Compare commits
10 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
9a194a9fd7 | ||
| fccd94cc11 | |||
|
|
27da1327c1 | ||
| 82a9706deb | |||
|
|
6479f68b6c | ||
| 4f52c1a0f3 | |||
|
|
3787e0f3ed | ||
| 45dec00b86 | |||
|
|
fbb3f48b6d | ||
| e32f4eb8ff |
25
CHANGELOG.md
25
CHANGELOG.md
@@ -388,3 +388,28 @@
|
|||||||
### Features
|
### Features
|
||||||
|
|
||||||
* Add logging for user management operations in HibernateUserManager ([9ca1813](https://git.janis-eccarius.de/KnockOutWhist/KnockOutWhist-Web/commit/9ca1813f06539cffeb573d0e00571e4f2d5144f1))
|
* Add logging for user management operations in HibernateUserManager ([9ca1813](https://git.janis-eccarius.de/KnockOutWhist/KnockOutWhist-Web/commit/9ca1813f06539cffeb573d0e00571e4f2d5144f1))
|
||||||
|
## (2026-01-20)
|
||||||
|
|
||||||
|
### Features
|
||||||
|
|
||||||
|
* Integrate UserManager and HibernateUserManager in session management ([e32f4eb](https://git.janis-eccarius.de/KnockOutWhist/KnockOutWhist-Web/commit/e32f4eb8fff9daec46f20284e28e94a59231d033))
|
||||||
|
## (2026-01-20)
|
||||||
|
|
||||||
|
### Features
|
||||||
|
|
||||||
|
* Implement transaction management for user addition and removal in HibernateUserManager ([45dec00](https://git.janis-eccarius.de/KnockOutWhist/KnockOutWhist-Web/commit/45dec00b86a1395457226ed62ac319c61e38739a))
|
||||||
|
## (2026-01-20)
|
||||||
|
|
||||||
|
### Features
|
||||||
|
|
||||||
|
* Add mainRoute configuration for OpenID in application and environment files ([4f52c1a](https://git.janis-eccarius.de/KnockOutWhist/KnockOutWhist-Web/commit/4f52c1a0f30cf0b917452149a52b53b94d82a7c9))
|
||||||
|
## (2026-01-20)
|
||||||
|
|
||||||
|
### Features
|
||||||
|
|
||||||
|
* Simplify authorization request creation in OpenIDConnectService and use environment variables for Keycloak configuration ([82a9706](https://git.janis-eccarius.de/KnockOutWhist/KnockOutWhist-Web/commit/82a9706deb97db193015e55a048830d496e76d83))
|
||||||
|
## (2026-01-20)
|
||||||
|
|
||||||
|
### Features
|
||||||
|
|
||||||
|
* Use environment variables for Keycloak client configuration in staging ([fccd94c](https://git.janis-eccarius.de/KnockOutWhist/KnockOutWhist-Web/commit/fccd94cc11db43f99eded13207cc93fb59d8703e))
|
||||||
|
|||||||
Submodule knockoutwhistfrontend updated: c2dfa0e701...cd950e9521
@@ -58,17 +58,33 @@ class OpenIDController @Inject()(
|
|||||||
} yield {
|
} yield {
|
||||||
openIDService.exchangeCodeForTokens(provider, authCode, sessionState.get).flatMap {
|
openIDService.exchangeCodeForTokens(provider, authCode, sessionState.get).flatMap {
|
||||||
case Some(tokenResponse) =>
|
case Some(tokenResponse) =>
|
||||||
openIDService.getUserInfo(provider, tokenResponse.accessToken).map {
|
openIDService.getUserInfo(provider, tokenResponse.accessToken).flatMap {
|
||||||
case Some(userInfo) =>
|
case Some(userInfo) =>
|
||||||
// Store user info in session for username selection
|
// Check if user already exists
|
||||||
Redirect(config.get[String]("openid.selectUserRoute"))
|
userManager.authenticateOpenID(provider, userInfo.id) match {
|
||||||
.withSession(
|
case Some(user) =>
|
||||||
"oauth_user_info" -> Json.toJson(userInfo).toString(),
|
// User already exists, log them in
|
||||||
"oauth_provider" -> provider,
|
val sessionToken = sessionManager.createSession(user)
