Compare commits
7 Commits
v3.2.0-bet
...
feat/totp
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
ad46624bff | ||
|
|
f1c33d90cd | ||
|
|
10877e6f41 | ||
|
|
bd7a140676 | ||
|
|
61f4848f20 | ||
|
|
9f5f4adddb | ||
|
|
746ce016cb |
32
.env.example
@@ -1,32 +0,0 @@
|
|||||||
PORT=3000
|
|
||||||
ADDRESS=0.0.0.0
|
|
||||||
SECRET=app_secret
|
|
||||||
SECRET_FILE=app_secret_file
|
|
||||||
APP_URL=http://localhost:3000
|
|
||||||
USERS=your_user_password_hash
|
|
||||||
USERS_FILE=users_file
|
|
||||||
COOKIE_SECURE=false
|
|
||||||
GITHUB_CLIENT_ID=github_client_id
|
|
||||||
GITHUB_CLIENT_SECRET=github_client_secret
|
|
||||||
GITHUB_CLIENT_SECRET_FILE=github_client_secret_file
|
|
||||||
GOOGLE_CLIENT_ID=google_client_id
|
|
||||||
GOOGLE_CLIENT_SECRET=google_client_secret
|
|
||||||
GOOGLE_CLIENT_SECRET_FILE=google_client_secret_file
|
|
||||||
TAILSCALE_CLIENT_ID=tailscale_client_id
|
|
||||||
TAILSCALE_CLIENT_SECRET=tailscale_client_secret
|
|
||||||
TAILSCALE_CLIENT_SECRET_FILE=tailscale__client_secret_file
|
|
||||||
GENERIC_CLIENT_ID=generic_client_id
|
|
||||||
GENERIC_CLIENT_SECRET=generic_client_secret
|
|
||||||
GENERIC_CLIENT_SECRET_FILE=generic_client_secret_file
|
|
||||||
GENERIC_SCOPES=generic_scopes
|
|
||||||
GENERIC_AUTH_URL=generic_auth_url
|
|
||||||
GENERIC_TOKEN_URL=generic_token_url
|
|
||||||
GENERIC_USER_URL=generic_user_url
|
|
||||||
DISABLE_CONTINUE=false
|
|
||||||
OAUTH_WHITELIST=
|
|
||||||
GENERIC_NAME=My OAuth
|
|
||||||
SESSION_EXPIRY=7200
|
|
||||||
LOGIN_TIMEOUT=300
|
|
||||||
LOGIN_MAX_RETRIES=5
|
|
||||||
LOG_LEVEL=0
|
|
||||||
APP_TITLE=Tinyauth SSO
|
|
||||||
58
.github/workflows/alpha-release.yml
vendored
Normal file
@@ -0,0 +1,58 @@
|
|||||||
|
name: Alpha Release
|
||||||
|
on:
|
||||||
|
workflow_dispatch:
|
||||||
|
inputs:
|
||||||
|
alpha:
|
||||||
|
description: "Alpha version (e.g. 1, 2, 3)"
|
||||||
|
required: true
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
get-tag:
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
outputs:
|
||||||
|
tag: ${{ steps.tag.outputs.name }}
|
||||||
|
steps:
|
||||||
|
- name: Checkout code
|
||||||
|
uses: actions/checkout@v4
|
||||||
|
|
||||||
|
- name: Get tag
|
||||||
|
id: tag
|
||||||
|
run: echo "name=$(cat internal/assets/version)-alpha.${{ github.event.inputs.alpha }}" >> $GITHUB_OUTPUT
|
||||||
|
|
||||||
|
build-docker:
|
||||||
|
needs: get-tag
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
- name: Checkout
|
||||||
|
uses: actions/checkout@v4
|
||||||
|
|
||||||
|
- name: Set up QEMU
|
||||||
|
uses: docker/setup-qemu-action@v3
|
||||||
|
|
||||||
|
- name: Set up Docker Buildx
|
||||||
|
uses: docker/setup-buildx-action@v3
|
||||||
|
|
||||||
|
- name: Login to GitHub Container Registry
|
||||||
|
uses: docker/login-action@v3
|
||||||
|
with:
|
||||||
|
registry: ghcr.io
|
||||||
|
username: ${{ github.repository_owner }}
|
||||||
|
password: ${{ secrets.GITHUB_TOKEN }}
|
||||||
|
|
||||||
|
- name: Build and push
|
||||||
|
uses: docker/build-push-action@v6
|
||||||
|
with:
|
||||||
|
context: .
|
||||||
|
push: true
|
||||||
|
platforms: linux/arm64, linux/amd64
|
||||||
|
tags: ghcr.io/${{ github.repository_owner }}/tinyauth:${{ needs.get-tag.outputs.tag }}
|
||||||
|
|
||||||
|
alpha-release:
|
||||||
|
needs: [get-tag, build-docker]
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
- name: Create alpha release
|
||||||
|
uses: softprops/action-gh-release@v2
|
||||||
|
with:
|
||||||
|
prerelease: true
|
||||||
|
tag_name: ${{ needs.get-tag.outputs.tag }}
|
||||||
58
.github/workflows/beta-release.yml
vendored
Normal file
@@ -0,0 +1,58 @@
|
|||||||
|
name: Beta Release
|
||||||
|
on:
|
||||||
|
workflow_dispatch:
|
||||||
|
inputs:
|
||||||
|
alpha:
|
||||||
|
description: "Beta version (e.g. 1, 2, 3)"
|
||||||
|
required: true
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
get-tag:
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
outputs:
|
||||||
|
tag: ${{ steps.tag.outputs.name }}
|
||||||
|
steps:
|
||||||
|
- name: Checkout code
|
||||||
|
uses: actions/checkout@v4
|
||||||
|
|
||||||
|
- name: Get tag
|
||||||
|
id: tag
|
||||||
|
run: echo "name=$(cat internal/assets/version)-beta.${{ github.event.inputs.alpha }}" >> $GITHUB_OUTPUT
|
||||||
|
|
||||||
|
build-docker:
|
||||||
|
needs: get-tag
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
- name: Checkout
|
||||||
|
uses: actions/checkout@v4
|
||||||
|
|
||||||
|
- name: Set up QEMU
|
||||||
|
uses: docker/setup-qemu-action@v3
|
||||||
|
|
||||||
|
- name: Set up Docker Buildx
|
||||||
|
uses: docker/setup-buildx-action@v3
|
||||||
|
|
||||||
|
- name: Login to GitHub Container Registry
|
||||||
|
uses: docker/login-action@v3
|
||||||
|
with:
|
||||||
|
registry: ghcr.io
|
||||||
|
username: ${{ github.repository_owner }}
|
||||||
|
password: ${{ secrets.GITHUB_TOKEN }}
|
||||||
|
|
||||||
|
- name: Build and push
|
||||||
|
uses: docker/build-push-action@v6
|
||||||
|
with:
|
||||||
|
context: .
|
||||||
|
push: true
|
||||||
|
platforms: linux/arm64, linux/amd64
|
||||||
|
tags: ghcr.io/${{ github.repository_owner }}/tinyauth:${{ needs.get-tag.outputs.tag }}
|
||||||
|
|
||||||
|
beta-release:
|
||||||
|
needs: [get-tag, build-docker]
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
- name: Create beta release
|
||||||
|
uses: softprops/action-gh-release@v2
|
||||||
|
with:
|
||||||
|
prerelease: true
|
||||||
|
tag_name: ${{ needs.get-tag.outputs.tag }}
|
||||||
6
.github/workflows/ci.yml
vendored
@@ -26,17 +26,17 @@ jobs:
|
|||||||
|
|
||||||
- name: Install frontend dependencies
|
- name: Install frontend dependencies
|
||||||
run: |
|
run: |
|
||||||
cd frontend
|
cd site
|
||||||
bun install
|
bun install
|
||||||
|
|
||||||
- name: Build frontend
|
- name: Build frontend
|
||||||
run: |
|
run: |
|
||||||
cd frontend
|
cd site
|
||||||
bun run build
|
bun run build
|
||||||
|
|
||||||
- name: Copy frontend
|
- name: Copy frontend
|
||||||
run: |
|
run: |
|
||||||
cp -r frontend/dist internal/assets/dist
|
cp -r site/dist internal/assets/dist
|
||||||
|
|
||||||
- name: Run tests
|
- name: Run tests
|
||||||
run: go test -v ./...
|
run: go test -v ./...
|
||||||
|
|||||||
232
.github/workflows/release.yml
vendored
@@ -1,100 +1,32 @@
|
|||||||
name: Release
|
name: Release
|
||||||
on:
|
on:
|
||||||
workflow_dispatch:
|
workflow_dispatch:
|
||||||
push:
|
|
||||||
tags:
|
|
||||||
- "v*"
|
|
||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
binary-build:
|
get-tag:
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
outputs:
|
||||||
|
tag: ${{ steps.tag.outputs.name }}
|
||||||
|
steps:
|
||||||
|
- name: Checkout code
|
||||||
|
uses: actions/checkout@v4
|
||||||
|
|
||||||
|
- name: Get tag
|
||||||
|
id: tag
|
||||||
|
run: echo "name=$(cat internal/assets/version)" >> $GITHUB_OUTPUT
|
||||||
|
|
||||||
|
build-docker:
|
||||||
|
needs: get-tag
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
steps:
|
steps:
|
||||||
- name: Checkout
|
- name: Checkout
|
||||||
uses: actions/checkout@v4
|
uses: actions/checkout@v4
|
||||||
|
|
||||||
- uses: oven-sh/setup-bun@v2
|
- name: Set up QEMU
|
||||||
with:
|
uses: docker/setup-qemu-action@v3
|
||||||
bun-version: latest
|
|
||||||
|
|
||||||
- uses: actions/setup-go@v5
|
- name: Set up Docker Buildx
|
||||||
with:
|
uses: docker/setup-buildx-action@v3
|
||||||
go-version: "^1.23.2"
|
|
||||||
|
|
||||||
- name: Install frontend dependencies
|
|
||||||
run: |
|
|
||||||
cd frontend
|
|
||||||
bun install
|
|
||||||
|
|
||||||
- name: Install backend dependencies
|
|
||||||
run: |
|
|
||||||
go mod tidy
|
|
||||||
|
|
||||||
- name: Build frontend
|
|
||||||
run: |
|
|
||||||
cd frontend
|
|
||||||
bun run build
|
|
||||||
|
|
||||||
- name: Build
|
|
||||||
run: |
|
|
||||||
cp -r frontend/dist internal/assets/dist
|
|
||||||
CGO_ENABLED=0 go build -ldflags "-s -w" -o tinyauth-amd64
|
|
||||||
|
|
||||||
- name: Upload artifact
|
|
||||||
uses: actions/upload-artifact@v4
|
|
||||||
with:
|
|
||||||
name: tinyauth-amd64
|
|
||||||
path: tinyauth-amd64
|
|
||||||
|
|
||||||
binary-build-arm:
|
|
||||||
runs-on: ubuntu-24.04-arm
|
|
||||||
steps:
|
|
||||||
- name: Checkout
|
|
||||||
uses: actions/checkout@v4
|
|
||||||
|
|
||||||
- uses: oven-sh/setup-bun@v2
|
|
||||||
with:
|
|
||||||
bun-version: latest
|
|
||||||
|
|
||||||
- uses: actions/setup-go@v5
|
|
||||||
with:
|
|
||||||
go-version: "^1.23.2"
|
|
||||||
|
|
||||||
- name: Install frontend dependencies
|
|
||||||
run: |
|
|
||||||
cd frontend
|
|
||||||
bun install
|
|
||||||
|
|
||||||
- name: Install backend dependencies
|
|
||||||
run: |
|
|
||||||
go mod tidy
|
|
||||||
|
|
||||||
- name: Build frontend
|
|
||||||
run: |
|
|
||||||
cd frontend
|
|
||||||
bun run build
|
|
||||||
|
|
||||||
- name: Build
|
|
||||||
run: |
|
|
||||||
cp -r frontend/dist internal/assets/dist
|
|
||||||
CGO_ENABLED=0 go build -ldflags "-s -w" -o tinyauth-arm64
|
|
||||||
|
|
||||||
- name: Upload artifact
|
|
||||||
uses: actions/upload-artifact@v4
|
|
||||||
with:
|
|
||||||
name: tinyauth-arm64
|
|
||||||
path: tinyauth-arm64
|
|
||||||
|
|
||||||
image-build:
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
steps:
|
|
||||||
- name: Checkout
|
|
||||||
uses: actions/checkout@v4
|
|
||||||
|
|
||||||
- name: Docker meta
|
|
||||||
id: meta
|
|
||||||
uses: docker/metadata-action@v5
|
|
||||||
with:
|
|
||||||
images: ghcr.io/${{ github.repository_owner }}/tinyauth
|
|
||||||
|
|
||||||
- name: Login to GitHub Container Registry
|
- name: Login to GitHub Container Registry
|
||||||
uses: docker/login-action@v3
|
uses: docker/login-action@v3
|
||||||
@@ -103,129 +35,21 @@ jobs:
|
|||||||
username: ${{ github.repository_owner }}
|
username: ${{ github.repository_owner }}
|
||||||
password: ${{ secrets.GITHUB_TOKEN }}
|
password: ${{ secrets.GITHUB_TOKEN }}
|
||||||
|
|
||||||
- name: Set up Docker Buildx
|
|
||||||
uses: docker/setup-buildx-action@v3
|
|
||||||
|
|
||||||
- name: Build and push
|
- name: Build and push
|
||||||
uses: docker/build-push-action@v6
|
uses: docker/build-push-action@v6
|
||||||
id: build
|
|
||||||
with:
|
with:
|
||||||
platforms: linux/amd64
|
context: .
|
||||||
labels: ${{ steps.meta.outputs.labels }}
|
push: true
|
||||||
tags: ghcr.io/${{ github.repository_owner }}/tinyauth
|
platforms: linux/arm64, linux/amd64
|
||||||
outputs: type=image,push-by-digest=true,name-canonical=true,push=true
|
tags: ghcr.io/${{ github.repository_owner }}/tinyauth:${{ needs.get-tag.outputs.tag }}, ghcr.io/${{ github.repository_owner }}/tinyauth:latest
|
||||||
|
|
||||||
- name: Export digest
|
release:
|
||||||
run: |
|
needs: [get-tag, build-docker]
|
||||||
mkdir -p ${{ runner.temp }}/digests
|
|
||||||
digest="${{ steps.build.outputs.digest }}"
|
|
||||||
touch "${{ runner.temp }}/digests/${digest#sha256:}"
|
|
||||||
|
|
||||||
- name: Upload digest
|
|
||||||
uses: actions/upload-artifact@v4
|
|
||||||
with:
|
|
||||||
name: digests-linux-amd64
|
|
||||||
path: ${{ runner.temp }}/digests/*
|
|
||||||
if-no-files-found: error
|
|
||||||
retention-days: 1
|
|
||||||
|
|
||||||
image-build-arm:
|
|
||||||
runs-on: ubuntu-24.04-arm
|
|
||||||
steps:
|
|
||||||
- name: Checkout
|
|
||||||
uses: actions/checkout@v4
|
|
||||||
|
|
||||||
- name: Docker meta
|
|
||||||
id: meta
|
|
||||||
uses: docker/metadata-action@v5
|
|
||||||
with:
|
|
||||||
images: ghcr.io/${{ github.repository_owner }}/tinyauth
|
|
||||||
|
|
||||||
- name: Login to GitHub Container Registry
|
|
||||||
uses: docker/login-action@v3
|
|
||||||
with:
|
|
||||||
registry: ghcr.io
|
|
||||||
username: ${{ github.repository_owner }}
|
|
||||||
password: ${{ secrets.GITHUB_TOKEN }}
|
|
||||||
|
|
||||||
- name: Set up Docker Buildx
|
|
||||||
uses: docker/setup-buildx-action@v3
|
|
||||||
|
|
||||||
- name: Build and push
|
|
||||||
uses: docker/build-push-action@v6
|
|
||||||
id: build
|
|
||||||
with:
|
|
||||||
platforms: linux/arm64
|
|
||||||
labels: ${{ steps.meta.outputs.labels }}
|
|
||||||
tags: ghcr.io/${{ github.repository_owner }}/tinyauth
|
|
||||||
outputs: type=image,push-by-digest=true,name-canonical=true,push=true
|
|
||||||
|
|
||||||
- name: Export digest
|
|
||||||
run: |
|
|
||||||
mkdir -p ${{ runner.temp }}/digests
|
|
||||||
digest="${{ steps.build.outputs.digest }}"
|
|
||||||
touch "${{ runner.temp }}/digests/${digest#sha256:}"
|
|
||||||
|
|
||||||
- name: Upload digest
|
|
||||||
uses: actions/upload-artifact@v4
|
|
||||||
with:
|
|
||||||
name: digests-linux-arm64
|
|
||||||
path: ${{ runner.temp }}/digests/*
|
|
||||||
if-no-files-found: error
|
|
||||||
retention-days: 1
|
|
||||||
|
|
||||||
image-merge:
|
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
needs:
|
|
||||||
- image-build
|
|
||||||
- image-build-arm
|
|
||||||
steps:
|
steps:
|
||||||
- name: Download digests
|
- name: Create release
|
||||||
uses: actions/download-artifact@v4
|
|
||||||
with:
|
|
||||||
path: ${{ runner.temp }}/digests
|
|
||||||
pattern: digests-*
|
|
||||||
merge-multiple: true
|
|
||||||
|
|
||||||
- name: Login to GitHub Container Registry
|
|
||||||
uses: docker/login-action@v3
|
|
||||||
with:
|
|
||||||
registry: ghcr.io
|
|
||||||
username: ${{ github.repository_owner }}
|
|
||||||
password: ${{ secrets.GITHUB_TOKEN }}
|
|
||||||
|
|
||||||
- name: Set up Docker Buildx
|
|
||||||
uses: docker/setup-buildx-action@v3
|
|
||||||
|
|
||||||
- name: Docker meta
|
|
||||||
id: meta
|
|
||||||
uses: docker/metadata-action@v5
|
|
||||||
with:
|
|
||||||
images: ghcr.io/${{ github.repository_owner }}/tinyauth
|
|
||||||
tags: |
|
|
||||||
type=semver,pattern={{version}},prefix=v
|
|
||||||
type=semver,pattern={{major}},prefix=v
|
|
||||||
type=semver,pattern={{major}}.{{minor}},prefix=v
|
|
||||||
|
|
||||||
- name: Create manifest list and push
|
|
||||||
working-directory: ${{ runner.temp }}/digests
|
|
||||||
run: |
|
|
||||||
docker buildx imagetools create $(jq -cr '.tags | map("-t " + .) | join(" ")' <<< "$DOCKER_METADATA_OUTPUT_JSON") \
|
|
||||||
$(printf 'ghcr.io/${{ github.repository_owner }}/tinyauth@sha256:%s ' *)
|
|
||||||
|
|
||||||
update-release:
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
needs:
|
|
||||||
- binary-build
|
|
||||||
- binary-build-arm
|
|
||||||
steps:
|
|
||||||
- uses: actions/download-artifact@v4
|
|
||||||
with:
|
|
||||||
pattern: tinyauth-*
|
|
||||||
path: binaries
|
|
||||||
merge-multiple: true
|
|
||||||
|
|
||||||
- name: Release
|
|
||||||
uses: softprops/action-gh-release@v2
|
uses: softprops/action-gh-release@v2
|
||||||
with:
|
with:
|
||||||
files: binaries/*
|
prerelease: false
|
||||||
|
make_latest: false
|
||||||
|
tag_name: ${{ needs.get-tag.outputs.tag }}
|
||||||
|
|||||||
98
.github/workflows/translations.yml
vendored
@@ -1,98 +0,0 @@
|
|||||||
name: Publish translations
|
|
||||||
|
|
||||||
on:
|
|
||||||
push:
|
|
||||||
branches:
|
|
||||||
- i18n_v*
|
|
||||||
workflow_dispatch:
|
|
||||||
|
|
||||||
permissions:
|
|
||||||
contents: read
|
|
||||||
pages: write
|
|
||||||
id-token: write
|
|
||||||
|
|
||||||
concurrency:
|
|
||||||
group: pages
|
|
||||||
cancel-in-progress: false
|
|
||||||
|
|
||||||
jobs:
|
|
||||||
get-branches:
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
outputs:
|
|
||||||
i18n-branches: ${{ steps.get-branches.outputs.result }}
|
|
||||||
steps:
|
|
||||||
- name: Get branches
|
|
||||||
id: get-branches
|
|
||||||
uses: actions/github-script@v7
|
|
||||||
with:
|
|
||||||
script: |
|
|
||||||
const { data: repos } = await github.rest.repos.listBranches({
|
|
||||||
owner: context.repo.owner,
|
|
||||||
repo: context.repo.repo,
|
|
||||||
})
|
|
||||||
|
|
||||||
const i18nBranches = repos.filter((branch) => branch.name.startsWith("i18n_v"))
|
|
||||||
const i18nBranchNames = i18nBranches.map((branch) => branch.name)
|
|
||||||
|
|
||||||
return i18nBranchNames
|
|
||||||
|
|
||||||
get-translations:
|
|
||||||
needs: get-branches
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
strategy:
|
|
||||||
matrix:
|
|
||||||
branch: ${{ fromJson(needs.get-branches.outputs.i18n-branches) }}
|
|
||||||
steps:
|
|
||||||
- name: Checkout
|
|
||||||
uses: actions/checkout@v4
|
|
||||||
with:
|
|
||||||
ref: ${{ matrix.branch }}
|
|
||||||
|
|
||||||
- name: Get translation version
|
|
||||||
id: get-version
|
|
||||||
run: |
|
|
||||||
branch=${{ matrix.branch }}
|
|
||||||
version=${branch#i18n_}
|
|
||||||
echo "version=$version" >> $GITHUB_OUTPUT
|
|
||||||
|
|
||||||
- name: Upload translations
|
|
||||||
uses: actions/upload-artifact@v4
|
|
||||||
with:
|
|
||||||
name: ${{ steps.get-version.outputs.version }}
|
|
||||||
path: frontend/src/lib/i18n/locales
|
|
||||||
|
|
||||||
build:
|
|
||||||
needs: get-translations
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
steps:
|
|
||||||
- name: Checkout
|
|
||||||
uses: actions/checkout@v4
|
|
||||||
|
|
||||||
- name: Setup Pages
|
|
||||||
uses: actions/configure-pages@v4
|
|
||||||
|
|
||||||
- name: Prepare output directory
|
|
||||||
run: |
|
|
||||||
mkdir -p dist/i18n/
|
|
||||||
|
|
||||||
- name: Download translations
|
|
||||||
uses: actions/download-artifact@v4
|
|
||||||
with:
|
|
||||||
path: dist/i18n/
|
|
||||||
|
|
||||||
- name: Upload artifact
|
|
||||||
uses: actions/upload-pages-artifact@v3
|
|
||||||
with:
|
|
||||||
path: dist
|
|
||||||
|
|
||||||
deploy:
|
|
||||||
environment:
|
|
||||||
name: github-pages
|
|
||||||
url: ${{ steps.deployment.outputs.page_url }}
|
|
||||||
needs: build
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
name: Deploy
|
|
||||||
steps:
|
|
||||||
- name: Deploy to GitHub Pages
|
|
||||||
id: deployment
|
|
||||||
uses: actions/deploy-pages@v4
|
|
||||||
8
.gitignore
vendored
@@ -18,10 +18,4 @@ secret_oauth.txt
|
|||||||
.vscode
|
.vscode
|
||||||
|
|
||||||
# apple stuff
|
# apple stuff
|
||||||
.DS_Store
|
.DS_Store
|
||||||
|
|
||||||
# env
|
|
||||||
.env
|
|
||||||
|
|
||||||
# tmp directory
|
|
||||||
tmp
|
|
||||||
@@ -1,6 +1,6 @@
|
|||||||
# Contributing
|
# Contributing
|
||||||
|
|
||||||
Contributing is relatively easy, you just need to follow the steps carefully and you will be up and running with a development server in less than 5 minutes.
|
Contributing is relatively easy.
|
||||||
|
|
||||||
## Requirements
|
## Requirements
|
||||||
|
|
||||||
@@ -20,37 +20,62 @@ cd tinyauth
|
|||||||
|
|
||||||
## Install requirements
|
## Install requirements
|
||||||
|
|
||||||
Although you will not need the requirements in your machine since the development will happen in docker, I still recommend to install them because this way you will not have import errors, to install the go requirements, run:
|
Now it's time to install the requirements, firstly the Go ones:
|
||||||
|
|
||||||
```sh
|
```sh
|
||||||
go mod tidy
|
go mod download
|
||||||
```
|
```
|
||||||
|
|
||||||
You also need to download the frontend dependencies, this can be done like so:
|
And now the site ones:
|
||||||
|
|
||||||
```sh
|
```sh
|
||||||
cd frontend/
|
cd site
|
||||||
bun install
|
bun i
|
||||||
```
|
```
|
||||||
|
|
||||||
## Create your `.env` file
|
## Developing locally
|
||||||
|
|
||||||
In order to configure the app you need to create an environment file, this can be done by copying the `.env.example` file to `.env` and modifying the environment variables inside to suit your needs.
|
In order to develop the app locally you need to build the frontend and copy it to the assets folder in order for Go to embed it and host it. In order to build the frontend run:
|
||||||
|
|
||||||
## Developing
|
```sh
|
||||||
|
cd site
|
||||||
I have designed the development workflow to be entirely in docker, this is because it will directly work with traefik and you will not need to do any building in your host machine. The recommended development setup is to have a subdomain pointing to your machine like this:
|
bun run build
|
||||||
|
cd ..
|
||||||
```
|
|
||||||
*.dev.example.com -> 127.0.0.1
|
|
||||||
dev.example.com -> 127.0.0.1
|
|
||||||
```
|
```
|
||||||
|
|
||||||
Then you can just make sure the domains are correct in the example docker compose file and run:
|
Copy it to the assets folder:
|
||||||
|
|
||||||
|
```sh
|
||||||
|
rm -rf internal/assets/dist
|
||||||
|
cp -r site/dist internal/assets/dist
|
||||||
|
```
|
||||||
|
|
||||||
|
Finally either run the app with:
|
||||||
|
|
||||||
|
```sh
|
||||||
|
go run main.go
|
||||||
|
```
|
||||||
|
|
||||||
|
Or build it with:
|
||||||
|
|
||||||
|
```sh
|
||||||
|
go build
|
||||||
|
```
|
||||||
|
|
||||||
|
> [!WARNING]
|
||||||
|
> Make sure you have set the environment variables when running outside of docker else the app will fail.
|
||||||
|
|
||||||
|
## Developing in docker
|
||||||
|
|
||||||
|
My recommended development method is docker so I can test that both my image works and that the app responds correctly to traefik. In my setup I have set these two DNS records in my DNS server:
|
||||||
|
|
||||||
|
```
|
||||||
|
*.dev.local -> 127.0.0.1
|
||||||
|
dev.local -> 127.0.0.1
|
||||||
|
```
|
||||||
|
|
||||||
|
Then I can just make sure the domains are correct in the example docker compose file and do:
|
||||||
|
|
||||||
```sh
|
```sh
|
||||||
docker compose -f docker-compose.dev.yml up --build
|
docker compose -f docker-compose.dev.yml up --build
|
||||||
```
|
```
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> I would recommend copying the example `docker-compose.dev.yml` into a `docker-compose.test.yml` file, so as you don't accidentally commit any sensitive information.
|
|
||||||
|
|||||||
33
Dockerfile
@@ -1,22 +1,22 @@
|
|||||||
# Site builder
|
# Site builder
|
||||||
FROM oven/bun:1.1.45-alpine AS frontend-builder
|
FROM oven/bun:1.1.45-alpine AS site-builder
|
||||||
|
|
||||||
WORKDIR /frontend
|
WORKDIR /site
|
||||||
|
|
||||||
COPY ./frontend/package.json ./
|
COPY ./site/package.json ./
|
||||||
COPY ./frontend/bun.lockb ./
|
COPY ./site/bun.lockb ./
|
||||||
|
|
||||||
RUN bun install
|
RUN bun install
|
||||||
|
|
||||||
COPY ./frontend/public ./public
|
COPY ./site/public ./public
|
||||||
COPY ./frontend/src ./src
|
COPY ./site/src ./src
|
||||||
COPY ./frontend/eslint.config.js ./
|
COPY ./site/eslint.config.js ./
|
||||||
COPY ./frontend/index.html ./
|
COPY ./site/index.html ./
|
||||||
COPY ./frontend/tsconfig.json ./
|
COPY ./site/tsconfig.json ./
|
||||||
COPY ./frontend/tsconfig.app.json ./
|
COPY ./site/tsconfig.app.json ./
|
||||||
COPY ./frontend/tsconfig.node.json ./
|
COPY ./site/tsconfig.node.json ./
|
||||||
COPY ./frontend/vite.config.ts ./
|
COPY ./site/vite.config.ts ./
|
||||||
COPY ./frontend/postcss.config.cjs ./
|
COPY ./site/postcss.config.cjs ./
|
||||||
|
|
||||||
RUN bun run build
|
RUN bun run build
|
||||||
|
|
||||||
@@ -33,7 +33,7 @@ RUN go mod download
|
|||||||
COPY ./main.go ./
|
COPY ./main.go ./
|
||||||
COPY ./cmd ./cmd
|
COPY ./cmd ./cmd
|
||||||
COPY ./internal ./internal
|
COPY ./internal ./internal
|
||||||
COPY --from=frontend-builder /frontend/dist ./internal/assets/dist
|
COPY --from=site-builder /site/dist ./internal/assets/dist
|
||||||
|
|
||||||
RUN CGO_ENABLED=0 go build -ldflags "-s -w"
|
RUN CGO_ENABLED=0 go build -ldflags "-s -w"
|
||||||
|
|
||||||
@@ -42,13 +42,8 @@ FROM alpine:3.21 AS runner
|
|||||||
|
|
||||||
WORKDIR /tinyauth
|
WORKDIR /tinyauth
|
||||||
|
|
||||||
RUN apk add --no-cache curl
|
|
||||||
|
|
||||||
COPY --from=builder /tinyauth/tinyauth ./
|
COPY --from=builder /tinyauth/tinyauth ./
|
||||||
|
|
||||||
EXPOSE 3000
|
EXPOSE 3000
|
||||||
|
|
||||||
HEALTHCHECK --interval=10s --timeout=5s \
|
|
||||||
CMD curl -f http://localhost:3000/api/healthcheck || exit 1
|
|
||||||
|
|
||||||
ENTRYPOINT ["./tinyauth"]
|
ENTRYPOINT ["./tinyauth"]
|
||||||
@@ -1,22 +0,0 @@
|
|||||||
FROM golang:1.23-alpine3.21
|
|
||||||
|
|
||||||
WORKDIR /tinyauth
|
|
||||||
|
|
||||||
COPY go.mod ./
|
|
||||||
COPY go.sum ./
|
|
||||||
|
|
||||||
RUN go mod download
|
|
||||||
|
|
||||||
COPY ./cmd ./cmd
|
|
||||||
COPY ./internal ./internal
|
|
||||||
COPY ./main.go ./
|
|
||||||
COPY ./air.toml ./
|
|
||||||
|
|
||||||
RUN mkdir -p ./internal/assets/dist && \
|
|
||||||
echo "app running" > ./internal/assets/dist/index.html
|
|
||||||
|
|
||||||
RUN go install github.com/air-verse/air@v1.61.7
|
|
||||||
|
|
||||||
EXPOSE 3000
|
|
||||||
|
|
||||||
ENTRYPOINT ["air", "-c", "air.toml"]
|
|
||||||
@@ -1,2 +0,0 @@
|
|||||||
github: steveiliop56
|
|
||||||
buy_me_a_coffee: steveiliop56
|
|
||||||
25
Makefile
Normal file
@@ -0,0 +1,25 @@
|
|||||||
|
# Build website
|
||||||
|
web:
|
||||||
|
cd site; bun run build
|
||||||
|
|
||||||
|
# Copy site assets
|
||||||
|
assets: web
|
||||||
|
rm -rf internal/assets/dist
|
||||||
|
mkdir -p internal/assets/dist
|
||||||
|
cp -r site/dist/* internal/assets/dist
|
||||||
|
|
||||||
|
# Run development binary
|
||||||
|
run: assets
|
||||||
|
go run main.go
|
||||||
|
|
||||||
|
# Test
|
||||||
|
test:
|
||||||
|
go test ./...
|
||||||
|
|
||||||
|
# Build
|
||||||
|
build: assets
|
||||||
|
go build -o tinyauth
|
||||||
|
|
||||||
|
# Build no site
|
||||||
|
build-skip-web:
|
||||||
|
go build -o tinyauth
|
||||||
25
README.md
@@ -1,5 +1,5 @@
|
|||||||
<div align="center">
|
<div align="center">
|
||||||
<img alt="Tinyauth" title="Tinyauth" width="256" src="frontend/public/logo.png">
|
<img alt="Tinyauth" title="Tinyauth" width="256" src="site/public/logo.png">
|
||||||
<h1>Tinyauth</h1>
|
<h1>Tinyauth</h1>
|
||||||
<p>The easiest way to secure your apps with a login screen.</p>
|
<p>The easiest way to secure your apps with a login screen.</p>
|
||||||
</div>
|
</div>
|
||||||
@@ -10,15 +10,12 @@
|
|||||||
<img alt="Commit activity" src="https://img.shields.io/github/commit-activity/w/steveiliop56/tinyauth">
|
<img alt="Commit activity" src="https://img.shields.io/github/commit-activity/w/steveiliop56/tinyauth">
|
||||||
<img alt="Issues" src="https://img.shields.io/github/issues/steveiliop56/tinyauth">
|
<img alt="Issues" src="https://img.shields.io/github/issues/steveiliop56/tinyauth">
|
||||||
<img alt="Tinyauth CI" src="https://github.com/steveiliop56/tinyauth/actions/workflows/ci.yml/badge.svg">
|
<img alt="Tinyauth CI" src="https://github.com/steveiliop56/tinyauth/actions/workflows/ci.yml/badge.svg">
|
||||||
<a title="Crowdin" target="_blank" href="https://crowdin.com/project/tinyauth"><img src="https://badges.crowdin.net/tinyauth/localized.svg"></a>
|
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
<br />
|
<br />
|
||||||
|
|
||||||
Tinyauth is a simple authentication middleware that adds simple username/password login or OAuth with Google, Github and any generic OAuth provider to all of your docker apps. It is made for traefik but it can be extended to work with all reverse proxies like caddy and nginx.
|
Tinyauth is a simple authentication middleware that adds simple username/password login or OAuth with Google, Github and any generic OAuth provider to all of your docker apps. It is made for traefik but it can be extended to work with all reverse proxies like caddy and nginx.
