* feat(lists): integrate Omegabrr
* feat(lists): add missing lists index
* feat(lists): add db repo
* feat(lists): add db migrations
* feat(lists): labels
* feat(lists): url lists and more arrs
* fix(lists): db migrations client_id wrong type
* fix(lists): db fields
* feat(lists): create list form wip
* feat(lists): show in list and create
* feat(lists): update and delete
* feat(lists): trigger via webhook
* feat(lists): add webhook handler
* fix(arr): encode json to pointer
* feat(lists): rename endpoint to lists
* feat(lists): fetch tags from arr
* feat(lists): process plaintext lists
* feat(lists): add background refresh job
* run every 6th hour with a random start delay between 1-35 seconds
* feat(lists): refresh on save and improve logging
* feat(lists): cast arr client to pointer
* feat(lists): improve error handling
* feat(lists): reset shows field with match release
* feat(lists): filter opts all lists
* feat(lists): trigger on update if enabled
* feat(lists): update option for lists
* feat(lists): show connected filters in list
* feat(lists): missing listSvc dep
* feat(lists): cleanup
* feat(lists): typo arr list
* feat(lists): radarr include original
* feat(lists): rename ExcludeAlternateTitle to IncludeAlternateTitle
* fix(lists): arr client type conversion to pointer
* fix(actions): only log panic recover if err not nil
* feat(lists): show spinner on save
* feat(lists): show icon in filters list
* feat(lists): change icon color in filters list
* feat(lists): delete relations on filter delete
* feat(auth): implement oidc
* refactor(auth): centralize OIDC state cookie handling
* fix(web): resolve unused error variables in route handlers
* docs(readme): add OIDC authentication feature to list
* fix(auth): improve OIDC cookie handling for reverse proxy setups
The OIDC state cookie's Secure flag is now properly set when running behind a reverse proxy by checking both direct TLS and X-Forwarded-Proto header. This fixes authentication issues in common setups where:
- autobrr runs behind a reverse proxy that terminates HTTPS
- local development environments without TLS
- mixed protocol environments (internal HTTP, external HTTPS)
* fix: use crypt/random if argon2id fails
* feat(auth): show both login options when user exists in db
if user doesn't exist, e.g. canOnboard=true then we only show the OIDC button, since regular login makes no sense in that case
If user does not exist in db and the user wants to create a local user, OIDC needs to be disabled first
* feat(auth): improve OIDC provider initialization with discovery logging
* revert(issuer): do not remove trailing slash
* feat(auth): improve OIDC username resolution with additional claims
* fix(auth): handle OIDC issuer URLs with and without trailing slashes
When initializing the OIDC provider, automatically retry with/without trailing
slash if the first attempt fails.
- First attempts with original issuer URL
- If fails with trailing slash, retries without
- If fails without trailing slash, retries with
* feat(oidc): add gorilla sessions store for secure state management
Add gorilla sessions store to handle encrypted state cookies in OIDC flow,
while removing redundant session validation checks
Co-authored-by: Kyle Sanderson <kyle.leet@gmail.com>
* fix(auth): prevent duplicate OIDC state cookies for authenticated sessions
Modify OIDC config handler to check for existing authenticated sessions
before setting state cookie. Still returns OIDC enabled status to maintain
UI state, but prevents unnecessary cookie creation for authenticated users.
* feat(oidc): use random secret for temporary state cookies
Co-authored-by: Kyle Sanderson <kyle.leet@gmail.com>
* feat(auth): add rate limiting to OIDC endpoints
Co-authored-by: Kyle Sanderson <kyle.leet@gmail.com>
* fix(auth): validate OIDC authorization code presence in callback
Co-authored-by: Kyle Sanderson <kyle.leet@gmail.com>
* fix(auth): properly handle OIDC session errors
Improve error handling in OIDC login flow by properly handling cookie store
session errors. Return HTTP 500 if session cannot be retrieved instead of
silently continuing with potentially invalid state.
Co-authored-by: Kyle Sanderson <kyle.leet@gmail.com>
* feat(auth): track and display authentication method for oidc and password logins
* fix: tests
* docs(readme): add environment variable section
* go mod tidy
* chore: log style and errors
---------
Co-authored-by: Kyle Sanderson <kyle.leet@gmail.com>
Co-authored-by: ze0s <ze0s@riseup.net>
* refactor: remove baseUrl from api calls and sseBaseUrl
* refactor: set cookie session to '/'.
Since that's where the api endpoint is that way we set it to the root domain, we can't set it to the subfolder since the api is called directly now and not using the baseUrl.
* feat: add the baseUrl route.
When user for example is in `/autobrr` and hit reload it should just return the index.html.
* refactor: now it have to be `/autobrr`
Remove the trailing `/`, now base url is set to /autobrr aligned with other arrs.
* refactor: remove baseUrl stuff.
* refactor: use separate router for the api endpoint and the baseUrl.
I don't think we need separate router, but I didn't test it, so feel free to test it and see if it works without the separate router, the whole point was to make sure that it's not prefixed with baseUrl and I noticed that it was being called in the frontend `APIClients.ts`. So yea just check if it works without it then keep the old one.
Also removed the index since it was zombie code not being used anywhere.
* feat: Dynamic base url.
* fix: auth handler deps
* feat(http): mount web and api on baseurl
* feat(http): web api client routes
* feat(http): baseurl legacy mode
* feat(http): baseurl legacy mode test
* feat(http): add assetBaseUrl
* feat(http): try separate web handlers
* feat(http): improve file serving
* feat(http): ignore .gitkeep
* fix(assets): windows paths
* fix(assets): windows paths trimprefix
* fix(assets): windows paths join
* fix(assets): cleanup
* fix(assets): additional web route check
* feat(http): add comments
---------
Co-authored-by: ze0s <ze0s@riseup.net>
* feat(docs): add indexer docs update script
Add Python script to automatically update indexer documentation from YAML definitions.
- Creates a markdown table of supported indexers with feature support
- Sorts indexers alphabetically with generics at the end
- Includes support status for IRC and RSS features
- Outputs documentation to autobrr.com/snippets/indexers.mdx
* fix: use existing PAT
* fix: use correct token
* feat(docs): add freeleech support documentation
* feat(indexers): update SeedPool IRC port
* feat(indexers): SeedPool add db migration
* fix(indexers): adapt regex, tests and vars
* fix(indexers): set internal var to origin to fix parsing
---------
Co-authored-by: martylukyy <35452459+martylukyy@users.noreply.github.com>
* feat(database): SQLite database backups
* feat(database): do not produce SQL injections
* feat(database): retain all backups if 0 or less
refactor(database): specify database driver in func names
* refactor(database): return early on cleanup
* refactor(database): do not call cleanup func if max backups set to 0
* refactor(database): backup retention behavior
* feat(database): improve logging
---------
Co-authored-by: ze0s <43699394+zze0s@users.noreply.github.com>
* feat(indexers): update FearNoPeer IRC server
* Update FNP irc server and add migrations for SceneHD and BitHUmen changes all in one.
The update for FNP from LibraIRC to P2P-Network will set the nick to nick_0 to not cause any UNIQUE constraint issues. Users will have to update or merge with existing P2P-Network config.