|
||||||
"oauth_access_token" -> tokenResponse.accessToken
|
Future.successful(Redirect(config.getOptional[String]("openid.mainRoute").getOrElse("/"))
|
||||||
)
|
.withCookies(Cookie(
|
||||||
|
name = "accessToken",
|
||||||
|
value = sessionToken,
|
||||||
|
httpOnly = true,
|
||||||
|
secure = false,
|
||||||
|
sameSite = Some(Lax)
|
||||||
|
))
|
||||||
|
.removingFromSession("oauth_state", "oauth_nonce", "oauth_provider", "oauth_access_token"))
|
||||||
|
case None =>
|
||||||
|
// New user, redirect to username selection
|
||||||
|
Future.successful(Redirect(config.get[String]("openid.selectUserRoute"))
|
||||||
|
.withSession(
|
||||||
|
"oauth_user_info" -> Json.toJson(userInfo).toString(),
|
||||||
|
"oauth_provider" -> provider,
|
||||||
|
"oauth_access_token" -> tokenResponse.accessToken
|
||||||
|
))
|
||||||
|
}
|
||||||
case None =>
|
case None =>
|
||||||
Redirect("/login").flashing("error" -> "Failed to retrieve user information")
|
Future.successful(Redirect("/login").flashing("error" -> "Failed to retrieve user information"))
|
||||||
}
|
}
|
||||||
case None =>
|
case None =>
|
||||||
Future.successful(Redirect("/login").flashing("error" -> "Failed to exchange authorization code"))
|
Future.successful(Redirect("/login").flashing("error" -> "Failed to exchange authorization code"))
|
||||||
|
|||||||
@@ -1,25 +0,0 @@
|
|||||||
package di
|
|
||||||
|
|
||||||
import com.google.inject.AbstractModule
|
|
||||||
import com.google.inject.name.Names
|
|
||||||
import logic.user.impl.HibernateUserManager
|
|
||||||
import play.api.db.DBApi
|
|
||||||
import play.api.{Configuration, Environment}
|
|
||||||
|
|
||||||
class ProductionModule(
|
|
||||||
environment: Environment,
|
|
||||||
configuration: Configuration
|
|
||||||
) extends AbstractModule {
|
|
||||||
|
|
||||||
override def configure(): Unit = {
|
|
||||||
// Bind HibernateUserManager for production
|
|
||||||
bind(classOf[logic.user.UserManager])
|
|
||||||
.to(classOf[logic.user.impl.HibernateUserManager])
|
|
||||||
.asEagerSingleton()
|
|
||||||
|
|
||||||
// Bind EntityManager for JPA
|
|
||||||
bind(classOf[jakarta.persistence.EntityManager])
|
|
||||||
.toProvider(classOf[EntityManagerProvider])
|
|
||||||
.asEagerSingleton()
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@@ -4,7 +4,7 @@ import com.auth0.jwt.algorithms.Algorithm
|
|||||||
import com.auth0.jwt.{JWT, JWTVerifier}
|
import com.auth0.jwt.{JWT, JWTVerifier}
|
||||||
import com.github.benmanes.caffeine.cache.{Cache, Caffeine}
|
import com.github.benmanes.caffeine.cache.{Cache, Caffeine}
|
||||||
import com.typesafe.config.Config
|
import com.typesafe.config.Config
|
||||||
import logic.user.SessionManager
|
import logic.user.{SessionManager, UserManager}
|
||||||
import model.users.User
|
import model.users.User
|
||||||
import scalafx.util.Duration
|
import scalafx.util.Duration
|
||||||
import services.JwtKeyProvider
|
import services.JwtKeyProvider
|
||||||
@@ -16,7 +16,7 @@ import javax.inject.{Inject, Singleton}
|
|||||||
import scala.util.Try
|
import scala.util.Try
|
||||||
|
|
||||||
@Singleton
|
@Singleton
|
||||||
class BaseSessionManager @Inject()(val keyProvider: JwtKeyProvider, val userManager: StubUserManager, val config: Config) extends SessionManager {
|
