Compare commits
3 Commits
v3.2.0-bet
...
refactor/h
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
156bba6141 | ||
|
|
7d1252f3c7 | ||
|
|
0c91465c63 |
@@ -26,7 +26,5 @@ DISABLE_CONTINUE=false
|
|||||||
OAUTH_WHITELIST=
|
OAUTH_WHITELIST=
|
||||||
GENERIC_NAME=My OAuth
|
GENERIC_NAME=My OAuth
|
||||||
SESSION_EXPIRY=7200
|
SESSION_EXPIRY=7200
|
||||||
LOGIN_TIMEOUT=300
|
|
||||||
LOGIN_MAX_RETRIES=5
|
|
||||||
LOG_LEVEL=0
|
LOG_LEVEL=0
|
||||||
APP_TITLE=Tinyauth SSO
|
APP_TITLE=Tinyauth SSO
|
||||||
6
.github/workflows/ci.yml
vendored
@@ -26,17 +26,17 @@ jobs:
|
|||||||
|
|
||||||
- name: Install frontend dependencies
|
- name: Install frontend dependencies
|
||||||
run: |
|
run: |
|
||||||
cd frontend
|
cd site
|
||||||
bun install
|
bun install
|
||||||
|
|
||||||
- name: Build frontend
|
- name: Build frontend
|
||||||
run: |
|
run: |
|
||||||
cd frontend
|
cd site
|
||||||
bun run build
|
bun run build
|
||||||
|
|
||||||
- name: Copy frontend
|
- name: Copy frontend
|
||||||
run: |
|
run: |
|
||||||
cp -r frontend/dist internal/assets/dist
|
cp -r site/dist internal/assets/dist
|
||||||
|
|
||||||
- name: Run tests
|
- name: Run tests
|
||||||
run: go test -v ./...
|
run: go test -v ./...
|
||||||
|
|||||||
98
.github/workflows/translations.yml
vendored
@@ -1,98 +0,0 @@
|
|||||||
name: Publish translations
|
|
||||||
|
|
||||||
on:
|
|
||||||
push:
|
|
||||||
branches:
|
|
||||||
- i18n_v*
|
|
||||||
workflow_dispatch:
|
|
||||||
|
|
||||||
permissions:
|
|
||||||
contents: read
|
|
||||||
pages: write
|
|
||||||
id-token: write
|
|
||||||
|
|
||||||
concurrency:
|
|
||||||
group: pages
|
|
||||||
cancel-in-progress: false
|
|
||||||
|
|
||||||
jobs:
|
|
||||||
get-branches:
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
outputs:
|
|
||||||
i18n-branches: ${{ steps.get-branches.outputs.result }}
|
|
||||||
steps:
|
|
||||||
- name: Get branches
|
|
||||||
id: get-branches
|
|
||||||
uses: actions/github-script@v7
|
|
||||||
with:
|
|
||||||
script: |
|
|
||||||
const { data: repos } = await github.rest.repos.listBranches({
|
|
||||||
owner: context.repo.owner,
|
|
||||||
repo: context.repo.repo,
|
|
||||||
})
|
|
||||||
|
|
||||||
const i18nBranches = repos.filter((branch) => branch.name.startsWith("i18n_v"))
|
|
||||||
const i18nBranchNames = i18nBranches.map((branch) => branch.name)
|
|
||||||
|
|
||||||
return i18nBranchNames
|
|
||||||
|
|
||||||
get-translations:
|
|
||||||
needs: get-branches
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
strategy:
|
|
||||||
matrix:
|
|
||||||
branch: ${{ fromJson(needs.get-branches.outputs.i18n-branches) }}
|
|
||||||
steps:
|
|
||||||
- name: Checkout
|
|
||||||
uses: actions/checkout@v4
|
|
||||||
with:
|
|
||||||
ref: ${{ matrix.branch }}
|
|
||||||
|
|
||||||
- name: Get translation version
|
|
||||||
id: get-version
|
|
||||||
run: |
|
|
||||||
branch=${{ matrix.branch }}
|
|
||||||
version=${branch#i18n_}
|
|
||||||
echo "version=$version" >> $GITHUB_OUTPUT
|
|
||||||
|
|
||||||
- name: Upload translations
|
|
||||||
uses: actions/upload-artifact@v4
|
|
||||||
with:
|
|
||||||
name: ${{ steps.get-version.outputs.version }}
|
|
||||||
path: frontend/src/lib/i18n/locales
|
|
||||||
|
|
||||||
build:
|
|
||||||
needs: get-translations
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
steps:
|
|
||||||
- name: Checkout
|
|
||||||
uses: actions/checkout@v4
|
|
||||||
|
|
||||||
- name: Setup Pages
|
|
||||||
uses: actions/configure-pages@v4
|
|
||||||
|
|
||||||
- name: Prepare output directory
|
|
||||||
run: |
|
|
||||||
mkdir -p dist/i18n/
|
|
||||||
|
|
||||||
- name: Download translations
|
|
||||||
uses: actions/download-artifact@v4
|
|
||||||
with:
|
|
||||||
path: dist/i18n/
|
|
||||||
|
|
||||||
- name: Upload artifact
|
|
||||||
uses: actions/upload-pages-artifact@v3
|
|
||||||
with:
|
|
||||||
path: dist
|
|
||||||
|
|
||||||
deploy:
|
|
||||||
environment:
|
|
||||||
name: github-pages
|
|
||||||
url: ${{ steps.deployment.outputs.page_url }}
|
|
||||||
needs: build
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
name: Deploy
|
|
||||||
steps:
|
|
||||||
- name: Deploy to GitHub Pages
|
|
||||||
id: deployment
|
|
||||||
uses: actions/deploy-pages@v4
|
|
||||||
@@ -20,22 +20,22 @@ cd tinyauth
|
|||||||
|
|
||||||
## Install requirements
|
## Install requirements
|
||||||
|
|
||||||
Although you will not need the requirements in your machine since the development will happen in docker, I still recommend to install them because this way you will not have import errors, to install the go requirements, run:
|
Although you will not need the requirements in your machine since the development will happen in docker, I still recommend to install them because this way you will not have errors, to install the go requirements, run:
|
||||||
|
|
||||||
```sh
|
```sh
|
||||||
go mod tidy
|
go mod tidy
|
||||||
```
|
```
|
||||||
|
|
||||||
You also need to download the frontend dependencies, this can be done like so:
|
You also need to download the frontend requirements, this can be done like so:
|
||||||
|
|
||||||
```sh
|
```sh
|
||||||
cd frontend/
|
cd site/
|
||||||
bun install
|
bun install
|
||||||
```
|
```
|
||||||
|
|
||||||
## Create your `.env` file
|
## Create your `.env` file
|
||||||
|
|
||||||
In order to configure the app you need to create an environment file, this can be done by copying the `.env.example` file to `.env` and modifying the environment variables inside to suit your needs.
|
In order to ocnfigure the app you need to create an environment file, this can be done by copying the `.env.example` file to `.env` and modifying the environment variables inside to suit your needs.
|
||||||
|
|
||||||
## Developing
|
## Developing
|
||||||
|
|
||||||
|
|||||||
33
Dockerfile
@@ -1,22 +1,22 @@
|
|||||||
# Site builder
|
# Site builder
|
||||||
FROM oven/bun:1.1.45-alpine AS frontend-builder
|
FROM oven/bun:1.1.45-alpine AS site-builder
|
||||||
|
|
||||||
WORKDIR /frontend
|
WORKDIR /site
|
||||||
|
|
||||||
COPY ./frontend/package.json ./
|
COPY ./site/package.json ./
|
||||||
COPY ./frontend/bun.lockb ./
|
COPY ./site/bun.lockb ./
|
||||||
|
|
||||||
RUN bun install
|
RUN bun install
|
||||||
|
|
||||||
COPY ./frontend/public ./public
|
COPY ./site/public ./public
|
||||||
COPY ./frontend/src ./src
|
COPY ./site/src ./src
|
||||||
COPY ./frontend/eslint.config.js ./
|
COPY ./site/eslint.config.js ./
|
||||||
COPY ./frontend/index.html ./
|
COPY ./site/index.html ./
|
||||||
COPY ./frontend/tsconfig.json ./
|
COPY ./site/tsconfig.json ./
|
||||||
COPY ./frontend/tsconfig.app.json ./
|
COPY ./site/tsconfig.app.json ./
|
||||||
COPY ./frontend/tsconfig.node.json ./
|
COPY ./site/tsconfig.node.json ./
|
||||||
COPY ./frontend/vite.config.ts ./
|
COPY ./site/vite.config.ts ./
|
||||||
COPY ./frontend/postcss.config.cjs ./
|
COPY ./site/postcss.config.cjs ./
|
||||||
|
|
||||||
RUN bun run build
|
RUN bun run build
|
||||||
|
|
||||||
@@ -33,7 +33,7 @@ RUN go mod download
|
|||||||
COPY ./main.go ./
|
COPY ./main.go ./
|
||||||
COPY ./cmd ./cmd
|
COPY ./cmd ./cmd
|
||||||
COPY ./internal ./internal
|
COPY ./internal ./internal
|
||||||
COPY --from=frontend-builder /frontend/dist ./internal/assets/dist
|
COPY --from=site-builder /site/dist ./internal/assets/dist
|
||||||
|
|
||||||
RUN CGO_ENABLED=0 go build -ldflags "-s -w"
|
RUN CGO_ENABLED=0 go build -ldflags "-s -w"
|
||||||
|
|
||||||
@@ -42,13 +42,8 @@ FROM alpine:3.21 AS runner
|
|||||||
|
|
||||||
WORKDIR /tinyauth
|
WORKDIR /tinyauth
|
||||||
|
|
||||||
RUN apk add --no-cache curl
|
|
||||||
|
|
||||||
COPY --from=builder /tinyauth/tinyauth ./
|
COPY --from=builder /tinyauth/tinyauth ./
|
||||||
|
|
||||||
EXPOSE 3000
|
EXPOSE 3000
|
||||||
|
|
||||||
HEALTHCHECK --interval=10s --timeout=5s \
|
|
||||||
CMD curl -f http://localhost:3000/api/healthcheck || exit 1
|
|
||||||
|
|
||||||
ENTRYPOINT ["./tinyauth"]
|
ENTRYPOINT ["./tinyauth"]
|
||||||
11
README.md
@@ -1,5 +1,5 @@
|
|||||||
<div align="center">
|
<div align="center">
|
||||||
<img alt="Tinyauth" title="Tinyauth" width="256" src="frontend/public/logo.png">
|
<img alt="Tinyauth" title="Tinyauth" width="256" src="site/public/logo.png">
|
||||||
<h1>Tinyauth</h1>
|
<h1>Tinyauth</h1>
|
||||||
<p>The easiest way to secure your apps with a login screen.</p>
|
<p>The easiest way to secure your apps with a login screen.</p>
|
||||||
</div>
|
</div>
|
||||||
@@ -10,7 +10,6 @@
|
|||||||
<img alt="Commit activity" src="https://img.shields.io/github/commit-activity/w/steveiliop56/tinyauth">
|
<img alt="Commit activity" src="https://img.shields.io/github/commit-activity/w/steveiliop56/tinyauth">
|
||||||
<img alt="Issues" src="https://img.shields.io/github/issues/steveiliop56/tinyauth">
|
<img alt="Issues" src="https://img.shields.io/github/issues/steveiliop56/tinyauth">
|
||||||
<img alt="Tinyauth CI" src="https://github.com/steveiliop56/tinyauth/actions/workflows/ci.yml/badge.svg">
|
<img alt="Tinyauth CI" src="https://github.com/steveiliop56/tinyauth/actions/workflows/ci.yml/badge.svg">
|
||||||
<a title="Crowdin" target="_blank" href="https://crowdin.com/project/tinyauth"><img src="https://badges.crowdin.net/tinyauth/localized.svg"></a>
|
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
<br />
|
<br />
|
||||||
@@ -39,10 +38,6 @@ You can find documentation and guides on all available configuration of tinyauth
|
|||||||
|
|
||||||
All contributions to the codebase are welcome! If you have any recommendations on how to improve security or find a security issue in tinyauth please open an issue or pull request so it can be fixed as soon as possible!
|
All contributions to the codebase are welcome! If you have any recommendations on how to improve security or find a security issue in tinyauth please open an issue or pull request so it can be fixed as soon as possible!
|
||||||
|
|
||||||
## Localization
|
|
||||||
|
|
||||||
If you would like to help translating the project in more languages you can do so by visiting the [Crowdin](https://crowdin.com/project/tinyauth) page.
|
|
||||||
|
|
||||||
## License
|
## License
|
||||||
|
|
||||||
Tinyauth is licensed under the GNU General Public License v3.0. TL;DR — You may copy, distribute and modify the software as long as you track changes/dates in source files. Any modifications to or software including (via compiler) GPL-licensed code must also be made available under the GPL along with build & install instructions. For more information about the license check the [license](./LICENSE) file.
|
Tinyauth is licensed under the GNU General Public License v3.0. TL;DR — You may copy, distribute and modify the software as long as you track changes/dates in source files. Any modifications to or software including (via compiler) GPL-licensed code must also be made available under the GPL along with build & install instructions. For more information about the license check the [license](./LICENSE) file.
|
||||||
@@ -61,7 +56,3 @@ Credits for the logo of this app go to:
|
|||||||
|
|
||||||
- **Freepik** for providing the police hat and badge.
|
- **Freepik** for providing the police hat and badge.
|
||||||
- **Renee French** for the original gopher logo.
|
- **Renee French** for the original gopher logo.
|
||||||
|
|
||||||
## Star History
|
|
||||||
|
|
||||||
[](https://www.star-history.com/#steveiliop56/tinyauth&Date)
|
|
||||||
1
air.toml
@@ -2,6 +2,7 @@ root = "/tinyauth"
|
|||||||
tmp_dir = "tmp"
|
tmp_dir = "tmp"
|
||||||
|
|
||||||
[build]
|
[build]
|
||||||
|
pre_cmd = ["go mod tidy"]
|
||||||
cmd = "go build -o ./tmp/tinyauth ."
|
cmd = "go build -o ./tmp/tinyauth ."
|
||||||
bin = "tmp/tinyauth"
|
bin = "tmp/tinyauth"
|
||||||
include_ext = ["go"]
|
include_ext = ["go"]
|
||||||
|
|||||||
@@ -14,7 +14,7 @@
|
|||||||
},
|
},
|
||||||
"timestamp": "2025-03-10T19:00:00.000Z",
|
"timestamp": "2025-03-10T19:00:00.000Z",
|
||||||
"thumbnail": {
|
"thumbnail": {
|
||||||
"url": "https://github.com/steveiliop56/tinyauth/blob/main/frontend/public/logo.png?raw=true"
|
"url": "https://github.com/steveiliop56/tinyauth/blob/main/site/public/logo.png?raw=true"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
|||||||
25
cmd/root.go
@@ -2,6 +2,7 @@ package cmd
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"errors"
|
"errors"
|
||||||
|
"fmt"
|
||||||
"os"
|
"os"
|
||||||
"strings"
|
"strings"
|
||||||
"time"
|
"time"
|
||||||
@@ -93,8 +94,10 @@ var rootCmd = &cobra.Command{
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Create handlers config
|
// Create handlers config
|
||||||
handlersConfig := types.HandlersConfig{
|
serverConfig := types.HandlersConfig{
|
||||||
AppURL: config.AppURL,
|
AppURL: config.AppURL,
|
||||||
|
Domain: fmt.Sprintf(".%s", domain),
|
||||||
|
CookieSecure: config.CookieSecure,
|
||||||
DisableContinue: config.DisableContinue,
|
DisableContinue: config.DisableContinue,
|
||||||
Title: config.Title,
|
Title: config.Title,
|
||||||
GenericName: config.GenericName,
|
GenericName: config.GenericName,
|
||||||
@@ -104,29 +107,21 @@ var rootCmd = &cobra.Command{
|
|||||||
apiConfig := types.APIConfig{
|
apiConfig := types.APIConfig{
|
||||||
Port: config.Port,
|
Port: config.Port,
|
||||||
Address: config.Address,
|
Address: config.Address,
|
||||||
}
|
|
||||||
|
|
||||||
// Create auth config
|
|
||||||
authConfig := types.AuthConfig{
|
|
||||||
Users: users,
|
|
||||||
OauthWhitelist: oauthWhitelist,
|
|
||||||
Secret: config.Secret,
|
Secret: config.Secret,
|
||||||
CookieSecure: config.CookieSecure,
|
CookieSecure: config.CookieSecure,
|
||||||
SessionExpiry: config.SessionExpiry,
|
SessionExpiry: config.SessionExpiry,
|
||||||
Domain: domain,
|
Domain: domain,
|
||||||
LoginTimeout: config.LoginTimeout,
|
|
||||||
LoginMaxRetries: config.LoginMaxRetries,
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// Create docker service
|
// Create docker service
|
||||||
docker := docker.NewDocker()
|
docker := docker.NewDocker()
|
||||||
|
|
||||||
// Initialize docker
|
// Initialize docker
|
||||||
err = docker.Init()
|
dockerErr := docker.Init()
|
||||||
HandleError(err, "Failed to initialize docker")
|
HandleError(dockerErr, "Failed to initialize docker")
|
||||||
|
|
||||||
// Create auth service
|
// Create auth service
|
||||||
auth := auth.NewAuth(authConfig, docker)
|
auth := auth.NewAuth(docker, users, oauthWhitelist, config.SessionExpiry)
|
||||||
|
|
||||||
// Create OAuth providers service
|
// Create OAuth providers service
|
||||||
providers := providers.NewProviders(oauthConfig)
|
providers := providers.NewProviders(oauthConfig)
|
||||||
@@ -138,7 +133,7 @@ var rootCmd = &cobra.Command{
|
|||||||
hooks := hooks.NewHooks(auth, providers)
|
hooks := hooks.NewHooks(auth, providers)
|
||||||
|
|
||||||
// Create handlers
|
// Create handlers
|
||||||
handlers := handlers.NewHandlers(handlersConfig, auth, hooks, providers, docker)
|
handlers := handlers.NewHandlers(serverConfig, auth, hooks, providers)
|
||||||
|
|
||||||
// Create API
|
// Create API
|
||||||
api := api.NewAPI(apiConfig, handlers)
|
api := api.NewAPI(apiConfig, handlers)
|
||||||
@@ -203,8 +198,6 @@ func init() {
|
|||||||
rootCmd.Flags().Bool("disable-continue", false, "Disable continue screen and redirect to app directly.")
|
rootCmd.Flags().Bool("disable-continue", false, "Disable continue screen and redirect to app directly.")
|
||||||
rootCmd.Flags().String("oauth-whitelist", "", "Comma separated list of email addresses to whitelist when using OAuth.")
|
rootCmd.Flags().String("oauth-whitelist", "", "Comma separated list of email addresses to whitelist when using OAuth.")
|
||||||
rootCmd.Flags().Int("session-expiry", 86400, "Session (cookie) expiration time in seconds.")
|
rootCmd.Flags().Int("session-expiry", 86400, "Session (cookie) expiration time in seconds.")
|
||||||
rootCmd.Flags().Int("login-timeout", 300, "Login timeout in seconds after max retries reached (0 to disable).")
|
|
||||||
rootCmd.Flags().Int("login-max-retries", 5, "Maximum login attempts before timeout (0 to disable).")
|
|
||||||
rootCmd.Flags().Int("log-level", 1, "Log level.")
|
rootCmd.Flags().Int("log-level", 1, "Log level.")
|
||||||
rootCmd.Flags().String("app-title", "Tinyauth", "Title of the app.")
|
rootCmd.Flags().String("app-title", "Tinyauth", "Title of the app.")