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
> [!WARNING]
|
> [!WARNING]
|
||||||
> Tinyauth is in active development and configuration may change often. Please make sure to carefully read the release notes before updating.
|
> Tinyauth is in active development and configuration may change often. Please make sure to carefully read the release notes before updating.
|
||||||
|
|
||||||
@@ -31,39 +28,23 @@ I just made a Discord server for Tinyauth! It is not only for Tinyauth but gener
|
|||||||
|
|
||||||
## Getting Started
|
## Getting Started
|
||||||
|
|
||||||
You can easily get started with tinyauth by following the guide on the [documentation](https://tinyauth.app/docs/getting-started.html). There is also an available [docker compose file](./docker-compose.example.yml) that has traefik, nginx and tinyauth to demonstrate its capabilities.
|
You can easily get started with tinyauth by following the guide on the [documentation](https://tinyauth.doesmycode.work/docs/getting-started.html). There is also an available [docker compose file](./docker-compose.example.yml) that has traefik, nginx and tinyauth to demonstrate its capabilities.
|
||||||
|
|
||||||
## Documentation
|
## Documentation
|
||||||
|
|
||||||
You can find documentation and guides on all available configuration of tinyauth [here](https://tinyauth.app).
|
You can find documentation and guides on all available configuration of tinyauth [here](https://tinyauth.doesmycode.work).
|
||||||
|
|
||||||
## Contributing
|
## Contributing
|
||||||
|
|
||||||
All contributions to the codebase are welcome! If you have any recommendations on how to improve security or find a security issue in tinyauth please open an issue or pull request so it can be fixed as soon as possible!
|
All contributions to the codebase are welcome! If you have any recommendations on how to improve security or find a security issue in tinyauth please open an issue or pull request so it can be fixed as soon as possible!
|
||||||
|
|
||||||
## Localization
|
|
||||||
|
|
||||||
If you would like to help translating the project in more languages you can do so by visiting the [Crowdin](https://crowdin.com/project/tinyauth) page.
|
|
||||||
|
|
||||||
## License
|
## License
|
||||||
|
|
||||||
Tinyauth is licensed under the GNU General Public License v3.0. TL;DR — You may copy, distribute and modify the software as long as you track changes/dates in source files. Any modifications to or software including (via compiler) GPL-licensed code must also be made available under the GPL along with build & install instructions. For more information about the license check the [license](./LICENSE) file.
|
Tinyauth is licensed under the GNU General Public License v3.0. TL;DR — You may copy, distribute and modify the software as long as you track changes/dates in source files. Any modifications to or software including (via compiler) GPL-licensed code must also be made available under the GPL along with build & install instructions. For more information about the license check the [license](./LICENSE) file.
|
||||||
|
|
||||||
## Sponsors
|
|
||||||
|
|
||||||
Thanks a lot to the following people for providing me with more coffee:
|
|
||||||
|
|
||||||
| <img height="64" src="https://avatars.githubusercontent.com/u/47644445?v=4" alt="Nicolas"> | <img height="64" src="https://avatars.githubusercontent.com/u/4255748?v=4" alt="Erwin"> |
|
|
||||||
| ------------------------------------------------------------------------------------------ | --------------------------------------------------------------------------------------- |
|
|
||||||
| <div align="center"><a href="https://github.com/nicotsx">Nicolas</a></div> | <div align="center"><a href="https://github.com/erwinkramer">Erwin</a></div> |
|
|
||||||
|
|
||||||
## Acknowledgements
|
## Acknowledgements
|
||||||
|
|
||||||
Credits for the logo of this app go to:
|
Credits for the logo of this app go to:
|
||||||
|
|
||||||
- **Freepik** for providing the police hat and badge.
|
- **Freepik** for providing the police hat and badge.
|
||||||
- **Renee French** for the original gopher logo.
|
- **Renee French** for the original gopher logo.
|
||||||
|
|
||||||
## Star History
|
|
||||||
|
|
||||||
[](https://www.star-history.com/#steveiliop56/tinyauth&Date)
|
|
||||||
|
|||||||
23
air.toml
@@ -1,23 +0,0 @@
|
|||||||
root = "/tinyauth"
|
|
||||||
tmp_dir = "tmp"
|
|
||||||
|
|
||||||
[build]
|
|
||||||
cmd = "go build -o ./tmp/tinyauth ."
|
|
||||||
bin = "tmp/tinyauth"
|
|
||||||
include_ext = ["go"]
|
|
||||||
exclude_dir = ["internal/assets/dist"]
|
|
||||||
exclude_regex = [".*_test\\.go"]
|
|
||||||
stop_on_error = true
|
|
||||||
|
|
||||||
[color]
|
|
||||||
main = "magenta"
|
|
||||||
watcher = "cyan"
|
|
||||||
build = "yellow"
|
|
||||||
runner = "green"
|
|
||||||
|
|
||||||
[misc]
|
|
||||||
clean_on_exit = true
|
|
||||||
|
|
||||||
[screen]
|
|
||||||
clear_on_rebuild = false
|
|
||||||
keep_scroll = true
|
|
||||||
@@ -3,8 +3,8 @@
|
|||||||
"embeds": [
|
"embeds": [
|
||||||
{
|
{
|
||||||
"title": "Welcome to Tinyauth Discord!",
|
"title": "Welcome to Tinyauth Discord!",
|
||||||
"description": "Tinyauth is a simple authentication middleware that adds simple username/password login or OAuth with Google, Github and any generic OAuth provider to all of your docker apps.\n\n**Information**\n\n• Github: <https://github.com/steveiliop56/tinyauth>\n• Website: <https://tinyauth.app>",
|
"description": "Tinyauth is a simple authentication middleware that adds simple username/password login or OAuth with Google, Github and any generic OAuth provider to all of your docker apps.\n\n**Information**\n\n• Github: <https://github.com/steveiliop56/tinyauth>\n• Website: <https://tinyauth.doesmycode.work>",
|
||||||
"url": "https://tinyauth.app",
|
"url": "https://tinyauth.doesmycode.work",
|
||||||
"color": 7002085,
|
"color": 7002085,
|
||||||
"author": {
|
"author": {
|
||||||
"name": "Tinyauth"
|
"name": "Tinyauth"
|
||||||
@@ -12,11 +12,11 @@
|
|||||||
"footer": {
|
"footer": {
|
||||||
"text": "Updated at"
|
"text": "Updated at"
|
||||||
},
|
},
|
||||||
"timestamp": "2025-03-10T19:00:00.000Z",
|
"timestamp": "2025-02-06T22:00:00.000Z",
|
||||||
"thumbnail": {
|
"thumbnail": {
|
||||||
"url": "https://github.com/steveiliop56/tinyauth/blob/main/frontend/public/logo.png?raw=true"
|
"url": "https://github.com/steveiliop56/tinyauth/blob/main/site/public/logo.png?raw=true"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"attachments": []
|
"attachments": []
|
||||||
}
|
}
|
||||||
|
|||||||
BIN
assets/login.png
|
Before Width: | Height: | Size: 93 KiB |
74
cmd/root.go
@@ -11,7 +11,6 @@ import (
|
|||||||
"tinyauth/internal/assets"
|
"tinyauth/internal/assets"
|
||||||
"tinyauth/internal/auth"
|
"tinyauth/internal/auth"
|
||||||
"tinyauth/internal/docker"
|
"tinyauth/internal/docker"
|
||||||
"tinyauth/internal/handlers"
|
|
||||||
"tinyauth/internal/hooks"
|
"tinyauth/internal/hooks"
|
||||||
"tinyauth/internal/providers"
|
"tinyauth/internal/providers"
|
||||||
"tinyauth/internal/types"
|
"tinyauth/internal/types"
|
||||||
@@ -34,8 +33,8 @@ var rootCmd = &cobra.Command{
|
|||||||
|
|
||||||
// Get config
|
// Get config
|
||||||
var config types.Config
|
var config types.Config
|
||||||
err := viper.Unmarshal(&config)
|
parseErr := viper.Unmarshal(&config)
|
||||||
HandleError(err, "Failed to parse config")
|
HandleError(parseErr, "Failed to parse config")
|
||||||
|
|
||||||
// Secrets
|
// Secrets
|
||||||
config.Secret = utils.GetSecret(config.Secret, config.SecretFile)
|
config.Secret = utils.GetSecret(config.Secret, config.SecretFile)
|
||||||
@@ -46,8 +45,8 @@ var rootCmd = &cobra.Command{
|
|||||||
|
|
||||||
// Validate config
|
// Validate config
|
||||||
validator := validator.New()
|
validator := validator.New()
|
||||||
err = validator.Struct(config)
|
validateErr := validator.Struct(config)
|
||||||
HandleError(err, "Failed to validate config")
|
HandleError(validateErr, "Failed to validate config")
|
||||||
|
|
||||||
// Logger
|
// Logger
|
||||||
log.Logger = log.Level(zerolog.Level(config.LogLevel))
|
log.Logger = log.Level(zerolog.Level(config.LogLevel))
|
||||||
@@ -55,8 +54,9 @@ var rootCmd = &cobra.Command{
|
|||||||
|
|
||||||
// Users
|
// Users
|
||||||
log.Info().Msg("Parsing users")
|
log.Info().Msg("Parsing users")
|
||||||
users, err := utils.GetUsers(config.Users, config.UsersFile)
|
users, usersErr := utils.GetUsers(config.Users, config.UsersFile)
|
||||||
HandleError(err, "Failed to parse users")
|
|
||||||
|
HandleError(usersErr, "Failed to parse users")
|
||||||
|
|
||||||
if len(users) == 0 && !utils.OAuthConfigured(config) {
|
if len(users) == 0 && !utils.OAuthConfigured(config) {
|
||||||
HandleError(errors.New("no users or OAuth configured"), "No users or OAuth configured")
|
HandleError(errors.New("no users or OAuth configured"), "No users or OAuth configured")
|
||||||
@@ -66,15 +66,8 @@ var rootCmd = &cobra.Command{
|
|||||||
oauthWhitelist := utils.Filter(strings.Split(config.OAuthWhitelist, ","), func(val string) bool {
|
oauthWhitelist := utils.Filter(strings.Split(config.OAuthWhitelist, ","), func(val string) bool {
|
||||||
return val != ""
|
return val != ""
|
||||||
})
|
})
|
||||||
|
|
||||||
log.Debug().Msg("Parsed OAuth whitelist")
|
log.Debug().Msg("Parsed OAuth whitelist")
|
||||||
|
|
||||||
// Get domain
|
|
||||||
log.Debug().Msg("Getting domain")
|
|
||||||
domain, err := utils.GetUpperDomain(config.AppURL)
|
|
||||||
HandleError(err, "Failed to get upper domain")
|
|
||||||
log.Info().Str("domain", domain).Msg("Using domain for cookie store")
|
|
||||||
|
|
||||||
// Create OAuth config
|
// Create OAuth config
|
||||||
oauthConfig := types.OAuthConfig{
|
oauthConfig := types.OAuthConfig{
|
||||||
GithubClientId: config.GithubClientId,
|
GithubClientId: config.GithubClientId,
|
||||||
@@ -92,41 +85,17 @@ var rootCmd = &cobra.Command{
|
|||||||
AppURL: config.AppURL,
|
AppURL: config.AppURL,
|
||||||
}
|
}
|
||||||
|
|
||||||
// Create handlers config
|
log.Debug().Msg("Parsed OAuth config")
|
||||||
handlersConfig := types.HandlersConfig{
|
|
||||||
AppURL: config.AppURL,
|
|
||||||
DisableContinue: config.DisableContinue,
|
|
||||||
Title: config.Title,
|
|
||||||
GenericName: config.GenericName,
|
|
||||||
}
|
|
||||||
|
|
||||||
// Create api config
|
|
||||||
apiConfig := types.APIConfig{
|
|
||||||
Port: config.Port,
|
|
||||||
Address: config.Address,
|
|
||||||
}
|
|
||||||
|
|
||||||
// Create auth config
|
|
||||||
authConfig := types.AuthConfig{
|
|
||||||
Users: users,
|
|
||||||
OauthWhitelist: oauthWhitelist,
|
|
||||||
Secret: config.Secret,
|
|
||||||
CookieSecure: config.CookieSecure,
|
|
||||||
SessionExpiry: config.SessionExpiry,
|
|
||||||
Domain: domain,
|
|
||||||
LoginTimeout: config.LoginTimeout,
|
|
||||||
LoginMaxRetries: config.LoginMaxRetries,
|
|
||||||
}
|
|
||||||
|
|
||||||
// Create docker service
|
// Create docker service
|
||||||
docker := docker.NewDocker()
|
docker := docker.NewDocker()
|
||||||
|
|
||||||
// Initialize docker
|
// Initialize docker
|
||||||
err = docker.Init()
|
dockerErr := docker.Init()
|
||||||
HandleError(err, "Failed to initialize docker")
|
HandleError(dockerErr, "Failed to initialize docker")
|
||||||
|
|
||||||
// Create auth service
|
// Create auth service
|
||||||
auth := auth.NewAuth(authConfig, docker)
|
auth := auth.NewAuth(docker, users, oauthWhitelist, config.SessionExpiry)
|
||||||
|
|
||||||
// Create OAuth providers service
|
// Create OAuth providers service
|
||||||
providers := providers.NewProviders(oauthConfig)
|
providers := providers.NewProviders(oauthConfig)
|
||||||
@@ -137,11 +106,18 @@ var rootCmd = &cobra.Command{
|
|||||||
// Create hooks service
|
// Create hooks service
|
||||||
hooks := hooks.NewHooks(auth, providers)
|
hooks := hooks.NewHooks(auth, providers)
|
||||||
|
|
||||||
// Create handlers
|
|
||||||
handlers := handlers.NewHandlers(handlersConfig, auth, hooks, providers, docker)
|
|
||||||
|
|
||||||
// Create API
|
// Create API
|
||||||
api := api.NewAPI(apiConfig, handlers)
|
api := api.NewAPI(types.APIConfig{
|
||||||
|
Port: config.Port,
|
||||||
|
Address: config.Address,
|
||||||
|
Secret: config.Secret,
|
||||||
|
AppURL: config.AppURL,
|
||||||
|
CookieSecure: config.CookieSecure,
|
||||||
|
DisableContinue: config.DisableContinue,
|
||||||
|
SessionExpiry: config.SessionExpiry,
|
||||||
|
Title: config.Title,
|
||||||
|
GenericName: config.GenericName,
|
||||||
|
}, hooks, auth, providers)
|
||||||
|
|
||||||
// Setup routes
|
// Setup routes
|
||||||
api.Init()
|
api.Init()
|
||||||
@@ -158,7 +134,7 @@ func Execute() {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func HandleError(err error, msg string) {
|
func HandleError(err error, msg string) {
|
||||||
// If error, log it and exit
|
// If error log it and exit
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Fatal().Err(err).Msg(msg)
|
log.Fatal().Err(err).Msg(msg)
|
||||||
}
|
}
|
||||||
@@ -203,8 +179,6 @@ func init() {
|
|||||||
rootCmd.Flags().Bool("disable-continue", false, "Disable continue screen and redirect to app directly.")
|
rootCmd.Flags().Bool("disable-continue", false, "Disable continue screen and redirect to app directly.")
|
||||||
rootCmd.Flags().String("oauth-whitelist", "", "Comma separated list of email addresses to whitelist when using OAuth.")
|
rootCmd.Flags().String("oauth-whitelist", "", "Comma separated list of email addresses to whitelist when using OAuth.")
|
||||||
rootCmd.Flags().Int("session-expiry", 86400, "Session (cookie) expiration time in seconds.")
|
rootCmd.Flags().Int("session-expiry", 86400, "Session (cookie) expiration time in seconds.")
|
||||||
rootCmd.Flags().Int("login-timeout", 300, "Login timeout in seconds after max retries reached (0 to disable).")
|
|
||||||
rootCmd.Flags().Int("login-max-retries", 5, "Maximum login attempts before timeout (0 to disable).")
|
|
||||||
rootCmd.Flags().Int("log-level", 1, "Log level.")
|
rootCmd.Flags().Int("log-level", 1, "Log level.")
|
||||||
rootCmd.Flags().String("app-title", "Tinyauth", "Title of the app.")
|
rootCmd.Flags().String("app-title", "Tinyauth", "Title of the app.")
|
||||||
|
|
||||||
@@ -239,8 +213,6 @@ func init() {
|
|||||||
viper.BindEnv("session-expiry", "SESSION_EXPIRY")
|
viper.BindEnv("session-expiry", "SESSION_EXPIRY")
|
||||||
viper.BindEnv("log-level", "LOG_LEVEL")
|
viper.BindEnv("log-level", "LOG_LEVEL")
|
||||||
viper.BindEnv("app-title", "APP_TITLE")
|
viper.BindEnv("app-title", "APP_TITLE")
|
||||||
viper.BindEnv("login-timeout", "LOGIN_TIMEOUT")
|
|
||||||
viper.BindEnv("login-max-retries", "LOGIN_MAX_RETRIES")
|
|
||||||
|
|
||||||
// Bind flags to viper
|
// Bind flags to viper
|
||||||
viper.BindPFlags(rootCmd.Flags())
|
viper.BindPFlags(rootCmd.Flags())
|
||||||
|
|||||||
@@ -18,7 +18,7 @@ import (
|
|||||||
// Interactive flag
|
// Interactive flag
|
||||||
var interactive bool
|
var interactive bool
|
||||||
|
|
||||||
// Input user
|
// i stands for input
|
||||||
var iUser string
|
var iUser string
|
||||||
|
|
||||||
var GenerateCmd = &cobra.Command{
|
var GenerateCmd = &cobra.Command{
|
||||||
@@ -46,18 +46,18 @@ var GenerateCmd = &cobra.Command{
|
|||||||
)
|
)
|
||||||
|
|
||||||
// Run form
|
// Run form
|
||||||
err := form.WithTheme(baseTheme).Run()
|
formErr := form.WithTheme(baseTheme).Run()
|
||||||
|
|
||||||
if err != nil {
|
if formErr != nil {
|
||||||
log.Fatal().Err(err).Msg("Form failed")
|
log.Fatal().Err(formErr).Msg("Form failed")
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// Parse user
|
// Parse user
|
||||||
user, err := utils.ParseUser(iUser)
|
user, parseErr := utils.ParseUser(iUser)
|
||||||
|
|
||||||
if err != nil {
|
if parseErr != nil {
|
||||||
log.Fatal().Err(err).Msg("Failed to parse user")
|
log.Fatal().Err(parseErr).Msg("Failed to parse user")
|
||||||
}
|
}
|
||||||
|
|
||||||
// Check if user was using docker escape
|
// Check if user was using docker escape
|
||||||
@@ -73,13 +73,13 @@ var GenerateCmd = &cobra.Command{
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Generate totp secret
|
// Generate totp secret
|
||||||
key, err := totp.Generate(totp.GenerateOpts{
|
key, keyErr := totp.Generate(totp.GenerateOpts{
|
||||||
Issuer: "Tinyauth",
|
Issuer: "Tinyauth",
|
||||||
AccountName: user.Username,
|
AccountName: user.Username,
|
||||||
})
|
})
|
||||||
|
|
||||||
if err != nil {
|
if keyErr != nil {
|
||||||
log.Fatal().Err(err).Msg("Failed to generate totp secret")
|
log.Fatal().Err(keyErr).Msg("Failed to generate totp secret")
|
||||||
}
|
}
|
||||||
|
|
||||||
// Create secret
|
// Create secret
|
||||||
|
|||||||
@@ -12,10 +12,7 @@ import (
|
|||||||
"golang.org/x/crypto/bcrypt"
|
"golang.org/x/crypto/bcrypt"
|
||||||
)
|
)
|
||||||
|
|
||||||
// Interactive flag
|
|
||||||
var interactive bool
|
var interactive bool
|
||||||
|
|
||||||
// Docker flag
|
|
||||||
var docker bool
|
var docker bool
|
||||||
|
|
||||||
// i stands for input
|
// i stands for input
|
||||||
@@ -54,10 +51,10 @@ var CreateCmd = &cobra.Command{
|
|||||||
// Use simple theme
|
// Use simple theme
|
||||||
var baseTheme *huh.Theme = huh.ThemeBase()
|
var baseTheme *huh.Theme = huh.ThemeBase()
|
||||||
|
|
||||||
err := form.WithTheme(baseTheme).Run()
|
formErr := form.WithTheme(baseTheme).Run()
|
||||||
|
|
||||||
if err != nil {
|
if formErr != nil {
|
||||||
log.Fatal().Err(err).Msg("Form failed")
|
log.Fatal().Err(formErr).Msg("Form failed")
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -69,10 +66,10 @@ var CreateCmd = &cobra.Command{
|
|||||||
log.Info().Str("username", iUsername).Str("password", iPassword).Bool("docker", docker).Msg("Creating user")
|
log.Info().Str("username", iUsername).Str("password", iPassword).Bool("docker", docker).Msg("Creating user")
|
||||||
|
|
||||||
// Hash password
|
// Hash password
|
||||||
password, err := bcrypt.GenerateFromPassword([]byte(iPassword), bcrypt.DefaultCost)
|
password, passwordErr := bcrypt.GenerateFromPassword([]byte(iPassword), bcrypt.DefaultCost)
|
||||||
|
|
||||||
if err != nil {
|
if passwordErr != nil {
|
||||||
log.Fatal().Err(err).Msg("Failed to hash password")
|
log.Fatal().Err(passwordErr).Msg("Failed to hash password")
|
||||||
}
|
}
|
||||||
|
|
||||||
// Convert password to string
|
// Convert password to string
|
||||||
|
|||||||
@@ -12,10 +12,7 @@ import (
|
|||||||
"golang.org/x/crypto/bcrypt"
|
"golang.org/x/crypto/bcrypt"
|
||||||
)
|
)
|
||||||
|
|
||||||
// Interactive flag
|
|
||||||
var interactive bool
|
var interactive bool
|
||||||
|
|
||||||
// Docker flag
|
|
||||||
var docker bool
|
var docker bool
|
||||||
|
|
||||||
// i stands for input
|
// i stands for input
|
||||||
@@ -63,18 +60,18 @@ var VerifyCmd = &cobra.Command{
|
|||||||
)
|
)
|
||||||
|
|
||||||
// Run form
|
// Run form
|
||||||
err := form.WithTheme(baseTheme).Run()
|
formErr := form.WithTheme(baseTheme).Run()
|
||||||
|
|
||||||
if err != nil {
|
if formErr != nil {
|
||||||
log.Fatal().Err(err).Msg("Form failed")
|
log.Fatal().Err(formErr).Msg("Form failed")
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// Parse user
|
// Parse user
|
||||||
user, err := utils.ParseUser(iUser)
|
user, userErr := utils.ParseUser(iUser)
|
||||||
|
|
||||||
if err != nil {
|
if userErr != nil {
|
||||||
log.Fatal().Err(err).Msg("Failed to parse user")
|
log.Fatal().Err(userErr).Msg("Failed to parse user")
|
||||||
}
|
}
|
||||||
|
|
||||||
// Compare username
|
// Compare username
|
||||||
@@ -83,9 +80,9 @@ var VerifyCmd = &cobra.Command{
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Compare password
|
// Compare password
|
||||||
err = bcrypt.CompareHashAndPassword([]byte(user.Password), []byte(iPassword))
|
verifyErr := bcrypt.CompareHashAndPassword([]byte(user.Password), []byte(iPassword))
|
||||||
|
|
||||||
if err != nil {
|
if verifyErr != nil {
|
||||||
log.Fatal().Msg("Ppassword is incorrect")
|
log.Fatal().Msg("Ppassword is incorrect")
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -99,9 +96,9 @@ var VerifyCmd = &cobra.Command{
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Check totp code
|
// Check totp code
|
||||||
ok := totp.Validate(iTotp, user.TotpSecret)
|
totpOk := totp.Validate(iTotp, user.TotpSecret)
|
||||||
|
|
||||||
if !ok {
|
if !totpOk {
|
||||||
log.Fatal().Msg("Totp code incorrect")
|
log.Fatal().Msg("Totp code incorrect")
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
12
crowdin.yml
@@ -1,12 +0,0 @@
|
|||||||
"base_path": "."
|
|
||||||
"base_url": "https://api.crowdin.com"
|
|
||||||
|
|
||||||
"preserve_hierarchy": true
|
|
||||||
|
|
||||||
files:
|
|
||||||
[
|
|
||||||
{
|
|
||||||
"source": "/frontend/src/lib/i18n/locales/en.json",
|
|
||||||
"translation": "/frontend/src/lib/i18n/locales/%locale%.json",
|
|
||||||
},
|
|
||||||
]
|
|
||||||
@@ -8,40 +8,27 @@ services:
|
|||||||
volumes:
|
volumes:
|
||||||
- /var/run/docker.sock:/var/run/docker.sock
|
- /var/run/docker.sock:/var/run/docker.sock
|
||||||
|
|
||||||
whoami:
|
nginx:
|
||||||
container_name: whoami
|
container_name: nginx
|
||||||
image: traefik/whoami:latest
|
image: nginx:latest
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: true
|
traefik.enable: true
|
||||||
traefik.http.routers.nginx.rule: Host(`whoami.example.com`)
|
traefik.http.routers.nginx.rule: Host(`nginx.dev.local`)
|
||||||
|
traefik.http.services.nginx.loadbalancer.server.port: 80
|
||||||
traefik.http.routers.nginx.middlewares: tinyauth
|
traefik.http.routers.nginx.middlewares: tinyauth
|
||||||
|
|
||||||
tinyauth-frontend:
|
tinyauth:
|
||||||
container_name: tinyauth-frontend
|
container_name: tinyauth
|
||||||
build:
|
build:
|
||||||
context: .
|
context: .
|
||||||
dockerfile: frontend/Dockerfile.dev
|
dockerfile: Dockerfile
|
||||||
volumes:
|
environment:
|
||||||
- ./frontend/src:/frontend/src
|
- SECRET=some-random-32-chars-string
|
||||||
ports:
|
- APP_URL=http://tinyauth.dev.local
|
||||||
- 5173:5173
|
- USERS=user:$$2a$$10$$UdLYoJ5lgPsC0RKqYH/jMua7zIn0g9kPqWmhYayJYLaZQ/FTmH2/u # user:password
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: true
|
traefik.enable: true
|
||||||
traefik.http.routers.tinyauth.rule: Host(`tinyauth.example.com`)
|
traefik.http.routers.tinyauth.rule: Host(`tinyauth.dev.local`)
|
||||||
|
traefik.http.services.tinyauth.loadbalancer.server.port: 3000
|
||||||
tinyauth-backend:
|
traefik.http.middlewares.tinyauth.forwardauth.address: http://tinyauth:3000/api/auth/traefik
|
||||||
container_name: tinyauth-backend
|
traefik.http.middlewares.tinyauth.forwardauth.authResponseHeaders: X-Tinyauth-User
|
||||||
build:
|
|
||||||
context: .