class BaseSessionManager @Inject()(val keyProvider: JwtKeyProvider, val userManager: UserManager, val config: Config) extends SessionManager {
|
||||||
|
|
||||||
private val algorithm = Algorithm.RSA512(keyProvider.publicKey, keyProvider.privateKey)
|
private val algorithm = Algorithm.RSA512(keyProvider.publicKey, keyProvider.privateKey)
|
||||||
private val verifier: JWTVerifier = JWT.require(algorithm)
|
private val verifier: JWTVerifier = JWT.require(algorithm)
|
||||||
|
|||||||
@@ -18,7 +18,9 @@ class HibernateUserManager @Inject()(em: EntityManager, config: Config) extends
|
|||||||
private val logger = Logger(getClass.getName)
|
private val logger = Logger(getClass.getName)
|
||||||
|
|
||||||
override def addUser(name: String, password: String): Boolean = {
|
override def addUser(name: String, password: String): Boolean = {
|
||||||
|
val tx = em.getTransaction
|
||||||
try {
|
try {
|
||||||
|
tx.begin()
|
||||||
// Check if user already exists
|
// Check if user already exists
|
||||||
val existing = em.createQuery("SELECT u FROM UserEntity u WHERE u.username = :username", classOf[UserEntity])
|
val existing = em.createQuery("SELECT u FROM UserEntity u WHERE u.username = :username", classOf[UserEntity])
|
||||||
.setParameter("username", name)
|
.setParameter("username", name)
|
||||||
@@ -26,6 +28,7 @@ class HibernateUserManager @Inject()(em: EntityManager, config: Config) extends
|
|||||||
|
|
||||||
if (!existing.isEmpty) {
|
if (!existing.isEmpty) {
|
||||||
logger.warn(s"User $name already exists")
|
logger.warn(s"User $name already exists")
|
||||||
|
tx.rollback()
|
||||||
return false
|
return false
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -39,10 +42,12 @@ class HibernateUserManager @Inject()(em: EntityManager, config: Config) extends
|
|||||||
|
|
||||||
em.persist(userEntity)
|
em.persist(userEntity)
|
||||||
em.flush()
|
em.flush()
|
||||||
|
tx.commit()
|
||||||
|
|
||||||
true
|
true
|
||||||
} catch {
|
} catch {
|
||||||
case e: Exception => {
|
case e: Exception => {
|
||||||
|
if (tx.isActive) tx.rollback()
|
||||||
logger.error(s"Error adding user $name", e)
|
logger.error(s"Error adding user $name", e)
|
||||||
false
|
false
|
||||||
}
|
}
|
||||||
@@ -50,7 +55,9 @@ class HibernateUserManager @Inject()(em: EntityManager, config: Config) extends
|
|||||||
}
|
}
|
||||||
|
|
||||||
override def addOpenIDUser(name: String, userInfo: OpenIDUserInfo): Boolean = {
|
override def addOpenIDUser(name: String, userInfo: OpenIDUserInfo): Boolean = {
|
||||||
|
val tx = em.getTransaction
|
||||||
try {
|
try {
|
||||||
|
tx.begin()
|
||||||
// Check if user already exists
|
// Check if user already exists
|
||||||
val existing = em.createQuery("SELECT u FROM UserEntity u WHERE u.username = :username", classOf[UserEntity])
|
val existing = em.createQuery("SELECT u FROM UserEntity u WHERE u.username = :username", classOf[UserEntity])
|
||||||
.setParameter("username", name)
|
.setParameter("username", name)
|
||||||
@@ -58,6 +65,7 @@ class HibernateUserManager @Inject()(em: EntityManager, config: Config) extends
|
|||||||
|
|
||||||
if (!existing.isEmpty) {
|
if (!existing.isEmpty) {
|
||||||
logger.warn(s"User $name already exists")
|
logger.warn(s"User $name already exists")
|
||||||
|
tx.rollback()
|
||||||
return false
|
return false