|
||||||
|
|
||||||
@@ -239,8 +232,6 @@ func init() {
|
|||||||
viper.BindEnv("session-expiry", "SESSION_EXPIRY")
|
viper.BindEnv("session-expiry", "SESSION_EXPIRY")
|
||||||
viper.BindEnv("log-level", "LOG_LEVEL")
|
viper.BindEnv("log-level", "LOG_LEVEL")
|
||||||
viper.BindEnv("app-title", "APP_TITLE")
|
viper.BindEnv("app-title", "APP_TITLE")
|
||||||
viper.BindEnv("login-timeout", "LOGIN_TIMEOUT")
|
|
||||||
viper.BindEnv("login-max-retries", "LOGIN_MAX_RETRIES")
|
|
||||||
|
|
||||||
// Bind flags to viper
|
// Bind flags to viper
|
||||||
viper.BindPFlags(rootCmd.Flags())
|
viper.BindPFlags(rootCmd.Flags())
|
||||||
|
|||||||
@@ -18,7 +18,7 @@ import (
|
|||||||
// Interactive flag
|
// Interactive flag
|
||||||
var interactive bool
|
var interactive bool
|
||||||
|
|
||||||
// Input user
|
// i stands for input
|
||||||
var iUser string
|
var iUser string
|
||||||
|
|
||||||
var GenerateCmd = &cobra.Command{
|
var GenerateCmd = &cobra.Command{
|
||||||
@@ -46,18 +46,18 @@ var GenerateCmd = &cobra.Command{
|
|||||||
)
|
)
|
||||||
|
|
||||||
// Run form
|
// Run form
|
||||||
err := form.WithTheme(baseTheme).Run()
|
formErr := form.WithTheme(baseTheme).Run()
|
||||||
|
|
||||||
if err != nil {
|
if formErr != nil {
|
||||||
log.Fatal().Err(err).Msg("Form failed")
|
log.Fatal().Err(formErr).Msg("Form failed")
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// Parse user
|
// Parse user
|
||||||
user, err := utils.ParseUser(iUser)
|
user, parseErr := utils.ParseUser(iUser)
|
||||||
|
|
||||||
if err != nil {
|
if parseErr != nil {
|
||||||
log.Fatal().Err(err).Msg("Failed to parse user")
|
log.Fatal().Err(parseErr).Msg("Failed to parse user")
|
||||||
}
|
}
|
||||||
|
|
||||||
// Check if user was using docker escape
|
// Check if user was using docker escape
|
||||||
@@ -73,13 +73,13 @@ var GenerateCmd = &cobra.Command{
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Generate totp secret
|
// Generate totp secret
|
||||||
key, err := totp.Generate(totp.GenerateOpts{
|
key, keyErr := totp.Generate(totp.GenerateOpts{
|
||||||
Issuer: "Tinyauth",
|
Issuer: "Tinyauth",
|
||||||
AccountName: user.Username,
|
AccountName: user.Username,
|
||||||
})
|
})
|
||||||
|
|
||||||
if err != nil {
|
if keyErr != nil {
|
||||||
log.Fatal().Err(err).Msg("Failed to generate totp secret")
|
log.Fatal().Err(keyErr).Msg("Failed to generate totp secret")
|
||||||
}
|
}
|
||||||
|
|
||||||
// Create secret
|
// Create secret
|
||||||
|
|||||||
@@ -12,10 +12,7 @@ import (
|
|||||||
"golang.org/x/crypto/bcrypt"
|
"golang.org/x/crypto/bcrypt"
|
||||||
)
|
)
|
||||||
|
|
||||||
// Interactive flag
|
|
||||||
var interactive bool
|
var interactive bool
|
||||||
|
|
||||||
// Docker flag
|
|
||||||
var docker bool
|
var docker bool
|
||||||
|
|
||||||
// i stands for input
|
// i stands for input
|
||||||
@@ -54,10 +51,10 @@ var CreateCmd = &cobra.Command{
|
|||||||
// Use simple theme
|
// Use simple theme
|
||||||
var baseTheme *huh.Theme = huh.ThemeBase()
|
var baseTheme *huh.Theme = huh.ThemeBase()
|
||||||
|
|
||||||
err := form.WithTheme(baseTheme).Run()
|
formErr := form.WithTheme(baseTheme).Run()
|
||||||
|
|
||||||
if err != nil {
|
if formErr != nil {
|
||||||
log.Fatal().Err(err).Msg("Form failed")
|
log.Fatal().Err(formErr).Msg("Form failed")
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -69,10 +66,10 @@ var CreateCmd = &cobra.Command{
|
|||||||
log.Info().Str("username", iUsername).Str("password", iPassword).Bool("docker", docker).Msg("Creating user")
|
log.Info().Str("username", iUsername).Str("password", iPassword).Bool("docker", docker).Msg("Creating user")
|
||||||
|
|
||||||
// Hash password
|
// Hash password
|
||||||
password, err := bcrypt.GenerateFromPassword([]byte(iPassword), bcrypt.DefaultCost)
|
password, passwordErr := bcrypt.GenerateFromPassword([]byte(iPassword), bcrypt.DefaultCost)
|
||||||
|
|
||||||
if err != nil {
|
if passwordErr != nil {
|
||||||
log.Fatal().Err(err).Msg("Failed to hash password")
|
log.Fatal().Err(passwordErr).Msg("Failed to hash password")
|
||||||
}
|
}
|
||||||
|
|
||||||
// Convert password to string
|
// Convert password to string
|
||||||
|
|||||||
@@ -12,10 +12,7 @@ import (
|
|||||||
"golang.org/x/crypto/bcrypt"
|
"golang.org/x/crypto/bcrypt"
|
||||||
)
|
)
|
||||||
|
|
||||||
// Interactive flag
|
|
||||||
var interactive bool
|
var interactive bool
|
||||||
|
|
||||||
// Docker flag
|
|
||||||
var docker bool
|
var docker bool
|
||||||
|
|
||||||
// i stands for input
|
// i stands for input
|
||||||
@@ -63,18 +60,18 @@ var VerifyCmd = &cobra.Command{
|
|||||||
)
|
)
|
||||||
|
|
||||||
// Run form
|
// Run form
|
||||||
err := form.WithTheme(baseTheme).Run()
|
formErr := form.WithTheme(baseTheme).Run()
|
||||||
|
|
||||||
if err != nil {
|
if formErr != nil {
|
||||||
log.Fatal().Err(err).Msg("Form failed")
|
log.Fatal().Err(formErr).Msg("Form failed")
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// Parse user
|
// Parse user
|
||||||
user, err := utils.ParseUser(iUser)
|
user, userErr := utils.ParseUser(iUser)
|
||||||
|
|
||||||
if err != nil {
|
if userErr != nil {
|
||||||
log.Fatal().Err(err).Msg("Failed to parse user")
|
log.Fatal().Err(userErr).Msg("Failed to parse user")
|
||||||
}
|
}
|
||||||
|
|
||||||
// Compare username
|
// Compare username
|
||||||
@@ -83,9 +80,9 @@ var VerifyCmd = &cobra.Command{
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Compare password
|
// Compare password
|
||||||
err = bcrypt.CompareHashAndPassword([]byte(user.Password), []byte(iPassword))
|
verifyErr := bcrypt.CompareHashAndPassword([]byte(user.Password), []byte(iPassword))
|
||||||
|
|
||||||
if err != nil {
|
if verifyErr != nil {
|
||||||
log.Fatal().Msg("Ppassword is incorrect")
|
log.Fatal().Msg("Ppassword is incorrect")
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -99,9 +96,9 @@ var VerifyCmd = &cobra.Command{
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Check totp code
|
// Check totp code
|
||||||
ok := totp.Validate(iTotp, user.TotpSecret)
|
totpOk := totp.Validate(iTotp, user.TotpSecret)
|
||||||
|
|
||||||
if !ok {
|
if !totpOk {
|
||||||
log.Fatal().Msg("Totp code incorrect")
|
log.Fatal().Msg("Totp code incorrect")
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
12
crowdin.yml
@@ -1,12 +0,0 @@
|
|||||||
"base_path": "."
|
|
||||||
"base_url": "https://api.crowdin.com"
|
|
||||||
|
|
||||||
"preserve_hierarchy": true
|
|
||||||
|
|
||||||
files:
|
|
||||||
[
|
|
||||||
{
|
|
||||||
"source": "/frontend/src/lib/i18n/locales/en.json",
|
|
||||||
"translation": "/frontend/src/lib/i18n/locales/%locale%.json",
|
|
||||||
},
|
|
||||||
]
|
|
||||||
@@ -14,20 +14,22 @@ services:
|
|||||||
labels:
|
labels:
|
||||||
traefik.enable: true
|
traefik.enable: true
|
||||||
traefik.http.routers.nginx.rule: Host(`whoami.example.com`)
|
traefik.http.routers.nginx.rule: Host(`whoami.example.com`)
|
||||||
|
traefik.http.services.nginx.loadbalancer.server.port: 80
|
||||||
traefik.http.routers.nginx.middlewares: tinyauth
|
traefik.http.routers.nginx.middlewares: tinyauth
|
||||||
|
|
||||||
tinyauth-frontend:
|
tinyauth-frontend:
|
||||||
container_name: tinyauth-frontend
|
container_name: tinyauth-frontend
|
||||||
build:
|
build:
|
||||||
context: .
|
context: .
|
||||||
dockerfile: frontend/Dockerfile.dev
|
dockerfile: site/Dockerfile.dev
|
||||||
volumes:
|
volumes:
|
||||||
- ./frontend/src:/frontend/src
|
- ./site/src:/site/src
|
||||||
ports:
|
ports:
|
||||||
- 5173:5173
|
- 5173:5173
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: true
|
traefik.enable: true
|
||||||
traefik.http.routers.tinyauth.rule: Host(`tinyauth.example.com`)
|
traefik.http.routers.tinyauth.rule: Host(`tinyauth.example.com`)
|
||||||
|
traefik.http.services.tinyauth.loadbalancer.server.port: 5173
|
||||||
|
|
||||||
tinyauth-backend:
|
tinyauth-backend:
|
||||||
container_name: tinyauth-backend
|
container_name: tinyauth-backend
|
||||||
@@ -39,7 +41,6 @@ services:
|
|||||||
- ./internal:/tinyauth/internal
|
- ./internal:/tinyauth/internal
|
||||||
- ./cmd:/tinyauth/cmd
|
- ./cmd:/tinyauth/cmd
|
||||||
- ./main.go:/tinyauth/main.go
|
- ./main.go:/tinyauth/main.go
|
||||||
- /var/run/docker.sock:/var/run/docker.sock
|
|
||||||
ports:
|
ports:
|
||||||
- 3000:3000
|
- 3000:3000
|
||||||
labels:
|
labels:
|
||||||
|
|||||||
@@ -14,6 +14,7 @@ services:
|
|||||||
labels:
|
labels:
|
||||||
traefik.enable: true
|
traefik.enable: true
|
||||||
traefik.http.routers.nginx.rule: Host(`whoami.example.com`)
|
traefik.http.routers.nginx.rule: Host(`whoami.example.com`)
|
||||||
|
traefik.http.services.nginx.loadbalancer.server.port: 80
|
||||||
traefik.http.routers.nginx.middlewares: tinyauth
|
traefik.http.routers.nginx.middlewares: tinyauth
|
||||||
|
|
||||||
tinyauth:
|
tinyauth:
|
||||||
@@ -26,4 +27,5 @@ services:
|
|||||||
labels:
|
labels:
|
||||||
traefik.enable: true
|
traefik.enable: true
|
||||||
traefik.http.routers.tinyauth.rule: Host(`tinyauth.example.com`)
|
traefik.http.routers.tinyauth.rule: Host(`tinyauth.example.com`)
|
||||||
|
traefik.http.services.tinyauth.loadbalancer.server.port: 3000
|
||||||
traefik.http.middlewares.tinyauth.forwardauth.address: http://tinyauth:3000/api/auth/traefik
|
traefik.http.middlewares.tinyauth.forwardauth.address: http://tinyauth:3000/api/auth/traefik
|
||||||
|
|||||||
@@ -1,23 +0,0 @@
|
|||||||
FROM oven/bun:1.1.45-alpine
|
|
||||||
|
|
||||||
WORKDIR /frontend
|
|
||||||
|
|
||||||
COPY ./frontend/package.json ./
|
|
||||||
COPY ./frontend/bun.lockb ./
|
|
||||||
|
|
||||||
RUN bun install
|
|
||||||
|
|
||||||
COPY ./frontend/public ./public
|
|
||||||
COPY ./frontend/src ./src
|
|
||||||
|
|
||||||
COPY ./frontend/eslint.config.js ./
|
|
||||||
COPY ./frontend/index.html ./
|
|
||||||
COPY ./frontend/tsconfig.json ./
|
|
||||||
COPY ./frontend/tsconfig.app.json ./
|
|
||||||
COPY ./frontend/tsconfig.node.json ./
|
|
||||||
COPY ./frontend/vite.config.ts ./
|
|
||||||
COPY ./frontend/postcss.config.cjs ./
|
|
||||||
|
|
||||||
EXPOSE 5173
|
|
||||||
|
|
||||||
ENTRYPOINT ["bun", "run", "dev"]
|
|
||||||
@@ -1,40 +0,0 @@
|
|||||||
import { ComboboxItem, Select } from "@mantine/core";
|
|
||||||
import { useState } from "react";
|
|
||||||
import i18n from "../../lib/i18n/i18n";
|
|
||||||
import {
|
|
||||||
SupportedLanguage,
|
|
||||||
getLanguageName,
|
|
||||||
languages,
|
|
||||||
} from "../../lib/i18n/locales";
|
|
||||||
|
|
||||||
export const LanguageSelector = () => {
|
|
||||||
const [language, setLanguage] = useState<ComboboxItem>({
|
|
||||||
value: i18n.language,
|
|
||||||
label: getLanguageName(i18n.language as SupportedLanguage),
|
|
||||||
});
|
|
||||||
|
|
||||||
const languageOptions = Object.entries(languages).map(([code, name]) => ({
|
|
||||||
value: code,
|
|
||||||
label: name,
|
|
||||||
}));
|
|
||||||
|
|
||||||
const handleLanguageChange = (option: string) => {
|
|
||||||
i18n.changeLanguage(option as SupportedLanguage);
|
|
||||||
setLanguage({
|
|
||||||
value: option,
|
|
||||||
label: getLanguageName(option as SupportedLanguage),
|
|
||||||
});
|
|
||||||
};
|
|
||||||
|
|
||||||
return (
|
|
||||||
<Select
|
|
||||||
data={languageOptions}
|
|
||||||
value={language ? language.value : null}
|
|
||||||
onChange={(_value, option) => handleLanguageChange(option.value)}
|
|
||||||
allowDeselect={false}
|
|
||||||
pos="absolute"
|
|
||||||
right={10}
|
|
||||||
top={10}
|
|
||||||
/>
|
|
||||||
);
|
|
||||||
};
|
|
||||||
@@ -1,16 +0,0 @@
|
|||||||
import { Center, Flex } from "@mantine/core";
|
|
||||||
import { ReactNode } from "react";
|
|
||||||
import { LanguageSelector } from "../language-selector/language-selector";
|
|
||||||
|
|
||||||
export const Layout = ({ children }: { children: ReactNode }) => {
|
|
||||||
return (
|
|
||||||
<>
|
|
||||||
<LanguageSelector />
|
|
||||||
<Center style={{ minHeight: "100vh" }}>
|
|
||||||
<Flex direction="column" flex="1" maw={340}>
|
|
||||||
{children}
|
|
||||||
</Flex>
|
|
||||||
</Center>
|
|
||||||
</>
|
|
||||||
);
|
|
||||||
};
|
|
||||||
@@ -1,37 +0,0 @@
|
|||||||
import i18n from "i18next";
|
|
||||||
import { initReactI18next } from "react-i18next";
|
|
||||||
import LanguageDetector from "i18next-browser-languagedetector";
|
|
||||||
import ChainedBackend from "i18next-chained-backend";
|
|
||||||
import resourcesToBackend from "i18next-resources-to-backend";
|
|
||||||
import HttpBackend from "i18next-http-backend";
|
|
||||||
|
|
||||||
i18n
|
|
||||||
.use(ChainedBackend)
|
|
||||||
.use(LanguageDetector)
|
|
||||||
.use(initReactI18next)
|
|
||||||
.init({
|
|
||||||
fallbackLng: "en",
|
|
||||||
debug: import.meta.env.MODE === "development",
|
|
||||||
|
|
||||||
interpolation: {
|
|
||||||
escapeValue: false,
|
|
||||||
},
|
|
||||||
|
|
||||||
load: "currentOnly",
|
|
||||||
|
|
||||||
backend: {
|
|
||||||
backends: [
|
|
||||||
HttpBackend,
|
|
||||||
resourcesToBackend(
|
|
||||||
(language: string) => import(`./locales/${language}.json`),
|
|
||||||
),
|
|
||||||
],
|
|
||||||
backendOptions: [
|
|
||||||
{
|
|
||||||
loadPath: "https://cdn.tinyauth.app/i18n/v1/{{lng}}.json",
|
|
||||||
},
|
|
||||||
],
|
|
||||||
},
|
|
||||||
});
|
|
||||||
|
|
||||||
export default i18n;
|
|
||||||
@@ -1,36 +0,0 @@
|
|||||||
export const languages = {
|
|
||||||
"af-ZA": "Afrikaans",
|
|
||||||
"ar-SA": "العربية",
|
|
||||||
"ca-ES": "Català",
|
|
||||||
"cs-CZ": "Čeština",
|
|
||||||
"da-DK": "Dansk",
|
|
||||||
"de-DE": "Deutsch",
|
|
||||||
"el-GR": "Ελληνικά",
|
|
||||||
"en-US": "English",
|
|
||||||
"es-ES": "Español",
|
|
||||||
"fi-FI": "Suomi",
|
|
||||||
"fr-FR": "Français",
|
|
||||||
"he-IL": "עברית",
|
|
||||||
"hu-HU": "Magyar",
|
|
||||||
"it-IT": "Italiano",
|
|
||||||
"ja-JP": "日本語",
|
|
||||||
"ko-KR": "한국어",
|
|
||||||
"nl-NL": "Nederlands",
|
|
||||||
"no-NO": "Norsk",
|
|
||||||
"pl-PL": "Polski",
|
|
||||||
"pt-BR": "Português",
|
|
||||||
"pt-PT": "Português",
|
|
||||||
"ro-RO": "Română",
|
|
||||||
"ru-RU": "Русский",
|
|
||||||
"sr-SP": "Српски",
|
|
||||||
"sv-SE": "Svenska",
|
|
||||||
"tr-TR": "Türkçe",
|
|
||||||
"uk-UA": "Українська",
|
|
||||||
"vi-VN": "Tiếng Việt",
|
|
||||||
"zh-CN": "中文",
|
|
||||||
"zh-TW": "中文"
|
|
||||||
}
|
|
||||||
|
|
||||||
export type SupportedLanguage = keyof typeof languages;
|
|
||||||
|
|
||||||
export const getLanguageName = (language: SupportedLanguage): string => languages[language];
|
|
||||||
@@ -1,45 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,45 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,45 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,45 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,45 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,45 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,45 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Καλώς ήρθατε, συνδεθείτε με",
|
|
||||||
"loginDivider": "Ή συνεχίστε με κωδικό πρόσβασης",
|
|
||||||
"loginUsername": "Όνομα Χρήστη",
|
|
||||||
"loginPassword": "Κωδικός",
|
|
||||||
"loginSubmit": "Είσοδος",
|
|
||||||
"loginFailTitle": "Αποτυχία σύνδεσης",
|
|
||||||
"loginFailSubtitle": "Παρακαλώ ελέγξτε το όνομα χρήστη και τον κωδικό πρόσβασης",
|
|
||||||
"loginSuccessTitle": "Συνδεδεμένος",
|
|
||||||
"loginSuccessSubtitle": "Καλώς ήρθατε!",
|
|
||||||
"loginOauthFailTitle": "Εσωτερικό σφάλμα",
|
|
||||||
"loginOauthFailSubtitle": "Αποτυχία λήψης OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Ανακατεύθυνση",
|
|
||||||
"loginOauthSuccessSubtitle": "Ανακατεύθυνση στον πάροχο OAuth σας",
|
|
||||||
"continueRedirectingTitle": "Ανακατεύθυνση...",
|
|
||||||
"continueRedirectingSubtitle": "Θα πρέπει να μεταφερθείτε σύντομα στην εφαρμογή σας",
|
|
||||||
"continueInvalidRedirectTitle": "Μη έγκυρη ανακατεύθυνση",
|
|
||||||
"continueInvalidRedirectSubtitle": "Το URL ανακατεύθυνσης δεν είναι έγκυρο",
|
|
||||||
"continueInsecureRedirectTitle": "Μη ασφαλής ανακατεύθυνση",
|
|
||||||
"continueInsecureRedirectSubtitle": "Προσπαθείτε να ανακατευθύνετε από <Code>https</Code> σε <Code>http</Code>, είστε σίγουροι ότι θέλετε να συνεχίσετε;",
|
|
||||||
"continueTitle": "Συνέχεια",
|
|
||||||
"continueSubtitle": "Κάντε κλικ στο κουμπί για να συνεχίσετε στην εφαρμογή σας.",
|
|
||||||
"internalErrorTitle": "Εσωτερικό Σφάλμα Διακομιστή",
|
|
||||||
"internalErrorSubtitle": "Παρουσιάστηκε σφάλμα στο διακομιστή και δεν μπορεί να εξυπηρετήσει το αίτημά σας.",
|
|
||||||
"internalErrorButton": "Προσπαθήστε ξανά",
|
|
||||||
"logoutFailTitle": "Αποτυχία αποσύνδεσης",
|
|
||||||
"logoutFailSubtitle": "Παρακαλώ δοκιμάστε ξανά",
|
|
||||||
"logoutSuccessTitle": "Αποσυνδεδεμένος",
|
|
||||||
"logoutSuccessSubtitle": "Έχετε αποσυνδεθεί",
|
|
||||||
"logoutTitle": "Αποσύνδεση",
|
|
||||||
"logoutUsernameSubtitle": "Αυτή τη στιγμή είστε συνδεδεμένοι ως <Code>{{username}}</Code>, κάντε κλικ στο παρακάτω κουμπί για να αποσυνδεθείτε.",
|
|
||||||
"logoutOauthSubtitle": "Αυτή τη στιγμή είστε συνδεδεμένοι ως <Code>{{username}}</Code> χρησιμοποιώντας την υπηρεσία παροχής {{provider}} OAuth, κάντε κλικ στο παρακάτω κουμπί για να αποσυνδεθείτε.",