|
|
||||||
dockerfile: Dockerfile.dev
|
|
||||||
env_file: .env
|
|
||||||
volumes:
|
|
||||||
- ./internal:/tinyauth/internal
|
|
||||||
- ./cmd:/tinyauth/cmd
|
|
||||||
- ./main.go:/tinyauth/main.go
|
|
||||||
- /var/run/docker.sock:/var/run/docker.sock
|
|
||||||
ports:
|
|
||||||
- 3000:3000
|
|
||||||
labels:
|
|
||||||
traefik.enable: true
|
|
||||||
traefik.http.middlewares.tinyauth.forwardauth.address: http://tinyauth-backend:3000/api/auth/traefik
|
|
||||||
|
|||||||
@@ -8,17 +8,18 @@ services:
|
|||||||
volumes:
|
volumes:
|
||||||
- /var/run/docker.sock:/var/run/docker.sock
|
- /var/run/docker.sock:/var/run/docker.sock
|
||||||
|
|
||||||
whoami:
|
nginx:
|
||||||
container_name: whoami
|
container_name: nginx
|
||||||
image: traefik/whoami:latest
|
image: nginx:latest
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: true
|
traefik.enable: true
|
||||||
traefik.http.routers.nginx.rule: Host(`whoami.example.com`)
|
traefik.http.routers.nginx.rule: Host(`nginx.example.com`)
|
||||||
|
traefik.http.services.nginx.loadbalancer.server.port: 80
|
||||||
traefik.http.routers.nginx.middlewares: tinyauth
|
traefik.http.routers.nginx.middlewares: tinyauth
|
||||||
|
|
||||||
tinyauth:
|
tinyauth:
|
||||||
container_name: tinyauth
|
container_name: tinyauth
|
||||||
image: ghcr.io/steveiliop56/tinyauth:v3
|
image: ghcr.io/steveiliop56/tinyauth:latest
|
||||||
environment:
|
environment:
|
||||||
- SECRET=some-random-32-chars-string
|
- SECRET=some-random-32-chars-string
|
||||||
- APP_URL=https://tinyauth.example.com
|
- APP_URL=https://tinyauth.example.com
|
||||||
@@ -26,4 +27,6 @@ services:
|
|||||||
labels:
|
labels:
|
||||||
traefik.enable: true
|
traefik.enable: true
|
||||||
traefik.http.routers.tinyauth.rule: Host(`tinyauth.example.com`)
|
traefik.http.routers.tinyauth.rule: Host(`tinyauth.example.com`)
|
||||||
|
traefik.http.services.tinyauth.loadbalancer.server.port: 3000
|
||||||
traefik.http.middlewares.tinyauth.forwardauth.address: http://tinyauth:3000/api/auth/traefik
|
traefik.http.middlewares.tinyauth.forwardauth.address: http://tinyauth:3000/api/auth/traefik
|
||||||
|
traefik.http.middlewares.tinyauth.forwardauth.authResponseHeaders: X-Tinyauth-User
|
||||||
|
|||||||
@@ -1,23 +0,0 @@
|
|||||||
FROM oven/bun:1.1.45-alpine
|
|
||||||
|
|
||||||
WORKDIR /frontend
|
|
||||||
|
|
||||||
COPY ./frontend/package.json ./
|
|
||||||
COPY ./frontend/bun.lockb ./
|
|
||||||
|
|
||||||
RUN bun install
|
|
||||||
|
|
||||||
COPY ./frontend/public ./public
|
|
||||||
COPY ./frontend/src ./src
|
|
||||||
|
|
||||||
COPY ./frontend/eslint.config.js ./
|
|
||||||
COPY ./frontend/index.html ./
|
|
||||||
COPY ./frontend/tsconfig.json ./
|
|
||||||
COPY ./frontend/tsconfig.app.json ./
|
|
||||||
COPY ./frontend/tsconfig.node.json ./
|
|
||||||
COPY ./frontend/vite.config.ts ./
|
|
||||||
COPY ./frontend/postcss.config.cjs ./
|
|
||||||
|
|
||||||
EXPOSE 5173
|
|
||||||
|
|
||||||
ENTRYPOINT ["bun", "run", "dev"]
|
|
||||||
@@ -1,40 +0,0 @@
|
|||||||
import { ComboboxItem, Select } from "@mantine/core";
|
|
||||||
import { useState } from "react";
|
|
||||||
import i18n from "../../lib/i18n/i18n";
|
|
||||||
import {
|
|
||||||
SupportedLanguage,
|
|
||||||
getLanguageName,
|
|
||||||
languages,
|
|
||||||
} from "../../lib/i18n/locales";
|
|
||||||
|
|
||||||
export const LanguageSelector = () => {
|
|
||||||
const [language, setLanguage] = useState<ComboboxItem>({
|
|
||||||
value: i18n.language,
|
|
||||||
label: getLanguageName(i18n.language as SupportedLanguage),
|
|
||||||
});
|
|
||||||
|
|
||||||
const languageOptions = Object.entries(languages).map(([code, name]) => ({
|
|
||||||
value: code,
|
|
||||||
label: name,
|
|
||||||
}));
|
|
||||||
|
|
||||||
const handleLanguageChange = (option: string) => {
|
|
||||||
i18n.changeLanguage(option as SupportedLanguage);
|
|
||||||
setLanguage({
|
|
||||||
value: option,
|
|
||||||
label: getLanguageName(option as SupportedLanguage),
|
|
||||||
});
|
|
||||||
};
|
|
||||||
|
|
||||||
return (
|
|
||||||
<Select
|
|
||||||
data={languageOptions}
|
|
||||||
value={language ? language.value : null}
|
|
||||||
onChange={(_value, option) => handleLanguageChange(option.value)}
|
|
||||||
allowDeselect={false}
|
|
||||||
pos="absolute"
|
|
||||||
right={10}
|
|
||||||
top={10}
|
|
||||||
/>
|
|
||||||
);
|
|
||||||
};
|
|
||||||
@@ -1,16 +0,0 @@
|
|||||||
import { Center, Flex } from "@mantine/core";
|
|
||||||
import { ReactNode } from "react";
|
|
||||||
import { LanguageSelector } from "../language-selector/language-selector";
|
|
||||||
|
|
||||||
export const Layout = ({ children }: { children: ReactNode }) => {
|
|
||||||
return (
|
|
||||||
<>
|
|
||||||
<LanguageSelector />
|
|
||||||
<Center style={{ minHeight: "100vh" }}>
|
|
||||||
<Flex direction="column" flex="1" maw={340}>
|
|
||||||
{children}
|
|
||||||
</Flex>
|
|
||||||
</Center>
|
|
||||||
</>
|
|
||||||
);
|
|
||||||
};
|
|
||||||
@@ -1,42 +0,0 @@
|
|||||||
import { useQuery } from "@tanstack/react-query";
|
|
||||||
import React, { createContext, useContext } from "react";
|
|
||||||
import axios from "axios";
|
|
||||||
import { AppContextSchemaType } from "../schemas/app-context-schema";
|
|
||||||
|
|
||||||
const AppContext = createContext<AppContextSchemaType | null>(null);
|
|
||||||
|
|
||||||
export const AppContextProvider = ({
|
|
||||||
children,
|
|
||||||
}: {
|
|
||||||
children: React.ReactNode;
|
|
||||||
}) => {
|
|
||||||
const {
|
|
||||||
data: userContext,
|
|
||||||
isLoading,
|
|
||||||
error,
|
|
||||||
} = useQuery({
|
|
||||||
queryKey: ["appContext"],
|
|
||||||
queryFn: async () => {
|
|
||||||
const res = await axios.get("/api/app");
|
|
||||||
return res.data;
|
|
||||||
},
|
|
||||||
});
|
|
||||||
|
|
||||||
if (error && !isLoading) {
|
|
||||||
throw error;
|
|
||||||
}
|
|
||||||
|
|
||||||
return (
|
|
||||||
<AppContext.Provider value={userContext}>{children}</AppContext.Provider>
|
|
||||||
);
|
|
||||||
};
|
|
||||||
|
|
||||||
export const useAppContext = () => {
|
|
||||||
const context = useContext(AppContext);
|
|
||||||
|
|
||||||
if (context === null) {
|
|
||||||
throw new Error("useAppContext must be used within an AppContextProvider");
|
|
||||||
}
|
|
||||||
|
|
||||||
return context;
|
|
||||||
};
|
|
||||||
@@ -1,27 +0,0 @@
|
|||||||
import { useColorScheme } from "@mantine/hooks";
|
|
||||||
import type { SVGProps } from "react";
|
|
||||||
|
|
||||||
export function TailscaleIcon(props: SVGProps<SVGSVGElement>) {
|
|
||||||
const colorScheme = useColorScheme();
|
|
||||||
return (
|
|
||||||
<svg
|
|
||||||
xmlns="http://www.w3.org/2000/svg"
|
|
||||||
viewBox="0 0 512 512"
|
|
||||||
width={24}
|
|
||||||
height={24}
|
|
||||||
{...props}
|
|
||||||
>
|
|
||||||
{colorScheme === "dark" ? (
|
|
||||||
<>
|
|
||||||
<path xmlns="http://www.w3.org/2000/svg" d="M65.6 318.1c35.3 0 63.9-28.6 63.9-63.9s-28.6-63.9-63.9-63.9S1.8 219 1.8 254.2s28.6 63.9 63.8 63.9m191.6 0c35.3 0 63.9-28.6 63.9-63.9s-28.6-63.9-63.9-63.9-63.9 28.6-63.9 63.9 28.6 63.9 63.9 63.9m0 193.9c35.3 0 63.9-28.6 63.9-63.9s-28.6-63.9-63.9-63.9-63.9 28.6-63.9 63.9 28.6 63.9 63.9 63.9m189.2-193.9c35.3 0 63.9-28.6 63.9-63.9s-28.6-63.9-63.9-63.9-63.9 28.6-63.9 63.9 28.6 63.9 63.9 63.9" fill="#ffffff"/>
|
|
||||||
<path xmlns="http://www.w3.org/2000/svg" d="M65.6 127.7c35.3 0 63.9-28.6 63.9-63.9S100.9 0 65.6 0 1.8 28.6 1.8 63.9s28.6 63.8 63.8 63.8m0 384.3c35.3 0 63.9-28.6 63.9-63.9s-28.6-63.9-63.9-63.9-63.8 28.7-63.8 63.9S30.4 512 65.6 512m191.6-384.3c35.3 0 63.9-28.6 63.9-63.9S292.5 0 257.2 0s-63.9 28.6-63.9 63.9 28.6 63.8 63.9 63.8m189.2 0c35.3 0 63.9-28.6 63.9-63.9S481.6 0 446.4 0c-35.3 0-63.9 28.6-63.9 63.9s28.6 63.8 63.9 63.8m0 384.3c35.3 0 63.9-28.6 63.9-63.9s-28.6-63.9-63.9-63.9-63.9 28.6-63.9 63.9 28.6 63.9 63.9 63.9" fill="#CCCAC9" opacity="0.2"/>
|
|
||||||
</>
|
|
||||||
) : (
|
|
||||||
<>
|
|
||||||
<path xmlns="http://www.w3.org/2000/svg" d="M65.6 318.1c35.3 0 63.9-28.6 63.9-63.9s-28.6-63.9-63.9-63.9S1.8 219 1.8 254.2s28.6 63.9 63.8 63.9m191.6 0c35.3 0 63.9-28.6 63.9-63.9s-28.6-63.9-63.9-63.9-63.9 28.6-63.9 63.9 28.6 63.9 63.9 63.9m0 193.9c35.3 0 63.9-28.6 63.9-63.9s-28.6-63.9-63.9-63.9-63.9 28.6-63.9 63.9 28.6 63.9 63.9 63.9m189.2-193.9c35.3 0 63.9-28.6 63.9-63.9s-28.6-63.9-63.9-63.9-63.9 28.6-63.9 63.9 28.6 63.9 63.9 63.9"/>
|
|
||||||
<path xmlns="http://www.w3.org/2000/svg" d="M65.6 127.7c35.3 0 63.9-28.6 63.9-63.9S100.9 0 65.6 0 1.8 28.6 1.8 63.9s28.6 63.8 63.8 63.8m0 384.3c35.3 0 63.9-28.6 63.9-63.9s-28.6-63.9-63.9-63.9-63.8 28.7-63.8 63.9S30.4 512 65.6 512m191.6-384.3c35.3 0 63.9-28.6 63.9-63.9S292.5 0 257.2 0s-63.9 28.6-63.9 63.9 28.6 63.8 63.9 63.8m189.2 0c35.3 0 63.9-28.6 63.9-63.9S481.6 0 446.4 0c-35.3 0-63.9 28.6-63.9 63.9s28.6 63.8 63.9 63.8m0 384.3c35.3 0 63.9-28.6 63.9-63.9s-28.6-63.9-63.9-63.9-63.9 28.6-63.9 63.9 28.6 63.9 63.9 63.9" opacity=".2"/>
|
|
||||||
</>
|
|
||||||
)}
|
|
||||||
</svg>
|
|
||||||
);
|
|
||||||
}
|
|
||||||
@@ -1,37 +0,0 @@
|
|||||||
import i18n from "i18next";
|
|
||||||
import { initReactI18next } from "react-i18next";
|
|
||||||
import LanguageDetector from "i18next-browser-languagedetector";
|
|
||||||
import ChainedBackend from "i18next-chained-backend";
|
|
||||||
import resourcesToBackend from "i18next-resources-to-backend";
|
|
||||||
import HttpBackend from "i18next-http-backend";
|
|
||||||
|
|
||||||
i18n
|
|
||||||
.use(ChainedBackend)
|
|
||||||
.use(LanguageDetector)
|
|
||||||
.use(initReactI18next)
|
|
||||||
.init({
|
|
||||||
fallbackLng: "en",
|
|
||||||
debug: import.meta.env.MODE === "development",
|
|
||||||
|
|
||||||
interpolation: {
|
|
||||||
escapeValue: false,
|
|
||||||
},
|
|
||||||
|
|
||||||
load: "currentOnly",
|
|
||||||
|
|
||||||
backend: {
|
|
||||||
backends: [
|
|
||||||
HttpBackend,
|
|
||||||
resourcesToBackend(
|
|
||||||
(language: string) => import(`./locales/${language}.json`),
|
|
||||||
),
|
|
||||||
],
|
|
||||||
backendOptions: [
|
|
||||||
{
|
|
||||||
loadPath: "https://cdn.tinyauth.app/i18n/v1/{{lng}}.json",
|
|
||||||
},
|
|
||||||
],
|
|
||||||
},
|
|
||||||
});
|
|
||||||
|
|
||||||
export default i18n;
|
|
||||||
@@ -1,36 +0,0 @@
|
|||||||
export const languages = {
|
|
||||||
"af-ZA": "Afrikaans",
|
|
||||||
"ar-SA": "العربية",
|
|
||||||
"ca-ES": "Català",
|
|
||||||
"cs-CZ": "Čeština",
|
|
||||||
"da-DK": "Dansk",
|
|
||||||
"de-DE": "Deutsch",
|
|
||||||
"el-GR": "Ελληνικά",
|
|
||||||
"en-US": "English",
|
|
||||||
"es-ES": "Español",
|
|
||||||
"fi-FI": "Suomi",
|
|
||||||
"fr-FR": "Français",
|
|
||||||
"he-IL": "עברית",
|
|
||||||
"hu-HU": "Magyar",
|
|
||||||
"it-IT": "Italiano",
|
|
||||||
"ja-JP": "日本語",
|
|
||||||
"ko-KR": "한국어",
|
|
||||||
"nl-NL": "Nederlands",
|
|
||||||
"no-NO": "Norsk",
|
|
||||||
"pl-PL": "Polski",
|
|
||||||
"pt-BR": "Português",
|
|
||||||
"pt-PT": "Português",
|
|
||||||
"ro-RO": "Română",
|
|
||||||
"ru-RU": "Русский",
|
|
||||||
"sr-SP": "Српски",
|
|
||||||
"sv-SE": "Svenska",
|
|
||||||
"tr-TR": "Türkçe",
|
|
||||||
"uk-UA": "Українська",
|
|
||||||
"vi-VN": "Tiếng Việt",
|
|
||||||
"zh-CN": "中文",
|
|
||||||
"zh-TW": "中文"
|
|
||||||
}
|
|
||||||
|
|
||||||
export type SupportedLanguage = keyof typeof languages;
|
|
||||||
|
|
||||||
export const getLanguageName = (language: SupportedLanguage): string => languages[language];
|
|
||||||
@@ -1,46 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginFailRateLimit": "You failed to login too many times, please try again later",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,46 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginFailRateLimit": "You failed to login too many times, please try again later",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,46 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginFailRateLimit": "You failed to login too many times, please try again later",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,46 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginFailRateLimit": "You failed to login too many times, please try again later",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,46 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginFailRateLimit": "You failed to login too many times, please try again later",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,46 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Willkommen zurück, logge dich ein mit",
|
|
||||||
"loginDivider": "Oder mit Passwort fortfahren",
|
|
||||||
"loginUsername": "Benutzername",
|
|
||||||
"loginPassword": "Passwort",
|
|
||||||
"loginSubmit": "Anmelden",
|
|
||||||
"loginFailTitle": "Login fehlgeschlagen",
|
|
||||||
"loginFailSubtitle": "Bitte überprüfe deinen Benutzernamen und Passwort",
|
|
||||||
"loginFailRateLimit": "Sie konnten sich zu oft nicht einloggen, bitte versuchen Sie es später erneut",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,46 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Καλώς ήρθατε, συνδεθείτε με",
|
|
||||||
"loginDivider": "Ή συνεχίστε με κωδικό πρόσβασης",
|
|
||||||
"loginUsername": "Όνομα Χρήστη",
|
|
||||||
"loginPassword": "Κωδικός",
|
|
||||||
"loginSubmit": "Είσοδος",
|
|
||||||
"loginFailTitle": "Αποτυχία σύνδεσης",
|
|
||||||
"loginFailSubtitle": "Παρακαλώ ελέγξτε το όνομα χρήστη και τον κωδικό πρόσβασης",
|
|
||||||
"loginFailRateLimit": "Αποτύχατε να συνδεθείτε πάρα πολλές φορές, παρακαλώ προσπαθήστε ξανά αργότερα",
|
|
||||||
"loginSuccessTitle": "Συνδεδεμένος",
|
|
||||||
"loginSuccessSubtitle": "Καλώς ήρθατε!",
|
|
||||||
"loginOauthFailTitle": "Εσωτερικό σφάλμα",
|
|
||||||
"loginOauthFailSubtitle": "Αποτυχία λήψης OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Ανακατεύθυνση",
|
|
||||||
"loginOauthSuccessSubtitle": "Ανακατεύθυνση στον πάροχο OAuth σας",
|
|
||||||
"continueRedirectingTitle": "Ανακατεύθυνση...",
|
|
||||||
"continueRedirectingSubtitle": "Θα πρέπει να μεταφερθείτε σύντομα στην εφαρμογή σας",
|
|
||||||
"continueInvalidRedirectTitle": "Μη έγκυρη ανακατεύθυνση",
|
|
||||||
"continueInvalidRedirectSubtitle": "Το URL ανακατεύθυνσης δεν είναι έγκυρο",
|
|
||||||
"continueInsecureRedirectTitle": "Μη ασφαλής ανακατεύθυνση",
|
|
||||||
"continueInsecureRedirectSubtitle": "Προσπαθείτε να ανακατευθύνετε από <Code>https</Code> σε <Code>http</Code>, είστε σίγουροι ότι θέλετε να συνεχίσετε;",
|
|
||||||
"continueTitle": "Συνέχεια",
|
|
||||||
"continueSubtitle": "Κάντε κλικ στο κουμπί για να συνεχίσετε στην εφαρμογή σας.",
|
|
||||||
"internalErrorTitle": "Εσωτερικό Σφάλμα Διακομιστή",
|
|
||||||
"internalErrorSubtitle": "Παρουσιάστηκε σφάλμα στο διακομιστή και δεν μπορεί να εξυπηρετήσει το αίτημά σας.",
|
|
||||||
"internalErrorButton": "Προσπαθήστε ξανά",
|
|
||||||
"logoutFailTitle": "Αποτυχία αποσύνδεσης",
|
|
||||||
"logoutFailSubtitle": "Παρακαλώ δοκιμάστε ξανά",
|
|
||||||
"logoutSuccessTitle": "Αποσυνδεδεμένος",
|
|
||||||
"logoutSuccessSubtitle": "Έχετε αποσυνδεθεί",
|
|
||||||
"logoutTitle": "Αποσύνδεση",
|
|
||||||
"logoutUsernameSubtitle": "Αυτή τη στιγμή είστε συνδεδεμένοι ως <Code>{{username}}</Code>, κάντε κλικ στο παρακάτω κουμπί για να αποσυνδεθείτε.",
|
|
||||||
"logoutOauthSubtitle": "Αυτή τη στιγμή είστε συνδεδεμένοι ως <Code>{{username}}</Code> χρησιμοποιώντας την υπηρεσία παροχής {{provider}} OAuth, κάντε κλικ στο παρακάτω κουμπί για να αποσυνδεθείτε.",
|
|
||||||
"notFoundTitle": "Η σελίδα δε βρέθηκε",
|
|
||||||
"notFoundSubtitle": "Η σελίδα που ψάχνετε δεν υπάρχει.",
|
|
||||||
"notFoundButton": "Μετάβαση στην αρχική",
|
|
||||||
"totpFailTitle": "Αποτυχία επαλήθευσης κωδικού",
|
|
||||||
"totpFailSubtitle": "Παρακαλώ ελέγξτε τον κώδικά σας και προσπαθήστε ξανά",
|
|
||||||
"totpSuccessTitle": "Επαληθεύθηκε",
|
|
||||||
"totpSuccessSubtitle": "Ανακατεύθυνση στην εφαρμογή σας",
|
|
||||||
"totpTitle": "Εισάγετε τον κωδικό TOTP",
|
|
||||||
"unauthorizedTitle": "Μη εξουσιοδοτημένο",
|
|
||||||
"unauthorizedResourceSubtitle": "Ο χρήστης με όνομα χρήστη <Code>{{username}}</Code> δεν έχει άδεια πρόσβασης στον πόρο <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "Ο χρήστης με όνομα χρήστη <Code>{{username}}</Code> δεν είναι εξουσιοδοτημένος να συνδεθεί.",
|
|
||||||
"unauthorizedButton": "Προσπαθήστε ξανά"
|
|
||||||
}
|
|
||||||
@@ -1,46 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginFailRateLimit": "You failed to login too many times, please try again later",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,46 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginFailRateLimit": "You failed to login too many times, please try again later",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,46 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginFailRateLimit": "You failed to login too many times, please try again later",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,46 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginFailRateLimit": "You failed to login too many times, please try again later",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,46 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Bienvenue, connectez-vous avec",
|
|
||||||
"loginDivider": "Ou continuez avec le mot de passe",
|
|
||||||
"loginUsername": "Nom d'utilisateur",
|
|
||||||
"loginPassword": "Mot de passe",
|
|
||||||
"loginSubmit": "Se connecter",
|
|
||||||
"loginFailTitle": "Échec de la connexion",
|
|
||||||
"loginFailSubtitle": "Veuillez vérifier votre nom d'utilisateur et votre mot de passe",
|
|
||||||
"loginFailRateLimit": "Vous n'avez pas pu vous connecter trop de fois, veuillez réessayer plus tard",
|
|
||||||
"loginSuccessTitle": "Connecté",
|
|
||||||
"loginSuccessSubtitle": "Bienvenue!",
|
|
||||||
"loginOauthFailTitle": "Erreur interne",
|
|
||||||
"loginOauthFailSubtitle": "Impossible d'obtenir l'URL OAuth",
|
|
||||||
"loginOauthSuccessTitle": "Redirection",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirection vers votre fournisseur OAuth",
|
|
||||||
"continueRedirectingTitle": "Redirection...",
|
|
||||||
"continueRedirectingSubtitle": "Vous devriez être redirigé vers l'application bientôt",
|
|
||||||
"continueInvalidRedirectTitle": "Redirection invalide",
|
|
||||||
"continueInvalidRedirectSubtitle": "L'URL de redirection est invalide",
|
|
||||||
"continueInsecureRedirectTitle": "Redirection non sécurisée",
|
|
||||||
"continueInsecureRedirectSubtitle": "Vous essayez de rediriger de <Code>https</Code> vers <Code>http</Code>, êtes-vous sûr de vouloir continuer ?",
|
|
||||||
"continueTitle": "Continuer",
|
|
||||||
"continueSubtitle": "Cliquez sur le bouton pour continuer vers votre application.",
|
|
||||||
"internalErrorTitle": "Erreur interne du serveur",
|
|
||||||
"internalErrorSubtitle": "Une erreur s'est produite sur le serveur et il ne peut actuellement pas répondre à votre demande.",
|
|
||||||
"internalErrorButton": "Réessayer",
|
|
||||||
"logoutFailTitle": "Échec de la déconnexion",
|
|
||||||
"logoutFailSubtitle": "Veuillez réessayer",
|
|
||||||
"logoutSuccessTitle": "Déconnecté",
|
|
||||||
"logoutSuccessSubtitle": "Vous avez été déconnecté",
|
|
||||||
"logoutTitle": "Déconnexion",
|
|
||||||
"logoutUsernameSubtitle": "Vous êtes actuellement connecté en tant que <Code>{{username}}</Code>, cliquez sur le bouton ci-dessous pour vous déconnecter.",
|
|
||||||
"logoutOauthSubtitle": "Vous êtes actuellement connecté en tant que <Code>{{username}}</Code> en utilisant le fournisseur OAuth {{provider}} , cliquez sur le bouton ci-dessous pour vous déconnecter.",
|
|
||||||
"notFoundTitle": "Page introuvable",
|
|
||||||
"notFoundSubtitle": "La page recherchée n'existe pas.",
|
|
||||||
"notFoundButton": "Retour à la page d'accueil",
|
|
||||||
"totpFailTitle": "Échec de la vérification du code",
|
|
||||||
"totpFailSubtitle": "Veuillez vérifier votre code et réessayer",
|
|
||||||
"totpSuccessTitle": "Vérifié",
|
|
||||||
"totpSuccessSubtitle": "Redirection vers votre application",
|
|
||||||
"totpTitle": "Saisissez votre code TOTP",
|
|
||||||
"unauthorizedTitle": "Non autorisé",
|
|
||||||
"unauthorizedResourceSubtitle": "L'utilisateur avec le nom d'utilisateur <Code>{{username}}</Code> n'est pas autorisé à accéder à la ressource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "L'utilisateur avec le nom d'utilisateur <Code>{{username}}</Code> n'est pas autorisé à se connecter.",
|
|
||||||
"unauthorizedButton": "Réessayer"
|
|
||||||
}
|
|
||||||
@@ -1,46 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginFailRateLimit": "You failed to login too many times, please try again later",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,46 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginFailRateLimit": "You failed to login too many times, please try again later",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,46 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginFailRateLimit": "You failed to login too many times, please try again later",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,46 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginFailRateLimit": "You failed to login too many times, please try again later",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,46 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginFailRateLimit": "You failed to login too many times, please try again later",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,46 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welkom terug, log in met",
|
|
||||||
"loginDivider": "Of ga door met wachtwoord",
|
|
||||||
"loginUsername": "Gebruikersnaam",
|
|
||||||
"loginPassword": "Wachtwoord",
|
|
||||||
"loginSubmit": "Log in",
|
|
||||||
"loginFailTitle": "Mislukt om in te loggen",
|
|
||||||
"loginFailSubtitle": "Gelieve uw gebruikersnaam en wachtwoord te controleren",
|
|
||||||
"loginFailRateLimit": "You failed to login too many times, please try again later",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,46 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginFailRateLimit": "You failed to login too many times, please try again later",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,46 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Witaj ponownie, zaloguj się przez",
|
|
||||||
"loginDivider": "Lub kontynuuj z hasłem",
|
|
||||||
"loginUsername": "Nazwa użytkownika",
|
|
||||||
"loginPassword": "Hasło",
|
|
||||||
"loginSubmit": "Zaloguj się",
|
|
||||||
"loginFailTitle": "Nie udało się zalogować",
|
|
||||||
"loginFailSubtitle": "Sprawdź swoją nazwę użytkownika i hasło",
|
|
||||||
"loginFailRateLimit": "Nie udało się zalogować zbyt wiele razy, spróbuj ponownie później",
|
|
||||||
"loginSuccessTitle": "Zalogowano",
|
|
||||||
"loginSuccessSubtitle": "Witaj ponownie!",
|
|
||||||
"loginOauthFailTitle": "Wewnętrzny błąd",
|
|
||||||
"loginOauthFailSubtitle": "Nie udało się uzyskać adresu URL OAuth",
|
|
||||||
"loginOauthSuccessTitle": "Przekierowywanie",
|
|
||||||
"loginOauthSuccessSubtitle": "Przekierowywanie do Twojego dostawcy OAuth",
|
|
||||||
"continueRedirectingTitle": "Przekierowywanie...",
|
|
||||||
"continueRedirectingSubtitle": "Wkrótce powinieneś zostać przekierowany do aplikacji",
|
|
||||||
"continueInvalidRedirectTitle": "Nieprawidłowe przekierowanie",
|
|
||||||
"continueInvalidRedirectSubtitle": "Adres przekierowania jest nieprawidłowy",
|
|
||||||
"continueInsecureRedirectTitle": "Niezabezpieczone przekierowanie",
|
|
||||||
"continueInsecureRedirectSubtitle": "Próbujesz przekierować z <Code>https</Code> do <Code>http</Code>, czy na pewno chcesz kontynuować?",
|
|
||||||
"continueTitle": "Kontynuuj",
|
|
||||||
"continueSubtitle": "Kliknij przycisk, aby przejść do aplikacji.",
|
|
||||||
"internalErrorTitle": "Wewnętrzny błąd serwera",
|
|
||||||
"internalErrorSubtitle": "Wystąpił błąd na serwerze i obecnie nie można obsłużyć tego żądania.",
|
|
||||||
"internalErrorButton": "Spróbuj ponownie",
|
|
||||||
"logoutFailTitle": "Nie udało się wylogować",
|
|
||||||
"logoutFailSubtitle": "Spróbuj ponownie",
|
|
||||||
"logoutSuccessTitle": "Wylogowano",
|
|
||||||
"logoutSuccessSubtitle": "Zostałeś wylogowany",
|
|
||||||
"logoutTitle": "Wylogowanie",
|
|
||||||
"logoutUsernameSubtitle": "Jesteś aktualnie zalogowany jako <Code>{{username}}</Code>, kliknij przycisk poniżej, aby się wylogować.",
|
|
||||||
"logoutOauthSubtitle": "Jesteś obecnie zalogowany jako <Code>{{username}}</Code> przy użyciu providera OAuth {{provider}}, kliknij przycisk poniżej, aby się wylogować.",
|
|
||||||
"notFoundTitle": "Strona nie znaleziona",
|
|
||||||
"notFoundSubtitle": "Strona, której szukasz nie istnieje.",
|
|
||||||
"notFoundButton": "Wróć do strony głównej",
|
|
||||||
"totpFailTitle": "Nie udało się zweryfikować kodu",
|
|
||||||
"totpFailSubtitle": "Sprawdź swój kod i spróbuj ponownie",
|
|
||||||
"totpSuccessTitle": "Zweryfikowano",
|
|
||||||
"totpSuccessSubtitle": "Przekierowywanie do aplikacji",
|
|
||||||
"totpTitle": "Wprowadź kod TOTP",
|
|
||||||
"unauthorizedTitle": "Nieautoryzowany",
|
|
||||||
"unauthorizedResourceSubtitle": "Użytkownik o nazwie <Code>{{username}}</Code> nie jest upoważniony do uzyskania dostępu do zasobu <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "Użytkownik o nazwie <Code>{{username}}</Code> nie jest upoważniony do logowania.",
|
|
||||||
"unauthorizedButton": "Spróbuj ponownie"
|
|
||||||
}
|
|
||||||