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -72,6 +80,7 @@ class HibernateUserManager @Inject()(em: EntityManager, config: Config) extends
|
|||||||
|
|
||||||
if (!existingOpenID.isEmpty) {
|
if (!existingOpenID.isEmpty) {
|
||||||
logger.warn(s"OpenID user ${userInfo.provider}_${userInfo.id} already exists")
|
logger.warn(s"OpenID user ${userInfo.provider}_${userInfo.id} already exists")
|
||||||
|
tx.rollback()
|
||||||
return false
|
return false
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -80,9 +89,11 @@ class HibernateUserManager @Inject()(em: EntityManager, config: Config) extends
|
|||||||
|
|
||||||
em.persist(userEntity)
|
em.persist(userEntity)
|
||||||
em.flush()
|
em.flush()
|
||||||
|
tx.commit()
|
||||||
true
|
true
|
||||||
} catch {
|
} catch {
|
||||||
case e: Exception => {
|
case e: Exception => {
|
||||||
|
if (tx.isActive) tx.rollback()
|
||||||
logger.error(s"Error adding OpenID user ${userInfo.provider}_${userInfo.id}", e)
|
logger.error(s"Error adding OpenID user ${userInfo.provider}_${userInfo.id}", e)
|
||||||
false
|
false
|
||||||
}
|
}
|
||||||
@@ -167,20 +178,27 @@ class HibernateUserManager @Inject()(em: EntityManager, config: Config) extends
|
|||||||
}
|
}
|
||||||
|
|
||||||
override def removeUser(name: String): Boolean = {
|
override def removeUser(name: String): Boolean = {
|
||||||
|
val tx = em.getTransaction
|
||||||
try {
|
try {
|
||||||
|
tx.begin()
|
||||||
val users = em.createQuery("SELECT u FROM UserEntity u WHERE u.username = :username", classOf[UserEntity])
|
val users = em.createQuery("SELECT u FROM UserEntity u WHERE u.username = :username", classOf[UserEntity])
|
||||||
.setParameter("username", name)
|
.setParameter("username", name)
|
||||||
.getResultList
|
.getResultList
|
||||||
|
|
||||||
if (users.isEmpty) {
|
if (users.isEmpty) {
|
||||||
|
tx.rollback()
|
||||||
false
|
false
|
||||||
} else {
|
} else {
|
||||||
em.remove(users.get(0))
|
em.remove(users.get(0))
|
||||||
em.flush()
|
em.flush()
|
||||||
|
tx.commit()
|
||||||
true
|
true
|
||||||
}
|
}
|
||||||
} catch {
|
} catch {
|
||||||
case _: Exception => false
|
case _: Exception => {
|
||||||
|
if (tx.isActive) tx.rollback()
|
||||||
|
false
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,10 +1,24 @@
|
|||||||
package modules
|
package modules
|
||||||
|
|
||||||
import com.google.inject.AbstractModule
|
import com.google.inject.AbstractModule
|
||||||
|
import di.EntityManagerProvider
|
||||||
|
import jakarta.persistence.EntityManager
|
||||||
import logic.Gateway
|
import logic.Gateway
|
||||||
|
import logic.user.UserManager
|
||||||
|
import logic.user.impl.HibernateUserManager
|
||||||
|
|
||||||
class GatewayModule extends AbstractModule {
|
class GatewayModule extends AbstractModule {
|
||||||
override def configure(): Unit = {
|
override def configure(): Unit = {
|
||||||
bind(classOf[Gateway]).asEagerSingleton()
|
bind(classOf[Gateway]).asEagerSingleton()
|
||||||
|
|
||||||
|
// Bind HibernateUserManager for production (when GatewayModule is used)
|
||||||
|
bind(classOf[UserManager])
|
||||||
|
.to(classOf[HibernateUserManager])
|
||||||
|
.asEagerSingleton()
|
||||||
|
|
||||||
|
// Bind EntityManager for JPA
|
||||||
|
bind(classOf[EntityManager])
|
||||||
|
.toProvider(classOf[EntityManagerProvider])
|
||||||
|
.asEagerSingleton()