|
|
||||||
"notFoundTitle": "Η σελίδα δε βρέθηκε",
|
|
||||||
"notFoundSubtitle": "Η σελίδα που ψάχνετε δεν υπάρχει.",
|
|
||||||
"notFoundButton": "Μετάβαση στην αρχική",
|
|
||||||
"totpFailTitle": "Αποτυχία επαλήθευσης κωδικού",
|
|
||||||
"totpFailSubtitle": "Παρακαλώ ελέγξτε τον κώδικά σας και προσπαθήστε ξανά",
|
|
||||||
"totpSuccessTitle": "Επαληθεύθηκε",
|
|
||||||
"totpSuccessSubtitle": "Ανακατεύθυνση στην εφαρμογή σας",
|
|
||||||
"totpTitle": "Εισάγετε τον κωδικό TOTP",
|
|
||||||
"unauthorizedTitle": "Μη εξουσιοδοτημένο",
|
|
||||||
"unauthorizedResourceSubtitle": "Ο χρήστης με όνομα χρήστη {{username}} δεν είναι εξουσιοδοτημένος να έχει πρόσβαση στον πόρο <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "Ο χρήστης με όνομα χρήστη {{username}} δεν είναι εξουσιοδοτημένος να συνδεθεί.",
|
|
||||||
"unauthorizedButton": "Προσπαθήστε ξανά"
|
|
||||||
}
|
|
||||||
@@ -1,46 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginFailRateLimit": "You failed to login too many times, please try again later",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,46 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginFailRateLimit": "You failed to login too many times, please try again later",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,45 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,45 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,45 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Bienvenue, connectez-vous avec",
|
|
||||||
"loginDivider": "Ou continuez avec le mot de passe",
|
|
||||||
"loginUsername": "Nom d'utilisateur",
|
|
||||||
"loginPassword": "Mot de passe",
|
|
||||||
"loginSubmit": "Se connecter",
|
|
||||||
"loginFailTitle": "Échec de la connexion",
|
|
||||||
"loginFailSubtitle": "Veuillez vérifier votre nom d'utilisateur et votre mot de passe",
|
|
||||||
"loginSuccessTitle": "Connecté",
|
|
||||||
"loginSuccessSubtitle": "Bienvenue!",
|
|
||||||
"loginOauthFailTitle": "Erreur interne",
|
|
||||||
"loginOauthFailSubtitle": "Impossible d'obtenir l'URL OAuth",
|
|
||||||
"loginOauthSuccessTitle": "Redirection",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirection vers votre fournisseur OAuth",
|
|
||||||
"continueRedirectingTitle": "Redirection...",
|
|
||||||
"continueRedirectingSubtitle": "Vous devriez être redirigé vers l'application bientôt",
|
|
||||||
"continueInvalidRedirectTitle": "Redirection invalide",
|
|
||||||
"continueInvalidRedirectSubtitle": "L'URL de redirection est invalide",
|
|
||||||
"continueInsecureRedirectTitle": "Redirection non sécurisée",
|
|
||||||
"continueInsecureRedirectSubtitle": "Vous essayez de rediriger de <Code>https</Code> vers <Code>http</Code>, êtes-vous sûr de vouloir continuer ?",
|
|
||||||
"continueTitle": "Continuer",
|
|
||||||
"continueSubtitle": "Cliquez sur le bouton pour continuer vers votre application.",
|
|
||||||
"internalErrorTitle": "Erreur interne du serveur",
|
|
||||||
"internalErrorSubtitle": "Une erreur s'est produite sur le serveur et il ne peut actuellement pas répondre à votre demande.",
|
|
||||||
"internalErrorButton": "Réessayer",
|
|
||||||
"logoutFailTitle": "Échec de la déconnexion",
|
|
||||||
"logoutFailSubtitle": "Veuillez réessayer",
|
|
||||||
"logoutSuccessTitle": "Déconnecté",
|
|
||||||
"logoutSuccessSubtitle": "Vous avez été déconnecté",
|
|
||||||
"logoutTitle": "Déconnexion",
|
|
||||||
"logoutUsernameSubtitle": "Vous êtes actuellement connecté en tant que <Code>{{username}}</Code>, cliquez sur le bouton ci-dessous pour vous déconnecter.",
|
|
||||||
"logoutOauthSubtitle": "Vous êtes actuellement connecté en tant que <Code>{{username}}</Code> en utilisant le fournisseur OAuth {{provider}} , cliquez sur le bouton ci-dessous pour vous déconnecter.",
|
|
||||||
"notFoundTitle": "Page introuvable",
|
|
||||||
"notFoundSubtitle": "La page recherchée n'existe pas.",
|
|
||||||
"notFoundButton": "Retour à la page d'accueil",
|
|
||||||
"totpFailTitle": "Échec de la vérification du code",
|
|
||||||
"totpFailSubtitle": "Veuillez vérifier votre code et réessayer",
|
|
||||||
"totpSuccessTitle": "Vérifié",
|
|
||||||
"totpSuccessSubtitle": "Redirection vers votre application",
|
|
||||||
"totpTitle": "Saisissez votre code TOTP",
|
|
||||||
"unauthorizedTitle": "Non autorisé",
|
|
||||||
"unauthorizedResourceSubtitle": "L'utilisateur avec le nom d'utilisateur {{username}} n'est pas autorisé à accéder à la ressource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "L'utilisateur avec le nom d'utilisateur {{username}} n'est pas autorisé à se connecter.",
|
|
||||||
"unauthorizedButton": "Réessayer"
|
|
||||||
}
|
|
||||||
@@ -1,45 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,45 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,45 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,45 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,45 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,45 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,45 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,45 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Witaj ponownie, zaloguj się przez",
|
|
||||||
"loginDivider": "Lub kontynuuj z hasłem",
|
|
||||||
"loginUsername": "Nazwa użytkownika",
|
|
||||||
"loginPassword": "Hasło",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Sprawdź swoją nazwę użytkownika i hasło",
|
|
||||||
"loginSuccessTitle": "Zalogowano",
|
|
||||||
"loginSuccessSubtitle": "Witaj ponownie!",
|
|
||||||
"loginOauthFailTitle": "Wewnętrzny błąd",
|
|
||||||
"loginOauthFailSubtitle": "Nie udało się uzyskać adresu URL OAuth",
|
|
||||||
"loginOauthSuccessTitle": "Przekierowywanie",
|
|
||||||
"loginOauthSuccessSubtitle": "Przekierowywanie do Twojego dostawcy OAuth",
|
|
||||||
"continueRedirectingTitle": "Przekierowywanie...",
|
|
||||||
"continueRedirectingSubtitle": "Wkrótce powinieneś zostać przekierowany do aplikacji",
|
|
||||||
"continueInvalidRedirectTitle": "Nieprawidłowe przekierowanie",
|
|
||||||
"continueInvalidRedirectSubtitle": "Adres przekierowania jest nieprawidłowy",
|
|
||||||
"continueInsecureRedirectTitle": "Niezabezpieczone przekierowanie",
|
|
||||||
"continueInsecureRedirectSubtitle": "Próbujesz przekierować z <Code>https</Code> do <Code>http</Code>, czy na pewno chcesz kontynuować?",
|
|
||||||
"continueTitle": "Kontynuuj",
|
|
||||||
"continueSubtitle": "Kliknij przycisk, aby przejść do aplikacji.",
|
|
||||||
"internalErrorTitle": "Wewnętrzny błąd serwera",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Spróbuj ponownie",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Spróbuj ponownie",
|
|
||||||
"logoutSuccessTitle": "Wylogowano",
|
|
||||||
"logoutSuccessSubtitle": "Zostałeś wylogowany",
|
|
||||||
"logoutTitle": "Wylogowanie",
|
|
||||||
"logoutUsernameSubtitle": "Jesteś aktualnie zalogowany jako <Code>{{username}}</Code>, kliknij przycisk poniżej, aby się wylogować.",
|
|
||||||
"logoutOauthSubtitle": "Jesteś obecnie zalogowany jako <Code>{{username}}</Code> przy użyciu providera OAuth {{provider}}, kliknij przycisk poniżej, aby się wylogować.",
|
|
||||||
"notFoundTitle": "Strona nie znaleziona",
|
|
||||||
"notFoundSubtitle": "Strona, której szukasz nie istnieje.",
|
|
||||||
"notFoundButton": "Wróć do strony głównej",
|
|
||||||
"totpFailTitle": "Nie udało się zweryfikować kodu",
|
|
||||||
"totpFailSubtitle": "Sprawdź swój kod i spróbuj ponownie",
|
|
||||||
"totpSuccessTitle": "Zweryfikowano",
|
|
||||||
"totpSuccessSubtitle": "Przekierowywanie do aplikacji",
|
|
||||||
"totpTitle": "Wprowadź kod TOTP",
|
|
||||||
"unauthorizedTitle": "Nieautoryzowany",
|
|
||||||
"unauthorizedResourceSubtitle": "Użytkownik o nazwie {{username}} nie jest upoważniony do uzyskania dostępu do zasobu <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "Użytkownik o nazwie {{username}} nie jest upoważniony do logowania.",
|
|
||||||
"unauthorizedButton": "Spróbuj ponownie"
|
|
||||||
}
|
|
||||||
@@ -1,45 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,45 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,45 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,45 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,45 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,45 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,45 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,45 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,45 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,45 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,45 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
4
go.mod
@@ -3,6 +3,7 @@ module tinyauth
|
|||||||
go 1.23.2
|
go 1.23.2
|
||||||
|
|
||||||
require (
|
require (
|
||||||
|
github.com/gin-contrib/sessions v1.0.2
|
||||||
github.com/gin-gonic/gin v1.10.0
|
github.com/gin-gonic/gin v1.10.0
|
||||||
github.com/go-playground/validator/v10 v10.24.0
|
github.com/go-playground/validator/v10 v10.24.0
|
||||||
github.com/google/go-querystring v1.1.0
|
github.com/google/go-querystring v1.1.0
|
||||||
@@ -57,8 +58,9 @@ require (
|
|||||||
github.com/go-playground/universal-translator v0.18.1 // indirect
|
github.com/go-playground/universal-translator v0.18.1 // indirect
|
||||||
github.com/goccy/go-json v0.10.4 // indirect
|
github.com/goccy/go-json v0.10.4 // indirect
|
||||||
github.com/gogo/protobuf v1.3.2 // indirect
|
github.com/gogo/protobuf v1.3.2 // indirect
|
||||||
|
github.com/gorilla/context v1.1.2 // indirect
|
||||||
github.com/gorilla/securecookie v1.1.2 // indirect
|
github.com/gorilla/securecookie v1.1.2 // indirect
|
||||||
github.com/gorilla/sessions v1.2.2
|
github.com/gorilla/sessions v1.2.2 // indirect
|
||||||
github.com/hashicorp/hcl v1.0.0 // indirect
|
github.com/hashicorp/hcl v1.0.0 // indirect
|
||||||
github.com/inconshreveable/mousetrap v1.1.0 // indirect
|
github.com/inconshreveable/mousetrap v1.1.0 // indirect
|
||||||
github.com/json-iterator/go v1.1.12 // indirect
|
github.com/json-iterator/go v1.1.12 // indirect
|
||||||
|
|||||||
4
go.sum
@@ -65,6 +65,8 @@ github.com/fsnotify/fsnotify v1.7.0 h1:8JEhPFa5W2WU7YfeZzPNqzMP6Lwt7L2715Ggo0nos
|
|||||||
github.com/fsnotify/fsnotify v1.7.0/go.mod h1:40Bi/Hjc2AVfZrqy+aj+yEI+/bRxZnMJyTJwOpGvigM=
|
github.com/fsnotify/fsnotify v1.7.0/go.mod h1:40Bi/Hjc2AVfZrqy+aj+yEI+/bRxZnMJyTJwOpGvigM=
|
||||||
github.com/gabriel-vasile/mimetype v1.4.8 h1:FfZ3gj38NjllZIeJAmMhr+qKL8Wu+nOoI3GqacKw1NM=
|
github.com/gabriel-vasile/mimetype v1.4.8 h1:FfZ3gj38NjllZIeJAmMhr+qKL8Wu+nOoI3GqacKw1NM=
|
||||||
github.com/gabriel-vasile/mimetype v1.4.8/go.mod h1:ByKUIKGjh1ODkGM1asKUbQZOLGrPjydw3hYPU2YU9t8=
|
github.com/gabriel-vasile/mimetype v1.4.8/go.mod h1:ByKUIKGjh1ODkGM1asKUbQZOLGrPjydw3hYPU2YU9t8=
|
||||||
|
github.com/gin-contrib/sessions v1.0.2 h1:UaIjUvTH1cMeOdj3in6dl+Xb6It8RiKRF9Z1anbUyCA=
|
||||||
|
github.com/gin-contrib/sessions v1.0.2/go.mod h1:KxKxWqWP5LJVDCInulOl4WbLzK2KSPlLesfZ66wRvMs=
|
||||||
github.com/gin-contrib/sse v1.0.0 h1:y3bT1mUWUxDpW4JLQg/HnTqV4rozuW4tC9eFKTxYI9E=
|
github.com/gin-contrib/sse v1.0.0 h1:y3bT1mUWUxDpW4JLQg/HnTqV4rozuW4tC9eFKTxYI9E=
|
||||||
github.com/gin-contrib/sse v1.0.0/go.mod h1:zNuFdwarAygJBht0NTKiSi3jRf6RbqeILZ9Sp6Slhe0=
|
github.com/gin-contrib/sse v1.0.0/go.mod h1:zNuFdwarAygJBht0NTKiSi3jRf6RbqeILZ9Sp6Slhe0=
|
||||||
github.com/gin-gonic/gin v1.10.0 h1:nTuyha1TYqgedzytsKYqna+DfLos46nTv2ygFy86HFU=
|
github.com/gin-gonic/gin v1.10.0 h1:nTuyha1TYqgedzytsKYqna+DfLos46nTv2ygFy86HFU=
|
||||||
@@ -97,6 +99,8 @@ github.com/google/gofuzz v1.2.0 h1:xRy4A+RhZaiKjJ1bPfwQ8sedCA+YS2YcCHW6ec7JMi0=
|
|||||||
github.com/google/gofuzz v1.2.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg=
|
github.com/google/gofuzz v1.2.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg=
|
||||||
github.com/google/uuid v1.6.0 h1:NIvaJDMOsjHA8n1jAhLSgzrAzy1Hgr+hNrb57e+94F0=
|
github.com/google/uuid v1.6.0 h1:NIvaJDMOsjHA8n1jAhLSgzrAzy1Hgr+hNrb57e+94F0=
|
||||||
github.com/google/uuid v1.6.0/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo=
|
github.com/google/uuid v1.6.0/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo=
|
||||||
|
github.com/gorilla/context v1.1.2 h1:WRkNAv2uoa03QNIc1A6u4O7DAGMUVoopZhkiXWA2V1o=
|
||||||
|
github.com/gorilla/context v1.1.2/go.mod h1:KDPwT9i/MeWHiLl90fuTgrt4/wPcv75vFAZLaOOcbxM=
|
||||||
github.com/gorilla/securecookie v1.1.2 h1:YCIWL56dvtr73r6715mJs5ZvhtnY73hBvEF8kXD8ePA=
|
github.com/gorilla/securecookie v1.1.2 h1:YCIWL56dvtr73r6715mJs5ZvhtnY73hBvEF8kXD8ePA=
|
||||||
github.com/gorilla/securecookie v1.1.2/go.mod h1:NfCASbcHqRSY+3a8tlWJwsQap2VX5pwzwo4h3eOamfo=
|
github.com/gorilla/securecookie v1.1.2/go.mod h1:NfCASbcHqRSY+3a8tlWJwsQap2VX5pwzwo4h3eOamfo=
|
||||||
github.com/gorilla/sessions v1.2.2 h1:lqzMYz6bOfvn2WriPUjNByzeXIlVzURcPmgMczkmTjY=
|
github.com/gorilla/sessions v1.2.2 h1:lqzMYz6bOfvn2WriPUjNByzeXIlVzURcPmgMczkmTjY=
|
||||||
|
|||||||
@@ -4,13 +4,14 @@ import (
|
|||||||
"fmt"
|
"fmt"
|
||||||
"io/fs"
|
"io/fs"
|
||||||
"net/http"
|
"net/http"
|
||||||
"os"
|
|
||||||
"strings"
|
"strings"
|
||||||
"time"
|
"time"
|
||||||
"tinyauth/internal/assets"
|
"tinyauth/internal/assets"
|
||||||
"tinyauth/internal/handlers"
|
"tinyauth/internal/handlers"
|
||||||
"tinyauth/internal/types"
|
"tinyauth/internal/types"
|
||||||
|
|
||||||
|
"github.com/gin-contrib/sessions"
|
||||||
|
"github.com/gin-contrib/sessions/cookie"
|
||||||
"github.com/gin-gonic/gin"
|
"github.com/gin-gonic/gin"
|
||||||
"github.com/rs/zerolog/log"
|
"github.com/rs/zerolog/log"
|
||||||
)
|
)
|
||||||
@@ -49,22 +50,26 @@ func (api *API) Init() {
|
|||||||
log.Debug().Msg("Setting up file server")
|
log.Debug().Msg("Setting up file server")
|
||||||
fileServer := http.FileServer(http.FS(dist))
|
fileServer := http.FileServer(http.FS(dist))
|
||||||
|
|
||||||
|
// Setup cookie store
|
||||||
|
log.Debug().Msg("Setting up cookie store")
|
||||||
|
store := cookie.NewStore([]byte(api.Config.Secret))
|
||||||
|
|
||||||
|
// Use session middleware
|
||||||
|
store.Options(sessions.Options{
|
||||||
|
Domain: api.Config.Domain,
|
||||||
|
Path: "/",
|
||||||
|
HttpOnly: true,
|
||||||
|
Secure: api.Config.CookieSecure,
|
||||||
|
MaxAge: api.Config.SessionExpiry,
|
||||||
|
})
|
||||||
|
|
||||||
|
router.Use(sessions.Sessions("tinyauth", store))
|
||||||
|
|
||||||
// UI middleware
|
// UI middleware
|
||||||
router.Use(func(c *gin.Context) {
|
router.Use(func(c *gin.Context) {
|
||||||
// If not an API request, serve the UI
|
// If not an API request, serve the UI
|
||||||
if !strings.HasPrefix(c.Request.URL.Path, "/api") {
|
if !strings.HasPrefix(c.Request.URL.Path, "/api") {
|
||||||
// Check if the file exists
|
|
||||||
_, err := fs.Stat(dist, strings.TrimPrefix(c.Request.URL.Path, "/"))
|
|
||||||
|
|
||||||
// If the file doesn't exist, serve the index.html
|
|
||||||
if os.IsNotExist(err) {
|
|
||||||
c.Request.URL.Path = "/"
|
|
||||||
}
|
|
||||||
|
|
||||||
// Serve the file
|
|
||||||
fileServer.ServeHTTP(c.Writer, c.Request)
|
fileServer.ServeHTTP(c.Writer, c.Request)
|
||||||
|
|
||||||
// Stop further processing
|
|
||||||
c.Abort()
|
c.Abort()
|
||||||
}
|
}
|
||||||
})
|
})
|
||||||
|
|||||||
@@ -23,27 +23,21 @@ import (
|
|||||||
var apiConfig = types.APIConfig{
|
var apiConfig = types.APIConfig{
|
||||||
Port: 8080,
|
Port: 8080,
|
||||||
Address: "0.0.0.0",
|
Address: "0.0.0.0",
|
||||||
|
Secret: "super-secret-api-thing-for-tests", // It is 32 chars long
|
||||||
|
CookieSecure: false,
|
||||||
|
SessionExpiry: 3600,
|
||||||
}
|
}
|
||||||
|
|
||||||
// Simple handlers config for tests
|
// Simple handlers config for tests
|
||||||
var handlersConfig = types.HandlersConfig{
|
var handlersConfig = types.HandlersConfig{
|
||||||
AppURL: "http://localhost:8080",
|
AppURL: "http://localhost:8080",
|
||||||
|
Domain: ".localhost",
|
||||||
|
CookieSecure: false,
|
||||||
DisableContinue: false,
|
DisableContinue: false,
|
||||||
Title: "Tinyauth",
|
Title: "Tinyauth",
|
||||||
GenericName: "Generic",
|
GenericName: "Generic",
|
||||||
}
|
}
|
||||||
|
|
||||||
// Simple auth config for tests
|
|
||||||
var authConfig = types.AuthConfig{
|
|
||||||
Users: types.Users{},
|
|
||||||
OauthWhitelist: []string{},
|
|
||||||
Secret: "super-secret-api-thing-for-tests", // It is 32 chars long
|
|
||||||
CookieSecure: false,
|
|
||||||
SessionExpiry: 3600,
|
|
||||||
LoginTimeout: 0,
|
|
||||||
LoginMaxRetries: 0,
|
|
||||||
}
|
|
||||||
|
|
||||||
// Cookie
|
// Cookie
|
||||||
var cookie string
|
var cookie string
|
||||||
|
|
||||||
@@ -59,21 +53,20 @@ func getAPI(t *testing.T) *api.API {
|
|||||||
docker := docker.NewDocker()
|
docker := docker.NewDocker()
|
||||||
|
|
||||||
// Initialize docker
|
// Initialize docker
|
||||||
err := docker.Init()
|
dockerErr := docker.Init()
|
||||||
|
|
||||||
// Check if there was an error
|
// Check if there was an error
|
||||||
if err != nil {
|
if dockerErr != nil {
|
||||||
t.Fatalf("Failed to initialize docker: %v", err)