@@ -1,46 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginFailRateLimit": "You failed to login too many times, please try again later",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,46 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginFailRateLimit": "You failed to login too many times, please try again later",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,46 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginFailRateLimit": "You failed to login too many times, please try again later",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,46 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginFailRateLimit": "You failed to login too many times, please try again later",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,46 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginFailRateLimit": "You failed to login too many times, please try again later",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,46 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginFailRateLimit": "You failed to login too many times, please try again later",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,46 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginFailRateLimit": "You failed to login too many times, please try again later",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,46 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginFailRateLimit": "You failed to login too many times, please try again later",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,46 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginFailRateLimit": "You failed to login too many times, please try again later",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,46 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginFailRateLimit": "You failed to login too many times, please try again later",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,46 +0,0 @@
|
|||||||
{
|
|
||||||
"loginTitle": "Welcome back, login with",
|
|
||||||
"loginDivider": "Or continue with password",
|
|
||||||
"loginUsername": "Username",
|
|
||||||
"loginPassword": "Password",
|
|
||||||
"loginSubmit": "Login",
|
|
||||||
"loginFailTitle": "Failed to log in",
|
|
||||||
"loginFailSubtitle": "Please check your username and password",
|
|
||||||
"loginFailRateLimit": "You failed to login too many times, please try again later",
|
|
||||||
"loginSuccessTitle": "Logged in",
|
|
||||||
"loginSuccessSubtitle": "Welcome back!",
|
|
||||||
"loginOauthFailTitle": "Internal error",
|
|
||||||
"loginOauthFailSubtitle": "Failed to get OAuth URL",
|
|
||||||
"loginOauthSuccessTitle": "Redirecting",
|
|
||||||
"loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
|
|
||||||
"continueRedirectingTitle": "Redirecting...",
|
|
||||||
"continueRedirectingSubtitle": "You should be redirected to the app soon",
|
|
||||||
"continueInvalidRedirectTitle": "Invalid redirect",
|
|
||||||
"continueInvalidRedirectSubtitle": "The redirect URL is invalid",
|
|
||||||
"continueInsecureRedirectTitle": "Insecure redirect",
|
|
||||||
"continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
|
|
||||||
"continueTitle": "Continue",
|
|
||||||
"continueSubtitle": "Click the button to continue to your app.",
|
|
||||||
"internalErrorTitle": "Internal Server Error",
|
|
||||||
"internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
|
|
||||||
"internalErrorButton": "Try again",
|
|
||||||
"logoutFailTitle": "Failed to log out",
|
|
||||||
"logoutFailSubtitle": "Please try again",
|
|
||||||
"logoutSuccessTitle": "Logged out",
|
|
||||||
"logoutSuccessSubtitle": "You have been logged out",
|
|
||||||
"logoutTitle": "Logout",
|
|
||||||
"logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
|
|
||||||
"logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
|
|
||||||
"notFoundTitle": "Page not found",
|
|
||||||
"notFoundSubtitle": "The page you are looking for does not exist.",
|
|
||||||
"notFoundButton": "Go home",
|
|
||||||
"totpFailTitle": "Failed to verify code",
|
|
||||||
"totpFailSubtitle": "Please check your code and try again",
|
|
||||||
"totpSuccessTitle": "Verified",
|
|
||||||
"totpSuccessSubtitle": "Redirecting to your app",
|
|
||||||
"totpTitle": "Enter your TOTP code",
|
|
||||||
"unauthorizedTitle": "Unauthorized",
|
|
||||||
"unauthorizedResourceSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to access the resource <Code>{{resource}}</Code>.",
|
|
||||||
"unaothorizedLoginSubtitle": "The user with username <Code>{{username}}</Code> is not authorized to login.",
|
|
||||||
"unauthorizedButton": "Try again"
|
|
||||||
}
|
|
||||||
@@ -1,10 +0,0 @@
|
|||||||
import { z } from "zod";
|
|
||||||
|
|
||||||
export const appContextSchema = z.object({
|
|
||||||
configuredProviders: z.array(z.string()),
|
|
||||||
disableContinue: z.boolean(),
|
|
||||||
title: z.string(),
|
|
||||||
genericName: z.string(),
|
|
||||||
});
|
|
||||||
|
|
||||||
export type AppContextSchemaType = z.infer<typeof appContextSchema>;
|
|
||||||
@@ -1,17 +0,0 @@
|
|||||||
import { defineConfig } from "vite";
|
|
||||||
import react from "@vitejs/plugin-react-swc";
|
|
||||||
|
|
||||||
// https://vite.dev/config/
|
|
||||||
export default defineConfig({
|
|
||||||
plugins: [react()],
|
|
||||||
server: {
|
|
||||||
host: "0.0.0.0",
|
|
||||||
proxy: {
|
|
||||||
"/api": {
|
|
||||||
target: "http://tinyauth-backend:3000/api",
|
|
||||||
changeOrigin: true,
|
|
||||||
rewrite: (path) => path.replace(/^\/api/, ""),
|
|
||||||
},
|
|
||||||
}
|
|
||||||
}
|
|
||||||
});
|
|
||||||
6
go.mod
@@ -3,10 +3,10 @@ module tinyauth
|
|||||||
go 1.23.2
|
go 1.23.2
|
||||||
|
|
||||||
require (
|
require (
|
||||||
|
github.com/gin-contrib/sessions v1.0.2
|
||||||
github.com/gin-gonic/gin v1.10.0
|
github.com/gin-gonic/gin v1.10.0
|
||||||
github.com/go-playground/validator/v10 v10.24.0
|
github.com/go-playground/validator/v10 v10.24.0
|
||||||
github.com/google/go-querystring v1.1.0
|
github.com/google/go-querystring v1.1.0
|
||||||
github.com/mdp/qrterminal/v3 v3.2.0
|
|
||||||
github.com/rs/zerolog v1.33.0
|
github.com/rs/zerolog v1.33.0
|
||||||
github.com/spf13/cobra v1.8.1
|
github.com/spf13/cobra v1.8.1
|
||||||
github.com/spf13/viper v1.19.0
|
github.com/spf13/viper v1.19.0
|
||||||
@@ -15,6 +15,7 @@ require (
|
|||||||
|
|
||||||
require (
|
require (
|
||||||
github.com/containerd/log v0.1.0 // indirect
|
github.com/containerd/log v0.1.0 // indirect
|
||||||
|
github.com/mdp/qrterminal/v3 v3.2.0 // indirect
|
||||||
github.com/moby/term v0.5.2 // indirect
|
github.com/moby/term v0.5.2 // indirect
|
||||||
github.com/morikuni/aec v1.0.0 // indirect
|
github.com/morikuni/aec v1.0.0 // indirect
|
||||||
go.opentelemetry.io/auto/sdk v1.1.0 // indirect
|
go.opentelemetry.io/auto/sdk v1.1.0 // indirect
|
||||||
@@ -57,8 +58,9 @@ require (
|
|||||||
github.com/go-playground/universal-translator v0.18.1 // indirect
|
github.com/go-playground/universal-translator v0.18.1 // indirect
|
||||||
github.com/goccy/go-json v0.10.4 // indirect
|
github.com/goccy/go-json v0.10.4 // indirect
|
||||||
github.com/gogo/protobuf v1.3.2 // indirect
|
github.com/gogo/protobuf v1.3.2 // indirect
|
||||||
|
github.com/gorilla/context v1.1.2 // indirect
|
||||||
github.com/gorilla/securecookie v1.1.2 // indirect
|
github.com/gorilla/securecookie v1.1.2 // indirect
|
||||||
github.com/gorilla/sessions v1.2.2
|
github.com/gorilla/sessions v1.2.2 // indirect
|
||||||
github.com/hashicorp/hcl v1.0.0 // indirect
|
github.com/hashicorp/hcl v1.0.0 // indirect
|
||||||
github.com/inconshreveable/mousetrap v1.1.0 // indirect
|
github.com/inconshreveable/mousetrap v1.1.0 // indirect
|
||||||
github.com/json-iterator/go v1.1.12 // indirect
|
github.com/json-iterator/go v1.1.12 // indirect
|
||||||
|
|||||||
4
go.sum
@@ -65,6 +65,8 @@ github.com/fsnotify/fsnotify v1.7.0 h1:8JEhPFa5W2WU7YfeZzPNqzMP6Lwt7L2715Ggo0nos
|
|||||||
github.com/fsnotify/fsnotify v1.7.0/go.mod h1:40Bi/Hjc2AVfZrqy+aj+yEI+/bRxZnMJyTJwOpGvigM=
|
github.com/fsnotify/fsnotify v1.7.0/go.mod h1:40Bi/Hjc2AVfZrqy+aj+yEI+/bRxZnMJyTJwOpGvigM=
|
||||||
github.com/gabriel-vasile/mimetype v1.4.8 h1:FfZ3gj38NjllZIeJAmMhr+qKL8Wu+nOoI3GqacKw1NM=
|
github.com/gabriel-vasile/mimetype v1.4.8 h1:FfZ3gj38NjllZIeJAmMhr+qKL8Wu+nOoI3GqacKw1NM=
|
||||||
github.com/gabriel-vasile/mimetype v1.4.8/go.mod h1:ByKUIKGjh1ODkGM1asKUbQZOLGrPjydw3hYPU2YU9t8=
|
github.com/gabriel-vasile/mimetype v1.4.8/go.mod h1:ByKUIKGjh1ODkGM1asKUbQZOLGrPjydw3hYPU2YU9t8=
|
||||||
|
github.com/gin-contrib/sessions v1.0.2 h1:UaIjUvTH1cMeOdj3in6dl+Xb6It8RiKRF9Z1anbUyCA=
|
||||||
|
github.com/gin-contrib/sessions v1.0.2/go.mod h1:KxKxWqWP5LJVDCInulOl4WbLzK2KSPlLesfZ66wRvMs=
|
||||||
github.com/gin-contrib/sse v1.0.0 h1:y3bT1mUWUxDpW4JLQg/HnTqV4rozuW4tC9eFKTxYI9E=
|
github.com/gin-contrib/sse v1.0.0 h1:y3bT1mUWUxDpW4JLQg/HnTqV4rozuW4tC9eFKTxYI9E=
|
||||||
github.com/gin-contrib/sse v1.0.0/go.mod h1:zNuFdwarAygJBht0NTKiSi3jRf6RbqeILZ9Sp6Slhe0=
|
github.com/gin-contrib/sse v1.0.0/go.mod h1:zNuFdwarAygJBht0NTKiSi3jRf6RbqeILZ9Sp6Slhe0=
|
||||||
github.com/gin-gonic/gin v1.10.0 h1:nTuyha1TYqgedzytsKYqna+DfLos46nTv2ygFy86HFU=
|
github.com/gin-gonic/gin v1.10.0 h1:nTuyha1TYqgedzytsKYqna+DfLos46nTv2ygFy86HFU=
|
||||||
@@ -97,6 +99,8 @@ github.com/google/gofuzz v1.2.0 h1:xRy4A+RhZaiKjJ1bPfwQ8sedCA+YS2YcCHW6ec7JMi0=
|
|||||||
github.com/google/gofuzz v1.2.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg=
|
github.com/google/gofuzz v1.2.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg=
|
||||||
github.com/google/uuid v1.6.0 h1:NIvaJDMOsjHA8n1jAhLSgzrAzy1Hgr+hNrb57e+94F0=
|
github.com/google/uuid v1.6.0 h1:NIvaJDMOsjHA8n1jAhLSgzrAzy1Hgr+hNrb57e+94F0=
|
||||||
github.com/google/uuid v1.6.0/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo=
|
github.com/google/uuid v1.6.0/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo=
|
||||||
|
github.com/gorilla/context v1.1.2 h1:WRkNAv2uoa03QNIc1A6u4O7DAGMUVoopZhkiXWA2V1o=
|
||||||
|
github.com/gorilla/context v1.1.2/go.mod h1:KDPwT9i/MeWHiLl90fuTgrt4/wPcv75vFAZLaOOcbxM=
|
||||||
github.com/gorilla/securecookie v1.1.2 h1:YCIWL56dvtr73r6715mJs5ZvhtnY73hBvEF8kXD8ePA=
|
github.com/gorilla/securecookie v1.1.2 h1:YCIWL56dvtr73r6715mJs5ZvhtnY73hBvEF8kXD8ePA=
|
||||||
github.com/gorilla/securecookie v1.1.2/go.mod h1:NfCASbcHqRSY+3a8tlWJwsQap2VX5pwzwo4h3eOamfo=
|
github.com/gorilla/securecookie v1.1.2/go.mod h1:NfCASbcHqRSY+3a8tlWJwsQap2VX5pwzwo4h3eOamfo=
|
||||||
github.com/gorilla/sessions v1.2.2 h1:lqzMYz6bOfvn2WriPUjNByzeXIlVzURcPmgMczkmTjY=
|
github.com/gorilla/sessions v1.2.2 h1:lqzMYz6bOfvn2WriPUjNByzeXIlVzURcPmgMczkmTjY=
|
||||||
|
|||||||
@@ -3,29 +3,42 @@ package api
|
|||||||
import (
|
import (
|
||||||
"fmt"
|
"fmt"
|
||||||
"io/fs"
|
"io/fs"
|
||||||
|
"math/rand/v2"
|
||||||
"net/http"
|
"net/http"
|
||||||
"os"
|
"os"
|
||||||
"strings"
|
"strings"
|
||||||
"time"
|
"time"
|
||||||
"tinyauth/internal/assets"
|
"tinyauth/internal/assets"
|
||||||
"tinyauth/internal/handlers"
|
"tinyauth/internal/auth"
|
||||||
|
"tinyauth/internal/hooks"
|
||||||
|
"tinyauth/internal/providers"
|
||||||
"tinyauth/internal/types"
|
"tinyauth/internal/types"
|
||||||
|
"tinyauth/internal/utils"
|
||||||
|
|
||||||
|
"github.com/gin-contrib/sessions"
|
||||||
|
"github.com/gin-contrib/sessions/cookie"
|
||||||
"github.com/gin-gonic/gin"
|
"github.com/gin-gonic/gin"
|
||||||
|
"github.com/google/go-querystring/query"
|
||||||
|
"github.com/pquerna/otp/totp"
|
||||||
"github.com/rs/zerolog/log"
|
"github.com/rs/zerolog/log"
|
||||||
)
|
)
|
||||||
|
|
||||||
func NewAPI(config types.APIConfig, handlers *handlers.Handlers) *API {
|
func NewAPI(config types.APIConfig, hooks *hooks.Hooks, auth *auth.Auth, providers *providers.Providers) *API {
|
||||||
return &API{
|
return &API{
|
||||||
Config: config,
|
Config: config,
|
||||||
Handlers: handlers,
|
Hooks: hooks,
|
||||||
|
Auth: auth,
|
||||||
|
Providers: providers,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
type API struct {
|
type API struct {
|
||||||
Config types.APIConfig
|
Config types.APIConfig
|
||||||
Router *gin.Engine
|
Router *gin.Engine
|
||||||
Handlers *handlers.Handlers
|
Hooks *hooks.Hooks
|
||||||
|
Auth *auth.Auth
|
||||||
|
Providers *providers.Providers
|
||||||
|
Domain string
|
||||||
}
|
}
|
||||||
|
|
||||||
func (api *API) Init() {
|
func (api *API) Init() {
|
||||||
@@ -39,21 +52,48 @@ func (api *API) Init() {
|
|||||||
|
|
||||||
// Read UI assets
|
// Read UI assets
|
||||||
log.Debug().Msg("Setting up assets")
|
log.Debug().Msg("Setting up assets")
|
||||||
dist, err := fs.Sub(assets.Assets, "dist")
|
dist, distErr := fs.Sub(assets.Assets, "dist")
|
||||||
|
|
||||||
if err != nil {
|
if distErr != nil {
|
||||||
log.Fatal().Err(err).Msg("Failed to get UI assets")
|
log.Fatal().Err(distErr).Msg("Failed to get UI assets")
|
||||||
}
|
}
|
||||||
|
|
||||||
// Create file server
|
// Create file server
|
||||||
log.Debug().Msg("Setting up file server")
|
log.Debug().Msg("Setting up file server")
|
||||||
fileServer := http.FileServer(http.FS(dist))
|
fileServer := http.FileServer(http.FS(dist))
|
||||||
|
|
||||||
|
// Setup cookie store
|
||||||
|
log.Debug().Msg("Setting up cookie store")
|
||||||
|
store := cookie.NewStore([]byte(api.Config.Secret))
|
||||||
|
|
||||||
|
// Get domain to use for session cookies
|
||||||
|
log.Debug().Msg("Getting domain")
|
||||||
|
domain, domainErr := utils.GetRootURL(api.Config.AppURL)
|
||||||
|
|
||||||
|
if domainErr != nil {
|
||||||
|
log.Fatal().Err(domainErr).Msg("Failed to get domain")
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
|
||||||
|
log.Info().Str("domain", domain).Msg("Using domain for cookies")
|
||||||
|
|
||||||
|
api.Domain = fmt.Sprintf(".%s", domain)
|
||||||
|
|
||||||
|
// Use session middleware
|
||||||
|
store.Options(sessions.Options{
|
||||||
|
Domain: api.Domain,
|
||||||
|
Path: "/",
|
||||||
|
HttpOnly: true,
|
||||||
|
Secure: api.Config.CookieSecure,
|
||||||
|
MaxAge: api.Config.SessionExpiry,
|
||||||
|
})
|
||||||
|
|
||||||
|
router.Use(sessions.Sessions("tinyauth", store))
|
||||||
|
|
||||||
// UI middleware
|
// UI middleware
|
||||||
router.Use(func(c *gin.Context) {
|
router.Use(func(c *gin.Context) {
|
||||||
// If not an API request, serve the UI
|
// If not an API request, serve the UI
|
||||||
if !strings.HasPrefix(c.Request.URL.Path, "/api") {
|
if !strings.HasPrefix(c.Request.URL.Path, "/api") {
|
||||||
// Check if the file exists
|
|
||||||
_, err := fs.Stat(dist, strings.TrimPrefix(c.Request.URL.Path, "/"))
|
_, err := fs.Stat(dist, strings.TrimPrefix(c.Request.URL.Path, "/"))
|
||||||
|
|
||||||
// If the file doesn't exist, serve the index.html
|
// If the file doesn't exist, serve the index.html
|
||||||
@@ -74,36 +114,604 @@ func (api *API) Init() {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (api *API) SetupRoutes() {
|
func (api *API) SetupRoutes() {
|
||||||
// Proxy
|
api.Router.GET("/api/auth/:proxy", func(c *gin.Context) {
|
||||||
api.Router.GET("/api/auth/:proxy", api.Handlers.AuthHandler)
|
// Create struct for proxy
|
||||||
|
var proxy types.Proxy
|
||||||
|
|
||||||
// Auth
|
// Bind URI
|
||||||
api.Router.POST("/api/login", api.Handlers.LoginHandler)
|
bindErr := c.BindUri(&proxy)
|
||||||
api.Router.POST("/api/totp", api.Handlers.TotpHandler)
|
|
||||||
api.Router.POST("/api/logout", api.Handlers.LogoutHandler)
|
|
||||||
|
|
||||||
// Context
|
// Handle error
|
||||||
api.Router.GET("/api/app", api.Handlers.AppHandler)
|
if bindErr != nil {
|
||||||
api.Router.GET("/api/user", api.Handlers.UserHandler)
|
log.Error().Err(bindErr).Msg("Failed to bind URI")
|
||||||
|
c.JSON(400, gin.H{
|
||||||
|
"status": 400,
|
||||||
|
"message": "Bad Request",
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
// OAuth
|
log.Debug().Interface("proxy", proxy.Proxy).Msg("Got proxy")
|
||||||
api.Router.GET("/api/oauth/url/:provider", api.Handlers.OauthUrlHandler)
|
|
||||||
api.Router.GET("/api/oauth/callback/:provider", api.Handlers.OauthCallbackHandler)
|
|
||||||
|
|
||||||
// App
|
// Check if using basic auth
|
||||||
api.Router.GET("/api/healthcheck", api.Handlers.HealthcheckHandler)
|
_, _, basicAuth := c.Request.BasicAuth()
|
||||||
|
|
||||||
|
// Check if auth is enabled
|
||||||
|
authEnabled, authEnabledErr := api.Auth.AuthEnabled(c)
|
||||||
|
|
||||||
|
// Handle error
|
||||||
|
if authEnabledErr != nil {
|
||||||
|
// Return 500 if nginx is the proxy or if the request is using basic auth
|
||||||
|
if proxy.Proxy == "nginx" || basicAuth {
|
||||||
|
log.Error().Err(authEnabledErr).Msg("Failed to check if auth is enabled")
|
||||||
|
c.JSON(500, gin.H{
|
||||||
|
"status": 500,
|
||||||
|
"message": "Internal Server Error",
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Return the internal server error page
|
||||||
|
if api.handleError(c, "Failed to check if auth is enabled", authEnabledErr) {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// If auth is not enabled, return 200
|
||||||
|
if !authEnabled {
|
||||||
|
// The user is allowed to access the app
|
||||||
|
c.JSON(200, gin.H{
|
||||||
|
"status": 200,
|
||||||
|
"message": "Authenticated",
|
||||||
|
})
|
||||||
|
|
||||||
|
// Stop further processing
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Get user context
|
||||||
|
userContext := api.Hooks.UseUserContext(c)
|
||||||
|
|
||||||
|
// Get headers
|
||||||
|
uri := c.Request.Header.Get("X-Forwarded-Uri")
|
||||||
|
proto := c.Request.Header.Get("X-Forwarded-Proto")
|
||||||
|
host := c.Request.Header.Get("X-Forwarded-Host")
|
||||||
|
|
||||||
|
// Check if user is logged in
|
||||||
|
if userContext.IsLoggedIn {
|
||||||
|
log.Debug().Msg("Authenticated")
|
||||||
|
|
||||||
|
// Check if user is allowed to access subdomain, if request is nginx.example.com the subdomain (resource) is nginx
|
||||||
|
appAllowed, appAllowedErr := api.Auth.ResourceAllowed(c, userContext)
|
||||||
|
|
||||||
|
// Check if there was an error
|
||||||
|
if appAllowedErr != nil {
|
||||||
|
// Return 500 if nginx is the proxy or if the request is using basic auth
|
||||||
|
if proxy.Proxy == "nginx" || basicAuth {
|
||||||
|
log.Error().Err(appAllowedErr).Msg("Failed to check if app is allowed")
|
||||||
|
c.JSON(500, gin.H{
|
||||||
|
"status": 500,
|
||||||
|
"message": "Internal Server Error",
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Return the internal server error page
|
||||||
|
if api.handleError(c, "Failed to check if app is allowed", appAllowedErr) {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
log.Debug().Bool("appAllowed", appAllowed).Msg("Checking if app is allowed")
|
||||||
|
|
||||||
|
// The user is not allowed to access the app
|
||||||
|
if !appAllowed {
|
||||||
|
log.Warn().Str("username", userContext.Username).Str("host", host).Msg("User not allowed")
|
||||||
|
|
||||||
|
// Return 401 if nginx is the proxy or if the request is using an Authorization header
|
||||||
|
if proxy.Proxy == "nginx" || basicAuth {
|
||||||
|
c.Header("WWW-Authenticate", "Basic realm=\"tinyauth\"")
|
||||||
|
c.JSON(401, gin.H{
|
||||||
|
"status": 401,
|
||||||
|
"message": "Unauthorized",
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Build query
|
||||||
|
queries, queryErr := query.Values(types.UnauthorizedQuery{
|
||||||
|
Username: userContext.Username,
|
||||||
|
Resource: strings.Split(host, ".")[0],
|
||||||
|
})
|
||||||
|
|
||||||
|
// Handle error (no need to check for nginx/headers since we are sure we are using caddy/traefik)
|
||||||
|
if api.handleError(c, "Failed to build query", queryErr) {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// We are using caddy/traefik so redirect
|
||||||
|
c.Redirect(http.StatusTemporaryRedirect, fmt.Sprintf("%s/unauthorized?%s", api.Config.AppURL, queries.Encode()))
|
||||||
|
|
||||||
|
// Stop further processing
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Set the user header
|
||||||
|
c.Header("X-Tinyauth-User", userContext.Username)
|
||||||
|
|
||||||
|
// The user is allowed to access the app
|
||||||
|
c.JSON(200, gin.H{
|
||||||
|
"status": 200,
|
||||||
|
"message": "Authenticated",
|
||||||
|
})
|
||||||
|
|
||||||
|
// Stop further processing
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// The user is not logged in
|
||||||
|
log.Debug().Msg("Unauthorized")
|
||||||
|
|
||||||
|
// Return 401 if nginx is the proxy or if the request is using an Authorization header
|
||||||
|
if proxy.Proxy == "nginx" || basicAuth {
|
||||||
|
c.Header("WWW-Authenticate", "Basic realm=\"tinyauth\"")
|
||||||
|
c.JSON(401, gin.H{
|
||||||
|
"status": 401,
|
||||||
|
"message": "Unauthorized",
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Build query
|
||||||
|
queries, queryErr := query.Values(types.LoginQuery{
|
||||||
|
RedirectURI: fmt.Sprintf("%s://%s%s", proto, host, uri),
|
||||||
|
})
|
||||||
|
|
||||||
|
// Handle error (no need to check for nginx/headers since we are sure we are using caddy/traefik)
|
||||||
|
if api.handleError(c, "Failed to build query", queryErr) {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
log.Debug().Interface("redirect_uri", fmt.Sprintf("%s://%s%s", proto, host, uri)).Msg("Redirecting to login")
|
||||||
|
|
||||||
|
// Redirect to login
|
||||||
|
c.Redirect(http.StatusTemporaryRedirect, fmt.Sprintf("%s/?%s", api.Config.AppURL, queries.Encode()))
|
||||||
|
})
|
||||||
|
|
||||||
|
api.Router.POST("/api/login", func(c *gin.Context) {
|
||||||
|
// Create login struct
|
||||||
|
var login types.LoginRequest
|
||||||
|
|
||||||
|
// Bind JSON
|
||||||
|
err := c.BindJSON(&login)
|
||||||
|
|
||||||
|
// Handle error
|
||||||
|
if err != nil {
|
||||||
|
log.Error().Err(err).Msg("Failed to bind JSON")
|
||||||
|
c.JSON(400, gin.H{
|
||||||
|
"status": 400,
|
||||||
|
"message": "Bad Request",
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
log.Debug().Msg("Got login request")
|
||||||
|
|
||||||
|
// Get user based on username
|
||||||
|
user := api.Auth.GetUser(login.Username)
|
||||||
|
|
||||||
|
// User does not exist
|
||||||
|
if user == nil {
|
||||||
|
log.Debug().Str("username", login.Username).Msg("User not found")
|
||||||
|
c.JSON(401, gin.H{
|
||||||
|
"status": 401,
|
||||||
|
"message": "Unauthorized",
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
log.Debug().Msg("Got user")
|
||||||
|
|
||||||
|
// Check if password is correct
|
||||||
|
if !api.Auth.CheckPassword(*user, login.Password) {
|
||||||
|
log.Debug().Str("username", login.Username).Msg("Password incorrect")
|
||||||
|
c.JSON(401, gin.H{
|
||||||
|
"status": 401,
|
||||||
|
"message": "Unauthorized",
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
log.Debug().Msg("Password correct, checking totp")
|
||||||
|
|
||||||
|
// Check if user has totp enabled
|
||||||
|
if user.TotpSecret != "" {
|
||||||
|
log.Debug().Msg("Totp enabled")
|
||||||
|
|
||||||
|
// Set totp pending cookie
|
||||||
|
api.Auth.CreateSessionCookie(c, &types.SessionCookie{
|
||||||
|
Username: login.Username,
|
||||||
|
Provider: "username",
|
||||||
|
TotpPending: true,
|
||||||
|
})
|
||||||
|
|
||||||
|
// Return totp required
|
||||||
|
c.JSON(200, gin.H{
|
||||||
|
"status": 200,
|
||||||
|
"message": "Waiting for totp",
|
||||||
|
"totpPending": true,
|
||||||
|
})
|
||||||
|
|
||||||
|
// Stop further processing
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Create session cookie with username as provider
|
||||||
|
api.Auth.CreateSessionCookie(c, &types.SessionCookie{
|
||||||
|
Username: login.Username,
|
||||||
|
Provider: "username",
|
||||||
|
})
|
||||||
|
|
||||||
|
// Return logged in
|
||||||
|
c.JSON(200, gin.H{
|
||||||
|
"status": 200,
|
||||||
|
"message": "Logged in",
|
||||||
|
"totpPending": false,
|
||||||
|
})
|
||||||
|
})
|
||||||
|
|
||||||
|
api.Router.POST("/api/totp", func(c *gin.Context) {
|
||||||
|
// Create totp struct
|
||||||
|
var totpReq types.Totp
|
||||||
|
|
||||||
|
// Bind JSON
|
||||||
|
err := c.BindJSON(&totpReq)
|
||||||
|
|
||||||
|
// Handle error
|
||||||
|
if err != nil {
|
||||||
|
log.Error().Err(err).Msg("Failed to bind JSON")
|
||||||
|
c.JSON(400, gin.H{
|
||||||
|
"status": 400,
|
||||||
|
"message": "Bad Request",
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
log.Debug().Msg("Checking totp")
|
||||||
|
|
||||||
|
// Get user context
|
||||||
|
userContext := api.Hooks.UseUserContext(c)
|
||||||
|
|
||||||
|
// Check if we have a user
|
||||||
|
if userContext.Username == "" {
|
||||||
|
log.Debug().Msg("No user context")
|
||||||
|
c.JSON(401, gin.H{
|
||||||
|
"status": 401,
|
||||||
|
"message": "Unauthorized",
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Get user
|
||||||
|
user := api.Auth.GetUser(userContext.Username)
|
||||||
|
|
||||||
|
// Check if user exists
|
||||||
|
if user == nil {
|
||||||
|
log.Debug().Msg("User not found")
|
||||||
|
c.JSON(401, gin.H{
|
||||||
|
"status": 401,
|
||||||
|
"message": "Unauthorized",
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Check if totp is correct
|
||||||
|
totpOk := totp.Validate(totpReq.Code, user.TotpSecret)
|
||||||
|
|
||||||
|
// TOTP is incorrect
|
||||||
|
if !totpOk {
|
||||||
|
log.Debug().Msg("Totp incorrect")
|
||||||
|
c.JSON(401, gin.H{
|
||||||
|
"status": 401,
|
||||||
|
"message": "Unauthorized",
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
log.Debug().Msg("Totp correct")
|
||||||
|
|
||||||
|
// Create session cookie with username as provider
|
||||||
|
api.Auth.CreateSessionCookie(c, &types.SessionCookie{
|
||||||
|
Username: user.Username,
|
||||||
|
Provider: "username",
|
||||||
|
})
|
||||||
|
|
||||||
|
// Return logged in
|
||||||
|
c.JSON(200, gin.H{
|
||||||
|
"status": 200,
|
||||||
|
"message": "Logged in",
|
||||||
|
})
|
||||||
|
})
|
||||||
|
|
||||||
|
api.Router.POST("/api/logout", func(c *gin.Context) {
|
||||||
|
log.Debug().Msg("Logging out")
|
||||||
|
|
||||||
|
// Delete session cookie
|
||||||
|
api.Auth.DeleteSessionCookie(c)
|
||||||
|
|
||||||
|
log.Debug().Msg("Cleaning up redirect cookie")
|
||||||
|
|
||||||
|
// Clean up redirect cookie if it exists
|
||||||
|
c.SetCookie("tinyauth_redirect_uri", "", -1, "/", api.Domain, api.Config.CookieSecure, true)
|
||||||
|
|
||||||
|
// Return logged out
|
||||||
|
c.JSON(200, gin.H{
|
||||||
|
"status": 200,
|
||||||
|
"message": "Logged out",
|
||||||
|
})
|
||||||
|
})
|
||||||
|
|
||||||
|
api.Router.GET("/api/status", func(c *gin.Context) {
|
||||||
|
log.Debug().Msg("Checking status")
|
||||||
|
|
||||||
|
// Get user context
|
||||||
|
userContext := api.Hooks.UseUserContext(c)
|
||||||
|
|
||||||
|
// Get configured providers
|
||||||
|
configuredProviders := api.Providers.GetConfiguredProviders()