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -75,30 +75,15 @@ class OpenIDConnectService@Inject(ws: WSClient, config: Configuration)(implicit
|
|||||||
|
|
||||||
def getAuthorizationUrl(providerName: String, state: String, nonce: String): Option[String] = {
|
def getAuthorizationUrl(providerName: String, state: String, nonce: String): Option[String] = {
|
||||||
providers.get(providerName).map { provider =>
|
providers.get(providerName).map { provider =>
|
||||||
val authRequest = if (provider.scopes.contains("openid")) {
|
val authRequest = new AuthorizationRequest.Builder(
|
||||||
// Use OpenID Connect AuthenticationRequest for OpenID providers
|
new ResponseType(ResponseType.Value.CODE),
|
||||||
new AuthenticationRequest.Builder(
|
new com.nimbusds.oauth2.sdk.id.ClientID(provider.clientId)
|
||||||
new ResponseType(ResponseType.Value.CODE),
|
)
|
||||||
new com.nimbusds.oauth2.sdk.Scope(provider.scopes.mkString(" ")),
|
.scope(new com.nimbusds.oauth2.sdk.Scope(provider.scopes.mkString(" ")))
|
||||||
new com.nimbusds.oauth2.sdk.id.ClientID(provider.clientId),
|
.state(new com.nimbusds.oauth2.sdk.id.State(state))
|
||||||
URI.create(provider.redirectUri)
|
.redirectionURI(URI.create(provider.redirectUri))
|
||||||
)
|
.endpointURI(URI.create(provider.authorizationEndpoint))
|
||||||
.state(new com.nimbusds.oauth2.sdk.id.State(state))
|
.build()
|
||||||
.nonce(new Nonce(nonce))
|
|
||||||
.endpointURI(URI.create(provider.authorizationEndpoint))
|
|
||||||
.build()
|
|
||||||
} else {
|
|
||||||
// Use standard OAuth2 AuthorizationRequest for non-OpenID providers (like Discord)
|
|
||||||
new AuthorizationRequest.Builder(
|
|
||||||
new ResponseType(ResponseType.Value.CODE),
|
|
||||||
new com.nimbusds.oauth2.sdk.id.ClientID(provider.clientId)
|
|
||||||
)
|
|
||||||
.scope(new com.nimbusds.oauth2.sdk.Scope(provider.scopes.mkString(" ")))
|
|
||||||
.state(new com.nimbusds.oauth2.sdk.id.State(state))
|
|
||||||
.redirectionURI(URI.create(provider.redirectUri))
|
|
||||||
.endpointURI(URI.create(provider.authorizationEndpoint))
|
|
||||||
.build()
|
|
||||||
}
|
|
||||||
|
|
||||||
authRequest.toURI.toString
|
authRequest.toURI.toString
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -8,9 +8,10 @@
|
|||||||
<persistence-unit name="defaultPersistenceUnit">
|
<persistence-unit name="defaultPersistenceUnit">
|
||||||
<provider>org.hibernate.jpa.HibernatePersistenceProvider</provider>
|
<provider>org.hibernate.jpa.HibernatePersistenceProvider</provider>
|
||||||
|
|
||||||
|
<class>model.users.UserEntity</class>
|
||||||
|
|
||||||
<properties>
|
<properties>
|
||||||
<!-- Hibernate specific settings -->
|
<!-- Hibernate specific settings -->
|
||||||
<property name="hibernate.dialect" value="org.hibernate.dialect.PostgreSQLDialect"/>
|
|
||||||
<property name="hibernate.hbm2ddl.auto" value="update"/>
|
<property name="hibernate.hbm2ddl.auto" value="update"/>
|
||||||
<property name="hibernate.archive.autodetection" value="class"/>
|
<property name="hibernate.archive.autodetection" value="class"/>
|
||||||
<property name="hibernate.show_sql" value="false"/>
|
<property name="hibernate.show_sql" value="false"/>
|
||||||
|
|||||||
@@ -29,6 +29,7 @@ play.filters.cors {
|
|||||||
# Local Development OpenID Connect Configuration
|