|
t.Fatalf("Failed to initialize docker: %v", dockerErr)
|
||||||
}
|
}
|
||||||
|
|
||||||
// Create auth service
|
// Create auth service
|
||||||
authConfig.Users = types.Users{
|
auth := auth.NewAuth(docker, types.Users{
|
||||||
{
|
{
|
||||||
Username: user.Username,
|
Username: user.Username,
|
||||||
Password: user.Password,
|
Password: user.Password,
|
||||||
},
|
},
|
||||||
}
|
}, nil, apiConfig.SessionExpiry)
|
||||||
auth := auth.NewAuth(authConfig, docker)
|
|
||||||
|
|
||||||
// Create providers service
|
// Create providers service
|
||||||
providers := providers.NewProviders(types.OAuthConfig{})
|
providers := providers.NewProviders(types.OAuthConfig{})
|
||||||
@@ -85,7 +78,7 @@ func getAPI(t *testing.T) *api.API {
|
|||||||
hooks := hooks.NewHooks(auth, providers)
|
hooks := hooks.NewHooks(auth, providers)
|
||||||
|
|
||||||
// Create handlers service
|
// Create handlers service
|
||||||
handlers := handlers.NewHandlers(handlersConfig, auth, hooks, providers, docker)
|
handlers := handlers.NewHandlers(handlersConfig, auth, hooks, providers)
|
||||||
|
|
||||||
// Create API
|
// Create API
|
||||||
api := api.NewAPI(apiConfig, handlers)
|
api := api.NewAPI(apiConfig, handlers)
|
||||||
@@ -174,21 +167,21 @@ func TestAppContext(t *testing.T) {
|
|||||||
assert.Equal(t, recorder.Code, http.StatusOK)
|
assert.Equal(t, recorder.Code, http.StatusOK)
|
||||||
|
|
||||||
// Read the body of the response
|
// Read the body of the response
|
||||||
body, err := io.ReadAll(recorder.Body)
|
body, bodyErr := io.ReadAll(recorder.Body)
|
||||||
|
|
||||||
// Check if there was an error
|
// Check if there was an error
|
||||||
if err != nil {
|
if bodyErr != nil {
|
||||||
t.Fatalf("Error getting body: %v", err)
|
t.Fatalf("Error getting body: %v", bodyErr)
|
||||||
}
|
}
|
||||||
|
|
||||||
// Unmarshal the body into the user struct
|
// Unmarshal the body into the user struct
|
||||||
var app types.AppContext
|
var app types.AppContext
|
||||||
|
|
||||||
err = json.Unmarshal(body, &app)
|
jsonErr := json.Unmarshal(body, &app)
|
||||||
|
|
||||||
// Check if there was an error
|
// Check if there was an error
|
||||||
if err != nil {
|
if jsonErr != nil {
|
||||||
t.Fatalf("Error unmarshalling body: %v", err)
|
t.Fatalf("Error unmarshalling body: %v", jsonErr)
|
||||||
}
|
}
|
||||||
|
|
||||||
// Create tests values
|
// Create tests values
|
||||||
@@ -238,11 +231,11 @@ func TestUserContext(t *testing.T) {
|
|||||||
assert.Equal(t, recorder.Code, http.StatusOK)
|
assert.Equal(t, recorder.Code, http.StatusOK)
|
||||||
|
|
||||||
// Read the body of the response
|
// Read the body of the response
|
||||||
body, err := io.ReadAll(recorder.Body)
|
body, bodyErr := io.ReadAll(recorder.Body)
|
||||||
|
|
||||||
// Check if there was an error
|
// Check if there was an error
|
||||||
if err != nil {
|
if bodyErr != nil {
|
||||||
t.Fatalf("Error getting body: %v", err)
|
t.Fatalf("Error getting body: %v", bodyErr)
|
||||||
}
|
}
|
||||||
|
|
||||||
// Unmarshal the body into the user struct
|
// Unmarshal the body into the user struct
|
||||||
@@ -252,11 +245,11 @@ func TestUserContext(t *testing.T) {
|
|||||||
|
|
||||||
var user User
|
var user User
|
||||||
|
|
||||||
err = json.Unmarshal(body, &user)
|
jsonErr := json.Unmarshal(body, &user)
|
||||||
|
|
||||||
// Check if there was an error
|
// Check if there was an error
|
||||||
if err != nil {
|
if jsonErr != nil {
|
||||||
t.Fatalf("Error unmarshalling body: %v", err)
|
t.Fatalf("Error unmarshalling body: %v", jsonErr)
|
||||||
}
|
}
|
||||||
|
|
||||||
// We should get the username back
|
// We should get the username back
|
||||||
|
|||||||
@@ -1 +1 @@
|
|||||||
v3.2.0
|
v3.1.0
|
||||||
@@ -1,64 +1,38 @@
|
|||||||
package auth
|
package auth
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"fmt"
|
|
||||||
"net/http"
|
|
||||||
"regexp"
|
"regexp"
|
||||||
"slices"
|
"slices"
|
||||||
"strings"
|
"strings"
|
||||||
"sync"
|
|
||||||
"time"
|
"time"
|
||||||
"tinyauth/internal/docker"
|
"tinyauth/internal/docker"
|
||||||
"tinyauth/internal/types"
|
"tinyauth/internal/types"
|
||||||
|
|
||||||
|
"github.com/gin-contrib/sessions"
|
||||||
"github.com/gin-gonic/gin"
|
"github.com/gin-gonic/gin"
|
||||||
"github.com/gorilla/sessions"
|
|
||||||
"github.com/rs/zerolog/log"
|
"github.com/rs/zerolog/log"
|
||||||
"golang.org/x/crypto/bcrypt"
|
"golang.org/x/crypto/bcrypt"
|
||||||
)
|
)
|
||||||
|
|
||||||
func NewAuth(config types.AuthConfig, docker *docker.Docker) *Auth {
|
func NewAuth(docker *docker.Docker, userList types.Users, oauthWhitelist []string, sessionExpiry int) *Auth {
|
||||||
return &Auth{
|
return &Auth{
|
||||||
Config: config,
|
|
||||||
Docker: docker,
|
Docker: docker,
|
||||||
LoginAttempts: make(map[string]*types.LoginAttempt),
|
Users: userList,
|
||||||
|
OAuthWhitelist: oauthWhitelist,
|
||||||
|
SessionExpiry: sessionExpiry,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
type Auth struct {
|
type Auth struct {
|
||||||
Config types.AuthConfig
|
Users types.Users
|
||||||
Docker *docker.Docker
|
Docker *docker.Docker
|
||||||
LoginAttempts map[string]*types.LoginAttempt
|
OAuthWhitelist []string
|
||||||
LoginMutex sync.RWMutex
|
SessionExpiry int
|
||||||
}
|
|
||||||
|
|
||||||
func (auth *Auth) GetSession(c *gin.Context) (*sessions.Session, error) {
|
|
||||||
// Create cookie store
|
|
||||||
store := sessions.NewCookieStore([]byte(auth.Config.Secret))
|
|
||||||
|
|
||||||
// Configure cookie store
|
|
||||||
store.Options = &sessions.Options{
|
|
||||||
Path: "/",
|
|
||||||
MaxAge: auth.Config.SessionExpiry,
|
|
||||||
Secure: auth.Config.CookieSecure,
|
|
||||||
HttpOnly: true,
|
|
||||||
SameSite: http.SameSiteDefaultMode,
|
|
||||||
Domain: fmt.Sprintf(".%s", auth.Config.Domain),
|
|
||||||
}
|
|
||||||
|
|
||||||
// Get session
|
|
||||||
session, err := store.Get(c.Request, "tinyauth")
|
|
||||||
if err != nil {
|
|
||||||
log.Error().Err(err).Msg("Failed to get session")
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
|
|
||||||
return session, nil
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (auth *Auth) GetUser(username string) *types.User {
|
func (auth *Auth) GetUser(username string) *types.User {
|
||||||
// Loop through users and return the user if the username matches
|
// Loop through users and return the user if the username matches
|
||||||
for _, user := range auth.Config.Users {
|
for _, user := range auth.Users {
|
||||||
if user.Username == username {
|
if user.Username == username {
|
||||||
return &user
|
return &user
|
||||||
}
|
}
|
||||||
@@ -71,78 +45,14 @@ func (auth *Auth) CheckPassword(user types.User, password string) bool {
|
|||||||
return bcrypt.CompareHashAndPassword([]byte(user.Password), []byte(password)) == nil
|
return bcrypt.CompareHashAndPassword([]byte(user.Password), []byte(password)) == nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// IsAccountLocked checks if a username or IP is locked due to too many failed login attempts
|
|
||||||
func (auth *Auth) IsAccountLocked(identifier string) (bool, int) {
|
|
||||||
auth.LoginMutex.RLock()
|
|
||||||
defer auth.LoginMutex.RUnlock()
|
|
||||||
|
|
||||||
// Return false if rate limiting is not configured
|
|
||||||
if auth.Config.LoginMaxRetries <= 0 || auth.Config.LoginTimeout <= 0 {
|
|
||||||
return false, 0
|
|
||||||
}
|
|
||||||
|
|
||||||
// Check if the identifier exists in the map
|
|
||||||
attempt, exists := auth.LoginAttempts[identifier]
|
|
||||||
if !exists {
|
|
||||||
return false, 0
|
|
||||||
}
|
|
||||||
|
|
||||||
// If account is locked, check if lock time has expired
|
|
||||||
if attempt.LockedUntil.After(time.Now()) {
|
|
||||||
// Calculate remaining lockout time in seconds
|
|
||||||
remaining := int(time.Until(attempt.LockedUntil).Seconds())
|
|
||||||
return true, remaining
|
|
||||||
}
|
|
||||||
|
|
||||||
// Lock has expired
|
|
||||||
return false, 0
|
|
||||||
}
|
|
||||||
|
|
||||||
// RecordLoginAttempt records a login attempt for rate limiting
|
|
||||||
func (auth *Auth) RecordLoginAttempt(identifier string, success bool) {
|
|
||||||
// Skip if rate limiting is not configured
|
|
||||||
if auth.Config.LoginMaxRetries <= 0 || auth.Config.LoginTimeout <= 0 {
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
auth.LoginMutex.Lock()
|
|
||||||
defer auth.LoginMutex.Unlock()
|
|
||||||
|
|
||||||
// Get current attempt record or create a new one
|
|
||||||
attempt, exists := auth.LoginAttempts[identifier]
|
|
||||||
if !exists {
|
|
||||||
attempt = &types.LoginAttempt{}
|
|
||||||
auth.LoginAttempts[identifier] = attempt
|
|
||||||
}
|
|
||||||
|
|
||||||
// Update last attempt time
|
|
||||||
attempt.LastAttempt = time.Now()
|
|
||||||
|
|
||||||
// If successful login, reset failed attempts
|
|
||||||
if success {
|
|
||||||
attempt.FailedAttempts = 0
|
|
||||||
attempt.LockedUntil = time.Time{} // Reset lock time
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// Increment failed attempts
|
|
||||||
attempt.FailedAttempts++
|
|
||||||
|
|
||||||
// If max retries reached, lock the account
|
|
||||||
if attempt.FailedAttempts >= auth.Config.LoginMaxRetries {
|
|
||||||
attempt.LockedUntil = time.Now().Add(time.Duration(auth.Config.LoginTimeout) * time.Second)
|
|
||||||
log.Warn().Str("identifier", identifier).Int("timeout", auth.Config.LoginTimeout).Msg("Account locked due to too many failed login attempts")
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func (auth *Auth) EmailWhitelisted(emailSrc string) bool {
|
func (auth *Auth) EmailWhitelisted(emailSrc string) bool {
|
||||||
// If the whitelist is empty, allow all emails
|
// If the whitelist is empty, allow all emails
|
||||||
if len(auth.Config.OauthWhitelist) == 0 {
|
if len(auth.OAuthWhitelist) == 0 {
|
||||||
return true
|
return true
|
||||||
}
|
}
|
||||||
|
|
||||||
// Loop through the whitelist and return true if the email matches
|
// Loop through the whitelist and return true if the email matches
|
||||||
for _, email := range auth.Config.OauthWhitelist {
|
for _, email := range auth.OAuthWhitelist {
|
||||||
if email == emailSrc {
|
if email == emailSrc {
|
||||||
return true
|
return true
|
||||||
}
|
}
|
||||||
@@ -152,15 +62,11 @@ func (auth *Auth) EmailWhitelisted(emailSrc string) bool {
|
|||||||
return false
|
return false
|
||||||
}
|
}
|
||||||
|
|
||||||
func (auth *Auth) CreateSessionCookie(c *gin.Context, data *types.SessionCookie) error {
|
func (auth *Auth) CreateSessionCookie(c *gin.Context, data *types.SessionCookie) {
|
||||||
log.Debug().Msg("Creating session cookie")
|
log.Debug().Msg("Creating session cookie")
|
||||||
|
|
||||||
// Get session
|
// Get session
|
||||||
session, err := auth.GetSession(c)
|
sessions := sessions.Default(c)
|
||||||
if err != nil {
|
|
||||||
log.Error().Err(err).Msg("Failed to get session")
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
log.Debug().Msg("Setting session cookie")
|
log.Debug().Msg("Setting session cookie")
|
||||||
|
|
||||||
@@ -170,73 +76,54 @@ func (auth *Auth) CreateSessionCookie(c *gin.Context, data *types.SessionCookie)
|
|||||||
if data.TotpPending {
|
if data.TotpPending {
|
||||||
sessionExpiry = 3600
|
sessionExpiry = 3600
|
||||||
} else {
|
} else {
|
||||||
sessionExpiry = auth.Config.SessionExpiry
|
sessionExpiry = auth.SessionExpiry
|
||||||
}
|
}
|
||||||
|
|
||||||
// Set data
|
// Set data
|
||||||
session.Values["username"] = data.Username
|
sessions.Set("username", data.Username)
|
||||||
session.Values["provider"] = data.Provider
|
sessions.Set("provider", data.Provider)
|
||||||
session.Values["expiry"] = time.Now().Add(time.Duration(sessionExpiry) * time.Second).Unix()
|
sessions.Set("expiry", time.Now().Add(time.Duration(sessionExpiry)*time.Second).Unix())
|
||||||
session.Values["totpPending"] = data.TotpPending
|
sessions.Set("totpPending", data.TotpPending)
|
||||||
session.Values["redirectURI"] = data.RedirectURI
|
|
||||||
|
|
||||||
// Save session
|
// Save session
|
||||||
err = session.Save(c.Request, c.Writer)
|
sessions.Save()
|
||||||
if err != nil {
|
|
||||||
log.Error().Err(err).Msg("Failed to save session")
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
// Return nil
|
|
||||||
return nil
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (auth *Auth) DeleteSessionCookie(c *gin.Context) error {
|
func (auth *Auth) DeleteSessionCookie(c *gin.Context) {
|
||||||
log.Debug().Msg("Deleting session cookie")
|
log.Debug().Msg("Deleting session cookie")
|
||||||
|
|
||||||
// Get session
|
// Get session
|
||||||
session, err := auth.GetSession(c)
|
sessions := sessions.Default(c)
|
||||||
if err != nil {
|
|
||||||
log.Error().Err(err).Msg("Failed to get session")
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
// Delete all values in the session
|
// Clear session
|
||||||
for key := range session.Values {
|
sessions.Clear()
|
||||||
delete(session.Values, key)
|
|
||||||
}
|
|
||||||
|
|
||||||
// Save session
|
// Save session
|
||||||
err = session.Save(c.Request, c.Writer)
|
sessions.Save()
|
||||||
if err != nil {
|
|
||||||
log.Error().Err(err).Msg("Failed to save session")
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
// Return nil
|
|
||||||
return nil
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (auth *Auth) GetSessionCookie(c *gin.Context) (types.SessionCookie, error) {
|
func (auth *Auth) GetSessionCookie(c *gin.Context) types.SessionCookie {
|
||||||
log.Debug().Msg("Getting session cookie")
|
log.Debug().Msg("Getting session cookie")
|
||||||
|
|
||||||
// Get session
|
// Get session
|
||||||
session, err := auth.GetSession(c)
|
sessions := sessions.Default(c)
|
||||||
if err != nil {
|
|
||||||
log.Error().Err(err).Msg("Failed to get session")
|
|
||||||
return types.SessionCookie{}, err
|
|
||||||
}
|
|
||||||
|
|
||||||
// Get data from session
|
// Get data
|
||||||
username, usernameOk := session.Values["username"].(string)
|
cookieUsername := sessions.Get("username")
|
||||||
provider, providerOK := session.Values["provider"].(string)
|
cookieProvider := sessions.Get("provider")
|
||||||
redirectURI, redirectOK := session.Values["redirectURI"].(string)
|
cookieExpiry := sessions.Get("expiry")
|
||||||
expiry, expiryOk := session.Values["expiry"].(int64)
|
cookieTotpPending := sessions.Get("totpPending")
|
||||||
totpPending, totpPendingOk := session.Values["totpPending"].(bool)
|
|
||||||
|
|
||||||
if !usernameOk || !providerOK || !expiryOk || !redirectOK || !totpPendingOk {
|
// Convert interfaces to correct types
|
||||||
log.Warn().Msg("Session cookie is missing data")
|
username, usernameOk := cookieUsername.(string)
|
||||||
return types.SessionCookie{}, nil
|
provider, providerOk := cookieProvider.(string)
|
||||||
|
expiry, expiryOk := cookieExpiry.(int64)
|
||||||
|
totpPending, totpPendingOk := cookieTotpPending.(bool)
|
||||||
|
|
||||||
|
// Check if the cookie is invalid
|
||||||
|
if !usernameOk || !providerOk || !expiryOk || !totpPendingOk {
|
||||||
|
log.Warn().Msg("Session cookie invalid")
|
||||||
|
return types.SessionCookie{}
|
||||||
}
|
}
|
||||||
|
|
||||||
// Check if the cookie has expired
|
// Check if the cookie has expired
|
||||||
@@ -247,7 +134,7 @@ func (auth *Auth) GetSessionCookie(c *gin.Context) (types.SessionCookie, error)
|
|||||||
auth.DeleteSessionCookie(c)
|
auth.DeleteSessionCookie(c)
|
||||||
|
|
||||||
// Return empty cookie
|
// Return empty cookie
|
||||||
return types.SessionCookie{}, nil
|
return types.SessionCookie{}
|
||||||
}
|
}
|
||||||
|
|
||||||
log.Debug().Str("username", username).Str("provider", provider).Int64("expiry", expiry).Bool("totpPending", totpPending).Msg("Parsed cookie")
|
log.Debug().Str("username", username).Str("provider", provider).Int64("expiry", expiry).Bool("totpPending", totpPending).Msg("Parsed cookie")
|
||||||
@@ -257,13 +144,12 @@ func (auth *Auth) GetSessionCookie(c *gin.Context) (types.SessionCookie, error)
|
|||||||
Username: username,
|
Username: username,
|
||||||
Provider: provider,
|
Provider: provider,
|
||||||
TotpPending: totpPending,
|
TotpPending: totpPending,
|
||||||
RedirectURI: redirectURI,
|
}
|
||||||
}, nil
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (auth *Auth) UserAuthConfigured() bool {
|
func (auth *Auth) UserAuthConfigured() bool {
|
||||||
// If there are users, return true
|
// If there are users, return true
|
||||||
return len(auth.Config.Users) > 0
|
return len(auth.Users) > 0
|
||||||
}
|
}
|
||||||
|
|
||||||
func (auth *Auth) ResourceAllowed(c *gin.Context, context types.UserContext) (bool, error) {
|
func (auth *Auth) ResourceAllowed(c *gin.Context, context types.UserContext) (bool, error) {
|
||||||
@@ -273,15 +159,9 @@ func (auth *Auth) ResourceAllowed(c *gin.Context, context types.UserContext) (bo
|
|||||||
// Get app id
|
// Get app id
|
||||||
appId := strings.Split(host, ".")[0]
|
appId := strings.Split(host, ".")[0]
|
||||||
|
|
||||||
// Get the container labels
|