|
||||||
|
|
||||||
|
// We have username/password configured so add it to our providers
|
||||||
|
if api.Auth.UserAuthConfigured() {
|
||||||
|
configuredProviders = append(configuredProviders, "username")
|
||||||
|
}
|
||||||
|
|
||||||
|
// Fill status struct with data from user context and api config
|
||||||
|
status := types.Status{
|
||||||
|
Username: userContext.Username,
|
||||||
|
IsLoggedIn: userContext.IsLoggedIn,
|
||||||
|
Oauth: userContext.OAuth,
|
||||||
|
Provider: userContext.Provider,
|
||||||
|
ConfiguredProviders: configuredProviders,
|
||||||
|
DisableContinue: api.Config.DisableContinue,
|
||||||
|
Title: api.Config.Title,
|
||||||
|
GenericName: api.Config.GenericName,
|
||||||
|
TotpPending: userContext.TotpPending,
|
||||||
|
}
|
||||||
|
|
||||||
|
// If we are not logged in we set the status to 401 and add the WWW-Authenticate header else we set it to 200
|
||||||
|
if !userContext.IsLoggedIn {
|
||||||
|
log.Debug().Msg("Unauthorized")
|
||||||
|
c.Header("WWW-Authenticate", "Basic realm=\"tinyauth\"")
|
||||||
|
status.Status = 401
|
||||||
|
status.Message = "Unauthorized"
|
||||||
|
} else {
|
||||||
|
log.Debug().Interface("userContext", userContext).Strs("configuredProviders", configuredProviders).Bool("disableContinue", api.Config.DisableContinue).Msg("Authenticated")
|
||||||
|
status.Status = 200
|
||||||
|
status.Message = "Authenticated"
|
||||||
|
}
|
||||||
|
|
||||||
|
// Return data
|
||||||
|
c.JSON(200, status)
|
||||||
|
})
|
||||||
|
|
||||||
|
api.Router.GET("/api/oauth/url/:provider", func(c *gin.Context) {
|
||||||
|
// Create struct for OAuth request
|
||||||
|
var request types.OAuthRequest
|
||||||
|
|
||||||
|
// Bind URI
|
||||||
|
bindErr := c.BindUri(&request)
|
||||||
|
|
||||||
|
// Handle error
|
||||||
|
if bindErr != nil {
|
||||||
|
log.Error().Err(bindErr).Msg("Failed to bind URI")
|
||||||
|
c.JSON(400, gin.H{
|
||||||
|
"status": 400,
|
||||||
|
"message": "Bad Request",
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
log.Debug().Msg("Got OAuth request")
|
||||||
|
|
||||||
|
// Check if provider exists
|
||||||
|
provider := api.Providers.GetProvider(request.Provider)
|
||||||
|
|
||||||
|
// Provider does not exist
|
||||||
|
if provider == nil {
|
||||||
|
c.JSON(404, gin.H{
|
||||||
|
"status": 404,
|
||||||
|
"message": "Not Found",
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
log.Debug().Str("provider", request.Provider).Msg("Got provider")
|
||||||
|
|
||||||
|
// Get auth URL
|
||||||
|
authURL := provider.GetAuthURL()
|
||||||
|
|
||||||
|
log.Debug().Msg("Got auth URL")
|
||||||
|
|
||||||
|
// Get redirect URI
|
||||||
|
redirectURI := c.Query("redirect_uri")
|
||||||
|
|
||||||
|
// Set redirect cookie if redirect URI is provided
|
||||||
|
if redirectURI != "" {
|
||||||
|
log.Debug().Str("redirectURI", redirectURI).Msg("Setting redirect cookie")
|
||||||
|
c.SetCookie("tinyauth_redirect_uri", redirectURI, 3600, "/", api.Domain, api.Config.CookieSecure, true)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Tailscale does not have an auth url so we create a random code (does not need to be secure) to avoid caching and send it
|
||||||
|
if request.Provider == "tailscale" {
|
||||||
|
// Build tailscale query
|
||||||
|
tailscaleQuery, tailscaleQueryErr := query.Values(types.TailscaleQuery{
|
||||||
|
Code: (1000 + rand.IntN(9000)),
|
||||||
|
})
|
||||||
|
|
||||||
|
// Handle error
|
||||||
|
if tailscaleQueryErr != nil {
|
||||||
|
log.Error().Err(tailscaleQueryErr).Msg("Failed to build query")
|
||||||
|
c.JSON(500, gin.H{
|
||||||
|
"status": 500,
|
||||||
|
"message": "Internal Server Error",
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Return tailscale URL (immidiately redirects to the callback)
|
||||||
|
c.JSON(200, gin.H{
|
||||||
|
"status": 200,
|
||||||
|
"message": "Ok",
|
||||||
|
"url": fmt.Sprintf("%s/api/oauth/callback/tailscale?%s", api.Config.AppURL, tailscaleQuery.Encode()),
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Return auth URL
|
||||||
|
c.JSON(200, gin.H{
|
||||||
|
"status": 200,
|
||||||
|
"message": "Ok",
|
||||||
|
"url": authURL,
|
||||||
|
})
|
||||||
|
})
|
||||||
|
|
||||||
|
api.Router.GET("/api/oauth/callback/:provider", func(c *gin.Context) {
|
||||||
|
// Create struct for OAuth request
|
||||||
|
var providerName types.OAuthRequest
|
||||||
|
|
||||||
|
// Bind URI
|
||||||
|
bindErr := c.BindUri(&providerName)
|
||||||
|
|
||||||
|
// Handle error
|
||||||
|
if api.handleError(c, "Failed to bind URI", bindErr) {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
log.Debug().Interface("provider", providerName.Provider).Msg("Got provider name")
|
||||||
|
|
||||||
|
// Get code
|
||||||
|
code := c.Query("code")
|
||||||
|
|
||||||
|
// Code empty so redirect to error
|
||||||
|
if code == "" {
|
||||||
|
log.Error().Msg("No code provided")
|
||||||
|
c.Redirect(http.StatusPermanentRedirect, "/error")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
log.Debug().Msg("Got code")
|
||||||
|
|
||||||
|
// Get provider
|
||||||
|
provider := api.Providers.GetProvider(providerName.Provider)
|
||||||
|
|
||||||
|
log.Debug().Str("provider", providerName.Provider).Msg("Got provider")
|
||||||
|
|
||||||
|
// Provider does not exist
|
||||||
|
if provider == nil {
|
||||||
|
c.Redirect(http.StatusPermanentRedirect, "/not-found")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Exchange token (authenticates user)
|
||||||
|
_, tokenErr := provider.ExchangeToken(code)
|
||||||
|
|
||||||
|
log.Debug().Msg("Got token")
|
||||||
|
|
||||||
|
// Handle error
|
||||||
|
if api.handleError(c, "Failed to exchange token", tokenErr) {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Get email
|
||||||
|
email, emailErr := api.Providers.GetUser(providerName.Provider)
|
||||||
|
|
||||||
|
log.Debug().Str("email", email).Msg("Got email")
|
||||||
|
|
||||||
|
// Handle error
|
||||||
|
if api.handleError(c, "Failed to get user", emailErr) {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Email is not whitelisted
|
||||||
|
if !api.Auth.EmailWhitelisted(email) {
|
||||||
|
log.Warn().Str("email", email).Msg("Email not whitelisted")
|
||||||
|
|
||||||
|
// Build query
|
||||||
|
unauthorizedQuery, unauthorizedQueryErr := query.Values(types.UnauthorizedQuery{
|
||||||
|
Username: email,
|
||||||
|
})
|
||||||
|
|
||||||
|
// Handle error
|
||||||
|
if api.handleError(c, "Failed to build query", unauthorizedQueryErr) {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Redirect to unauthorized
|
||||||
|
c.Redirect(http.StatusPermanentRedirect, fmt.Sprintf("%s/unauthorized?%s", api.Config.AppURL, unauthorizedQuery.Encode()))
|
||||||
|
}
|
||||||
|
|
||||||
|
log.Debug().Msg("Email whitelisted")
|
||||||
|
|
||||||
|
// Create session cookie
|
||||||
|
api.Auth.CreateSessionCookie(c, &types.SessionCookie{
|
||||||
|
Username: email,
|
||||||
|
Provider: providerName.Provider,
|
||||||
|
})
|
||||||
|
|
||||||
|
// Get redirect URI
|
||||||
|
redirectURI, redirectURIErr := c.Cookie("tinyauth_redirect_uri")
|
||||||
|
|
||||||
|
// If it is empty it means that no redirect_uri was provided to the login screen so we just log in
|
||||||
|
if redirectURIErr != nil {
|
||||||
|
c.Redirect(http.StatusPermanentRedirect, api.Config.AppURL)
|
||||||
|
}
|
||||||
|
|
||||||
|
log.Debug().Str("redirectURI", redirectURI).Msg("Got redirect URI")
|
||||||
|
|
||||||
|
// Clean up redirect cookie since we already have the value
|
||||||
|
c.SetCookie("tinyauth_redirect_uri", "", -1, "/", api.Domain, api.Config.CookieSecure, true)
|
||||||
|
|
||||||
|
// Build query
|
||||||
|
redirectQuery, redirectQueryErr := query.Values(types.LoginQuery{
|
||||||
|
RedirectURI: redirectURI,
|
||||||
|
})
|
||||||
|
|
||||||
|
log.Debug().Msg("Got redirect query")
|
||||||
|
|
||||||
|
// Handle error
|
||||||
|
if api.handleError(c, "Failed to build query", redirectQueryErr) {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Redirect to continue with the redirect URI
|
||||||
|
c.Redirect(http.StatusPermanentRedirect, fmt.Sprintf("%s/continue?%s", api.Config.AppURL, redirectQuery.Encode()))
|
||||||
|
})
|
||||||
|
|
||||||
|
// Simple healthcheck
|
||||||
|
api.Router.GET("/api/healthcheck", func(c *gin.Context) {
|
||||||
|
c.JSON(200, gin.H{
|
||||||
|
"status": 200,
|
||||||
|
"message": "OK",
|
||||||
|
})
|
||||||
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
func (api *API) Run() {
|
func (api *API) Run() {
|
||||||
log.Info().Str("address", api.Config.Address).Int("port", api.Config.Port).Msg("Starting server")
|
log.Info().Str("address", api.Config.Address).Int("port", api.Config.Port).Msg("Starting server")
|
||||||
|
|
||||||
// Run server
|
// Run server
|
||||||
err := api.Router.Run(fmt.Sprintf("%s:%d", api.Config.Address, api.Config.Port))
|
api.Router.Run(fmt.Sprintf("%s:%d", api.Config.Address, api.Config.Port))
|
||||||
|
}
|
||||||
|
|
||||||
// Check for errors
|
// handleError logs the error and redirects to the error page (only meant for stuff the user may access does not apply for login paths)
|
||||||
|
func (api *API) handleError(c *gin.Context, msg string, err error) bool {
|
||||||
|
// If error is not nil log it and redirect to error page also return true so we can stop further processing
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Fatal().Err(err).Msg("Failed to start server")
|
log.Error().Err(err).Msg(msg)
|
||||||
|
c.Redirect(http.StatusPermanentRedirect, fmt.Sprintf("%s/error", api.Config.AppURL))
|
||||||
|
return true
|
||||||
}
|
}
|
||||||
|
return false
|
||||||
}
|
}
|
||||||
|
|
||||||
// zerolog is a middleware for gin that logs requests using zerolog
|
// zerolog is a middleware for gin that logs requests using zerolog
|
||||||
|
|||||||
@@ -2,16 +2,13 @@ package api_test
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"encoding/json"
|
"encoding/json"
|
||||||
"io"
|
|
||||||
"net/http"
|
"net/http"
|
||||||
"net/http/httptest"
|
"net/http/httptest"
|
||||||
"reflect"
|
|
||||||
"strings"
|
"strings"
|
||||||
"testing"
|
"testing"
|
||||||
"tinyauth/internal/api"
|
"tinyauth/internal/api"
|
||||||
"tinyauth/internal/auth"
|
"tinyauth/internal/auth"
|
||||||
"tinyauth/internal/docker"
|
"tinyauth/internal/docker"
|
||||||
"tinyauth/internal/handlers"
|
|
||||||
"tinyauth/internal/hooks"
|
"tinyauth/internal/hooks"
|
||||||
"tinyauth/internal/providers"
|
"tinyauth/internal/providers"
|
||||||
"tinyauth/internal/types"
|
"tinyauth/internal/types"
|
||||||
@@ -21,27 +18,13 @@ import (
|
|||||||
|
|
||||||
// Simple API config for tests
|
// Simple API config for tests
|
||||||
var apiConfig = types.APIConfig{
|
var apiConfig = types.APIConfig{
|
||||||
Port: 8080,
|
Port: 8080,
|
||||||
Address: "0.0.0.0",
|
Address: "0.0.0.0",
|
||||||
}
|
|
||||||
|
|
||||||
// Simple handlers config for tests
|
|
||||||
var handlersConfig = types.HandlersConfig{
|
|
||||||
AppURL: "http://localhost:8080",
|
|
||||||
DisableContinue: false,
|
|
||||||
Title: "Tinyauth",
|
|
||||||
GenericName: "Generic",
|
|
||||||
}
|
|
||||||
|
|
||||||
// Simple auth config for tests
|
|
||||||
var authConfig = types.AuthConfig{
|
|
||||||
Users: types.Users{},
|
|
||||||
OauthWhitelist: []string{},
|
|
||||||
Secret: "super-secret-api-thing-for-tests", // It is 32 chars long
|
Secret: "super-secret-api-thing-for-tests", // It is 32 chars long
|
||||||
|
AppURL: "http://tinyauth.localhost",
|
||||||
CookieSecure: false,
|
CookieSecure: false,
|
||||||
SessionExpiry: 3600,
|
SessionExpiry: 3600,
|
||||||
LoginTimeout: 0,
|
DisableContinue: false,
|
||||||
LoginMaxRetries: 0,
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// Cookie
|
// Cookie
|
||||||
@@ -59,21 +42,20 @@ func getAPI(t *testing.T) *api.API {
|
|||||||
docker := docker.NewDocker()
|
docker := docker.NewDocker()
|
||||||
|
|
||||||
// Initialize docker
|
// Initialize docker
|
||||||
err := docker.Init()
|
dockerErr := docker.Init()
|
||||||
|
|
||||||
// Check if there was an error
|
// Check if there was an error
|
||||||
if err != nil {
|
if dockerErr != nil {
|
||||||
t.Fatalf("Failed to initialize docker: %v", err)
|
t.Fatalf("Failed to initialize docker: %v", dockerErr)
|
||||||
}
|
}
|
||||||
|
|
||||||
// Create auth service
|
// Create auth service
|
||||||
authConfig.Users = types.Users{
|
auth := auth.NewAuth(docker, types.Users{
|
||||||
{
|
{
|
||||||
Username: user.Username,
|
Username: user.Username,
|
||||||
Password: user.Password,
|
Password: user.Password,
|
||||||
},
|
},
|
||||||
}
|
}, nil, apiConfig.SessionExpiry)
|
||||||
auth := auth.NewAuth(authConfig, docker)
|
|
||||||
|
|
||||||
// Create providers service
|
// Create providers service
|
||||||
providers := providers.NewProviders(types.OAuthConfig{})
|
providers := providers.NewProviders(types.OAuthConfig{})
|
||||||
@@ -84,11 +66,8 @@ func getAPI(t *testing.T) *api.API {
|
|||||||
// Create hooks service
|
// Create hooks service
|
||||||
hooks := hooks.NewHooks(auth, providers)
|
hooks := hooks.NewHooks(auth, providers)
|
||||||
|
|
||||||
// Create handlers service
|
|
||||||
handlers := handlers.NewHandlers(handlersConfig, auth, hooks, providers, docker)
|
|
||||||
|
|
||||||
// Create API
|
// Create API
|
||||||
api := api.NewAPI(apiConfig, handlers)
|
api := api.NewAPI(apiConfig, hooks, auth, providers)
|
||||||
|
|
||||||
// Setup routes
|
// Setup routes
|
||||||
api.Init()
|
api.Init()
|
||||||
@@ -143,9 +122,9 @@ func TestLogin(t *testing.T) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// Test app context
|
// Test status
|
||||||
func TestAppContext(t *testing.T) {
|
func TestStatus(t *testing.T) {
|
||||||
t.Log("Testing app context")
|
t.Log("Testing status")
|
||||||
|
|
||||||
// Get API
|
// Get API
|
||||||
api := getAPI(t)
|
api := getAPI(t)
|
||||||
@@ -154,7 +133,7 @@ func TestAppContext(t *testing.T) {
|
|||||||
recorder := httptest.NewRecorder()
|
recorder := httptest.NewRecorder()
|
||||||
|
|
||||||
// Create request
|
// Create request
|
||||||
req, err := http.NewRequest("GET", "/api/app", nil)
|
req, err := http.NewRequest("GET", "/api/status", nil)
|
||||||
|
|
||||||
// Check if there was an error
|
// Check if there was an error
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@@ -173,95 +152,11 @@ func TestAppContext(t *testing.T) {
|
|||||||
// Assert
|
// Assert
|
||||||
assert.Equal(t, recorder.Code, http.StatusOK)
|
assert.Equal(t, recorder.Code, http.StatusOK)
|
||||||
|
|
||||||
// Read the body of the response
|
// Parse the body
|
||||||
body, err := io.ReadAll(recorder.Body)
|
body := recorder.Body.String()
|
||||||
|
|
||||||
// Check if there was an error
|
if !strings.Contains(body, "user") {
|
||||||
if err != nil {
|
t.Fatalf("Expected user in body")
|
||||||
t.Fatalf("Error getting body: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
// Unmarshal the body into the user struct
|
|
||||||
var app types.AppContext
|
|
||||||
|
|
||||||
err = json.Unmarshal(body, &app)
|
|
||||||
|
|
||||||
// Check if there was an error
|
|
||||||
if err != nil {
|
|
||||||
t.Fatalf("Error unmarshalling body: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
// Create tests values
|
|
||||||
expected := types.AppContext{
|
|
||||||
Status: 200,
|
|
||||||
Message: "OK",
|
|
||||||
ConfiguredProviders: []string{"username"},
|
|
||||||
DisableContinue: false,
|
|
||||||
Title: "Tinyauth",
|
|
||||||
GenericName: "Generic",
|
|
||||||
}
|
|
||||||
|
|
||||||
// We should get the username back
|
|
||||||
if !reflect.DeepEqual(app, expected) {
|
|
||||||
t.Fatalf("Expected %v, got %v", expected, app)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Test user context
|
|
||||||
func TestUserContext(t *testing.T) {
|
|
||||||
t.Log("Testing user context")
|
|
||||||
|
|
||||||
// Get API
|
|
||||||
api := getAPI(t)
|
|
||||||
|
|
||||||
// Create recorder
|
|
||||||
recorder := httptest.NewRecorder()
|
|
||||||
|
|
||||||
// Create request
|
|
||||||
req, err := http.NewRequest("GET", "/api/user", nil)
|
|
||||||
|
|
||||||
// Check if there was an error
|
|
||||||
if err != nil {
|
|
||||||
t.Fatalf("Error creating request: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
// Set the cookie
|
|
||||||
req.AddCookie(&http.Cookie{
|
|
||||||
Name: "tinyauth",
|
|
||||||
Value: cookie,
|
|
||||||
})
|
|
||||||
|
|
||||||
// Serve the request
|
|
||||||
api.Router.ServeHTTP(recorder, req)
|
|
||||||
|
|
||||||
// Assert
|
|
||||||
assert.Equal(t, recorder.Code, http.StatusOK)
|
|
||||||
|
|
||||||
// Read the body of the response
|
|
||||||
body, err := io.ReadAll(recorder.Body)
|
|
||||||
|
|
||||||
// Check if there was an error
|
|
||||||
if err != nil {
|
|
||||||
t.Fatalf("Error getting body: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
// Unmarshal the body into the user struct
|
|
||||||
type User struct {
|
|
||||||
Username string `json:"username"`
|
|
||||||
}
|
|
||||||
|
|
||||||
var user User
|
|
||||||
|
|
||||||
err = json.Unmarshal(body, &user)
|
|
||||||
|
|
||||||
// Check if there was an error
|
|
||||||
if err != nil {
|
|
||||||
t.Fatalf("Error unmarshalling body: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
// We should get the username back
|
|
||||||
if user.Username != "user" {
|
|
||||||
t.Fatalf("Expected user, got %s", user.Username)
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -1 +1 @@
|
|||||||
v3.2.0
|
v3.0.1
|
||||||
@@ -1,64 +1,38 @@
|
|||||||
package auth
|
package auth
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"fmt"
|
|
||||||
"net/http"
|
|
||||||
"regexp"
|
"regexp"
|
||||||
"slices"
|
"slices"
|
||||||
"strings"
|
"strings"
|
||||||
"sync"
|
|
||||||
"time"
|
"time"
|
||||||
"tinyauth/internal/docker"
|
"tinyauth/internal/docker"
|
||||||
"tinyauth/internal/types"
|
"tinyauth/internal/types"
|
||||||
|
|
||||||
|
"github.com/gin-contrib/sessions"
|
||||||
"github.com/gin-gonic/gin"
|
"github.com/gin-gonic/gin"
|
||||||
"github.com/gorilla/sessions"
|
|
||||||
"github.com/rs/zerolog/log"
|
"github.com/rs/zerolog/log"
|
||||||
"golang.org/x/crypto/bcrypt"
|
"golang.org/x/crypto/bcrypt"
|
||||||
)
|
)
|
||||||
|
|
||||||
func NewAuth(config types.AuthConfig, docker *docker.Docker) *Auth {
|
func NewAuth(docker *docker.Docker, userList types.Users, oauthWhitelist []string, sessionExpiry int) *Auth {
|
||||||
return &Auth{
|
return &Auth{
|
||||||
Config: config,
|
Docker: docker,
|
||||||
Docker: docker,
|
Users: userList,
|
||||||
LoginAttempts: make(map[string]*types.LoginAttempt),
|
OAuthWhitelist: oauthWhitelist,
|
||||||
|
SessionExpiry: sessionExpiry,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
type Auth struct {
|
type Auth struct {
|
||||||
Config types.AuthConfig
|
Users types.Users
|
||||||
Docker *docker.Docker
|
Docker *docker.Docker
|
||||||
LoginAttempts map[string]*types.LoginAttempt
|
OAuthWhitelist []string
|
||||||
LoginMutex sync.RWMutex
|
SessionExpiry int
|
||||||
}
|
|
||||||
|
|
||||||
func (auth *Auth) GetSession(c *gin.Context) (*sessions.Session, error) {
|
|
||||||
// Create cookie store
|
|
||||||
store := sessions.NewCookieStore([]byte(auth.Config.Secret))
|
|
||||||
|
|
||||||
// Configure cookie store
|
|
||||||
store.Options = &sessions.Options{
|
|
||||||
Path: "/",
|
|
||||||
MaxAge: auth.Config.SessionExpiry,
|
|
||||||
Secure: auth.Config.CookieSecure,
|
|
||||||
HttpOnly: true,
|
|
||||||
SameSite: http.SameSiteDefaultMode,
|
|
||||||
Domain: fmt.Sprintf(".%s", auth.Config.Domain),
|
|
||||||
}
|
|
||||||
|
|
||||||
// Get session
|
|
||||||
session, err := store.Get(c.Request, "tinyauth")
|
|
||||||
if err != nil {
|
|
||||||
log.Error().Err(err).Msg("Failed to get session")
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
|
|
||||||
return session, nil
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (auth *Auth) GetUser(username string) *types.User {
|
func (auth *Auth) GetUser(username string) *types.User {
|
||||||
// Loop through users and return the user if the username matches
|
// Loop through users and return the user if the username matches
|
||||||
for _, user := range auth.Config.Users {
|
for _, user := range auth.Users {
|
||||||
if user.Username == username {
|
if user.Username == username {
|
||||||
return &user
|
return &user
|
||||||
}
|
}
|
||||||
@@ -71,78 +45,14 @@ func (auth *Auth) CheckPassword(user types.User, password string) bool {
|
|||||||
return bcrypt.CompareHashAndPassword([]byte(user.Password), []byte(password)) == nil
|
return bcrypt.CompareHashAndPassword([]byte(user.Password), []byte(password)) == nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// IsAccountLocked checks if a username or IP is locked due to too many failed login attempts
|
|
||||||
func (auth *Auth) IsAccountLocked(identifier string) (bool, int) {
|
|
||||||
auth.LoginMutex.RLock()
|
|
||||||
defer auth.LoginMutex.RUnlock()
|
|
||||||
|
|
||||||
// Return false if rate limiting is not configured
|
|
||||||
if auth.Config.LoginMaxRetries <= 0 || auth.Config.LoginTimeout <= 0 {
|
|
||||||
return false, 0
|
|
||||||
}
|
|
||||||
|
|
||||||
// Check if the identifier exists in the map
|
|
||||||
attempt, exists := auth.LoginAttempts[identifier]
|
|
||||||
if !exists {
|
|
||||||
return false, 0
|
|
||||||
}
|
|
||||||
|
|
||||||
// If account is locked, check if lock time has expired
|
|
||||||
if attempt.LockedUntil.After(time.Now()) {
|
|
||||||
// Calculate remaining lockout time in seconds
|
|
||||||
remaining := int(time.Until(attempt.LockedUntil).Seconds())
|
|
||||||
return true, remaining
|
|
||||||
}
|
|
||||||
|
|
||||||
// Lock has expired
|
|
||||||
return false, 0
|
|
||||||
}
|
|
||||||
|
|
||||||
// RecordLoginAttempt records a login attempt for rate limiting
|
|
||||||
func (auth *Auth) RecordLoginAttempt(identifier string, success bool) {
|
|
||||||
// Skip if rate limiting is not configured
|
|
||||||
if auth.Config.LoginMaxRetries <= 0 || auth.Config.LoginTimeout <= 0 {
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
auth.LoginMutex.Lock()
|
|
||||||
defer auth.LoginMutex.Unlock()
|
|
||||||
|
|
||||||
// Get current attempt record or create a new one
|
|
||||||
attempt, exists := auth.LoginAttempts[identifier]
|
|
||||||
if !exists {
|
|
||||||
attempt = &types.LoginAttempt{}
|
|
||||||
auth.LoginAttempts[identifier] = attempt
|
|
||||||
}
|
|
||||||
|
|
||||||
// Update last attempt time
|
|
||||||
attempt.LastAttempt = time.Now()
|
|
||||||
|
|
||||||
// If successful login, reset failed attempts
|
|
||||||
if success {
|
|
||||||
attempt.FailedAttempts = 0
|
|
||||||
attempt.LockedUntil = time.Time{} // Reset lock time
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// Increment failed attempts
|
|
||||||
attempt.FailedAttempts++
|
|
||||||
|
|
||||||
// If max retries reached, lock the account
|
|
||||||
if attempt.FailedAttempts >= auth.Config.LoginMaxRetries {
|
|
||||||
attempt.LockedUntil = time.Now().Add(time.Duration(auth.Config.LoginTimeout) * time.Second)
|
|
||||||
log.Warn().Str("identifier", identifier).Int("timeout", auth.Config.LoginTimeout).Msg("Account locked due to too many failed login attempts")
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func (auth *Auth) EmailWhitelisted(emailSrc string) bool {
|
func (auth *Auth) EmailWhitelisted(emailSrc string) bool {
|
||||||
// If the whitelist is empty, allow all emails
|
// If the whitelist is empty, allow all emails
|
||||||
if len(auth.Config.OauthWhitelist) == 0 {
|
if len(auth.OAuthWhitelist) == 0 {
|
||||||
return true
|
return true
|
||||||
}
|
}
|
||||||
|
|
||||||
// Loop through the whitelist and return true if the email matches
|
// Loop through the whitelist and return true if the email matches
|
||||||
for _, email := range auth.Config.OauthWhitelist {
|
for _, email := range auth.OAuthWhitelist {
|
||||||
if email == emailSrc {
|
if email == emailSrc {
|
||||||
return true
|
return true
|
||||||
}
|
}
|
||||||
@@ -152,15 +62,11 @@ func (auth *Auth) EmailWhitelisted(emailSrc string) bool {
|
|||||||
return false
|
return false
|
||||||
}
|
}
|
||||||
|
|
||||||
func (auth *Auth) CreateSessionCookie(c *gin.Context, data *types.SessionCookie) error {
|
func (auth *Auth) CreateSessionCookie(c *gin.Context, data *types.SessionCookie) {
|
||||||
log.Debug().Msg("Creating session cookie")
|
log.Debug().Msg("Creating session cookie")
|
||||||
|
|
||||||
// Get session
|
// Get session
|
||||||
session, err := auth.GetSession(c)
|
sessions := sessions.Default(c)
|
||||||
if err != nil {
|
|
||||||
log.Error().Err(err).Msg("Failed to get session")
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
log.Debug().Msg("Setting session cookie")
|
log.Debug().Msg("Setting session cookie")
|
||||||
|
|
||||||
@@ -170,73 +76,54 @@ func (auth *Auth) CreateSessionCookie(c *gin.Context, data *types.SessionCookie)
|
|||||||
if data.TotpPending {
|
if data.TotpPending {
|
||||||
sessionExpiry = 3600
|
sessionExpiry = 3600
|
||||||
} else {
|
} else {
|
||||||
sessionExpiry = auth.Config.SessionExpiry
|
sessionExpiry = auth.SessionExpiry
|
||||||
}
|
}
|
||||||
|
|
||||||
// Set data
|
// Set data
|
||||||
session.Values["username"] = data.Username
|
sessions.Set("username", data.Username)
|
||||||
session.Values["provider"] = data.Provider
|
sessions.Set("provider", data.Provider)
|
||||||
session.Values["expiry"] = time.Now().Add(time.Duration(sessionExpiry) * time.Second).Unix()
|
sessions.Set("expiry", time.Now().Add(time.Duration(sessionExpiry)*time.Second).Unix())
|
||||||
session.Values["totpPending"] = data.TotpPending
|
sessions.Set("totpPending", data.TotpPending)
|
||||||
session.Values["redirectURI"] = data.RedirectURI
|
|
||||||
|
|
||||||
// Save session
|
// Save session
|
||||||
err = session.Save(c.Request, c.Writer)
|
sessions.Save()
|
||||||
if err != nil {
|
|
||||||
log.Error().Err(err).Msg("Failed to save session")
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
// Return nil
|
|
||||||
return nil