# Local Development OpenID Connect Configuration
|
||||||
openid {
|
openid {
|
||||||
selectUserRoute="http://localhost:5173/select-username"
|
selectUserRoute="http://localhost:5173/select-username"
|
||||||
|
mainRoute="http://localhost:5173/"
|
||||||
|
|
||||||
discord {
|
discord {
|
||||||
clientId = ${?DISCORD_CLIENT_ID}
|
clientId = ${?DISCORD_CLIENT_ID}
|
||||||
|
|||||||
@@ -18,17 +18,18 @@ play.filters.cors {
|
|||||||
openid {
|
openid {
|
||||||
|
|
||||||
selectUserRoute="https://knockout.janis-eccarius.de/select-username"
|
selectUserRoute="https://knockout.janis-eccarius.de/select-username"
|
||||||
|
mainRoute="https://knockout.janis-eccarius.de/"
|
||||||
|
|
||||||
discord {
|
discord {
|
||||||
clientId = ${?DISCORD_CLIENT_ID}
|
clientId = ${?DISCORD_CLIENT_ID}
|
||||||
clientSecret = ${?DISCORD_CLIENT_SECRET}
|
clientSecret = ${?DISCORD_CLIENT_SECRET}
|
||||||
redirectUri = ${?DISCORD_REDIRECT_URI}
|
redirectUri = ${?DISCORD_REDIRECT_URI}
|
||||||
redirectUri = "https://knockout.janis-eccarius.de/auth/discord/callback"
|
redirectUri = "https://knockout.janis-eccarius.de/api/auth/discord/callback"
|
||||||
}
|
}
|
||||||
|
|
||||||
keycloak {
|
keycloak {
|
||||||
clientId = "your-keycloak-client-id"
|
clientId = ${?KEYCLOAK_CLIENT_ID}
|
||||||
clientSecret = "your-keycloak-client-secret"
|
clientSecret = ${?KEYCLOAK_CLIENT_SECRET}
|
||||||
redirectUri = "https://knockout.janis-eccarius.de/api/auth/keycloak/callback"
|
redirectUri = "https://knockout.janis-eccarius.de/api/auth/keycloak/callback"
|
||||||
authUrl = ${?KEYCLOAK_AUTH_URL}
|
authUrl = ${?KEYCLOAK_AUTH_URL}
|
||||||
authUrl = "https://identity.janis-eccarius.de/realms/master"
|
authUrl = "https://identity.janis-eccarius.de/realms/master"
|
||||||
|
|||||||
@@ -15,17 +15,18 @@ play.filters.cors {
|
|||||||
openid {
|
openid {
|
||||||
|
|
||||||
selectUserRoute="https://st.knockout.janis-eccarius.de/select-username"
|
selectUserRoute="https://st.knockout.janis-eccarius.de/select-username"
|
||||||
|
mainRoute="https://st.knockout.janis-eccarius.de/"
|
||||||
|
|
||||||
discord {
|
discord {
|
||||||
clientId = ${?DISCORD_CLIENT_ID}
|
clientId = ${?DISCORD_CLIENT_ID}
|
||||||
clientSecret = ${?DISCORD_CLIENT_SECRET}
|
clientSecret = ${?DISCORD_CLIENT_SECRET}
|
||||||
redirectUri = ${?DISCORD_REDIRECT_URI}
|
redirectUri = ${?DISCORD_REDIRECT_URI}
|
||||||
redirectUri = "https://st.knockout.janis-eccarius.de/auth/discord/callback"
|
redirectUri = "https://st.knockout.janis-eccarius.de/api/auth/discord/callback"
|
||||||
}
|
}
|
||||||
|
|
||||||
keycloak {
|
keycloak {
|
||||||
clientId = "your-keycloak-client-id"
|
clientId = ${?KEYCLOAK_CLIENT_ID}
|
||||||
clientSecret = "your-keycloak-client-secret"
|
clientSecret = ${?KEYCLOAK_CLIENT_SECRET}
|
||||||
redirectUri = "https://st.knockout.janis-eccarius.de/api/auth/keycloak/callback"
|
redirectUri = "https://st.knockout.janis-eccarius.de/api/auth/keycloak/callback"
|
||||||
authUrl = ${?KEYCLOAK_AUTH_URL}
|
authUrl = ${?KEYCLOAK_AUTH_URL}
|
||||||
authUrl = "https://identity.janis-eccarius.de/realms/master"
|
authUrl = "https://identity.janis-eccarius.de/realms/master"
|
||||||
|
|||||||
@@ -1,3 +1,3 @@
|
|||||||
MAJOR=4
|
MAJOR=4
|
||||||
MINOR=39
|
MINOR=44
|
||||||
PATCH=0
|
PATCH=0
|
||||||
|
|||||||
Reference in New Issue
Block a user