// Check if resource is allowed
|
||||||
labels, err := auth.Docker.GetLabels(appId)
|
allowed, allowedErr := auth.Docker.ContainerAction(appId, func(labels types.TinyauthLabels) (bool, error) {
|
||||||
|
// If the container has an oauth whitelist, check if the user is in it
|
||||||
// If there is an error, return false
|
|
||||||
if err != nil {
|
|
||||||
return false, err
|
|
||||||
}
|
|
||||||
|
|
||||||
// Check if oauth is allowed
|
|
||||||
if context.OAuth {
|
if context.OAuth {
|
||||||
if len(labels.OAuthWhitelist) == 0 {
|
if len(labels.OAuthWhitelist) == 0 {
|
||||||
return true, nil
|
return true, nil
|
||||||
@@ -290,18 +170,30 @@ func (auth *Auth) ResourceAllowed(c *gin.Context, context types.UserContext) (bo
|
|||||||
if slices.Contains(labels.OAuthWhitelist, context.Username) {
|
if slices.Contains(labels.OAuthWhitelist, context.Username) {
|
||||||
return true, nil
|
return true, nil
|
||||||
}
|
}
|
||||||
|
return false, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// Check if user is allowed
|
// If the container has users, check if the user is in it
|
||||||
if len(labels.Users) != 0 {
|
if len(labels.Users) != 0 {
|
||||||
log.Debug().Msg("Checking users")
|
log.Debug().Msg("Checking users")
|
||||||
if slices.Contains(labels.Users, context.Username) {
|
if slices.Contains(labels.Users, context.Username) {
|
||||||
return true, nil
|
return true, nil
|
||||||
}
|
}
|
||||||
|
return false, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// Not allowed
|
// Allowed
|
||||||
return false, nil
|
return true, nil
|
||||||
|
})
|
||||||
|
|
||||||
|
// If there is an error, return false
|
||||||
|
if allowedErr != nil {
|
||||||
|
log.Error().Err(allowedErr).Msg("Error checking if resource is allowed")
|
||||||
|
return false, allowedErr
|
||||||
|
}
|
||||||
|
|
||||||
|
// Return if the resource is allowed
|
||||||
|
return allowed, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (auth *Auth) AuthEnabled(c *gin.Context) (bool, error) {
|
func (auth *Auth) AuthEnabled(c *gin.Context) (bool, error) {
|
||||||
@@ -312,14 +204,8 @@ func (auth *Auth) AuthEnabled(c *gin.Context) (bool, error) {
|
|||||||
// Get app id
|
// Get app id
|
||||||
appId := strings.Split(host, ".")[0]
|
appId := strings.Split(host, ".")[0]
|
||||||
|
|
||||||
// Get the container labels
|
// Check if auth is enabled
|
||||||
labels, err := auth.Docker.GetLabels(appId)
|
enabled, enabledErr := auth.Docker.ContainerAction(appId, func(labels types.TinyauthLabels) (bool, error) {
|
||||||
|
|
||||||
// If there is an error, auth enabled
|
|
||||||
if err != nil {
|
|
||||||
return true, err
|
|
||||||
}
|
|
||||||
|
|
||||||
// Check if the allowed label is empty
|
// Check if the allowed label is empty
|
||||||
if labels.Allowed == "" {
|
if labels.Allowed == "" {
|
||||||
// Auth enabled
|
// Auth enabled
|
||||||
@@ -327,12 +213,12 @@ func (auth *Auth) AuthEnabled(c *gin.Context) (bool, error) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Compile regex
|
// Compile regex
|
||||||
regex, err := regexp.Compile(labels.Allowed)
|
regex, regexErr := regexp.Compile(labels.Allowed)
|
||||||
|
|
||||||
// If there is an error, invalid regex, auth enabled
|
// If there is an error, invalid regex, auth enabled
|
||||||
if err != nil {
|
if regexErr != nil {
|
||||||
log.Warn().Err(err).Msg("Invalid regex")
|
log.Warn().Err(regexErr).Msg("Invalid regex")
|
||||||
return true, err
|
return true, regexErr
|
||||||
}
|
}
|
||||||
|
|
||||||
// Check if the uri matches the regex
|
// Check if the uri matches the regex
|
||||||
@@ -343,6 +229,15 @@ func (auth *Auth) AuthEnabled(c *gin.Context) (bool, error) {
|
|||||||
|
|
||||||
// Auth enabled
|
// Auth enabled
|
||||||
return true, nil
|
return true, nil
|
||||||
|
})
|
||||||
|
|
||||||
|
// If there is an error, auth enabled
|
||||||
|
if enabledErr != nil {
|
||||||
|
log.Error().Err(enabledErr).Msg("Error checking if auth is enabled")
|
||||||
|
return true, enabledErr
|
||||||
|
}
|
||||||
|
|
||||||
|
return enabled, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (auth *Auth) GetBasicAuth(c *gin.Context) *types.User {
|
func (auth *Auth) GetBasicAuth(c *gin.Context) *types.User {
|
||||||
|
|||||||
@@ -1,147 +0,0 @@
|
|||||||
package auth_test
|
|
||||||
|
|
||||||
import (
|
|
||||||
"testing"
|
|
||||||
"time"
|
|
||||||
"tinyauth/internal/auth"
|
|
||||||
"tinyauth/internal/docker"
|
|
||||||
"tinyauth/internal/types"
|
|
||||||
)
|
|
||||||
|
|
||||||
var config = types.AuthConfig{
|
|
||||||
Users: types.Users{},
|
|
||||||
OauthWhitelist: []string{},
|
|
||||||
SessionExpiry: 3600,
|
|
||||||
}
|
|
||||||
|
|
||||||
func TestLoginRateLimiting(t *testing.T) {
|
|
||||||
// Initialize a new auth service with 3 max retries and 5 seconds timeout
|
|
||||||
config.LoginMaxRetries = 3
|
|
||||||
config.LoginTimeout = 5
|
|
||||||
authService := auth.NewAuth(config, &docker.Docker{})
|
|
||||||
|
|
||||||
// Test identifier
|
|
||||||
identifier := "test_user"
|
|
||||||
|
|
||||||
// Test successful login - should not lock account
|
|
||||||
t.Log("Testing successful login")
|
|
||||||
|
|
||||||
authService.RecordLoginAttempt(identifier, true)
|
|
||||||
locked, _ := authService.IsAccountLocked(identifier)
|
|
||||||
|
|
||||||
if locked {
|
|
||||||
t.Fatalf("Account should not be locked after successful login")
|
|
||||||
}
|
|
||||||
|
|
||||||
// Test 2 failed attempts - should not lock account yet
|
|
||||||
t.Log("Testing 2 failed login attempts")
|
|
||||||
|
|
||||||
authService.RecordLoginAttempt(identifier, false)
|
|
||||||
authService.RecordLoginAttempt(identifier, false)
|
|
||||||
locked, _ = authService.IsAccountLocked(identifier)
|
|
||||||
|
|
||||||
if locked {
|
|
||||||
t.Fatalf("Account should not be locked after only 2 failed attempts")
|
|
||||||
}
|
|
||||||
|
|
||||||
// Add one more failed attempt (total 3) - should lock account with maxRetries=3
|
|
||||||
t.Log("Testing 3 failed login attempts")
|
|
||||||
authService.RecordLoginAttempt(identifier, false)
|
|
||||||
locked, remainingTime := authService.IsAccountLocked(identifier)
|
|
||||||
|
|
||||||
if !locked {
|
|
||||||
t.Fatalf("Account should be locked after reaching max retries")
|
|
||||||
}
|
|
||||||
if remainingTime <= 0 || remainingTime > 5 {
|
|
||||||
t.Fatalf("Expected remaining time between 1-5 seconds, got %d", remainingTime)
|
|
||||||
}
|
|
||||||
|
|
||||||
// Test reset after waiting for timeout - use 1 second timeout for fast testing
|
|
||||||
t.Log("Testing unlocking after timeout")
|
|
||||||
|
|
||||||
// Reinitialize auth service with a shorter timeout for testing
|
|
||||||
config.LoginTimeout = 1
|
|
||||||
config.LoginMaxRetries = 3
|
|
||||||
authService = auth.NewAuth(config, &docker.Docker{})
|
|
||||||
|
|
||||||
// Add enough failed attempts to lock the account
|
|
||||||
for i := 0; i < 3; i++ {
|
|
||||||
authService.RecordLoginAttempt(identifier, false)
|
|
||||||
}
|
|
||||||
|
|
||||||
// Verify it's locked
|
|
||||||
locked, _ = authService.IsAccountLocked(identifier)
|
|
||||||
if !locked {
|
|
||||||
t.Fatalf("Account should be locked initially")
|
|
||||||
}
|
|
||||||
|
|
||||||
// Wait a bit and verify it gets unlocked after timeout
|
|
||||||
time.Sleep(1500 * time.Millisecond) // Wait longer than the timeout
|
|
||||||
locked, _ = authService.IsAccountLocked(identifier)
|
|
||||||
|
|
||||||
if locked {
|
|
||||||
t.Fatalf("Account should be unlocked after timeout period")
|
|
||||||
}
|
|
||||||
|
|
||||||
// Test disabled rate limiting
|
|
||||||
t.Log("Testing disabled rate limiting")
|
|
||||||
config.LoginMaxRetries = 0
|
|
||||||
config.LoginTimeout = 0
|
|
||||||
authService = auth.NewAuth(config, &docker.Docker{})
|
|
||||||
|
|
||||||
for i := 0; i < 10; i++ {
|
|
||||||
authService.RecordLoginAttempt(identifier, false)
|
|
||||||
}
|
|
||||||
|
|
||||||
locked, _ = authService.IsAccountLocked(identifier)
|
|
||||||
if locked {
|
|
||||||
t.Fatalf("Account should not be locked when rate limiting is disabled")
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func TestConcurrentLoginAttempts(t *testing.T) {
|
|
||||||
// Initialize a new auth service with 2 max retries and 5 seconds timeout
|
|
||||||
config.LoginMaxRetries = 2
|
|
||||||
config.LoginTimeout = 5
|
|
||||||
authService := auth.NewAuth(config, &docker.Docker{})
|
|
||||||
|
|
||||||
// Test multiple identifiers
|
|
||||||
identifiers := []string{"user1", "user2", "user3"}
|
|
||||||
|
|
||||||
// Test that locking one identifier doesn't affect others
|
|
||||||
t.Log("Testing multiple identifiers")
|
|
||||||
|
|
||||||
// Add enough failed attempts to lock first user (2 attempts with maxRetries=2)
|
|
||||||
authService.RecordLoginAttempt(identifiers[0], false)
|
|
||||||
authService.RecordLoginAttempt(identifiers[0], false)
|
|
||||||
|
|
||||||
// Check if first user is locked
|
|
||||||
locked, _ := authService.IsAccountLocked(identifiers[0])
|
|
||||||
if !locked {
|
|
||||||
t.Fatalf("User1 should be locked after reaching max retries")
|
|
||||||
}
|
|
||||||
|
|
||||||
// Check that other users are not affected
|
|
||||||
for i := 1; i < len(identifiers); i++ {
|
|
||||||
locked, _ := authService.IsAccountLocked(identifiers[i])
|
|
||||||
if locked {
|
|
||||||
t.Fatalf("User%d should not be locked", i+1)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Test successful login after failed attempts (but before lock)
|
|
||||||
t.Log("Testing successful login after failed attempts but before lock")
|
|
||||||
|
|
||||||
// One failed attempt for user2
|
|
||||||
authService.RecordLoginAttempt(identifiers[1], false)
|
|
||||||
|
|
||||||
// Successful login should reset the counter
|
|
||||||
authService.RecordLoginAttempt(identifiers[1], true)
|
|
||||||
|
|
||||||
// Now try a failed login again - should not be locked as counter was reset
|
|
||||||
authService.RecordLoginAttempt(identifiers[1], false)
|
|
||||||
locked, _ = authService.IsAccountLocked(identifiers[1])
|
|
||||||
if locked {
|
|
||||||
t.Fatalf("User2 should not be locked after successful login reset")
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@@ -5,5 +5,4 @@ var TinyauthLabels = []string{
|
|||||||
"tinyauth.oauth.whitelist",
|
"tinyauth.oauth.whitelist",
|
||||||
"tinyauth.users",
|
"tinyauth.users",
|
||||||
"tinyauth.allowed",
|
"tinyauth.allowed",
|
||||||
"tinyauth.headers",
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -3,7 +3,7 @@ package docker
|
|||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
"strings"
|
"strings"
|
||||||
"tinyauth/internal/types"
|
appTypes "tinyauth/internal/types"
|
||||||
"tinyauth/internal/utils"
|
"tinyauth/internal/utils"
|
||||||
|
|
||||||
apiTypes "github.com/docker/docker/api/types"
|
apiTypes "github.com/docker/docker/api/types"
|
||||||
@@ -23,7 +23,7 @@ type Docker struct {
|
|||||||
|
|
||||||
func (docker *Docker) Init() error {
|
func (docker *Docker) Init() error {
|
||||||
// Create a new docker client
|
// Create a new docker client
|
||||||
client, err := client.NewClientWithOpts(client.FromEnv)
|
apiClient, err := client.NewClientWithOpts(client.FromEnv)
|
||||||
|
|
||||||
// Check if there was an error
|
// Check if there was an error
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@@ -32,7 +32,7 @@ func (docker *Docker) Init() error {
|
|||||||
|
|
||||||
// Set the context and api client
|
// Set the context and api client
|
||||||
docker.Context = context.Background()
|
docker.Context = context.Background()
|
||||||
docker.Client = client
|
docker.Client = apiClient
|
||||||
|
|
||||||
// Done
|
// Done
|
||||||
return nil
|
return nil
|
||||||
@@ -70,22 +70,22 @@ func (docker *Docker) DockerConnected() bool {
|
|||||||
return err == nil
|
return err == nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (docker *Docker) GetLabels(appId string) (types.TinyauthLabels, error) {
|
func (docker *Docker) ContainerAction(appId string, runCheck func(labels appTypes.TinyauthLabels) (bool, error)) (bool, error) {
|
||||||
// Check if we have access to the Docker API
|
// Check if we have access to the Docker API
|
||||||
isConnected := docker.DockerConnected()
|
isConnected := docker.DockerConnected()
|
||||||
|
|
||||||
// If we don't have access, return an empty struct
|
// If we don't have access, it is assumed that the check passed
|
||||||
if !isConnected {
|
if !isConnected {
|
||||||
log.Debug().Msg("Docker not connected, returning empty labels")
|
log.Debug().Msg("Docker not connected, passing check")
|
||||||
return types.TinyauthLabels{}, nil
|
return true, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// Get the containers
|
// Get the containers
|
||||||
containers, err := docker.GetContainers()
|
containers, containersErr := docker.GetContainers()
|
||||||
|
|
||||||
// If there is an error, return false
|
// If there is an error, return false
|
||||||
if err != nil {
|
if containersErr != nil {
|
||||||
return types.TinyauthLabels{}, err
|
return false, containersErr
|
||||||
}
|
}
|
||||||
|
|
||||||
log.Debug().Msg("Got containers")
|
log.Debug().Msg("Got containers")
|
||||||
@@ -93,15 +93,15 @@ func (docker *Docker) GetLabels(appId string) (types.TinyauthLabels, error) {
|
|||||||
// Loop through the containers
|
// Loop through the containers
|
||||||
for _, container := range containers {
|
for _, container := range containers {
|
||||||
// Inspect the container
|
// Inspect the container
|
||||||
inspect, err := docker.InspectContainer(container.ID)
|
inspect, inspectErr := docker.InspectContainer(container.ID)
|
||||||
|
|
||||||
// If there is an error, return false
|
// If there is an error, return false
|
||||||
if err != nil {
|
if inspectErr != nil {
|
||||||
return types.TinyauthLabels{}, err
|
return false, inspectErr
|
||||||
}
|
}
|
||||||
|
|
||||||
// Get the container name (for some reason it is /name)
|
// Get the container name (for some reason it is /name)
|
||||||
containerName := strings.TrimPrefix(inspect.Name, "/")
|
containerName := strings.Split(inspect.Name, "/")[1]
|
||||||
|
|
||||||
// There is a container with the same name as the app ID
|
// There is a container with the same name as the app ID
|
||||||
if containerName == appId {
|
if containerName == appId {
|
||||||
@@ -112,14 +112,14 @@ func (docker *Docker) GetLabels(appId string) (types.TinyauthLabels, error) {
|
|||||||
|
|
||||||
log.Debug().Msg("Got labels")
|
log.Debug().Msg("Got labels")
|
||||||
|
|
||||||
// Return labels
|
// Run the check
|
||||||
return labels, nil
|
return runCheck(labels)
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
log.Debug().Msg("No matching container found, returning empty labels")
|
log.Debug().Msg("No matching container found, passing check")
|
||||||
|
|
||||||
// If no matching container is found, return empty labels
|
// If no matching container is found, pass check
|
||||||
return types.TinyauthLabels{}, nil
|
return true, nil
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -6,7 +6,6 @@ import (
|
|||||||
"net/http"
|
"net/http"
|
||||||
"strings"
|
"strings"
|
||||||
"tinyauth/internal/auth"
|
"tinyauth/internal/auth"
|
||||||
"tinyauth/internal/docker"
|
|
||||||
"tinyauth/internal/hooks"
|
"tinyauth/internal/hooks"
|
||||||
"tinyauth/internal/providers"
|
"tinyauth/internal/providers"
|
||||||
"tinyauth/internal/types"
|
"tinyauth/internal/types"
|
||||||
@@ -17,13 +16,12 @@ import (
|
|||||||
"github.com/rs/zerolog/log"
|
"github.com/rs/zerolog/log"
|
||||||
)
|
)
|
||||||
|
|
||||||
func NewHandlers(config types.HandlersConfig, auth *auth.Auth, hooks *hooks.Hooks, providers *providers.Providers, docker *docker.Docker) *Handlers {
|
func NewHandlers(config types.HandlersConfig, auth *auth.Auth, hooks *hooks.Hooks, providers *providers.Providers) *Handlers {
|
||||||
return &Handlers{
|
return &Handlers{
|
||||||
Config: config,
|
Config: config,
|
||||||
Auth: auth,
|
Auth: auth,
|
||||||
Hooks: hooks,
|
Hooks: hooks,
|
||||||
Providers: providers,
|
Providers: providers,
|
||||||
Docker: docker,
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -32,7 +30,6 @@ type Handlers struct {
|
|||||||
Auth *auth.Auth
|
Auth *auth.Auth
|
||||||
Hooks *hooks.Hooks
|
Hooks *hooks.Hooks
|
||||||
Providers *providers.Providers
|
Providers *providers.Providers
|
||||||
Docker *docker.Docker
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (h *Handlers) AuthHandler(c *gin.Context) {
|
func (h *Handlers) AuthHandler(c *gin.Context) {
|
||||||
@@ -63,39 +60,12 @@ func (h *Handlers) AuthHandler(c *gin.Context) {
|
|||||||
|
|
||||||
log.Debug().Interface("proxy", proxy.Proxy).Msg("Got proxy")
|
log.Debug().Interface("proxy", proxy.Proxy).Msg("Got proxy")
|
||||||
|
|
||||||
// Get headers
|
|
||||||
uri := c.Request.Header.Get("X-Forwarded-Uri")
|
|
||||||
proto := c.Request.Header.Get("X-Forwarded-Proto")
|
|
||||||
host := c.Request.Header.Get("X-Forwarded-Host")
|
|
||||||
|
|
||||||
// Check if auth is enabled
|
// Check if auth is enabled