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (auth *Auth) DeleteSessionCookie(c *gin.Context) error {
|
func (auth *Auth) DeleteSessionCookie(c *gin.Context) {
|
||||||
log.Debug().Msg("Deleting session cookie")
|
log.Debug().Msg("Deleting session cookie")
|
||||||
|
|
||||||
// Get session
|
// Get session
|
||||||
session, err := auth.GetSession(c)
|
sessions := sessions.Default(c)
|
||||||
if err != nil {
|
|
||||||
log.Error().Err(err).Msg("Failed to get session")
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
// Delete all values in the session
|
// Clear session
|
||||||
for key := range session.Values {
|
sessions.Clear()
|
||||||
delete(session.Values, key)
|
|
||||||
}
|
|
||||||
|
|
||||||
// Save session
|
// Save session
|
||||||
err = session.Save(c.Request, c.Writer)
|
sessions.Save()
|
||||||
if err != nil {
|
|
||||||
log.Error().Err(err).Msg("Failed to save session")
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
// Return nil
|
|
||||||
return nil
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (auth *Auth) GetSessionCookie(c *gin.Context) (types.SessionCookie, error) {
|
func (auth *Auth) GetSessionCookie(c *gin.Context) types.SessionCookie {
|
||||||
log.Debug().Msg("Getting session cookie")
|
log.Debug().Msg("Getting session cookie")
|
||||||
|
|
||||||
// Get session
|
// Get session
|
||||||
session, err := auth.GetSession(c)
|
sessions := sessions.Default(c)
|
||||||
if err != nil {
|
|
||||||
log.Error().Err(err).Msg("Failed to get session")
|
|
||||||
return types.SessionCookie{}, err
|
|
||||||
}
|
|
||||||
|
|
||||||
// Get data from session
|
// Get data
|
||||||
username, usernameOk := session.Values["username"].(string)
|
cookieUsername := sessions.Get("username")
|
||||||
provider, providerOK := session.Values["provider"].(string)
|
cookieProvider := sessions.Get("provider")
|
||||||
redirectURI, redirectOK := session.Values["redirectURI"].(string)
|
cookieExpiry := sessions.Get("expiry")
|
||||||
expiry, expiryOk := session.Values["expiry"].(int64)
|
cookieTotpPending := sessions.Get("totpPending")
|
||||||
totpPending, totpPendingOk := session.Values["totpPending"].(bool)
|
|
||||||
|
|
||||||
if !usernameOk || !providerOK || !expiryOk || !redirectOK || !totpPendingOk {
|
// Convert interfaces to correct types
|
||||||
log.Warn().Msg("Session cookie is missing data")
|
username, usernameOk := cookieUsername.(string)
|
||||||
return types.SessionCookie{}, nil
|
provider, providerOk := cookieProvider.(string)
|
||||||
|
expiry, expiryOk := cookieExpiry.(int64)
|
||||||
|
totpPending, totpPendingOk := cookieTotpPending.(bool)
|
||||||
|
|
||||||
|
// Check if the cookie is invalid
|
||||||
|
if !usernameOk || !providerOk || !expiryOk || !totpPendingOk {
|
||||||
|
log.Warn().Msg("Session cookie invalid")
|
||||||
|
return types.SessionCookie{}
|
||||||
}
|
}
|
||||||
|
|
||||||
// Check if the cookie has expired
|
// Check if the cookie has expired
|
||||||
@@ -247,7 +134,7 @@ func (auth *Auth) GetSessionCookie(c *gin.Context) (types.SessionCookie, error)
|
|||||||
auth.DeleteSessionCookie(c)
|
auth.DeleteSessionCookie(c)
|
||||||
|
|
||||||
// Return empty cookie
|
// Return empty cookie
|
||||||
return types.SessionCookie{}, nil
|
return types.SessionCookie{}
|
||||||
}
|
}
|
||||||
|
|
||||||
log.Debug().Str("username", username).Str("provider", provider).Int64("expiry", expiry).Bool("totpPending", totpPending).Msg("Parsed cookie")
|
log.Debug().Str("username", username).Str("provider", provider).Int64("expiry", expiry).Bool("totpPending", totpPending).Msg("Parsed cookie")
|
||||||
@@ -257,13 +144,12 @@ func (auth *Auth) GetSessionCookie(c *gin.Context) (types.SessionCookie, error)
|
|||||||
Username: username,
|
Username: username,
|
||||||
Provider: provider,
|
Provider: provider,
|
||||||
TotpPending: totpPending,
|
TotpPending: totpPending,
|
||||||
RedirectURI: redirectURI,
|
}
|
||||||
}, nil
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (auth *Auth) UserAuthConfigured() bool {
|
func (auth *Auth) UserAuthConfigured() bool {
|
||||||
// If there are users, return true
|
// If there are users, return true
|
||||||
return len(auth.Config.Users) > 0
|
return len(auth.Users) > 0
|
||||||
}
|
}
|
||||||
|
|
||||||
func (auth *Auth) ResourceAllowed(c *gin.Context, context types.UserContext) (bool, error) {
|
func (auth *Auth) ResourceAllowed(c *gin.Context, context types.UserContext) (bool, error) {
|
||||||
@@ -273,37 +159,38 @@ func (auth *Auth) ResourceAllowed(c *gin.Context, context types.UserContext) (bo
|
|||||||
// Get app id
|
// Get app id
|
||||||
appId := strings.Split(host, ".")[0]
|
appId := strings.Split(host, ".")[0]
|
||||||
|
|
||||||
// Get the container labels
|
// Check if resource is allowed
|
||||||
labels, err := auth.Docker.GetLabels(appId)
|
allowed, allowedErr := auth.Docker.ContainerAction(appId, func(labels types.TinyauthLabels) (bool, error) {
|
||||||
|
// If the container has an oauth whitelist, check if the user is in it
|
||||||
|
if context.OAuth && len(labels.OAuthWhitelist) != 0 {
|
||||||
|
log.Debug().Msg("Checking OAuth whitelist")
|
||||||
|
if slices.Contains(labels.OAuthWhitelist, context.Username) {
|
||||||
|
return true, nil
|
||||||
|
}
|
||||||
|
return false, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// If the container has users, check if the user is in it
|
||||||
|
if len(labels.Users) != 0 {
|
||||||
|
log.Debug().Msg("Checking users")
|
||||||
|
if slices.Contains(labels.Users, context.Username) {
|
||||||
|
return true, nil
|
||||||
|
}
|
||||||
|
return false, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Allowed
|
||||||
|
return true, nil
|
||||||
|
})
|
||||||
|
|
||||||
// If there is an error, return false
|
// If there is an error, return false
|
||||||
if err != nil {
|
if allowedErr != nil {
|
||||||
return false, err
|
log.Error().Err(allowedErr).Msg("Error checking if resource is allowed")
|
||||||
|
return false, allowedErr
|
||||||
}
|
}
|
||||||
|
|
||||||
// Check if oauth is allowed
|
// Return if the resource is allowed
|
||||||
if context.OAuth {
|
return allowed, nil
|
||||||
if len(labels.OAuthWhitelist) == 0 {
|
|
||||||
return true, nil
|
|
||||||
}
|
|
||||||
log.Debug().Msg("Checking OAuth whitelist")
|
|
||||||
if slices.Contains(labels.OAuthWhitelist, context.Username) {
|
|
||||||
return true, nil
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Check if user is allowed
|
|
||||||
if len(labels.Users) != 0 {
|
|
||||||
log.Debug().Msg("Checking users")
|
|
||||||
if slices.Contains(labels.Users, context.Username) {
|
|
||||||
return true, nil
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
return true, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// Not allowed
|
|
||||||
return false, nil
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (auth *Auth) AuthEnabled(c *gin.Context) (bool, error) {
|
func (auth *Auth) AuthEnabled(c *gin.Context) (bool, error) {
|
||||||
@@ -314,37 +201,40 @@ func (auth *Auth) AuthEnabled(c *gin.Context) (bool, error) {
|
|||||||
// Get app id
|
// Get app id
|
||||||
appId := strings.Split(host, ".")[0]
|
appId := strings.Split(host, ".")[0]
|
||||||
|
|
||||||
// Get the container labels
|
// Check if auth is enabled
|
||||||
labels, err := auth.Docker.GetLabels(appId)
|
enabled, enabledErr := auth.Docker.ContainerAction(appId, func(labels types.TinyauthLabels) (bool, error) {
|
||||||
|
// Check if the allowed label is empty
|
||||||
|
if labels.Allowed == "" {
|
||||||
|
// Auth enabled
|
||||||
|
return true, nil
|
||||||
|
}
|
||||||
|
|
||||||
// If there is an error, auth enabled
|
// Compile regex
|
||||||
if err != nil {
|
regex, regexErr := regexp.Compile(labels.Allowed)
|
||||||
return true, err
|
|
||||||
}
|
// If there is an error, invalid regex, auth enabled
|
||||||
|
if regexErr != nil {
|
||||||
|
log.Warn().Err(regexErr).Msg("Invalid regex")
|
||||||
|
return true, regexErr
|
||||||
|
}
|
||||||
|
|
||||||
|
// Check if the uri matches the regex
|
||||||
|
if regex.MatchString(uri) {
|
||||||
|
// Auth disabled
|
||||||
|
return false, nil
|
||||||
|
}
|
||||||
|
|
||||||
// Check if the allowed label is empty
|
|
||||||
if labels.Allowed == "" {
|
|
||||||
// Auth enabled
|
// Auth enabled
|
||||||
return true, nil
|
return true, nil
|
||||||
|
})
|
||||||
|
|
||||||
|
// If there is an error, auth enabled
|
||||||
|
if enabledErr != nil {
|
||||||
|
log.Error().Err(enabledErr).Msg("Error checking if auth is enabled")
|
||||||
|
return true, enabledErr
|
||||||
}
|
}
|
||||||
|
|
||||||
// Compile regex
|
return enabled, nil
|
||||||
regex, err := regexp.Compile(labels.Allowed)
|
|
||||||
|
|
||||||
// If there is an error, invalid regex, auth enabled
|
|
||||||
if err != nil {
|
|
||||||
log.Warn().Err(err).Msg("Invalid regex")
|
|
||||||
return true, err
|
|
||||||
}
|
|
||||||
|
|
||||||
// Check if the uri matches the regex
|
|
||||||
if regex.MatchString(uri) {
|
|
||||||
// Auth disabled
|
|
||||||
return false, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// Auth enabled
|
|
||||||
return true, nil
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (auth *Auth) GetBasicAuth(c *gin.Context) *types.User {
|
func (auth *Auth) GetBasicAuth(c *gin.Context) *types.User {
|
||||||
|
|||||||
@@ -1,147 +0,0 @@
|
|||||||
package auth_test
|
|
||||||
|
|
||||||
import (
|
|
||||||
"testing"
|
|
||||||
"time"
|
|
||||||
"tinyauth/internal/auth"
|
|
||||||
"tinyauth/internal/docker"
|
|
||||||
"tinyauth/internal/types"
|
|
||||||
)
|
|
||||||
|
|
||||||
var config = types.AuthConfig{
|
|
||||||
Users: types.Users{},
|
|
||||||
OauthWhitelist: []string{},
|
|
||||||
SessionExpiry: 3600,
|
|
||||||
}
|
|
||||||
|
|
||||||
func TestLoginRateLimiting(t *testing.T) {
|
|
||||||
// Initialize a new auth service with 3 max retries and 5 seconds timeout
|
|
||||||
config.LoginMaxRetries = 3
|
|
||||||
config.LoginTimeout = 5
|
|
||||||
authService := auth.NewAuth(config, &docker.Docker{})
|
|
||||||
|
|
||||||
// Test identifier
|
|
||||||
identifier := "test_user"
|
|
||||||
|
|
||||||
// Test successful login - should not lock account
|
|
||||||
t.Log("Testing successful login")
|
|
||||||
|
|
||||||
authService.RecordLoginAttempt(identifier, true)
|
|
||||||
locked, _ := authService.IsAccountLocked(identifier)
|
|
||||||
|
|
||||||
if locked {
|
|
||||||
t.Fatalf("Account should not be locked after successful login")
|
|
||||||
}
|
|
||||||
|
|
||||||
// Test 2 failed attempts - should not lock account yet
|
|
||||||
t.Log("Testing 2 failed login attempts")
|
|
||||||
|
|
||||||
authService.RecordLoginAttempt(identifier, false)
|
|
||||||
authService.RecordLoginAttempt(identifier, false)
|
|
||||||
locked, _ = authService.IsAccountLocked(identifier)
|
|
||||||
|
|
||||||
if locked {
|
|
||||||
t.Fatalf("Account should not be locked after only 2 failed attempts")
|
|
||||||
}
|
|
||||||
|
|
||||||
// Add one more failed attempt (total 3) - should lock account with maxRetries=3
|
|
||||||
t.Log("Testing 3 failed login attempts")
|
|
||||||
authService.RecordLoginAttempt(identifier, false)
|
|
||||||
locked, remainingTime := authService.IsAccountLocked(identifier)
|
|
||||||
|
|
||||||
if !locked {
|
|
||||||
t.Fatalf("Account should be locked after reaching max retries")
|
|
||||||
}
|
|
||||||
if remainingTime <= 0 || remainingTime > 5 {
|
|
||||||
t.Fatalf("Expected remaining time between 1-5 seconds, got %d", remainingTime)
|
|
||||||
}
|
|
||||||
|
|
||||||
// Test reset after waiting for timeout - use 1 second timeout for fast testing
|
|
||||||
t.Log("Testing unlocking after timeout")
|
|
||||||
|
|
||||||
// Reinitialize auth service with a shorter timeout for testing
|
|
||||||
config.LoginTimeout = 1
|
|
||||||
config.LoginMaxRetries = 3
|
|
||||||
authService = auth.NewAuth(config, &docker.Docker{})
|
|
||||||
|
|
||||||
// Add enough failed attempts to lock the account
|
|
||||||
for i := 0; i < 3; i++ {
|
|
||||||
authService.RecordLoginAttempt(identifier, false)
|
|
||||||
}
|
|
||||||
|
|
||||||
// Verify it's locked
|
|
||||||
locked, _ = authService.IsAccountLocked(identifier)
|
|
||||||
if !locked {
|
|
||||||
t.Fatalf("Account should be locked initially")
|
|
||||||
}
|
|
||||||
|
|
||||||
// Wait a bit and verify it gets unlocked after timeout
|
|
||||||
time.Sleep(1500 * time.Millisecond) // Wait longer than the timeout
|
|
||||||
locked, _ = authService.IsAccountLocked(identifier)
|
|
||||||
|
|
||||||
if locked {
|
|
||||||
t.Fatalf("Account should be unlocked after timeout period")
|
|
||||||
}
|
|
||||||
|
|
||||||
// Test disabled rate limiting
|
|
||||||
t.Log("Testing disabled rate limiting")
|
|
||||||
config.LoginMaxRetries = 0
|
|
||||||
config.LoginTimeout = 0
|
|
||||||
authService = auth.NewAuth(config, &docker.Docker{})
|
|
||||||
|
|
||||||
for i := 0; i < 10; i++ {
|
|
||||||
authService.RecordLoginAttempt(identifier, false)
|
|
||||||
}
|
|
||||||
|
|
||||||
locked, _ = authService.IsAccountLocked(identifier)
|
|
||||||
if locked {
|
|
||||||
t.Fatalf("Account should not be locked when rate limiting is disabled")
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func TestConcurrentLoginAttempts(t *testing.T) {
|
|
||||||
// Initialize a new auth service with 2 max retries and 5 seconds timeout
|
|
||||||
config.LoginMaxRetries = 2
|
|
||||||
config.LoginTimeout = 5
|
|
||||||
authService := auth.NewAuth(config, &docker.Docker{})
|
|
||||||
|
|
||||||
// Test multiple identifiers
|
|
||||||
identifiers := []string{"user1", "user2", "user3"}
|
|
||||||
|
|
||||||
// Test that locking one identifier doesn't affect others
|
|
||||||
t.Log("Testing multiple identifiers")
|
|
||||||
|
|
||||||
// Add enough failed attempts to lock first user (2 attempts with maxRetries=2)
|
|
||||||
authService.RecordLoginAttempt(identifiers[0], false)
|
|
||||||
authService.RecordLoginAttempt(identifiers[0], false)
|
|
||||||
|
|
||||||
// Check if first user is locked
|
|
||||||
locked, _ := authService.IsAccountLocked(identifiers[0])
|
|
||||||
if !locked {
|
|
||||||
t.Fatalf("User1 should be locked after reaching max retries")
|
|
||||||
}
|
|
||||||
|
|
||||||
// Check that other users are not affected
|
|
||||||
for i := 1; i < len(identifiers); i++ {
|
|
||||||
locked, _ := authService.IsAccountLocked(identifiers[i])
|
|
||||||
if locked {
|
|
||||||
t.Fatalf("User%d should not be locked", i+1)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Test successful login after failed attempts (but before lock)
|
|
||||||
t.Log("Testing successful login after failed attempts but before lock")
|
|
||||||
|
|
||||||
// One failed attempt for user2
|
|
||||||
authService.RecordLoginAttempt(identifiers[1], false)
|
|
||||||
|
|
||||||
// Successful login should reset the counter
|
|
||||||
authService.RecordLoginAttempt(identifiers[1], true)
|
|
||||||
|
|
||||||
// Now try a failed login again - should not be locked as counter was reset
|
|
||||||
authService.RecordLoginAttempt(identifiers[1], false)
|
|
||||||
locked, _ = authService.IsAccountLocked(identifiers[1])
|
|
||||||
if locked {
|
|
||||||
t.Fatalf("User2 should not be locked after successful login reset")
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@@ -5,5 +5,4 @@ var TinyauthLabels = []string{
|
|||||||
"tinyauth.oauth.whitelist",
|
"tinyauth.oauth.whitelist",
|
||||||
"tinyauth.users",
|
"tinyauth.users",
|
||||||
"tinyauth.allowed",
|
"tinyauth.allowed",
|
||||||
"tinyauth.headers",
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -3,7 +3,7 @@ package docker
|
|||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
"strings"
|
"strings"
|
||||||
"tinyauth/internal/types"
|
appTypes "tinyauth/internal/types"
|
||||||
"tinyauth/internal/utils"
|
"tinyauth/internal/utils"
|
||||||
|
|
||||||
apiTypes "github.com/docker/docker/api/types"
|
apiTypes "github.com/docker/docker/api/types"
|
||||||
@@ -23,7 +23,7 @@ type Docker struct {
|
|||||||
|
|
||||||
func (docker *Docker) Init() error {
|
func (docker *Docker) Init() error {
|
||||||
// Create a new docker client
|
// Create a new docker client
|
||||||
client, err := client.NewClientWithOpts(client.FromEnv)
|
apiClient, err := client.NewClientWithOpts(client.FromEnv)
|
||||||
|
|
||||||
// Check if there was an error
|
// Check if there was an error
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@@ -32,7 +32,7 @@ func (docker *Docker) Init() error {
|
|||||||
|
|
||||||
// Set the context and api client
|
// Set the context and api client
|
||||||
docker.Context = context.Background()
|
docker.Context = context.Background()
|
||||||
docker.Client = client
|
docker.Client = apiClient
|
||||||
|
|
||||||
// Done
|
// Done
|
||||||
return nil
|
return nil
|
||||||
@@ -70,22 +70,22 @@ func (docker *Docker) DockerConnected() bool {
|
|||||||
return err == nil
|
return err == nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (docker *Docker) GetLabels(appId string) (types.TinyauthLabels, error) {
|
func (docker *Docker) ContainerAction(appId string, runCheck func(labels appTypes.TinyauthLabels) (bool, error)) (bool, error) {
|
||||||
// Check if we have access to the Docker API
|
// Check if we have access to the Docker API
|
||||||
isConnected := docker.DockerConnected()
|
isConnected := docker.DockerConnected()
|
||||||
|
|
||||||
// If we don't have access, return an empty struct
|
// If we don't have access, it is assumed that the check passed
|
||||||
if !isConnected {
|
if !isConnected {
|
||||||
log.Debug().Msg("Docker not connected, returning empty labels")
|
log.Debug().Msg("Docker not connected, passing check")
|
||||||
return types.TinyauthLabels{}, nil
|
return true, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// Get the containers
|
// Get the containers
|
||||||
containers, err := docker.GetContainers()
|
containers, containersErr := docker.GetContainers()
|
||||||
|
|
||||||
// If there is an error, return false
|
// If there is an error, return false
|
||||||
if err != nil {
|
if containersErr != nil {
|
||||||
return types.TinyauthLabels{}, err
|
return false, containersErr
|
||||||
}
|
}
|
||||||
|
|
||||||
log.Debug().Msg("Got containers")
|
log.Debug().Msg("Got containers")
|
||||||
@@ -93,15 +93,15 @@ func (docker *Docker) GetLabels(appId string) (types.TinyauthLabels, error) {
|
|||||||
// Loop through the containers
|
// Loop through the containers
|
||||||
for _, container := range containers {
|
for _, container := range containers {
|
||||||
// Inspect the container
|
// Inspect the container
|
||||||
inspect, err := docker.InspectContainer(container.ID)
|
inspect, inspectErr := docker.InspectContainer(container.ID)
|
||||||
|
|
||||||
// If there is an error, return false
|
// If there is an error, return false
|
||||||
if err != nil {
|
if inspectErr != nil {
|
||||||
return types.TinyauthLabels{}, err
|
return false, inspectErr
|
||||||
}
|
}
|
||||||
|
|
||||||
// Get the container name (for some reason it is /name)
|
// Get the container name (for some reason it is /name)
|
||||||
containerName := strings.TrimPrefix(inspect.Name, "/")
|
containerName := strings.Split(inspect.Name, "/")[1]
|
||||||
|
|
||||||
// There is a container with the same name as the app ID
|
// There is a container with the same name as the app ID
|
||||||
if containerName == appId {
|
if containerName == appId {
|
||||||
@@ -112,14 +112,14 @@ func (docker *Docker) GetLabels(appId string) (types.TinyauthLabels, error) {
|
|||||||
|
|
||||||
log.Debug().Msg("Got labels")
|
log.Debug().Msg("Got labels")
|
||||||
|
|
||||||
// Return labels
|
// Run the check
|
||||||
return labels, nil
|
return runCheck(labels)
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
log.Debug().Msg("No matching container found, returning empty labels")
|
log.Debug().Msg("No matching container found, passing check")
|
||||||
|
|
||||||
// If no matching container is found, return empty labels
|
// If no matching container is found, pass check
|
||||||
return types.TinyauthLabels{}, nil
|
return true, nil
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,692 +0,0 @@
|
|||||||
package handlers
|
|
||||||
|
|
||||||
import (
|
|
||||||
"fmt"
|
|
||||||
"math/rand/v2"
|
|
||||||
"net/http"
|
|
||||||
"strings"
|
|
||||||
"tinyauth/internal/auth"
|
|
||||||
"tinyauth/internal/docker"
|
|
||||||
"tinyauth/internal/hooks"
|
|
||||||
"tinyauth/internal/providers"
|
|
||||||
"tinyauth/internal/types"
|
|
||||||
|
|
||||||
"github.com/gin-gonic/gin"
|
|
||||||
"github.com/google/go-querystring/query"
|
|
||||||
"github.com/pquerna/otp/totp"
|
|
||||||
"github.com/rs/zerolog/log"
|
|
||||||
)
|
|
||||||
|
|
||||||
func NewHandlers(config types.HandlersConfig, auth *auth.Auth, hooks *hooks.Hooks, providers *providers.Providers, docker *docker.Docker) *Handlers {
|
|
||||||
return &Handlers{
|
|
||||||
Config: config,
|
|
||||||
Auth: auth,
|
|
||||||
Hooks: hooks,
|
|
||||||
Providers: providers,
|
|
||||||
Docker: docker,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
type Handlers struct {
|
|
||||||
Config types.HandlersConfig
|
|
||||||
Auth *auth.Auth
|
|
||||||
Hooks *hooks.Hooks
|
|
||||||
Providers *providers.Providers
|
|
||||||
Docker *docker.Docker
|
|
||||||
}
|
|
||||||
|
|
||||||
func (h *Handlers) AuthHandler(c *gin.Context) {
|
|
||||||
// Create struct for proxy
|
|
||||||
var proxy types.Proxy
|
|
||||||
|
|
||||||
// Bind URI
|
|
||||||
err := c.BindUri(&proxy)
|
|
||||||
|
|
||||||
// Handle error
|
|
||||||
if err != nil {
|
|
||||||
log.Error().Err(err).Msg("Failed to bind URI")
|
|
||||||
c.JSON(400, gin.H{
|
|
||||||
"status": 400,
|
|
||||||
"message": "Bad Request",
|
|
||||||
})
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// Check if the request is coming from a browser (tools like curl/bruno use */* and they don't include the text/html)
|
|
||||||
isBrowser := strings.Contains(c.Request.Header.Get("Accept"), "text/html")
|
|
||||||
|
|
||||||
if isBrowser {
|
|
||||||
log.Debug().Msg("Request is most likely coming from a browser")
|
|
||||||
} else {
|
|
||||||
log.Debug().Msg("Request is most likely not coming from a browser")
|
|
||||||
}
|
|
||||||
|
|
||||||
log.Debug().Interface("proxy", proxy.Proxy).Msg("Got proxy")
|
|
||||||
|
|
||||||
// Get headers
|
|
||||||
uri := c.Request.Header.Get("X-Forwarded-Uri")
|
|
||||||
proto := c.Request.Header.Get("X-Forwarded-Proto")
|
|
||||||
host := c.Request.Header.Get("X-Forwarded-Host")
|
|
||||||
|
|
||||||
// Check if auth is enabled
|
|
||||||
authEnabled, err := h.Auth.AuthEnabled(c)
|
|
||||||
|
|
||||||
// Check if there was an error
|
|
||||||
if err != nil {
|
|
||||||
log.Error().Err(err).Msg("Failed to check if app is allowed")
|
|
||||||
|
|
||||||
if proxy.Proxy == "nginx" || !isBrowser {
|
|
||||||
c.JSON(500, gin.H{
|
|
||||||
"status": 500,
|
|
||||||
"message": "Internal Server Error",
|
|
||||||
})
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
c.Redirect(http.StatusPermanentRedirect, fmt.Sprintf("%s/error", h.Config.AppURL))
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// Get the app id
|
|
||||||
appId := strings.Split(host, ".")[0]
|
|
||||||
|
|
||||||
// Get the container labels
|
|
||||||
labels, err := h.Docker.GetLabels(appId)
|
|
||||||
|
|
||||||
// Check if there was an error
|
|
||||||
if err != nil {
|
|
||||||
log.Error().Err(err).Msg("Failed to check if app is allowed")
|
|
||||||
|
|
||||||
if proxy.Proxy == "nginx" || !isBrowser {
|
|
||||||
c.JSON(500, gin.H{
|
|
||||||
"status": 500,
|
|
||||||
"message": "Internal Server Error",
|
|
||||||
})
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
c.Redirect(http.StatusPermanentRedirect, fmt.Sprintf("%s/error", h.Config.AppURL))
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// If auth is not enabled, return 200
|
|
||||||
if !authEnabled {
|
|
||||||
for key, value := range labels.Headers {
|
|
||||||
log.Debug().Str("key", key).Str("value", value).Msg("Setting header")
|
|
||||||
c.Header(key, value)
|
|
||||||
}
|
|
||||||
c.JSON(200, gin.H{
|
|
||||||
"status": 200,
|
|
||||||
"message": "Authenticated",
|
|
||||||
})
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// Get user context
|
|
||||||
userContext := h.Hooks.UseUserContext(c)
|
|
||||||
|
|
||||||
// Check if user is logged in
|
|
||||||
if userContext.IsLoggedIn {
|
|
||||||
log.Debug().Msg("Authenticated")
|
|
||||||
|
|
||||||
// Check if user is allowed to access subdomain, if request is nginx.example.com the subdomain (resource) is nginx
|
|
||||||
appAllowed, err := h.Auth.ResourceAllowed(c, userContext)
|
|
||||||
|
|
||||||
// Check if there was an error
|
|
||||||
if err != nil {
|
|
||||||
log.Error().Err(err).Msg("Failed to check if app is allowed")
|
|
||||||
|
|
||||||
if proxy.Proxy == "nginx" || !isBrowser {
|
|
||||||
c.JSON(500, gin.H{
|
|
||||||
"status": 500,
|
|
||||||
"message": "Internal Server Error",
|
|
||||||
})
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
c.Redirect(http.StatusPermanentRedirect, fmt.Sprintf("%s/error", h.Config.AppURL))
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
log.Debug().Bool("appAllowed", appAllowed).Msg("Checking if app is allowed")
|
|
||||||
|
|
||||||
// The user is not allowed to access the app
|
|
||||||
if !appAllowed {
|
|
||||||
log.Warn().Str("username", userContext.Username).Str("host", host).Msg("User not allowed")
|
|
||||||
|
|
||||||
// Set WWW-Authenticate header
|
|
||||||
c.Header("WWW-Authenticate", "Basic realm=\"tinyauth\"")
|
|
||||||
|
|
||||||
if proxy.Proxy == "nginx" || !isBrowser {
|
|
||||||
c.JSON(401, gin.H{
|
|
||||||
"status": 401,
|
|
||||||
"message": "Unauthorized",
|
|
||||||
})
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// Build query
|
|
||||||
queries, err := query.Values(types.UnauthorizedQuery{
|
|
||||||
Username: userContext.Username,
|
|
||||||
Resource: strings.Split(host, ".")[0],
|
|
||||||
})
|
|
||||||
|
|
||||||
// Handle error (no need to check for nginx/headers since we are sure we are using caddy/traefik)