|
||||||
authEnabled, err := h.Auth.AuthEnabled(c)
|
authEnabled, err := h.Auth.AuthEnabled(c)
|
||||||
|
|
||||||
// Check if there was an error
|
// Handle error
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Error().Err(err).Msg("Failed to check if app is allowed")
|
log.Error().Err(err).Msg("Failed to check if auth is enabled")
|
||||||
|
|
||||||
if proxy.Proxy == "nginx" || !isBrowser {
|
|
||||||
c.JSON(500, gin.H{
|
|
||||||
"status": 500,
|
|
||||||
"message": "Internal Server Error",
|
|
||||||
})
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
c.Redirect(http.StatusPermanentRedirect, fmt.Sprintf("%s/error", h.Config.AppURL))
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// Get the app id
|
|
||||||
appId := strings.Split(host, ".")[0]
|
|
||||||
|
|
||||||
// Get the container labels
|
|
||||||
labels, err := h.Docker.GetLabels(appId)
|
|
||||||
|
|
||||||
// Check if there was an error
|
|
||||||
if err != nil {
|
|
||||||
log.Error().Err(err).Msg("Failed to check if app is allowed")
|
|
||||||
|
|
||||||
if proxy.Proxy == "nginx" || !isBrowser {
|
if proxy.Proxy == "nginx" || !isBrowser {
|
||||||
c.JSON(500, gin.H{
|
c.JSON(500, gin.H{
|
||||||
@@ -111,10 +81,6 @@ func (h *Handlers) AuthHandler(c *gin.Context) {
|
|||||||
|
|
||||||
// If auth is not enabled, return 200
|
// If auth is not enabled, return 200
|
||||||
if !authEnabled {
|
if !authEnabled {
|
||||||
for key, value := range labels.Headers {
|
|
||||||
log.Debug().Str("key", key).Str("value", value).Msg("Setting header")
|
|
||||||
c.Header(key, value)
|
|
||||||
}
|
|
||||||
c.JSON(200, gin.H{
|
c.JSON(200, gin.H{
|
||||||
"status": 200,
|
"status": 200,
|
||||||
"message": "Authenticated",
|
"message": "Authenticated",
|
||||||
@@ -125,6 +91,11 @@ func (h *Handlers) AuthHandler(c *gin.Context) {
|
|||||||
// Get user context
|
// Get user context
|
||||||
userContext := h.Hooks.UseUserContext(c)
|
userContext := h.Hooks.UseUserContext(c)
|
||||||
|
|
||||||
|
// Get headers
|
||||||
|
uri := c.Request.Header.Get("X-Forwarded-Uri")
|
||||||
|
proto := c.Request.Header.Get("X-Forwarded-Proto")
|
||||||
|
host := c.Request.Header.Get("X-Forwarded-Host")
|
||||||
|
|
||||||
// Check if user is logged in
|
// Check if user is logged in
|
||||||
if userContext.IsLoggedIn {
|
if userContext.IsLoggedIn {
|
||||||
log.Debug().Msg("Authenticated")
|
log.Debug().Msg("Authenticated")
|
||||||
@@ -173,7 +144,7 @@ func (h *Handlers) AuthHandler(c *gin.Context) {
|
|||||||
|
|
||||||
// Handle error (no need to check for nginx/headers since we are sure we are using caddy/traefik)
|
// Handle error (no need to check for nginx/headers since we are sure we are using caddy/traefik)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Error().Err(err).Msg("Failed to build queries")
|
log.Error().Err(err).Msg("Failed to build query")
|
||||||
c.Redirect(http.StatusPermanentRedirect, fmt.Sprintf("%s/error", h.Config.AppURL))
|
c.Redirect(http.StatusPermanentRedirect, fmt.Sprintf("%s/error", h.Config.AppURL))
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
@@ -186,12 +157,6 @@ func (h *Handlers) AuthHandler(c *gin.Context) {
|
|||||||
// Set the user header
|
// Set the user header
|
||||||
c.Header("Remote-User", userContext.Username)
|
c.Header("Remote-User", userContext.Username)
|
||||||
|
|
||||||
// Set the rest of the headers
|
|
||||||
for key, value := range labels.Headers {
|
|
||||||
log.Debug().Str("key", key).Str("value", value).Msg("Setting header")
|
|
||||||
c.Header(key, value)
|
|
||||||
}
|
|
||||||
|
|
||||||
// The user is allowed to access the app
|
// The user is allowed to access the app
|
||||||
c.JSON(200, gin.H{
|
c.JSON(200, gin.H{
|
||||||
"status": 200,
|
"status": 200,
|
||||||
@@ -219,7 +184,7 @@ func (h *Handlers) AuthHandler(c *gin.Context) {
|
|||||||
})
|
})
|
||||||
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Error().Err(err).Msg("Failed to build queries")
|
log.Error().Err(err).Msg("Failed to build query")
|
||||||
c.Redirect(http.StatusPermanentRedirect, fmt.Sprintf("%s/error", h.Config.AppURL))
|
c.Redirect(http.StatusPermanentRedirect, fmt.Sprintf("%s/error", h.Config.AppURL))
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
@@ -249,34 +214,12 @@ func (h *Handlers) LoginHandler(c *gin.Context) {
|
|||||||
|
|
||||||
log.Debug().Msg("Got login request")
|
log.Debug().Msg("Got login request")
|
||||||
|
|
||||||
// Get client IP for rate limiting
|
|
||||||
clientIP := c.ClientIP()
|
|
||||||
|
|
||||||
// Create an identifier for rate limiting (username or IP if username doesn't exist yet)
|
|
||||||
rateIdentifier := login.Username
|
|
||||||
if rateIdentifier == "" {
|
|
||||||
rateIdentifier = clientIP
|
|
||||||
}
|
|
||||||
|
|
||||||
// Check if the account is locked due to too many failed attempts
|
|
||||||
locked, remainingTime := h.Auth.IsAccountLocked(rateIdentifier)
|
|
||||||
if locked {
|
|
||||||
log.Warn().Str("identifier", rateIdentifier).Int("remaining_seconds", remainingTime).Msg("Account is locked due to too many failed login attempts")
|
|
||||||
c.JSON(429, gin.H{
|
|
||||||
"status": 429,
|
|
||||||
"message": fmt.Sprintf("Too many failed login attempts. Try again in %d seconds", remainingTime),
|
|
||||||
})
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// Get user based on username
|
// Get user based on username
|
||||||
user := h.Auth.GetUser(login.Username)
|
user := h.Auth.GetUser(login.Username)
|
||||||
|
|
||||||
// User does not exist
|
// User does not exist
|
||||||
if user == nil {
|
if user == nil {
|
||||||
log.Debug().Str("username", login.Username).Msg("User not found")
|
log.Debug().Str("username", login.Username).Msg("User not found")
|
||||||
// Record failed login attempt
|
|
||||||
h.Auth.RecordLoginAttempt(rateIdentifier, false)
|
|
||||||
c.JSON(401, gin.H{
|
c.JSON(401, gin.H{
|
||||||
"status": 401,
|
"status": 401,
|
||||||
"message": "Unauthorized",
|
"message": "Unauthorized",
|
||||||
@@ -289,8 +232,6 @@ func (h *Handlers) LoginHandler(c *gin.Context) {
|
|||||||
// Check if password is correct
|
// Check if password is correct
|
||||||
if !h.Auth.CheckPassword(*user, login.Password) {
|
if !h.Auth.CheckPassword(*user, login.Password) {
|
||||||
log.Debug().Str("username", login.Username).Msg("Password incorrect")
|
log.Debug().Str("username", login.Username).Msg("Password incorrect")
|
||||||
// Record failed login attempt
|
|
||||||
h.Auth.RecordLoginAttempt(rateIdentifier, false)
|
|
||||||
c.JSON(401, gin.H{
|
c.JSON(401, gin.H{
|
||||||
"status": 401,
|
"status": 401,
|
||||||
"message": "Unauthorized",
|
"message": "Unauthorized",
|
||||||
@@ -300,9 +241,6 @@ func (h *Handlers) LoginHandler(c *gin.Context) {
|
|||||||
|
|
||||||
log.Debug().Msg("Password correct, checking totp")
|
log.Debug().Msg("Password correct, checking totp")
|
||||||
|
|
||||||
// Record successful login attempt (will reset failed attempt counter)
|
|
||||||
h.Auth.RecordLoginAttempt(rateIdentifier, true)
|
|
||||||
|
|
||||||
// Check if user has totp enabled
|
// Check if user has totp enabled
|
||||||
if user.TotpSecret != "" {
|
if user.TotpSecret != "" {
|
||||||
log.Debug().Msg("Totp enabled")
|
log.Debug().Msg("Totp enabled")
|
||||||
@@ -385,10 +323,10 @@ func (h *Handlers) TotpHandler(c *gin.Context) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Check if totp is correct
|
// Check if totp is correct
|
||||||
ok := totp.Validate(totpReq.Code, user.TotpSecret)
|
totpOk := totp.Validate(totpReq.Code, user.TotpSecret)
|
||||||
|
|
||||||
// TOTP is incorrect
|
// TOTP is incorrect
|
||||||
if !ok {
|
if !totpOk {
|
||||||
log.Debug().Msg("Totp incorrect")
|
log.Debug().Msg("Totp incorrect")
|
||||||
c.JSON(401, gin.H{
|
c.JSON(401, gin.H{
|
||||||
"status": 401,
|
"status": 401,
|
||||||
@@ -420,6 +358,9 @@ func (h *Handlers) LogoutHandler(c *gin.Context) {
|
|||||||
|
|
||||||
log.Debug().Msg("Cleaning up redirect cookie")
|
log.Debug().Msg("Cleaning up redirect cookie")
|
||||||
|
|
||||||
|
// Clean up redirect cookie if it exists
|
||||||
|
c.SetCookie("tinyauth_redirect_uri", "", -1, "/", h.Config.Domain, h.Config.CookieSecure, true)
|
||||||
|
|
||||||
// Return logged out
|
// Return logged out
|
||||||
c.JSON(200, gin.H{
|
c.JSON(200, gin.H{
|
||||||
"status": 200,
|
"status": 200,
|
||||||
@@ -526,21 +467,19 @@ func (h *Handlers) OauthUrlHandler(c *gin.Context) {
|
|||||||
// Set redirect cookie if redirect URI is provided
|
// Set redirect cookie if redirect URI is provided
|
||||||
if redirectURI != "" {
|
if redirectURI != "" {
|
||||||
log.Debug().Str("redirectURI", redirectURI).Msg("Setting redirect cookie")
|
log.Debug().Str("redirectURI", redirectURI).Msg("Setting redirect cookie")
|
||||||
h.Auth.CreateSessionCookie(c, &types.SessionCookie{
|
c.SetCookie("tinyauth_redirect_uri", redirectURI, 3600, "/", h.Config.Domain, h.Config.CookieSecure, true)
|
||||||
RedirectURI: redirectURI,
|
|
||||||
})
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// Tailscale does not have an auth url so we create a random code (does not need to be secure) to avoid caching and send it
|
// Tailscale does not have an auth url so we create a random code (does not need to be secure) to avoid caching and send it
|
||||||
if request.Provider == "tailscale" {
|
if request.Provider == "tailscale" {
|
||||||
// Build tailscale query
|
// Build tailscale query
|
||||||
queries, err := query.Values(types.TailscaleQuery{
|
tailscaleQuery, err := query.Values(types.TailscaleQuery{
|
||||||
Code: (1000 + rand.IntN(9000)),
|
Code: (1000 + rand.IntN(9000)),
|
||||||
})
|
})
|
||||||
|
|
||||||
// Handle error
|
// Handle error
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Error().Err(err).Msg("Failed to build queries")
|
log.Error().Err(err).Msg("Failed to build query")
|
||||||
c.JSON(500, gin.H{
|
c.JSON(500, gin.H{
|
||||||
"status": 500,
|
"status": 500,
|
||||||
"message": "Internal Server Error",
|
"message": "Internal Server Error",
|
||||||
@@ -552,7 +491,7 @@ func (h *Handlers) OauthUrlHandler(c *gin.Context) {
|
|||||||
c.JSON(200, gin.H{
|
c.JSON(200, gin.H{
|
||||||
"status": 200,
|
"status": 200,
|
||||||
"message": "OK",
|
"message": "OK",
|
||||||
"url": fmt.Sprintf("%s/api/oauth/callback/tailscale?%s", h.Config.AppURL, queries.Encode()),
|
"url": fmt.Sprintf("%s/api/oauth/callback/tailscale?%s", h.Config.AppURL, tailscaleQuery.Encode()),
|
||||||
})
|
})
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
@@ -633,55 +572,58 @@ func (h *Handlers) OauthCallbackHandler(c *gin.Context) {
|
|||||||
log.Warn().Str("email", email).Msg("Email not whitelisted")
|
log.Warn().Str("email", email).Msg("Email not whitelisted")
|
||||||
|
|
||||||
// Build query
|
// Build query
|
||||||
queries, err := query.Values(types.UnauthorizedQuery{
|
unauthorizedQuery, err := query.Values(types.UnauthorizedQuery{
|
||||||
Username: email,
|
Username: email,
|
||||||
})
|
})
|
||||||
|
|
||||||
// Handle error
|
// Handle error
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Error().Msg("Failed to build queries")
|
log.Error().Msg("Failed to build query")
|
||||||
c.Redirect(http.StatusPermanentRedirect, fmt.Sprintf("%s/error", h.Config.AppURL))
|
c.Redirect(http.StatusPermanentRedirect, fmt.Sprintf("%s/error", h.Config.AppURL))
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
// Redirect to unauthorized
|
// Redirect to unauthorized
|
||||||
c.Redirect(http.StatusPermanentRedirect, fmt.Sprintf("%s/unauthorized?%s", h.Config.AppURL, queries.Encode()))
|
c.Redirect(http.StatusPermanentRedirect, fmt.Sprintf("%s/unauthorized?%s", h.Config.AppURL, unauthorizedQuery.Encode()))
|
||||||
}
|
}
|
||||||
|
|
||||||
log.Debug().Msg("Email whitelisted")
|
log.Debug().Msg("Email whitelisted")
|
||||||
|
|
||||||
// Get redirect URI
|
// Create session cookie
|
||||||
cookie, err := h.Auth.GetSessionCookie(c)
|
|
||||||
|
|
||||||
// Create session cookie (also cleans up redirect cookie)
|
|
||||||
h.Auth.CreateSessionCookie(c, &types.SessionCookie{
|
h.Auth.CreateSessionCookie(c, &types.SessionCookie{
|
||||||
Username: email,
|
Username: email,
|
||||||
Provider: providerName.Provider,
|
Provider: providerName.Provider,
|
||||||
})
|
})
|
||||||
|
|
||||||
|
// Get redirect URI
|
||||||
|
redirectURI, redirectURIErr := c.Cookie("tinyauth_redirect_uri")
|
||||||
|
|
||||||
// If it is empty it means that no redirect_uri was provided to the login screen so we just log in
|
// If it is empty it means that no redirect_uri was provided to the login screen so we just log in
|
||||||
if err != nil {
|
if redirectURIErr != nil {
|
||||||
c.Redirect(http.StatusPermanentRedirect, h.Config.AppURL)
|
c.Redirect(http.StatusPermanentRedirect, h.Config.AppURL)
|
||||||
}
|
}
|
||||||
|
|
||||||
log.Debug().Str("redirectURI", cookie.RedirectURI).Msg("Got redirect URI")
|
log.Debug().Str("redirectURI", redirectURI).Msg("Got redirect URI")
|
||||||
|
|
||||||
|
// Clean up redirect cookie since we already have the value
|
||||||
|
c.SetCookie("tinyauth_redirect_uri", "", -1, "/", h.Config.Domain, h.Config.CookieSecure, true)
|
||||||
|
|
||||||
// Build query
|
// Build query
|
||||||
queries, err := query.Values(types.LoginQuery{
|
redirectQuery, err := query.Values(types.LoginQuery{
|
||||||
RedirectURI: cookie.RedirectURI,
|
RedirectURI: redirectURI,
|
||||||
})
|
})
|
||||||
|
|
||||||
log.Debug().Msg("Got redirect query")
|
log.Debug().Msg("Got redirect query")
|
||||||
|
|
||||||
// Handle error
|
// Handle error
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Error().Msg("Failed to build queries")
|
log.Error().Msg("Failed to build query")
|
||||||
c.Redirect(http.StatusPermanentRedirect, fmt.Sprintf("%s/error", h.Config.AppURL))
|
c.Redirect(http.StatusPermanentRedirect, fmt.Sprintf("%s/error", h.Config.AppURL))
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
// Redirect to continue with the redirect URI
|
// Redirect to continue with the redirect URI
|
||||||
c.Redirect(http.StatusPermanentRedirect, fmt.Sprintf("%s/continue?%s", h.Config.AppURL, queries.Encode()))
|
c.Redirect(http.StatusPermanentRedirect, fmt.Sprintf("%s/continue?%s", h.Config.AppURL, redirectQuery.Encode()))
|
||||||
}
|
}
|
||||||
|
|
||||||
func (h *Handlers) HealthcheckHandler(c *gin.Context) {
|
func (h *Handlers) HealthcheckHandler(c *gin.Context) {
|
||||||
|
|||||||
@@ -23,7 +23,7 @@ type Hooks struct {
|
|||||||
|
|
||||||
func (hooks *Hooks) UseUserContext(c *gin.Context) types.UserContext {
|
func (hooks *Hooks) UseUserContext(c *gin.Context) types.UserContext {
|
||||||
// Get session cookie and basic auth
|
// Get session cookie and basic auth
|
||||||
cookie, err := hooks.Auth.GetSessionCookie(c)
|
cookie := hooks.Auth.GetSessionCookie(c)
|
||||||
basic := hooks.Auth.GetBasicAuth(c)
|
basic := hooks.Auth.GetBasicAuth(c)
|
||||||
|
|
||||||
// Check if basic auth is set
|
// Check if basic auth is set
|
||||||
@@ -46,19 +46,6 @@ func (hooks *Hooks) UseUserContext(c *gin.Context) types.UserContext {
|
|||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// Check cookie error after basic auth
|
|
||||||
if err != nil {
|
|
||||||
log.Error().Err(err).Msg("Failed to get session cookie")
|
|
||||||
// Return empty context
|
|
||||||
return types.UserContext{
|
|
||||||
Username: "",
|
|
||||||
IsLoggedIn: false,
|
|
||||||
OAuth: false,
|
|
||||||
Provider: "",
|
|
||||||
TotpPending: false,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Check if session cookie has totp pending
|
// Check if session cookie has totp pending
|
||||||
if cookie.TotpPending {
|
if cookie.TotpPending {
|
||||||
log.Debug().Msg("Totp pending")
|
log.Debug().Msg("Totp pending")
|
||||||
|
|||||||
@@ -15,21 +15,21 @@ type GenericUserInfoResponse struct {
|
|||||||
|
|
||||||
func GetGenericEmail(client *http.Client, url string) (string, error) {
|
func GetGenericEmail(client *http.Client, url string) (string, error) {
|
||||||
// Using the oauth client get the user info url
|
// Using the oauth client get the user info url
|
||||||
res, err := client.Get(url)
|
res, resErr := client.Get(url)
|
||||||
|
|
||||||
// Check if there was an error
|
// Check if there was an error
|
||||||
if err != nil {
|
if resErr != nil {
|
||||||
return "", err
|
return "", resErr
|
||||||
}
|
}
|
||||||
|
|
||||||
log.Debug().Msg("Got response from generic provider")
|
log.Debug().Msg("Got response from generic provider")
|
||||||
|
|
||||||
// Read the body of the response
|
// Read the body of the response
|
||||||
body, err := io.ReadAll(res.Body)
|
body, bodyErr := io.ReadAll(res.Body)
|
||||||
|
|
||||||
// Check if there was an error
|
// Check if there was an error
|
||||||
if err != nil {
|
if bodyErr != nil {
|
||||||
return "", err
|
return "", bodyErr
|
||||||
}
|
}
|
||||||
|
|
||||||
log.Debug().Msg("Read body from generic provider")
|
log.Debug().Msg("Read body from generic provider")
|
||||||
@@ -38,11 +38,11 @@ func GetGenericEmail(client *http.Client, url string) (string, error) {