|
|
||||||
if err != nil {
|
|
||||||
log.Error().Err(err).Msg("Failed to build queries")
|
|
||||||
c.Redirect(http.StatusPermanentRedirect, fmt.Sprintf("%s/error", h.Config.AppURL))
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// We are using caddy/traefik so redirect
|
|
||||||
c.Redirect(http.StatusTemporaryRedirect, fmt.Sprintf("%s/unauthorized?%s", h.Config.AppURL, queries.Encode()))
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// Set the user header
|
|
||||||
c.Header("Remote-User", userContext.Username)
|
|
||||||
|
|
||||||
// Set the rest of the headers
|
|
||||||
for key, value := range labels.Headers {
|
|
||||||
log.Debug().Str("key", key).Str("value", value).Msg("Setting header")
|
|
||||||
c.Header(key, value)
|
|
||||||
}
|
|
||||||
|
|
||||||
// The user is allowed to access the app
|
|
||||||
c.JSON(200, gin.H{
|
|
||||||
"status": 200,
|
|
||||||
"message": "Authenticated",
|
|
||||||
})
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// The user is not logged in
|
|
||||||
log.Debug().Msg("Unauthorized")
|
|
||||||
|
|
||||||
// Set www-authenticate header
|
|
||||||
c.Header("WWW-Authenticate", "Basic realm=\"tinyauth\"")
|
|
||||||
|
|
||||||
if proxy.Proxy == "nginx" || !isBrowser {
|
|
||||||
c.JSON(401, gin.H{
|
|
||||||
"status": 401,
|
|
||||||
"message": "Unauthorized",
|
|
||||||
})
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
queries, err := query.Values(types.LoginQuery{
|
|
||||||
RedirectURI: fmt.Sprintf("%s://%s%s", proto, host, uri),
|
|
||||||
})
|
|
||||||
|
|
||||||
if err != nil {
|
|
||||||
log.Error().Err(err).Msg("Failed to build queries")
|
|
||||||
c.Redirect(http.StatusPermanentRedirect, fmt.Sprintf("%s/error", h.Config.AppURL))
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
log.Debug().Interface("redirect_uri", fmt.Sprintf("%s://%s%s", proto, host, uri)).Msg("Redirecting to login")
|
|
||||||
|
|
||||||
// Redirect to login
|
|
||||||
c.Redirect(http.StatusTemporaryRedirect, fmt.Sprintf("%s/?%s", h.Config.AppURL, queries.Encode()))
|
|
||||||
}
|
|
||||||
|
|
||||||
func (h *Handlers) LoginHandler(c *gin.Context) {
|
|
||||||
// Create login struct
|
|
||||||
var login types.LoginRequest
|
|
||||||
|
|
||||||
// Bind JSON
|
|
||||||
err := c.BindJSON(&login)
|
|
||||||
|
|
||||||
// Handle error
|
|
||||||
if err != nil {
|
|
||||||
log.Error().Err(err).Msg("Failed to bind JSON")
|
|
||||||
c.JSON(400, gin.H{
|
|
||||||
"status": 400,
|
|
||||||
"message": "Bad Request",
|
|
||||||
})
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
log.Debug().Msg("Got login request")
|
|
||||||
|
|
||||||
// Get client IP for rate limiting
|
|
||||||
clientIP := c.ClientIP()
|
|
||||||
|
|
||||||
// Create an identifier for rate limiting (username or IP if username doesn't exist yet)
|
|
||||||
rateIdentifier := login.Username
|
|
||||||
if rateIdentifier == "" {
|
|
||||||
rateIdentifier = clientIP
|
|
||||||
}
|
|
||||||
|
|
||||||
// Check if the account is locked due to too many failed attempts
|
|
||||||
locked, remainingTime := h.Auth.IsAccountLocked(rateIdentifier)
|
|
||||||
if locked {
|
|
||||||
log.Warn().Str("identifier", rateIdentifier).Int("remaining_seconds", remainingTime).Msg("Account is locked due to too many failed login attempts")
|
|
||||||
c.JSON(429, gin.H{
|
|
||||||
"status": 429,
|
|
||||||
"message": fmt.Sprintf("Too many failed login attempts. Try again in %d seconds", remainingTime),
|
|
||||||
})
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// Get user based on username
|
|
||||||
user := h.Auth.GetUser(login.Username)
|
|
||||||
|
|
||||||
// User does not exist
|
|
||||||
if user == nil {
|
|
||||||
log.Debug().Str("username", login.Username).Msg("User not found")
|
|
||||||
// Record failed login attempt
|
|
||||||
h.Auth.RecordLoginAttempt(rateIdentifier, false)
|
|
||||||
c.JSON(401, gin.H{
|
|
||||||
"status": 401,
|
|
||||||
"message": "Unauthorized",
|
|
||||||
})
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
log.Debug().Msg("Got user")
|
|
||||||
|
|
||||||
// Check if password is correct
|
|
||||||
if !h.Auth.CheckPassword(*user, login.Password) {
|
|
||||||
log.Debug().Str("username", login.Username).Msg("Password incorrect")
|
|
||||||
// Record failed login attempt
|
|
||||||
h.Auth.RecordLoginAttempt(rateIdentifier, false)
|
|
||||||
c.JSON(401, gin.H{
|
|
||||||
"status": 401,
|
|
||||||
"message": "Unauthorized",
|
|
||||||
})
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
log.Debug().Msg("Password correct, checking totp")
|
|
||||||
|
|
||||||
// Record successful login attempt (will reset failed attempt counter)
|
|
||||||
h.Auth.RecordLoginAttempt(rateIdentifier, true)
|
|
||||||
|
|
||||||
// Check if user has totp enabled
|
|
||||||
if user.TotpSecret != "" {
|
|
||||||
log.Debug().Msg("Totp enabled")
|
|
||||||
|
|
||||||
// Set totp pending cookie
|
|
||||||
h.Auth.CreateSessionCookie(c, &types.SessionCookie{
|
|
||||||
Username: login.Username,
|
|
||||||
Provider: "username",
|
|
||||||
TotpPending: true,
|
|
||||||
})
|
|
||||||
|
|
||||||
// Return totp required
|
|
||||||
c.JSON(200, gin.H{
|
|
||||||
"status": 200,
|
|
||||||
"message": "Waiting for totp",
|
|
||||||
"totpPending": true,
|
|
||||||
})
|
|
||||||
|
|
||||||
// Stop further processing
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// Create session cookie with username as provider
|
|
||||||
h.Auth.CreateSessionCookie(c, &types.SessionCookie{
|
|
||||||
Username: login.Username,
|
|
||||||
Provider: "username",
|
|
||||||
})
|
|
||||||
|
|
||||||
// Return logged in
|
|
||||||
c.JSON(200, gin.H{
|
|
||||||
"status": 200,
|
|
||||||
"message": "Logged in",
|
|
||||||
"totpPending": false,
|
|
||||||
})
|
|
||||||
}
|
|
||||||
|
|
||||||
func (h *Handlers) TotpHandler(c *gin.Context) {
|
|
||||||
// Create totp struct
|
|
||||||
var totpReq types.TotpRequest
|
|
||||||
|
|
||||||
// Bind JSON
|
|
||||||
err := c.BindJSON(&totpReq)
|
|
||||||
|
|
||||||
// Handle error
|
|
||||||
if err != nil {
|
|
||||||
log.Error().Err(err).Msg("Failed to bind JSON")
|
|
||||||
c.JSON(400, gin.H{
|
|
||||||
"status": 400,
|
|
||||||
"message": "Bad Request",
|
|
||||||
})
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
log.Debug().Msg("Checking totp")
|
|
||||||
|
|
||||||
// Get user context
|
|
||||||
userContext := h.Hooks.UseUserContext(c)
|
|
||||||
|
|
||||||
// Check if we have a user
|
|
||||||
if userContext.Username == "" {
|
|
||||||
log.Debug().Msg("No user context")
|
|
||||||
c.JSON(401, gin.H{
|
|
||||||
"status": 401,
|
|
||||||
"message": "Unauthorized",
|
|
||||||
})
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// Get user
|
|
||||||
user := h.Auth.GetUser(userContext.Username)
|
|
||||||
|
|
||||||
// Check if user exists
|
|
||||||
if user == nil {
|
|
||||||
log.Debug().Msg("User not found")
|
|
||||||
c.JSON(401, gin.H{
|
|
||||||
"status": 401,
|
|
||||||
"message": "Unauthorized",
|
|
||||||
})
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// Check if totp is correct
|
|
||||||
ok := totp.Validate(totpReq.Code, user.TotpSecret)
|
|
||||||
|
|
||||||
// TOTP is incorrect
|
|
||||||
if !ok {
|
|
||||||
log.Debug().Msg("Totp incorrect")
|
|
||||||
c.JSON(401, gin.H{
|
|
||||||
"status": 401,
|
|
||||||
"message": "Unauthorized",
|
|
||||||
})
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
log.Debug().Msg("Totp correct")
|
|
||||||
|
|
||||||
// Create session cookie with username as provider
|
|
||||||
h.Auth.CreateSessionCookie(c, &types.SessionCookie{
|
|
||||||
Username: user.Username,
|
|
||||||
Provider: "username",
|
|
||||||
})
|
|
||||||
|
|
||||||
// Return logged in
|
|
||||||
c.JSON(200, gin.H{
|
|
||||||
"status": 200,
|
|
||||||
"message": "Logged in",
|
|
||||||
})
|
|
||||||
}
|
|
||||||
|
|
||||||
func (h *Handlers) LogoutHandler(c *gin.Context) {
|
|
||||||
log.Debug().Msg("Logging out")
|
|
||||||
|
|
||||||
// Delete session cookie
|
|
||||||
h.Auth.DeleteSessionCookie(c)
|
|
||||||
|
|
||||||
log.Debug().Msg("Cleaning up redirect cookie")
|
|
||||||
|
|
||||||
// Return logged out
|
|
||||||
c.JSON(200, gin.H{
|
|
||||||
"status": 200,
|
|
||||||
"message": "Logged out",
|
|
||||||
})
|
|
||||||
}
|
|
||||||
|
|
||||||
func (h *Handlers) AppHandler(c *gin.Context) {
|
|
||||||
log.Debug().Msg("Getting app context")
|
|
||||||
|
|
||||||
// Get configured providers
|
|
||||||
configuredProviders := h.Providers.GetConfiguredProviders()
|
|
||||||
|
|
||||||
// We have username/password configured so add it to our providers
|
|
||||||
if h.Auth.UserAuthConfigured() {
|
|
||||||
configuredProviders = append(configuredProviders, "username")
|
|
||||||
}
|
|
||||||
|
|
||||||
// Create app context struct
|
|
||||||
appContext := types.AppContext{
|
|
||||||
Status: 200,
|
|
||||||
Message: "OK",
|
|
||||||
ConfiguredProviders: configuredProviders,
|
|
||||||
DisableContinue: h.Config.DisableContinue,
|
|
||||||
Title: h.Config.Title,
|
|
||||||
GenericName: h.Config.GenericName,
|
|
||||||
}
|
|
||||||
|
|
||||||
// Return app context
|
|
||||||
c.JSON(200, appContext)
|
|
||||||
}
|
|
||||||
|
|
||||||
func (h *Handlers) UserHandler(c *gin.Context) {
|
|
||||||
log.Debug().Msg("Getting user context")
|
|
||||||
|
|
||||||
// Get user context
|
|
||||||
userContext := h.Hooks.UseUserContext(c)
|
|
||||||
|
|
||||||
// Create user context response
|
|
||||||
userContextResponse := types.UserContextResponse{
|
|
||||||
Status: 200,
|
|
||||||
IsLoggedIn: userContext.IsLoggedIn,
|
|
||||||
Username: userContext.Username,
|
|
||||||
Provider: userContext.Provider,
|
|
||||||
Oauth: userContext.OAuth,
|
|
||||||
TotpPending: userContext.TotpPending,
|
|
||||||
}
|
|
||||||
|
|
||||||
// If we are not logged in we set the status to 401 and add the WWW-Authenticate header else we set it to 200
|
|
||||||
if !userContext.IsLoggedIn {
|
|
||||||
log.Debug().Msg("Unauthorized")
|
|
||||||
c.Header("WWW-Authenticate", "Basic realm=\"tinyauth\"")
|
|
||||||
userContextResponse.Message = "Unauthorized"
|
|
||||||
} else {
|
|
||||||
log.Debug().Interface("userContext", userContext).Msg("Authenticated")
|
|
||||||
userContextResponse.Message = "Authenticated"
|
|
||||||
}
|
|
||||||
|
|
||||||
// Return user context
|
|
||||||
c.JSON(200, userContextResponse)
|
|
||||||
}
|
|
||||||
|
|
||||||
func (h *Handlers) OauthUrlHandler(c *gin.Context) {
|
|
||||||
// Create struct for OAuth request
|
|
||||||
var request types.OAuthRequest
|
|
||||||
|
|
||||||
// Bind URI
|
|
||||||
err := c.BindUri(&request)
|
|
||||||
|
|
||||||
// Handle error
|
|
||||||
if err != nil {
|
|
||||||
log.Error().Err(err).Msg("Failed to bind URI")
|
|
||||||
c.JSON(400, gin.H{
|
|
||||||
"status": 400,
|
|
||||||
"message": "Bad Request",
|
|
||||||
})
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
log.Debug().Msg("Got OAuth request")
|
|
||||||
|
|
||||||
// Check if provider exists
|
|
||||||
provider := h.Providers.GetProvider(request.Provider)
|
|
||||||
|
|
||||||
// Provider does not exist
|
|
||||||
if provider == nil {
|
|
||||||
c.JSON(404, gin.H{
|
|
||||||
"status": 404,
|
|
||||||
"message": "Not Found",
|
|
||||||
})
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
log.Debug().Str("provider", request.Provider).Msg("Got provider")
|
|
||||||
|
|
||||||
// Get auth URL
|
|
||||||
authURL := provider.GetAuthURL()
|
|
||||||
|
|
||||||
log.Debug().Msg("Got auth URL")
|
|
||||||
|
|
||||||
// Get redirect URI
|
|
||||||
redirectURI := c.Query("redirect_uri")
|
|
||||||
|
|
||||||
// Set redirect cookie if redirect URI is provided
|
|
||||||
if redirectURI != "" {
|
|
||||||
log.Debug().Str("redirectURI", redirectURI).Msg("Setting redirect cookie")
|
|
||||||
h.Auth.CreateSessionCookie(c, &types.SessionCookie{
|
|
||||||
RedirectURI: redirectURI,
|
|
||||||
})
|
|
||||||
}
|
|
||||||
|
|
||||||
// Tailscale does not have an auth url so we create a random code (does not need to be secure) to avoid caching and send it
|
|
||||||
if request.Provider == "tailscale" {
|
|
||||||
// Build tailscale query
|
|
||||||
queries, err := query.Values(types.TailscaleQuery{
|
|
||||||
Code: (1000 + rand.IntN(9000)),
|
|
||||||
})
|
|
||||||
|
|
||||||
// Handle error
|
|
||||||
if err != nil {
|
|
||||||
log.Error().Err(err).Msg("Failed to build queries")
|
|
||||||
c.JSON(500, gin.H{
|
|
||||||
"status": 500,
|
|
||||||
"message": "Internal Server Error",
|
|
||||||
})
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// Return tailscale URL (immidiately redirects to the callback)
|
|
||||||
c.JSON(200, gin.H{
|
|
||||||
"status": 200,
|
|
||||||
"message": "OK",
|
|
||||||
"url": fmt.Sprintf("%s/api/oauth/callback/tailscale?%s", h.Config.AppURL, queries.Encode()),
|
|
||||||
})
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// Return auth URL
|
|
||||||
c.JSON(200, gin.H{
|
|
||||||
"status": 200,
|
|
||||||
"message": "OK",
|
|
||||||
"url": authURL,
|
|
||||||
})
|
|
||||||
}
|
|
||||||
|
|
||||||
func (h *Handlers) OauthCallbackHandler(c *gin.Context) {
|
|
||||||
// Create struct for OAuth request
|
|
||||||
var providerName types.OAuthRequest
|
|
||||||
|
|
||||||
// Bind URI
|
|
||||||
err := c.BindUri(&providerName)
|
|
||||||
|
|
||||||
// Handle error
|
|
||||||
if err != nil {
|
|
||||||
log.Error().Err(err).Msg("Failed to bind URI")
|
|
||||||
c.Redirect(http.StatusPermanentRedirect, fmt.Sprintf("%s/error", h.Config.AppURL))
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
log.Debug().Interface("provider", providerName.Provider).Msg("Got provider name")
|
|
||||||
|
|
||||||
// Get code
|
|
||||||
code := c.Query("code")
|
|
||||||
|
|
||||||
// Code empty so redirect to error
|
|
||||||
if code == "" {
|
|
||||||
log.Error().Msg("No code provided")
|
|
||||||
c.Redirect(http.StatusPermanentRedirect, fmt.Sprintf("%s/error", h.Config.AppURL))
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
log.Debug().Msg("Got code")
|
|
||||||
|
|
||||||
// Get provider
|
|
||||||
provider := h.Providers.GetProvider(providerName.Provider)
|
|
||||||
|
|
||||||
log.Debug().Str("provider", providerName.Provider).Msg("Got provider")
|
|
||||||
|
|
||||||
// Provider does not exist
|
|
||||||
if provider == nil {
|
|
||||||
c.Redirect(http.StatusPermanentRedirect, "/not-found")
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// Exchange token (authenticates user)
|
|
||||||
_, err = provider.ExchangeToken(code)
|
|
||||||
|
|
||||||
log.Debug().Msg("Got token")
|
|
||||||
|
|
||||||
// Handle error
|
|
||||||
if err != nil {
|
|
||||||
log.Error().Msg("Failed to exchange token")
|
|
||||||
c.Redirect(http.StatusPermanentRedirect, fmt.Sprintf("%s/error", h.Config.AppURL))
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// Get email
|
|
||||||
email, err := h.Providers.GetUser(providerName.Provider)
|
|
||||||
|
|
||||||
log.Debug().Str("email", email).Msg("Got email")
|
|
||||||
|
|
||||||
// Handle error
|
|
||||||
if err != nil {
|
|
||||||
log.Error().Msg("Failed to get email")
|
|
||||||
c.Redirect(http.StatusPermanentRedirect, fmt.Sprintf("%s/error", h.Config.AppURL))
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// Email is not whitelisted
|
|
||||||
if !h.Auth.EmailWhitelisted(email) {
|
|
||||||
log.Warn().Str("email", email).Msg("Email not whitelisted")
|
|
||||||
|
|
||||||
// Build query
|
|
||||||
queries, err := query.Values(types.UnauthorizedQuery{
|
|
||||||
Username: email,
|
|
||||||
})
|
|
||||||
|
|
||||||
// Handle error
|
|
||||||
if err != nil {
|
|
||||||
log.Error().Msg("Failed to build queries")
|
|
||||||
c.Redirect(http.StatusPermanentRedirect, fmt.Sprintf("%s/error", h.Config.AppURL))
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// Redirect to unauthorized
|
|
||||||
c.Redirect(http.StatusPermanentRedirect, fmt.Sprintf("%s/unauthorized?%s", h.Config.AppURL, queries.Encode()))
|
|
||||||
}
|
|
||||||
|
|
||||||
log.Debug().Msg("Email whitelisted")
|
|
||||||
|
|
||||||
// Get redirect URI
|
|
||||||
cookie, err := h.Auth.GetSessionCookie(c)
|
|
||||||
|
|
||||||
// Create session cookie (also cleans up redirect cookie)
|
|
||||||
h.Auth.CreateSessionCookie(c, &types.SessionCookie{
|
|
||||||
Username: email,
|
|
||||||
Provider: providerName.Provider,
|
|
||||||
})
|
|
||||||
|
|
||||||
// If it is empty it means that no redirect_uri was provided to the login screen so we just log in
|
|
||||||
if err != nil {
|
|
||||||
c.Redirect(http.StatusPermanentRedirect, h.Config.AppURL)
|
|
||||||
}
|
|
||||||
|
|
||||||
log.Debug().Str("redirectURI", cookie.RedirectURI).Msg("Got redirect URI")
|
|
||||||
|
|
||||||
// Build query
|
|
||||||
queries, err := query.Values(types.LoginQuery{
|
|
||||||
RedirectURI: cookie.RedirectURI,
|
|
||||||
})
|
|
||||||
|
|
||||||
log.Debug().Msg("Got redirect query")
|
|
||||||
|
|
||||||
// Handle error
|
|
||||||
if err != nil {
|
|
||||||
log.Error().Msg("Failed to build queries")
|
|
||||||
c.Redirect(http.StatusPermanentRedirect, fmt.Sprintf("%s/error", h.Config.AppURL))
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// Redirect to continue with the redirect URI
|
|
||||||
c.Redirect(http.StatusPermanentRedirect, fmt.Sprintf("%s/continue?%s", h.Config.AppURL, queries.Encode()))
|
|
||||||
}
|
|
||||||
|
|
||||||
func (h *Handlers) HealthcheckHandler(c *gin.Context) {
|
|
||||||
c.JSON(200, gin.H{
|
|
||||||
"status": 200,
|
|
||||||
"message": "OK",
|
|
||||||
})
|
|
||||||
}
|
|
||||||
@@ -23,7 +23,7 @@ type Hooks struct {
|
|||||||
|
|
||||||
func (hooks *Hooks) UseUserContext(c *gin.Context) types.UserContext {
|
func (hooks *Hooks) UseUserContext(c *gin.Context) types.UserContext {
|
||||||
// Get session cookie and basic auth
|
// Get session cookie and basic auth
|
||||||
cookie, err := hooks.Auth.GetSessionCookie(c)
|
cookie := hooks.Auth.GetSessionCookie(c)
|
||||||
basic := hooks.Auth.GetBasicAuth(c)
|
basic := hooks.Auth.GetBasicAuth(c)
|
||||||
|
|
||||||
// Check if basic auth is set
|
// Check if basic auth is set
|
||||||
@@ -46,19 +46,6 @@ func (hooks *Hooks) UseUserContext(c *gin.Context) types.UserContext {
|
|||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// Check cookie error after basic auth
|
|
||||||
if err != nil {
|
|
||||||
log.Error().Err(err).Msg("Failed to get session cookie")
|
|
||||||
// Return empty context
|
|
||||||
return types.UserContext{
|
|
||||||
Username: "",
|
|
||||||
IsLoggedIn: false,
|
|
||||||
OAuth: false,
|
|
||||||
Provider: "",
|
|
||||||
TotpPending: false,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Check if session cookie has totp pending
|
// Check if session cookie has totp pending
|
||||||
if cookie.TotpPending {
|
if cookie.TotpPending {
|
||||||
log.Debug().Msg("Totp pending")
|
log.Debug().Msg("Totp pending")
|
||||||
|
|||||||
@@ -15,21 +15,21 @@ type GenericUserInfoResponse struct {
|
|||||||
|
|
||||||
func GetGenericEmail(client *http.Client, url string) (string, error) {
|
func GetGenericEmail(client *http.Client, url string) (string, error) {
|
||||||
// Using the oauth client get the user info url
|
// Using the oauth client get the user info url
|
||||||
res, err := client.Get(url)
|
res, resErr := client.Get(url)
|
||||||
|
|
||||||
// Check if there was an error
|
// Check if there was an error
|
||||||
if err != nil {
|
if resErr != nil {
|
||||||
return "", err
|
return "", resErr
|
||||||
}
|
}
|
||||||
|
|
||||||
log.Debug().Msg("Got response from generic provider")
|
log.Debug().Msg("Got response from generic provider")
|
||||||
|
|
||||||
// Read the body of the response
|
// Read the body of the response
|
||||||
body, err := io.ReadAll(res.Body)
|
body, bodyErr := io.ReadAll(res.Body)
|
||||||
|
|
||||||
// Check if there was an error
|
// Check if there was an error
|
||||||
if err != nil {
|
if bodyErr != nil {
|
||||||
return "", err
|
return "", bodyErr
|
||||||
}
|
}
|
||||||
|
|
||||||
log.Debug().Msg("Read body from generic provider")
|
log.Debug().Msg("Read body from generic provider")
|
||||||
@@ -38,11 +38,11 @@ func GetGenericEmail(client *http.Client, url string) (string, error) {
|
|||||||
var user GenericUserInfoResponse
|
var user GenericUserInfoResponse
|
||||||
|
|
||||||
// Unmarshal the body into the user struct
|
// Unmarshal the body into the user struct
|
||||||
err = json.Unmarshal(body, &user)
|
jsonErr := json.Unmarshal(body, &user)
|
||||||
|
|
||||||
// Check if there was an error
|
// Check if there was an error
|
||||||
if err != nil {
|
if jsonErr != nil {
|
||||||
return "", err
|
return "", jsonErr
|
||||||
}
|
}
|
||||||
|
|
||||||
log.Debug().Msg("Parsed user from generic provider")
|
log.Debug().Msg("Parsed user from generic provider")
|
||||||
|
|||||||
@@ -22,21 +22,21 @@ func GithubScopes() []string {
|
|||||||
|
|
||||||
func GetGithubEmail(client *http.Client) (string, error) {
|
func GetGithubEmail(client *http.Client) (string, error) {
|
||||||
// Get the user emails from github using the oauth http client
|
// Get the user emails from github using the oauth http client
|
||||||
res, err := client.Get("https://api.github.com/user/emails")
|
res, resErr := client.Get("https://api.github.com/user/emails")
|
||||||
|
|
||||||
// Check if there was an error
|
// Check if there was an error
|
||||||
if err != nil {
|
if resErr != nil {
|
||||||
return "", err
|
return "", resErr
|
||||||
}
|
}
|
||||||
|
|
||||||
log.Debug().Msg("Got response from github")
|
log.Debug().Msg("Got response from github")
|
||||||
|
|
||||||
// Read the body of the response
|
// Read the body of the response
|
||||||
body, err := io.ReadAll(res.Body)
|
body, bodyErr := io.ReadAll(res.Body)
|
||||||
|
|
||||||
// Check if there was an error
|
// Check if there was an error
|
||||||
if err != nil {
|
if bodyErr != nil {
|
||||||
return "", err
|
return "", bodyErr
|
||||||
}
|
}
|
||||||
|
|
||||||
log.Debug().Msg("Read body from github")
|
log.Debug().Msg("Read body from github")
|
||||||
@@ -45,11 +45,11 @@ func GetGithubEmail(client *http.Client) (string, error) {
|
|||||||
var emails GithubUserInfoResponse
|
var emails GithubUserInfoResponse
|
||||||
|
|
||||||
// Unmarshal the body into the user struct
|
// Unmarshal the body into the user struct
|
||||||
err = json.Unmarshal(body, &emails)
|
jsonErr := json.Unmarshal(body, &emails)
|
||||||
|
|
||||||
// Check if there was an error
|
// Check if there was an error
|
||||||
if err != nil {
|
if jsonErr != nil {
|
||||||
return "", err
|
return "", jsonErr
|
||||||
}
|
}
|
||||||
|
|
||||||
log.Debug().Msg("Parsed emails from github")
|
log.Debug().Msg("Parsed emails from github")
|
||||||
|
|||||||
@@ -20,21 +20,21 @@ func GoogleScopes() []string {
|
|||||||
|
|
||||||
func GetGoogleEmail(client *http.Client) (string, error) {
|
func GetGoogleEmail(client *http.Client) (string, error) {
|
||||||
// Get the user info from google using the oauth http client
|
// Get the user info from google using the oauth http client
|
||||||
res, err := client.Get("https://www.googleapis.com/userinfo/v2/me")
|
res, resErr := client.Get("https://www.googleapis.com/userinfo/v2/me")
|
||||||
|
|
||||||
// Check if there was an error
|
// Check if there was an error
|
||||||
if err != nil {
|
if resErr != nil {
|
||||||
return "", err
|
return "", resErr
|
||||||
}
|
}
|
||||||
|
|
||||||
log.Debug().Msg("Got response from google")
|
log.Debug().Msg("Got response from google")
|
||||||
|
|
||||||
// Read the body of the response
|
// Read the body of the response
|
||||||
body, err := io.ReadAll(res.Body)
|
body, bodyErr := io.ReadAll(res.Body)
|
||||||
|
|
||||||
// Check if there was an error
|
// Check if there was an error
|
||||||
if err != nil {
|
if bodyErr != nil {
|
||||||
return "", err
|
return "", bodyErr
|
||||||
}
|
}
|
||||||
|
|
||||||
log.Debug().Msg("Read body from google")
|
log.Debug().Msg("Read body from google")
|
||||||
@@ -43,11 +43,11 @@ func GetGoogleEmail(client *http.Client) (string, error) {
|
|||||||
var user GoogleUserInfoResponse
|
var user GoogleUserInfoResponse
|
||||||
|
|
||||||
// Unmarshal the body into the user struct
|
// Unmarshal the body into the user struct
|
||||||
err = json.Unmarshal(body, &user)
|
jsonErr := json.Unmarshal(body, &user)
|
||||||
|
|
||||||
// Check if there was an error
|
// Check if there was an error
|
||||||
if err != nil {
|
if jsonErr != nil {
|
||||||
return "", err
|
return "", jsonErr
|
||||||
}
|
}
|
||||||
|
|
||||||
log.Debug().Msg("Parsed user from google")
|
log.Debug().Msg("Parsed user from google")
|
||||||
|
|||||||
@@ -128,11 +128,11 @@ func (providers *Providers) GetUser(provider string) (string, error) {
|
|||||||
log.Debug().Msg("Got client from github")
|
log.Debug().Msg("Got client from github")
|
||||||
|
|
||||||
// Get the email from the github provider
|
// Get the email from the github provider
|
||||||
email, err := GetGithubEmail(client)
|
email, emailErr := GetGithubEmail(client)
|
||||||
|
|
||||||
// Check if there was an error
|
// Check if there was an error
|
||||||
if err != nil {
|
if emailErr != nil {
|
||||||
return "", err
|
return "", emailErr
|
||||||
}
|
}
|
||||||
|
|
||||||
log.Debug().Msg("Got email from github")
|
log.Debug().Msg("Got email from github")
|
||||||
@@ -152,11 +152,11 @@ func (providers *Providers) GetUser(provider string) (string, error) {
|
|||||||
log.Debug().Msg("Got client from google")
|
log.Debug().Msg("Got client from google")
|
||||||
|
|
||||||
// Get the email from the google provider
|
// Get the email from the google provider
|
||||||
email, err := GetGoogleEmail(client)
|
email, emailErr := GetGoogleEmail(client)
|
||||||
|
|
||||||
// Check if there was an error
|
// Check if there was an error
|
||||||
if err != nil {
|
if emailErr != nil {
|
||||||
return "", err
|
return "", emailErr
|
||||||
}
|
}
|
||||||
|
|
||||||
log.Debug().Msg("Got email from google")
|
log.Debug().Msg("Got email from google")
|
||||||
@@ -176,11 +176,11 @@ func (providers *Providers) GetUser(provider string) (string, error) {
|
|||||||
log.Debug().Msg("Got client from tailscale")
|
log.Debug().Msg("Got client from tailscale")
|
||||||
|
|
||||||
// Get the email from the tailscale provider
|
// Get the email from the tailscale provider
|
||||||
email, err := GetTailscaleEmail(client)
|
email, emailErr := GetTailscaleEmail(client)
|
||||||
|
|
||||||
// Check if there was an error
|
// Check if there was an error
|
||||||
if err != nil {
|
if emailErr != nil {
|
||||||
return "", err
|
return "", emailErr
|
||||||
}
|
}
|
||||||
|
|
||||||
log.Debug().Msg("Got email from tailscale")
|
log.Debug().Msg("Got email from tailscale")
|
||||||
@@ -200,11 +200,11 @@ func (providers *Providers) GetUser(provider string) (string, error) {
|
|||||||
log.Debug().Msg("Got client from generic")
|
log.Debug().Msg("Got client from generic")
|
||||||
|
|
||||||
// Get the email from the generic provider
|
// Get the email from the generic provider
|
||||||
email, err := GetGenericEmail(client, providers.Config.GenericUserURL)
|
email, emailErr := GetGenericEmail(client, providers.Config.GenericUserURL)
|
||||||
|
|
||||||
// Check if there was an error
|
// Check if there was an error
|
||||||
if err != nil {
|
if emailErr != nil {
|
||||||
return "", err
|
return "", emailErr
|
||||||
}
|
}
|
||||||
|
|
||||||
log.Debug().Msg("Got email from generic")
|
log.Debug().Msg("Got email from generic")
|
||||||
|
|||||||
@@ -31,21 +31,21 @@ var TailscaleEndpoint = oauth2.Endpoint{
|
|||||||
|
|
||||||
func GetTailscaleEmail(client *http.Client) (string, error) {
|
func GetTailscaleEmail(client *http.Client) (string, error) {
|
||||||
// Get the user info from tailscale using the oauth http client
|
// Get the user info from tailscale using the oauth http client
|
||||||
res, err := client.Get("https://api.tailscale.com/api/v2/tailnet/-/users")
|
res, resErr := client.Get("https://api.tailscale.com/api/v2/tailnet/-/users")
|
||||||
|
|
||||||
// Check if there was an error
|
// Check if there was an error
|
||||||
if err != nil {
|
if resErr != nil {
|
||||||
return "", err
|
return "", resErr
|
||||||
}
|
}
|
||||||
|
|
||||||
log.Debug().Msg("Got response from tailscale")
|
log.Debug().Msg("Got response from tailscale")
|
||||||
|
|
||||||
// Read the body of the response
|
// Read the body of the response
|
||||||
body, err := io.ReadAll(res.Body)
|
body, bodyErr := io.ReadAll(res.Body)
|
||||||
|
|
||||||
// Check if there was an error
|
// Check if there was an error
|
||||||
if err != nil {
|
if bodyErr != nil {
|
||||||
return "", err
|
return "", bodyErr
|
||||||
}
|
}
|
||||||
|
|
||||||
log.Debug().Msg("Read body from tailscale")
|
log.Debug().Msg("Read body from tailscale")
|
||||||
@@ -54,11 +54,11 @@ func GetTailscaleEmail(client *http.Client) (string, error) {
|
|||||||
var users TailscaleUserInfoResponse
|
var users TailscaleUserInfoResponse
|
||||||
|
|
||||||
// Unmarshal the body into the user struct
|
// Unmarshal the body into the user struct
|
||||||
err = json.Unmarshal(body, &users)
|
jsonErr := json.Unmarshal(body, &users)
|
||||||
|
|
||||||
// Check if there was an error
|
// Check if there was an error
|
||||||
if err != nil {
|
if jsonErr != nil {
|
||||||
return "", err
|
return "", jsonErr
|
||||||
}
|
}
|
||||||
|
|
||||||
log.Debug().Msg("Parsed users from tailscale")
|
log.Debug().Msg("Parsed users from tailscale")
|
||||||
|
|||||||
@@ -1,59 +0,0 @@
|
|||||||
package types
|
|
||||||
|
|
||||||
// LoginQuery is the query parameters for the login endpoint
|
|
||||||
type LoginQuery struct {
|
|
||||||
RedirectURI string `url:"redirect_uri"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// LoginRequest is the request body for the login endpoint
|
|
||||||
type LoginRequest struct {
|
|
||||||
Username string `json:"username"`
|
|
||||||
Password string `json:"password"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// OAuthRequest is the request for the OAuth endpoint
|
|
||||||
type OAuthRequest struct {
|
|
||||||
Provider string `uri:"provider" binding:"required"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// UnauthorizedQuery is the query parameters for the unauthorized endpoint
|
|
||||||
type UnauthorizedQuery struct {
|
|
||||||
Username string `url:"username"`
|
|
||||||
Resource string `url:"resource"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// TailscaleQuery is the query parameters for the tailscale endpoint
|
|
||||||
type TailscaleQuery struct {
|
|
||||||
Code int `url:"code"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// Proxy is the uri parameters for the proxy endpoint
|
|
||||||
type Proxy struct {
|
|
||||||
Proxy string `uri:"proxy" binding:"required"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// User Context response is the response for the user context endpoint
|
|
||||||
type UserContextResponse struct {
|
|
||||||
Status int `json:"status"`
|
|
||||||
Message string `json:"message"`
|
|
||||||
IsLoggedIn bool `json:"isLoggedIn"`
|
|
||||||
Username string `json:"username"`
|
|
||||||
Provider string `json:"provider"`
|
|
||||||
Oauth bool `json:"oauth"`
|
|
||||||
TotpPending bool `json:"totpPending"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// App Context is the response for the app context endpoint
|
|
||||||
type AppContext struct {
|
|
||||||
Status int `json:"status"`
|
|
||||||
Message string `json:"message"`
|
|
||||||
ConfiguredProviders []string `json:"configuredProviders"`
|
|
||||||
DisableContinue bool `json:"disableContinue"`
|
|
||||||
Title string `json:"title"`
|
|
||||||
GenericName string `json:"genericName"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// Totp request is the request for the totp endpoint
|
|
||||||
type TotpRequest struct {
|
|
||||||
Code string `json:"code"`
|
|
||||||
}
|
|
||||||
@@ -1,81 +0,0 @@
|
|||||||
package types
|
|
||||||
|
|
||||||
// Config is the configuration for the tinyauth server
|
|
||||||
type Config struct {
|
|
||||||
Port int `mapstructure:"port" validate:"required"`
|
|
||||||
Address string `validate:"required,ip4_addr" mapstructure:"address"`
|
|
||||||
Secret string `validate:"required,len=32" mapstructure:"secret"`
|
|
||||||
SecretFile string `mapstructure:"secret-file"`
|
|
||||||
AppURL string `validate:"required,url" mapstructure:"app-url"`
|
|
||||||
Users string `mapstructure:"users"`
|
|
||||||
UsersFile string `mapstructure:"users-file"`
|
|
||||||
CookieSecure bool `mapstructure:"cookie-secure"`
|
|
||||||
GithubClientId string `mapstructure:"github-client-id"`
|
|
||||||
GithubClientSecret string `mapstructure:"github-client-secret"`
|
|
||||||
GithubClientSecretFile string `mapstructure:"github-client-secret-file"`
|
|
||||||
GoogleClientId string `mapstructure:"google-client-id"`
|
|
||||||
GoogleClientSecret string `mapstructure:"google-client-secret"`
|
|
||||||
GoogleClientSecretFile string `mapstructure:"google-client-secret-file"`
|
|
||||||
TailscaleClientId string `mapstructure:"tailscale-client-id"`
|
|
||||||
TailscaleClientSecret string `mapstructure:"tailscale-client-secret"`
|
|
||||||
TailscaleClientSecretFile string `mapstructure:"tailscale-client-secret-file"`
|
|
||||||
GenericClientId string `mapstructure:"generic-client-id"`
|
|
||||||
GenericClientSecret string `mapstructure:"generic-client-secret"`
|
|
||||||
GenericClientSecretFile string `mapstructure:"generic-client-secret-file"`
|
|
||||||
GenericScopes string `mapstructure:"generic-scopes"`
|
|
||||||
GenericAuthURL string `mapstructure:"generic-auth-url"`
|
|
||||||
GenericTokenURL string `mapstructure:"generic-token-url"`
|
|
||||||
GenericUserURL string `mapstructure:"generic-user-url"`
|
|
||||||
GenericName string `mapstructure:"generic-name"`
|
|
||||||
DisableContinue bool `mapstructure:"disable-continue"`
|
|
||||||
OAuthWhitelist string `mapstructure:"oauth-whitelist"`
|
|
||||||
SessionExpiry int `mapstructure:"session-expiry"`
|
|
||||||
LogLevel int8 `mapstructure:"log-level" validate:"min=-1,max=5"`
|
|
||||||
Title string `mapstructure:"app-title"`
|
|
||||||
EnvFile string `mapstructure:"env-file"`
|
|
||||||
LoginTimeout int `mapstructure:"login-timeout"`
|
|
||||||
LoginMaxRetries int `mapstructure:"login-max-retries"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// Server configuration
|
|
||||||
type HandlersConfig struct {
|
|
||||||
AppURL string
|
|
||||||
DisableContinue bool
|
|
||||||
GenericName string
|
|
||||||
Title string
|
|
||||||
}
|
|
||||||
|
|
||||||
// OAuthConfig is the configuration for the providers
|
|
||||||
type OAuthConfig struct {
|
|
||||||
GithubClientId string
|
|
||||||
GithubClientSecret string
|
|
||||||
GoogleClientId string
|
|
||||||
GoogleClientSecret string
|
|
||||||
TailscaleClientId string
|
|
||||||
TailscaleClientSecret string
|
|
||||||
GenericClientId string
|
|
||||||
GenericClientSecret string
|
|
||||||
GenericScopes []string
|
|
||||||
GenericAuthURL string
|
|
||||||
GenericTokenURL string
|
|
||||||
GenericUserURL string
|
|
||||||
AppURL string
|
|
||||||
}
|
|
||||||
|
|
||||||
// APIConfig is the configuration for the API
|
|
||||||
type APIConfig struct {
|
|
||||||
Port int
|
|
||||||
Address string
|
|
||||||
}
|
|
||||||
|
|
||||||
// AuthConfig is the configuration for the auth service
|
|
||||||
type AuthConfig struct {
|
|
||||||
Users Users
|
|
||||||
OauthWhitelist []string
|
|
||||||
SessionExpiry int
|
|
||||||
Secret string
|
|
||||||
CookieSecure bool
|
|
||||||
Domain string
|
|
||||||
LoginTimeout int
|
|
||||||
LoginMaxRetries int
|
|
||||||
}
|
|
||||||
@@ -1,9 +1,17 @@
|
|||||||
package types
|
package types
|
||||||
|
|
||||||
import (
|
import "tinyauth/internal/oauth"
|
||||||
"time"
|
|
||||||
"tinyauth/internal/oauth"
|
// LoginQuery is the query parameters for the login endpoint
|
||||||
)
|
type LoginQuery struct {
|
||||||
|
RedirectURI string `url:"redirect_uri"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// LoginRequest is the request body for the login endpoint
|
||||||
|
type LoginRequest struct {
|
||||||
|
Username string `json:"username"`
|
||||||
|
Password string `json:"password"`
|
||||||
|
}
|
||||||
|
|
||||||
// User is the struct for a user
|
// User is the struct for a user
|
||||||
type User struct {
|
type User struct {
|
||||||
@@ -15,27 +23,38 @@ type User struct {
|
|||||||
// Users is a list of users
|
// Users is a list of users
|
||||||
type Users []User
|
type Users []User
|
||||||
|
|
||||||
// OAuthProviders is the struct for the OAuth providers
|
// Config is the configuration for the tinyauth server
|
||||||
type OAuthProviders struct {
|
type Config struct {
|
||||||
Github *oauth.OAuth
|
Port int `mapstructure:"port" validate:"required"`
|
||||||
Google *oauth.OAuth
|
Address string `validate:"required,ip4_addr" mapstructure:"address"`
|
||||||
Microsoft *oauth.OAuth
|
Secret string `validate:"required,len=32" mapstructure:"secret"`
|
||||||
}
|
SecretFile string `mapstructure:"secret-file"`
|
||||||
|
AppURL string `validate:"required,url" mapstructure:"app-url"`
|
||||||
// SessionCookie is the cookie for the session (exculding the expiry)
|
Users string `mapstructure:"users"`
|
||||||
type SessionCookie struct {
|
UsersFile string `mapstructure:"users-file"`
|
||||||
Username string
|
CookieSecure bool `mapstructure:"cookie-secure"`
|
||||||
Provider string
|
GithubClientId string `mapstructure:"github-client-id"`
|
||||||
TotpPending bool
|
GithubClientSecret string `mapstructure:"github-client-secret"`
|
||||||
RedirectURI string
|
GithubClientSecretFile string `mapstructure:"github-client-secret-file"`
|
||||||
}
|
GoogleClientId string `mapstructure:"google-client-id"`
|
||||||
|
GoogleClientSecret string `mapstructure:"google-client-secret"`
|
||||||
// TinyauthLabels is the labels for the tinyauth container
|
GoogleClientSecretFile string `mapstructure:"google-client-secret-file"`
|
||||||
type TinyauthLabels struct {
|
TailscaleClientId string `mapstructure:"tailscale-client-id"`
|
||||||
OAuthWhitelist []string
|
TailscaleClientSecret string `mapstructure:"tailscale-client-secret"`
|
||||||
Users []string
|
TailscaleClientSecretFile string `mapstructure:"tailscale-client-secret-file"`
|
||||||
Allowed string
|
GenericClientId string `mapstructure:"generic-client-id"`
|
||||||
Headers map[string]string
|
GenericClientSecret string `mapstructure:"generic-client-secret"`
|
||||||
|
GenericClientSecretFile string `mapstructure:"generic-client-secret-file"`
|
||||||
|
GenericScopes string `mapstructure:"generic-scopes"`
|
||||||
|
GenericAuthURL string `mapstructure:"generic-auth-url"`
|
||||||
|
GenericTokenURL string `mapstructure:"generic-token-url"`
|
||||||
|
GenericUserURL string `mapstructure:"generic-user-url"`
|
||||||
|
GenericName string `mapstructure:"generic-name"`
|
||||||
|
DisableContinue bool `mapstructure:"disable-continue"`
|
||||||
|
OAuthWhitelist string `mapstructure:"oauth-whitelist"`
|
||||||
|
SessionExpiry int `mapstructure:"session-expiry"`
|
||||||
|
LogLevel int8 `mapstructure:"log-level" validate:"min=-1,max=5"`
|
||||||
|
Title string `mapstructure:"app-title"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// UserContext is the context for the user
|
// UserContext is the context for the user
|
||||||
@@ -47,9 +66,94 @@ type UserContext struct {
|
|||||||
TotpPending bool
|
TotpPending bool
|
||||||
}
|
}
|
||||||
|
|
||||||
// LoginAttempt tracks information about login attempts for rate limiting
|
// APIConfig is the configuration for the API
|
||||||
type LoginAttempt struct {
|
type APIConfig struct {
|
||||||
FailedAttempts int
|
Port int
|
||||||
LastAttempt time.Time
|
Address string
|
||||||
LockedUntil time.Time
|
Secret string
|
||||||
|
AppURL string
|
||||||
|
CookieSecure bool
|
||||||
|
SessionExpiry int
|
||||||
|
DisableContinue bool
|
||||||
|
GenericName string
|
||||||
|
Title string
|
||||||
|
}
|
||||||
|
|
||||||
|
// OAuthConfig is the configuration for the providers
|
||||||
|
type OAuthConfig struct {
|
||||||
|
GithubClientId string
|
||||||
|
GithubClientSecret string
|
||||||
|
GoogleClientId string
|
||||||
|
GoogleClientSecret string
|
||||||
|
TailscaleClientId string
|
||||||
|
TailscaleClientSecret string
|
||||||
|
GenericClientId string
|
||||||
|
GenericClientSecret string
|
||||||
|
GenericScopes []string
|
||||||
|
GenericAuthURL string
|
||||||
|
GenericTokenURL string
|
||||||
|
GenericUserURL string
|
||||||
|
AppURL string
|
||||||
|
}
|
||||||
|
|
||||||
|
// OAuthRequest is the request for the OAuth endpoint
|
||||||
|
type OAuthRequest struct {
|
||||||
|
Provider string `uri:"provider" binding:"required"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// OAuthProviders is the struct for the OAuth providers
|
||||||
|
type OAuthProviders struct {
|
||||||
|
Github *oauth.OAuth
|
||||||
|
Google *oauth.OAuth
|
||||||
|
Microsoft *oauth.OAuth
|
||||||
|
}
|
||||||
|
|
||||||
|
// UnauthorizedQuery is the query parameters for the unauthorized endpoint
|
||||||
|
type UnauthorizedQuery struct {
|
||||||
|
Username string `url:"username"`
|
||||||
|
Resource string `url:"resource"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// SessionCookie is the cookie for the session (exculding the expiry)
|
||||||
|
type SessionCookie struct {
|
||||||
|
Username string
|
||||||
|
Provider string
|
||||||
|
TotpPending bool
|
||||||
|
}
|
||||||
|
|
||||||
|
// TinyauthLabels is the labels for the tinyauth container
|
||||||
|
type TinyauthLabels struct {
|
||||||
|
OAuthWhitelist []string
|
||||||
|
Users []string
|
||||||
|
Allowed string
|
||||||
|
}
|
||||||
|
|
||||||
|
// TailscaleQuery is the query parameters for the tailscale endpoint
|
||||||
|
type TailscaleQuery struct {
|
||||||
|
Code int `url:"code"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// Proxy is the uri parameters for the proxy endpoint
|
||||||
|
type Proxy struct {
|
||||||
|
Proxy string `uri:"proxy" binding:"required"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// Status response
|
||||||
|
type Status struct {
|
||||||
|
Status int `json:"status"`
|
||||||
|
Message string `json:"message"`
|
||||||
|
IsLoggedIn bool `json:"isLoggedIn"`
|
||||||
|
Username string `json:"username"`
|
||||||
|
Provider string `json:"provider"`
|
||||||
|
Oauth bool `json:"oauth"`
|
||||||
|
ConfiguredProviders []string `json:"configuredProviders"`
|
||||||
|
DisableContinue bool `json:"disableContinue"`
|
||||||
|
Title string `json:"title"`
|
||||||
|
GenericName string `json:"genericName"`
|
||||||
|
TotpPending bool `json:"totpPending"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// Totp request
|
||||||
|
type Totp struct {
|
||||||
|
Code string `json:"code"`
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -29,11 +29,11 @@ func ParseUsers(users string) (types.Users, error) {
|
|||||||
|
|
||||||
// Loop through the users and split them by colon
|
// Loop through the users and split them by colon
|
||||||
for _, user := range userList {
|
for _, user := range userList {
|
||||||
parsed, err := ParseUser(user)
|
parsed, parseErr := ParseUser(user)
|
||||||
|
|
||||||
// Check if there was an error
|
// Check if there was an error
|
||||||
if err != nil {
|
if parseErr != nil {
|
||||||
return types.Users{}, err
|
return types.Users{}, parseErr
|
||||||
}
|
}
|
||||||
|
|
||||||
// Append the user to the users struct
|
// Append the user to the users struct
|
||||||
@@ -46,14 +46,14 @@ func ParseUsers(users string) (types.Users, error) {
|
|||||||
return usersParsed, nil
|
return usersParsed, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// Get upper domain parses a hostname and returns the upper domain (e.g. sub1.sub2.domain.com -> sub2.domain.com)
|
// Root url parses parses a hostname and returns the root domain (e.g. sub1.sub2.domain.com -> sub2.domain.com)
|
||||||
func GetUpperDomain(urlSrc string) (string, error) {
|
func GetRootURL(urlSrc string) (string, error) {
|
||||||
// Make sure the url is valid
|
// Make sure the url is valid
|
||||||
urlParsed, err := url.Parse(urlSrc)
|
urlParsed, parseErr := url.Parse(urlSrc)
|
||||||
|
|
||||||
// Check if there was an error
|
// Check if there was an error
|
||||||
if err != nil {
|
if parseErr != nil {
|
||||||
return "", err
|
return "", parseErr
|
||||||
}
|
}
|
||||||
|
|
||||||
// Split the hostname by period
|
// Split the hostname by period
|
||||||
@@ -69,19 +69,19 @@ func GetUpperDomain(urlSrc string) (string, error) {
|
|||||||
// Reads a file and returns the contents
|
// Reads a file and returns the contents
|
||||||
func ReadFile(file string) (string, error) {
|
func ReadFile(file string) (string, error) {
|
||||||
// Check if the file exists
|
// Check if the file exists
|
||||||
_, err := os.Stat(file)
|
_, statErr := os.Stat(file)
|
||||||
|
|
||||||
// Check if there was an error
|
// Check if there was an error
|
||||||
if err != nil {
|
if statErr != nil {
|
||||||
return "", err
|
return "", statErr
|
||||||
}
|
}
|
||||||
|
|
||||||
// Read the file
|
// Read the file
|
||||||
data, err := os.ReadFile(file)
|
data, readErr := os.ReadFile(file)
|
||||||
|
|
||||||
// Check if there was an error
|
// Check if there was an error
|
||||||
if err != nil {
|
if readErr != nil {
|
||||||
return "", err
|
return "", readErr
|
||||||
}
|
}
|
||||||
|
|
||||||
// Return the file contents
|
// Return the file contents
|
||||||
@@ -152,10 +152,10 @@ func GetUsers(conf string, file string) (types.Users, error) {
|
|||||||
// If the file is set, read the file and append the users to the users string
|
// If the file is set, read the file and append the users to the users string
|
||||||
if file != "" {
|
if file != "" {
|
||||||
// Read the file
|
// Read the file
|
||||||
contents, err := ReadFile(file)
|
fileContents, fileErr := ReadFile(file)
|
||||||
|
|
||||||
// If there isn't an error we can append the users to the users string
|
// If there isn't an error we can append the users to the users string
|
||||||
if err == nil {
|
if fileErr == nil {
|
||||||
log.Debug().Msg("Using users from file")
|
log.Debug().Msg("Using users from file")
|
||||||
|
|
||||||
// Append the users to the users string
|
// Append the users to the users string
|
||||||
@@ -164,7 +164,7 @@ func GetUsers(conf string, file string) (types.Users, error) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Parse the file contents into a comma separated list of users
|
// Parse the file contents into a comma separated list of users
|
||||||
users += ParseFileToLine(contents)
|
users += ParseFileToLine(fileContents)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -193,16 +193,6 @@ func GetTinyauthLabels(labels map[string]string) types.TinyauthLabels {
|
|||||||
tinyauthLabels.Users = strings.Split(value, ",")
|
tinyauthLabels.Users = strings.Split(value, ",")
|
||||||
case "tinyauth.allowed":
|
case "tinyauth.allowed":
|
||||||
tinyauthLabels.Allowed = value
|
tinyauthLabels.Allowed = value
|
||||||
case "tinyauth.headers":
|
|
||||||
tinyauthLabels.Headers = make(map[string]string)
|
|
||||||
headers := strings.Split(value, ",")
|
|
||||||
for _, header := range headers {
|
|
||||||
headerSplit := strings.Split(header, "=")
|
|
||||||
if len(headerSplit) != 2 {
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
tinyauthLabels.Headers[headerSplit[0]] = headerSplit[1]
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -38,15 +38,15 @@ func TestParseUsers(t *testing.T) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// Test the get upper domain function
|
// Test the get root url function
|
||||||
func TestGetUpperDomain(t *testing.T) {
|
func TestGetRootURL(t *testing.T) {
|
||||||
t.Log("Testing get upper domain with a valid url")
|
t.Log("Testing get root url with a valid url")
|
||||||
|
|
||||||
// Test the get upper domain function with a valid url
|
// Test the get root url function with a valid url
|
||||||
url := "https://sub1.sub2.domain.com:8080"
|
url := "https://sub1.sub2.domain.com:8080"
|
||||||
expected := "sub2.domain.com"
|
expected := "sub2.domain.com"
|
||||||
|
|
||||||
result, err := utils.GetUpperDomain(url)
|
result, err := utils.GetRootURL(url)
|
||||||
|
|
||||||
// Check if there was an error
|
// Check if there was an error
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@@ -102,7 +102,7 @@ func TestParseFileToLine(t *testing.T) {
|
|||||||
t.Log("Testing parse file to line with a valid string")
|
t.Log("Testing parse file to line with a valid string")
|
||||||
|
|
||||||
// Test the parse file to line function with a valid string
|
// Test the parse file to line function with a valid string
|
||||||
content := "\nuser1:pass1\nuser2:pass2\n"
|
content := "user1:pass1\nuser2:pass2"
|
||||||
expected := "user1:pass1,user2:pass2"
|
expected := "user1:pass1,user2:pass2"
|
||||||
|
|
||||||
result := utils.ParseFileToLine(content)
|
result := utils.ParseFileToLine(content)
|
||||||
|
|||||||
0
frontend/.gitignore → site/.gitignore
vendored
BIN
site/bun.lockb
Executable file
@@ -6,7 +6,7 @@
|
|||||||
<link rel="apple-touch-icon" sizes="180x180" href="/apple-touch-icon.png" />
|
<link rel="apple-touch-icon" sizes="180x180" href="/apple-touch-icon.png" />
|
||||||
<link rel="icon" type="image/png" sizes="32x32" href="/favicon-32x32.png" />
|
<link rel="icon" type="image/png" sizes="32x32" href="/favicon-32x32.png" />
|
||||||
<link rel="icon" type="image/png" sizes="16x16" href="/favicon-16x16.png" />
|
<link rel="icon" type="image/png" sizes="16x16" href="/favicon-16x16.png" />
|
||||||
<link rel="manifest" href="/frontend.webmanifest" />
|
<link rel="manifest" href="/site.webmanifest" />
|
||||||
<title>Tinyauth</title>
|
<title>Tinyauth</title>
|
||||||
</head>
|
</head>
|
||||||
<body>
|
<body>
|
||||||
@@ -1,11 +1,11 @@
|
|||||||
{
|
{
|
||||||
"name": "frontend",
|
"name": "site",
|
||||||
"version": "0.0.0",
|
"version": "0.0.0",
|
||||||
"lockfileVersion": 3,
|
"lockfileVersion": 3,
|
||||||
"requires": true,
|
"requires": true,
|
||||||
"packages": {
|
"packages": {
|
||||||
"": {
|
"": {
|
||||||
"name": "frontend",
|
"name": "site",
|
||||||
"version": "0.0.0",
|
"version": "0.0.0",
|
||||||
"dependencies": {
|
"dependencies": {
|
||||||
"@mantine/core": "^7.16.0",
|
"@mantine/core": "^7.16.0",
|
||||||
@@ -2246,4 +2246,4 @@
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -1,5 +1,5 @@
|
|||||||
{
|
{
|
||||||
"name": "frontend",
|
"name": "site",
|
||||||
"private": true,
|
"private": true,
|
||||||
"version": "0.0.0",
|
"version": "0.0.0",
|
||||||
"type": "module",
|
"type": "module",
|
||||||
@@ -16,14 +16,8 @@
|
|||||||
"@mantine/notifications": "^7.16.0",
|
"@mantine/notifications": "^7.16.0",
|
||||||
"@tanstack/react-query": "4",
|
"@tanstack/react-query": "4",
|
||||||
"axios": "^1.7.9",
|
"axios": "^1.7.9",
|
||||||
"i18next": "^24.2.3",
|
|
||||||
"i18next-browser-languagedetector": "^8.0.4",
|
|
||||||
"i18next-chained-backend": "^4.6.2",
|
|
||||||
"i18next-http-backend": "^3.0.2",
|
|
||||||
"i18next-resources-to-backend": "^1.2.1",
|
|
||||||
"react": "^18.3.1",
|
"react": "^18.3.1",
|
||||||
"react-dom": "^18.3.1",
|
"react-dom": "^18.3.1",
|
||||||
"react-i18next": "^15.4.1",
|
|
||||||
"react-router": "^7.1.3",
|
"react-router": "^7.1.3",
|
||||||
"zod": "^3.24.1"
|
"zod": "^3.24.1"
|
||||||
},
|
},
|
||||||
@@ -44,4 +38,4 @@
|
|||||||
"typescript-eslint": "^8.18.2",
|
"typescript-eslint": "^8.18.2",
|
||||||
"vite": "^6.0.5"
|
"vite": "^6.0.5"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
Before Width: | Height: | Size: 15 KiB After Width: | Height: | Size: 15 KiB |
|
Before Width: | Height: | Size: 46 KiB After Width: | Height: | Size: 46 KiB |
|
Before Width: | Height: | Size: 13 KiB After Width: | Height: | Size: 13 KiB |
|
Before Width: | Height: | Size: 602 B After Width: | Height: | Size: 602 B |
|
Before Width: | Height: | Size: 1.4 KiB After Width: | Height: | Size: 1.4 KiB |
|
Before Width: | Height: | Size: 15 KiB After Width: | Height: | Size: 15 KiB |