|
|||||||
var user GenericUserInfoResponse
|
var user GenericUserInfoResponse
|
||||||
|
|
||||||
// Unmarshal the body into the user struct
|
// Unmarshal the body into the user struct
|
||||||
err = json.Unmarshal(body, &user)
|
jsonErr := json.Unmarshal(body, &user)
|
||||||
|
|
||||||
// Check if there was an error
|
// Check if there was an error
|
||||||
if err != nil {
|
if jsonErr != nil {
|
||||||
return "", err
|
return "", jsonErr
|
||||||
}
|
}
|
||||||
|
|
||||||
log.Debug().Msg("Parsed user from generic provider")
|
log.Debug().Msg("Parsed user from generic provider")
|
||||||
|
|||||||
@@ -22,21 +22,21 @@ func GithubScopes() []string {
|
|||||||
|
|
||||||
func GetGithubEmail(client *http.Client) (string, error) {
|
func GetGithubEmail(client *http.Client) (string, error) {
|
||||||
// Get the user emails from github using the oauth http client
|
// Get the user emails from github using the oauth http client
|
||||||
res, err := client.Get("https://api.github.com/user/emails")
|
res, resErr := client.Get("https://api.github.com/user/emails")
|
||||||
|
|
||||||
// Check if there was an error
|
// Check if there was an error
|
||||||
if err != nil {
|
if resErr != nil {
|
||||||
return "", err
|
return "", resErr
|
||||||
}
|
}
|
||||||
|
|
||||||
log.Debug().Msg("Got response from github")
|
log.Debug().Msg("Got response from github")
|
||||||
|
|
||||||
// Read the body of the response
|
// Read the body of the response
|
||||||
body, err := io.ReadAll(res.Body)
|
body, bodyErr := io.ReadAll(res.Body)
|
||||||
|
|
||||||
// Check if there was an error
|
// Check if there was an error
|
||||||
if err != nil {
|
if bodyErr != nil {
|
||||||
return "", err
|
return "", bodyErr
|
||||||
}
|
}
|
||||||
|
|
||||||
log.Debug().Msg("Read body from github")
|
log.Debug().Msg("Read body from github")
|
||||||
@@ -45,11 +45,11 @@ func GetGithubEmail(client *http.Client) (string, error) {
|
|||||||
var emails GithubUserInfoResponse
|
var emails GithubUserInfoResponse
|
||||||
|
|
||||||
// Unmarshal the body into the user struct
|
// Unmarshal the body into the user struct
|
||||||
err = json.Unmarshal(body, &emails)
|
jsonErr := json.Unmarshal(body, &emails)
|
||||||
|
|
||||||
// Check if there was an error
|
// Check if there was an error
|
||||||
if err != nil {
|
if jsonErr != nil {
|
||||||
return "", err
|
return "", jsonErr
|
||||||
}
|
}
|
||||||
|
|
||||||
log.Debug().Msg("Parsed emails from github")
|
log.Debug().Msg("Parsed emails from github")
|
||||||
|
|||||||
@@ -20,21 +20,21 @@ func GoogleScopes() []string {
|
|||||||
|
|
||||||
func GetGoogleEmail(client *http.Client) (string, error) {
|
func GetGoogleEmail(client *http.Client) (string, error) {
|
||||||
// Get the user info from google using the oauth http client
|
// Get the user info from google using the oauth http client
|
||||||
res, err := client.Get("https://www.googleapis.com/userinfo/v2/me")
|
res, resErr := client.Get("https://www.googleapis.com/userinfo/v2/me")
|
||||||
|
|
||||||
// Check if there was an error
|
// Check if there was an error
|
||||||
if err != nil {
|
if resErr != nil {
|
||||||
return "", err
|
return "", resErr
|
||||||
}
|
}
|
||||||
|
|
||||||
log.Debug().Msg("Got response from google")
|
log.Debug().Msg("Got response from google")
|
||||||
|
|
||||||
// Read the body of the response
|
// Read the body of the response
|
||||||
body, err := io.ReadAll(res.Body)
|
body, bodyErr := io.ReadAll(res.Body)
|
||||||
|
|
||||||
// Check if there was an error
|
// Check if there was an error
|
||||||
if err != nil {
|
if bodyErr != nil {
|
||||||
return "", err
|
return "", bodyErr
|
||||||
}
|
}
|
||||||
|
|
||||||
log.Debug().Msg("Read body from google")
|
log.Debug().Msg("Read body from google")
|
||||||
@@ -43,11 +43,11 @@ func GetGoogleEmail(client *http.Client) (string, error) {
|
|||||||
var user GoogleUserInfoResponse
|
var user GoogleUserInfoResponse
|
||||||
|
|
||||||
// Unmarshal the body into the user struct
|
// Unmarshal the body into the user struct
|
||||||
err = json.Unmarshal(body, &user)
|
jsonErr := json.Unmarshal(body, &user)
|
||||||
|
|
||||||
// Check if there was an error
|
// Check if there was an error
|
||||||
if err != nil {
|
if jsonErr != nil {
|
||||||
return "", err
|
return "", jsonErr
|
||||||
}
|
}
|
||||||
|
|
||||||
log.Debug().Msg("Parsed user from google")
|
log.Debug().Msg("Parsed user from google")
|
||||||
|
|||||||
@@ -128,11 +128,11 @@ func (providers *Providers) GetUser(provider string) (string, error) {
|
|||||||
log.Debug().Msg("Got client from github")
|
log.Debug().Msg("Got client from github")
|
||||||
|
|
||||||
// Get the email from the github provider
|
// Get the email from the github provider
|
||||||
email, err := GetGithubEmail(client)
|
email, emailErr := GetGithubEmail(client)
|
||||||
|
|
||||||
// Check if there was an error
|
// Check if there was an error
|
||||||
if err != nil {
|
if emailErr != nil {
|
||||||
return "", err
|
return "", emailErr
|
||||||
}
|
}
|
||||||
|
|
||||||
log.Debug().Msg("Got email from github")
|
log.Debug().Msg("Got email from github")
|
||||||
@@ -152,11 +152,11 @@ func (providers *Providers) GetUser(provider string) (string, error) {
|
|||||||
log.Debug().Msg("Got client from google")
|
log.Debug().Msg("Got client from google")
|
||||||
|
|
||||||
// Get the email from the google provider
|
// Get the email from the google provider
|
||||||
email, err := GetGoogleEmail(client)
|
email, emailErr := GetGoogleEmail(client)
|
||||||
|
|
||||||
// Check if there was an error
|
// Check if there was an error
|
||||||
if err != nil {
|
if emailErr != nil {
|
||||||
return "", err
|
return "", emailErr
|
||||||
}
|
}
|
||||||
|
|
||||||
log.Debug().Msg("Got email from google")
|
log.Debug().Msg("Got email from google")
|
||||||
@@ -176,11 +176,11 @@ func (providers *Providers) GetUser(provider string) (string, error) {
|
|||||||
log.Debug().Msg("Got client from tailscale")
|
log.Debug().Msg("Got client from tailscale")
|
||||||
|
|
||||||
// Get the email from the tailscale provider
|
// Get the email from the tailscale provider
|
||||||
email, err := GetTailscaleEmail(client)
|
email, emailErr := GetTailscaleEmail(client)
|
||||||
|
|
||||||
// Check if there was an error
|
// Check if there was an error
|
||||||
if err != nil {
|
if emailErr != nil {
|
||||||
return "", err
|
return "", emailErr
|
||||||
}
|
}
|
||||||
|
|
||||||
log.Debug().Msg("Got email from tailscale")
|
log.Debug().Msg("Got email from tailscale")
|
||||||
@@ -200,11 +200,11 @@ func (providers *Providers) GetUser(provider string) (string, error) {
|
|||||||
log.Debug().Msg("Got client from generic")
|
log.Debug().Msg("Got client from generic")
|
||||||
|
|
||||||
// Get the email from the generic provider
|
// Get the email from the generic provider
|
||||||
email, err := GetGenericEmail(client, providers.Config.GenericUserURL)
|
email, emailErr := GetGenericEmail(client, providers.Config.GenericUserURL)
|
||||||
|
|
||||||
// Check if there was an error
|
// Check if there was an error
|
||||||
if err != nil {
|
if emailErr != nil {
|
||||||
return "", err
|
return "", emailErr
|
||||||
}
|
}
|
||||||
|
|
||||||
log.Debug().Msg("Got email from generic")
|
log.Debug().Msg("Got email from generic")
|
||||||
|
|||||||
@@ -31,21 +31,21 @@ var TailscaleEndpoint = oauth2.Endpoint{
|
|||||||
|
|
||||||
func GetTailscaleEmail(client *http.Client) (string, error) {
|
func GetTailscaleEmail(client *http.Client) (string, error) {
|
||||||
// Get the user info from tailscale using the oauth http client
|
// Get the user info from tailscale using the oauth http client
|
||||||
res, err := client.Get("https://api.tailscale.com/api/v2/tailnet/-/users")
|
res, resErr := client.Get("https://api.tailscale.com/api/v2/tailnet/-/users")
|
||||||
|
|
||||||
// Check if there was an error
|
// Check if there was an error
|
||||||
if err != nil {
|
if resErr != nil {
|
||||||
return "", err
|
return "", resErr
|
||||||
}
|
}
|
||||||
|
|
||||||
log.Debug().Msg("Got response from tailscale")
|
log.Debug().Msg("Got response from tailscale")
|
||||||
|
|
||||||
// Read the body of the response
|
// Read the body of the response
|
||||||
body, err := io.ReadAll(res.Body)
|
body, bodyErr := io.ReadAll(res.Body)
|
||||||
|
|
||||||
// Check if there was an error
|
// Check if there was an error
|
||||||
if err != nil {
|
if bodyErr != nil {
|
||||||
return "", err
|
return "", bodyErr
|
||||||
}
|
}
|
||||||
|
|
||||||
log.Debug().Msg("Read body from tailscale")
|
log.Debug().Msg("Read body from tailscale")
|
||||||
@@ -54,11 +54,11 @@ func GetTailscaleEmail(client *http.Client) (string, error) {
|
|||||||
var users TailscaleUserInfoResponse
|
var users TailscaleUserInfoResponse
|
||||||
|
|
||||||
// Unmarshal the body into the user struct
|
// Unmarshal the body into the user struct
|
||||||
err = json.Unmarshal(body, &users)
|
jsonErr := json.Unmarshal(body, &users)
|
||||||
|
|
||||||
// Check if there was an error
|
// Check if there was an error
|
||||||
if err != nil {
|
if jsonErr != nil {
|
||||||
return "", err
|
return "", jsonErr
|
||||||
}
|
}
|
||||||
|
|
||||||
log.Debug().Msg("Parsed users from tailscale")
|
log.Debug().Msg("Parsed users from tailscale")
|
||||||
|
|||||||
@@ -1,59 +0,0 @@
|
|||||||
package types
|
|
||||||
|
|
||||||
// LoginQuery is the query parameters for the login endpoint
|
|
||||||
type LoginQuery struct {
|
|
||||||
RedirectURI string `url:"redirect_uri"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// LoginRequest is the request body for the login endpoint
|
|
||||||
type LoginRequest struct {
|
|
||||||
Username string `json:"username"`
|
|
||||||
Password string `json:"password"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// OAuthRequest is the request for the OAuth endpoint
|
|
||||||
type OAuthRequest struct {
|
|
||||||
Provider string `uri:"provider" binding:"required"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// UnauthorizedQuery is the query parameters for the unauthorized endpoint
|
|
||||||
type UnauthorizedQuery struct {
|
|
||||||
Username string `url:"username"`
|
|
||||||
Resource string `url:"resource"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// TailscaleQuery is the query parameters for the tailscale endpoint
|
|
||||||
type TailscaleQuery struct {
|
|
||||||
Code int `url:"code"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// Proxy is the uri parameters for the proxy endpoint
|
|
||||||
type Proxy struct {
|
|
||||||
Proxy string `uri:"proxy" binding:"required"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// User Context response is the response for the user context endpoint
|
|
||||||
type UserContextResponse struct {
|
|
||||||
Status int `json:"status"`
|
|
||||||
Message string `json:"message"`
|
|
||||||
IsLoggedIn bool `json:"isLoggedIn"`
|
|
||||||
Username string `json:"username"`
|
|
||||||
Provider string `json:"provider"`
|
|
||||||
Oauth bool `json:"oauth"`
|
|
||||||
TotpPending bool `json:"totpPending"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// App Context is the response for the app context endpoint
|
|
||||||
type AppContext struct {
|
|
||||||
Status int `json:"status"`
|
|
||||||
Message string `json:"message"`
|
|
||||||
ConfiguredProviders []string `json:"configuredProviders"`
|
|
||||||
DisableContinue bool `json:"disableContinue"`
|
|
||||||
Title string `json:"title"`
|
|
||||||
GenericName string `json:"genericName"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// Totp request is the request for the totp endpoint
|
|
||||||
type TotpRequest struct {
|
|
||||||
Code string `json:"code"`
|
|
||||||
}
|
|
||||||
@@ -1,81 +0,0 @@
|
|||||||
package types
|
|
||||||
|
|
||||||
// Config is the configuration for the tinyauth server
|
|
||||||
type Config struct {
|
|
||||||
Port int `mapstructure:"port" validate:"required"`
|
|
||||||
Address string `validate:"required,ip4_addr" mapstructure:"address"`
|
|
||||||
Secret string `validate:"required,len=32" mapstructure:"secret"`
|
|
||||||
SecretFile string `mapstructure:"secret-file"`
|
|
||||||
AppURL string `validate:"required,url" mapstructure:"app-url"`
|
|
||||||
Users string `mapstructure:"users"`
|
|
||||||
UsersFile string `mapstructure:"users-file"`
|
|
||||||
CookieSecure bool `mapstructure:"cookie-secure"`
|
|
||||||
GithubClientId string `mapstructure:"github-client-id"`
|
|
||||||
GithubClientSecret string `mapstructure:"github-client-secret"`
|
|
||||||
GithubClientSecretFile string `mapstructure:"github-client-secret-file"`
|
|
||||||
GoogleClientId string `mapstructure:"google-client-id"`
|
|
||||||
GoogleClientSecret string `mapstructure:"google-client-secret"`
|
|
||||||
GoogleClientSecretFile string `mapstructure:"google-client-secret-file"`
|
|
||||||
TailscaleClientId string `mapstructure:"tailscale-client-id"`
|
|
||||||
TailscaleClientSecret string `mapstructure:"tailscale-client-secret"`
|
|
||||||
TailscaleClientSecretFile string `mapstructure:"tailscale-client-secret-file"`
|
|
||||||
GenericClientId string `mapstructure:"generic-client-id"`
|
|
||||||
GenericClientSecret string `mapstructure:"generic-client-secret"`
|
|
||||||
GenericClientSecretFile string `mapstructure:"generic-client-secret-file"`
|
|
||||||
GenericScopes string `mapstructure:"generic-scopes"`
|
|
||||||
GenericAuthURL string `mapstructure:"generic-auth-url"`
|
|
||||||
GenericTokenURL string `mapstructure:"generic-token-url"`
|
|
||||||
GenericUserURL string `mapstructure:"generic-user-url"`
|
|
||||||
GenericName string `mapstructure:"generic-name"`
|
|
||||||
DisableContinue bool `mapstructure:"disable-continue"`
|
|
||||||
OAuthWhitelist string `mapstructure:"oauth-whitelist"`
|
|
||||||
SessionExpiry int `mapstructure:"session-expiry"`
|
|
||||||
LogLevel int8 `mapstructure:"log-level" validate:"min=-1,max=5"`
|
|
||||||
Title string `mapstructure:"app-title"`
|
|
||||||
EnvFile string `mapstructure:"env-file"`
|
|
||||||
LoginTimeout int `mapstructure:"login-timeout"`
|
|
||||||
LoginMaxRetries int `mapstructure:"login-max-retries"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// Server configuration
|
|
||||||
type HandlersConfig struct {
|
|
||||||
AppURL string
|
|
||||||
DisableContinue bool
|
|
||||||
GenericName string
|
|
||||||
Title string
|
|
||||||
}
|
|
||||||
|
|
||||||
// OAuthConfig is the configuration for the providers
|
|
||||||
type OAuthConfig struct {
|
|
||||||
GithubClientId string
|
|
||||||
GithubClientSecret string
|
|
||||||
GoogleClientId string
|
|
||||||
GoogleClientSecret string
|
|
||||||
TailscaleClientId string
|
|
||||||
TailscaleClientSecret string
|
|
||||||
GenericClientId string
|
|
||||||
GenericClientSecret string
|
|
||||||
GenericScopes []string
|
|
||||||
GenericAuthURL string
|
|
||||||
GenericTokenURL string
|
|
||||||
GenericUserURL string
|
|
||||||
AppURL string
|
|
||||||
}
|
|
||||||
|
|
||||||
// APIConfig is the configuration for the API
|
|
||||||
type APIConfig struct {
|
|
||||||
Port int
|
|
||||||
Address string
|
|
||||||
}
|
|
||||||
|
|
||||||
// AuthConfig is the configuration for the auth service
|
|
||||||
type AuthConfig struct {
|
|
||||||
Users Users
|
|
||||||
OauthWhitelist []string
|
|
||||||
SessionExpiry int
|
|
||||||
Secret string
|
|
||||||
CookieSecure bool
|
|
||||||
Domain string
|
|
||||||
LoginTimeout int
|
|
||||||
LoginMaxRetries int
|
|
||||||
}
|
|
||||||
@@ -1,9 +1,17 @@
|
|||||||
package types
|
package types
|
||||||
|
|
||||||
import (
|
import "tinyauth/internal/oauth"
|
||||||
"time"
|
|
||||||
"tinyauth/internal/oauth"
|
// LoginQuery is the query parameters for the login endpoint
|
||||||
)
|
type LoginQuery struct {
|
||||||
|
RedirectURI string `url:"redirect_uri"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// LoginRequest is the request body for the login endpoint
|
||||||
|
type LoginRequest struct {
|
||||||
|
Username string `json:"username"`
|
||||||
|
Password string `json:"password"`
|
||||||
|
}
|
||||||
|
|
||||||
// User is the struct for a user
|
// User is the struct for a user
|
||||||
type User struct {
|
type User struct {
|
||||||
@@ -15,27 +23,39 @@ type User struct {
|
|||||||
// Users is a list of users
|
// Users is a list of users
|
||||||
type Users []User
|
type Users []User
|
||||||
|
|
||||||
// OAuthProviders is the struct for the OAuth providers
|
// Config is the configuration for the tinyauth server
|
||||||
type OAuthProviders struct {
|
type Config struct {
|
||||||
Github *oauth.OAuth
|
Port int `mapstructure:"port" validate:"required"`
|
||||||
Google *oauth.OAuth
|
Address string `validate:"required,ip4_addr" mapstructure:"address"`
|
||||||
Microsoft *oauth.OAuth
|
Secret string `validate:"required,len=32" mapstructure:"secret"`
|
||||||
}
|
SecretFile string `mapstructure:"secret-file"`
|
||||||
|
AppURL string `validate:"required,url" mapstructure:"app-url"`
|
||||||
// SessionCookie is the cookie for the session (exculding the expiry)
|
Users string `mapstructure:"users"`
|
||||||
type SessionCookie struct {
|
UsersFile string `mapstructure:"users-file"`
|
||||||
Username string
|
CookieSecure bool `mapstructure:"cookie-secure"`
|
||||||
Provider string
|
GithubClientId string `mapstructure:"github-client-id"`
|
||||||
TotpPending bool
|
GithubClientSecret string `mapstructure:"github-client-secret"`
|
||||||
RedirectURI string
|
GithubClientSecretFile string `mapstructure:"github-client-secret-file"`
|
||||||
}
|
GoogleClientId string `mapstructure:"google-client-id"`
|
||||||
|
GoogleClientSecret string `mapstructure:"google-client-secret"`
|
||||||
// TinyauthLabels is the labels for the tinyauth container
|
GoogleClientSecretFile string `mapstructure:"google-client-secret-file"`
|
||||||
type TinyauthLabels struct {
|
TailscaleClientId string `mapstructure:"tailscale-client-id"`
|
||||||
OAuthWhitelist []string
|
TailscaleClientSecret string `mapstructure:"tailscale-client-secret"`
|
||||||
Users []string
|
TailscaleClientSecretFile string `mapstructure:"tailscale-client-secret-file"`
|
||||||
Allowed string
|
GenericClientId string `mapstructure:"generic-client-id"`
|
||||||
Headers map[string]string
|
GenericClientSecret string `mapstructure:"generic-client-secret"`
|
||||||
|
GenericClientSecretFile string `mapstructure:"generic-client-secret-file"`
|
||||||
|
GenericScopes string `mapstructure:"generic-scopes"`
|
||||||
|
GenericAuthURL string `mapstructure:"generic-auth-url"`
|
||||||
|
GenericTokenURL string `mapstructure:"generic-token-url"`
|
||||||
|
GenericUserURL string `mapstructure:"generic-user-url"`
|
||||||
|
GenericName string `mapstructure:"generic-name"`
|
||||||
|
DisableContinue bool `mapstructure:"disable-continue"`
|
||||||
|
OAuthWhitelist string `mapstructure:"oauth-whitelist"`
|
||||||
|
SessionExpiry int `mapstructure:"session-expiry"`
|
||||||
|
LogLevel int8 `mapstructure:"log-level" validate:"min=-1,max=5"`
|
||||||
|
Title string `mapstructure:"app-title"`
|
||||||
|
EnvFile string `mapstructure:"env-file"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// UserContext is the context for the user
|
// UserContext is the context for the user
|
||||||
@@ -47,9 +67,107 @@ type UserContext struct {
|
|||||||
TotpPending bool
|
TotpPending bool
|
||||||
}
|
}
|
||||||
|
|
||||||
// LoginAttempt tracks information about login attempts for rate limiting
|
// APIConfig is the configuration for the API
|
||||||
type LoginAttempt struct {
|
type APIConfig struct {
|
||||||
FailedAttempts int
|
Port int
|
||||||
LastAttempt time.Time
|
Address string
|
||||||
LockedUntil time.Time
|
Secret string
|
||||||
|
CookieSecure bool
|
||||||
|
SessionExpiry int
|
||||||
|
Domain string
|
||||||
|
}
|
||||||
|
|
||||||
|
// OAuthConfig is the configuration for the providers
|
||||||
|
type OAuthConfig struct {
|
||||||
|
GithubClientId string
|
||||||
|
GithubClientSecret string
|
||||||
|
GoogleClientId string
|
||||||
|
GoogleClientSecret string
|
||||||
|
TailscaleClientId string
|
||||||
|
TailscaleClientSecret string
|
||||||
|
GenericClientId string
|
||||||
|
GenericClientSecret string
|
||||||
|
GenericScopes []string
|
||||||
|
GenericAuthURL string
|
||||||
|
GenericTokenURL string
|
||||||
|
GenericUserURL string
|
||||||
|
AppURL string
|
||||||
|
}
|
||||||
|
|
||||||
|
// OAuthRequest is the request for the OAuth endpoint
|
||||||
|
type OAuthRequest struct {
|
||||||
|
Provider string `uri:"provider" binding:"required"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// OAuthProviders is the struct for the OAuth providers
|
||||||
|
type OAuthProviders struct {
|
||||||
|
Github *oauth.OAuth
|
||||||
|
Google *oauth.OAuth
|
||||||
|
Microsoft *oauth.OAuth
|
||||||
|
}
|
||||||
|
|
||||||
|
// UnauthorizedQuery is the query parameters for the unauthorized endpoint
|
||||||
|
type UnauthorizedQuery struct {
|
||||||
|
Username string `url:"username"`
|
||||||
|
Resource string `url:"resource"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// SessionCookie is the cookie for the session (exculding the expiry)
|
||||||
|
type SessionCookie struct {
|
||||||
|
Username string
|
||||||
|
Provider string
|
||||||
|
TotpPending bool
|
||||||
|
}
|
||||||
|
|
||||||
|
// TinyauthLabels is the labels for the tinyauth container
|
||||||
|
type TinyauthLabels struct {
|
||||||
|
OAuthWhitelist []string
|
||||||
|
Users []string
|
||||||
|
Allowed string
|
||||||
|
}
|
||||||
|
|
||||||
|
// TailscaleQuery is the query parameters for the tailscale endpoint
|
||||||
|
type TailscaleQuery struct {
|
||||||
|
Code int `url:"code"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// Proxy is the uri parameters for the proxy endpoint
|
||||||
|
type Proxy struct {
|
||||||
|
Proxy string `uri:"proxy" binding:"required"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// User Context response is the response for the user context endpoint
|
||||||
|
type UserContextResponse struct {
|
||||||
|
Status int `json:"status"`
|
||||||
|
Message string `json:"message"`
|
||||||
|
IsLoggedIn bool `json:"isLoggedIn"`
|
||||||
|
Username string `json:"username"`
|
||||||
|
Provider string `json:"provider"`
|
||||||
|
Oauth bool `json:"oauth"`
|
||||||
|
TotpPending bool `json:"totpPending"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// App Context is the response for the app context endpoint
|
||||||
|
type AppContext struct {
|
||||||
|
Status int `json:"status"`
|
||||||
|
Message string `json:"message"`
|
||||||
|
ConfiguredProviders []string `json:"configuredProviders"`
|
||||||
|
DisableContinue bool `json:"disableContinue"`
|
||||||
|
Title string `json:"title"`
|
||||||
|
GenericName string `json:"genericName"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// Totp request is the request for the totp endpoint
|
||||||
|
type TotpRequest struct {
|
||||||
|
Code string `json:"code"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// Server configuration
|
||||||
|
type HandlersConfig struct {
|
||||||
|
AppURL string
|
||||||
|
Domain string
|
||||||
|
CookieSecure bool
|
||||||
|
DisableContinue bool
|
||||||
|
GenericName string
|
||||||
|
Title string
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -29,11 +29,11 @@ func ParseUsers(users string) (types.Users, error) {
|
|||||||
|
|
||||||
// Loop through the users and split them by colon
|
// Loop through the users and split them by colon
|
||||||
for _, user := range userList {
|
for _, user := range userList {
|
||||||
parsed, err := ParseUser(user)
|
parsed, parseErr := ParseUser(user)
|
||||||
|
|
||||||
// Check if there was an error
|
// Check if there was an error
|
||||||
if err != nil {
|
if parseErr != nil {
|
||||||
return types.Users{}, err
|
return types.Users{}, parseErr
|
||||||
}
|
}
|
||||||
|
|
||||||
// Append the user to the users struct
|
// Append the user to the users struct
|
||||||
@@ -69,19 +69,19 @@ func GetUpperDomain(urlSrc string) (string, error) {
|
|||||||
// Reads a file and returns the contents
|
// Reads a file and returns the contents
|
||||||
func ReadFile(file string) (string, error) {
|
func ReadFile(file string) (string, error) {
|
||||||
// Check if the file exists
|
// Check if the file exists
|
||||||
_, err := os.Stat(file)
|
_, statErr := os.Stat(file)
|
||||||
|
|
||||||
// Check if there was an error
|
// Check if there was an error
|
||||||
if err != nil {
|
if statErr != nil {
|
||||||
return "", err
|
return "", statErr
|
||||||
}
|
}
|
||||||
|
|
||||||
// Read the file
|
// Read the file
|
||||||
data, err := os.ReadFile(file)
|
data, readErr := os.ReadFile(file)
|
||||||
|
|
||||||
// Check if there was an error
|
// Check if there was an error
|
||||||
if err != nil {
|
if readErr != nil {
|
||||||
return "", err
|
return "", readErr
|
||||||
}
|
}
|
||||||
|
|
||||||
// Return the file contents
|
// Return the file contents
|
||||||
@@ -152,10 +152,10 @@ func GetUsers(conf string, file string) (types.Users, error) {
|
|||||||
// If the file is set, read the file and append the users to the users string
|
// If the file is set, read the file and append the users to the users string
|
||||||
if file != "" {
|
if file != "" {
|
||||||
// Read the file
|
// Read the file
|
||||||
contents, err := ReadFile(file)
|
fileContents, fileErr := ReadFile(file)
|
||||||
|
|
||||||
// If there isn't an error we can append the users to the users string
|
// If there isn't an error we can append the users to the users string
|
||||||
if err == nil {
|
if fileErr == nil {
|
||||||
log.Debug().Msg("Using users from file")
|
log.Debug().Msg("Using users from file")
|
||||||
|
|
||||||
// Append the users to the users string
|
// Append the users to the users string
|
||||||
@@ -164,7 +164,7 @@ func GetUsers(conf string, file string) (types.Users, error) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Parse the file contents into a comma separated list of users
|
// Parse the file contents into a comma separated list of users
|
||||||
users += ParseFileToLine(contents)
|
users += ParseFileToLine(fileContents)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -193,16 +193,6 @@ func GetTinyauthLabels(labels map[string]string) types.TinyauthLabels {
|
|||||||
tinyauthLabels.Users = strings.Split(value, ",")
|
tinyauthLabels.Users = strings.Split(value, ",")
|
||||||
case "tinyauth.allowed":
|
case "tinyauth.allowed":
|
||||||
tinyauthLabels.Allowed = value
|
tinyauthLabels.Allowed = value
|
||||||
case "tinyauth.headers":
|
|
||||||
tinyauthLabels.Headers = make(map[string]string)
|
|
||||||
headers := strings.Split(value, ",")
|
|
||||||
for _, header := range headers {
|
|
||||||
headerSplit := strings.Split(header, "=")
|
|
||||||
if len(headerSplit) != 2 {
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
tinyauthLabels.Headers[headerSplit[0]] = headerSplit[1]
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -102,7 +102,7 @@ func TestParseFileToLine(t *testing.T) {
|
|||||||
t.Log("Testing parse file to line with a valid string")
|
t.Log("Testing parse file to line with a valid string")
|
||||||
|
|
||||||
// Test the parse file to line function with a valid string
|
// Test the parse file to line function with a valid string
|
||||||
content := "\nuser1:pass1\nuser2:pass2\n"
|
content := "user1:pass1\nuser2:pass2"
|
||||||
expected := "user1:pass1,user2:pass2"
|
expected := "user1:pass1,user2:pass2"
|
||||||
|
|
||||||
result := utils.ParseFileToLine(content)
|
result := utils.ParseFileToLine(content)
|
||||||
|
|||||||
0
frontend/.gitignore → site/.gitignore
vendored
23
site/Dockerfile.dev
Normal file
@@ -0,0 +1,23 @@
|
|||||||
|
FROM oven/bun:1.1.45-alpine
|
||||||
|
|
||||||
|
WORKDIR /site
|
||||||
|
|
||||||
|
COPY ./site/package.json ./
|
||||||
|
COPY ./site/bun.lockb ./
|
||||||
|
|
||||||
|
RUN bun install
|
||||||
|
|
||||||
|
COPY ./site/public ./public
|
||||||
|
COPY ./site/src ./src
|
||||||
|
|
||||||
|
COPY ./site/eslint.config.js ./
|
||||||
|
COPY ./site/index.html ./
|
||||||
|
COPY ./site/tsconfig.json ./
|
||||||
|
COPY ./site/tsconfig.app.json ./
|
||||||
|
COPY ./site/tsconfig.node.json ./
|
||||||
|
COPY ./site/vite.config.ts ./
|
||||||
|
COPY ./site/postcss.config.cjs ./
|
||||||
|
|
||||||
|
EXPOSE 5173
|
||||||
|
|
||||||
|
ENTRYPOINT ["bun", "run", "dev"]
|
||||||
BIN
site/bun.lockb
Executable file
@@ -6,7 +6,7 @@
|
|||||||
<link rel="apple-touch-icon" sizes="180x180" href="/apple-touch-icon.png" />
|
<link rel="apple-touch-icon" sizes="180x180" href="/apple-touch-icon.png" />
|
||||||
<link rel="icon" type="image/png" sizes="32x32" href="/favicon-32x32.png" />
|
<link rel="icon" type="image/png" sizes="32x32" href="/favicon-32x32.png" />
|
||||||
<link rel="icon" type="image/png" sizes="16x16" href="/favicon-16x16.png" />
|
<link rel="icon" type="image/png" sizes="16x16" href="/favicon-16x16.png" />
|
||||||
<link rel="manifest" href="/frontend.webmanifest" />
|
<link rel="manifest" href="/site.webmanifest" />
|
||||||
<title>Tinyauth</title>
|
<title>Tinyauth</title>
|
||||||
</head>
|
</head>
|
||||||
<body>
|
<body>
|
||||||
@@ -1,11 +1,11 @@
|
|||||||
{
|
{
|
||||||
"name": "frontend",
|
"name": "site",
|
||||||
"version": "0.0.0",
|
"version": "0.0.0",
|
||||||
"lockfileVersion": 3,
|
"lockfileVersion": 3,
|
||||||
"requires": true,
|
"requires": true,
|
||||||
"packages": {
|
"packages": {
|
||||||
"": {
|
"": {
|
||||||
"name": "frontend",
|
"name": "site",
|
||||||
"version": "0.0.0",
|
"version": "0.0.0",
|
||||||
"dependencies": {
|
"dependencies": {
|
||||||
"@mantine/core": "^7.16.0",
|
"@mantine/core": "^7.16.0",
|
||||||
@@ -1,5 +1,5 @@
|
|||||||
{
|
{
|
||||||
"name": "frontend",
|
"name": "site",
|
||||||
"private": true,
|
"private": true,
|
||||||
"version": "0.0.0",
|
"version": "0.0.0",
|
||||||
"type": "module",
|
"type": "module",
|
||||||
@@ -16,14 +16,8 @@
|
|||||||
"@mantine/notifications": "^7.16.0",
|
"@mantine/notifications": "^7.16.0",
|
||||||
"@tanstack/react-query": "4",
|
"@tanstack/react-query": "4",
|
||||||
"axios": "^1.7.9",
|
"axios": "^1.7.9",
|
||||||
"i18next": "^24.2.3",
|
|
||||||
"i18next-browser-languagedetector": "^8.0.4",
|
|
||||||
"i18next-chained-backend": "^4.6.2",
|
|
||||||
"i18next-http-backend": "^3.0.2",
|
|
||||||
"i18next-resources-to-backend": "^1.2.1",
|
|
||||||
"react": "^18.3.1",
|
"react": "^18.3.1",
|
||||||
"react-dom": "^18.3.1",
|
"react-dom": "^18.3.1",
|
||||||
"react-i18next": "^15.4.1",
|
|
||||||
"react-router": "^7.1.3",
|
"react-router": "^7.1.3",
|
||||||
"zod": "^3.24.1"
|
"zod": "^3.24.1"
|
||||||
},
|
},
|
||||||
|
Before Width: | Height: | Size: 15 KiB After Width: | Height: | Size: 15 KiB |
|
Before Width: | Height: | Size: 46 KiB After Width: | Height: | Size: 46 KiB |
|
Before Width: | Height: | Size: 13 KiB After Width: | Height: | Size: 13 KiB |
|
Before Width: | Height: | Size: 602 B After Width: | Height: | Size: 602 B |
|
Before Width: | Height: | Size: 1.4 KiB After Width: | Height: | Size: 1.4 KiB |
|
Before Width: | Height: | Size: 15 KiB After Width: | Height: | Size: 15 KiB |
|
Before Width: | Height: | Size: 35 KiB After Width: | Height: | Size: 35 KiB |
@@ -1,7 +1,6 @@
|
|||||||
import { TextInput, PasswordInput, Button } from "@mantine/core";
|
import { TextInput, PasswordInput, Button } from "@mantine/core";
|
||||||
import { useForm, zodResolver } from "@mantine/form";
|
import { useForm, zodResolver } from "@mantine/form";
|
||||||
import { LoginFormValues, loginSchema } from "../../schemas/login-schema";
|
import { LoginFormValues, loginSchema } from "../../schemas/login-schema";
|
||||||
import { useTranslation } from "react-i18next";
|
|
||||||
|
|
||||||
interface LoginFormProps {
|
interface LoginFormProps {
|
||||||
isLoading: boolean;
|
isLoading: boolean;
|
||||||
@@ -10,7 +9,6 @@ interface LoginFormProps {
|
|||||||
|
|
||||||
export const LoginForm = (props: LoginFormProps) => {
|
export const LoginForm = (props: LoginFormProps) => {
|
||||||
const { isLoading, onSubmit } = props;
|
const { isLoading, onSubmit } = props;
|
||||||
const { t } = useTranslation();
|
|
||||||
|
|
||||||
const form = useForm({
|
const form = useForm({
|
||||||
mode: "uncontrolled",
|
mode: "uncontrolled",
|
||||||
@@ -24,7 +22,7 @@ export const LoginForm = (props: LoginFormProps) => {
|
|||||||
return (
|
return (
|
||||||
<form onSubmit={form.onSubmit(onSubmit)}>
|
<form onSubmit={form.onSubmit(onSubmit)}>
|
||||||
<TextInput
|
<TextInput
|
||||||
label={t("loginUsername")}
|
label="Username"
|
||||||
placeholder="user@example.com"
|
placeholder="user@example.com"
|
||||||
required
|
required
|
||||||
disabled={isLoading}
|
disabled={isLoading}
|
||||||
@@ -32,7 +30,7 @@ export const LoginForm = (props: LoginFormProps) => {
|
|||||||
{...form.getInputProps("username")}
|
{...form.getInputProps("username")}
|
||||||
/>
|
/>
|
||||||
<PasswordInput
|
<PasswordInput
|
||||||
label={t("loginPassword")}
|
label="Password"
|
||||||
placeholder="password"
|
placeholder="password"
|
||||||
required
|
required
|
||||||
mt="md"
|
mt="md"
|
||||||
@@ -41,7 +39,7 @@ export const LoginForm = (props: LoginFormProps) => {
|
|||||||
{...form.getInputProps("password")}
|
{...form.getInputProps("password")}
|
||||||
/>
|
/>
|
||||||
<Button fullWidth mt="xl" type="submit" loading={isLoading}>
|
<Button fullWidth mt="xl" type="submit" loading={isLoading}>
|
||||||
{t("loginSubmit")}
|
Login
|
||||||
</Button>
|
</Button>
|
||||||
</form>
|
</form>
|
||||||
);
|
);
|
||||||
12
site/src/components/layouts/layout.tsx
Normal file
@@ -0,0 +1,12 @@
|
|||||||
|
import { Center, Flex } from "@mantine/core";
|
||||||
|
import { ReactNode } from "react";
|
||||||
|
|
||||||
|
export const Layout = ({ children }: { children: ReactNode }) => {
|
||||||
|
return (
|
||||||
|
<Center style={{ minHeight: "100vh" }}>
|
||||||
|
<Flex direction="column" flex="1" maw={350}>
|
||||||
|
{children}
|
||||||
|
</Flex>
|
||||||
|
</Center>
|
||||||
|
);
|
||||||
|
};
|
||||||