mirror of
https://github.com/simple-login/app.git
synced 2024-11-18 01:40:38 +01:00
1279 lines
38 KiB
Markdown
1279 lines
38 KiB
Markdown
<p align="center">
|
|
<a href="https://simplelogin.io">
|
|
<img src="./docs/diagram.png" height="300px">
|
|
</a>
|
|
</p>
|
|
|
|
[SimpleLogin](https://simplelogin.io) | Privacy-First Email Forwarding and Identity Provider Service
|
|
---
|
|
<p>
|
|
<a href="https://chrome.google.com/webstore/detail/simplelogin-protect-your/dphilobhebphkdjbpfohgikllaljmgbn">
|
|
<img src="https://img.shields.io/chrome-web-store/rating/dphilobhebphkdjbpfohgikllaljmgbn?label=Chrome%20Extension">
|
|
</a>
|
|
|
|
<a href="https://addons.mozilla.org/en-GB/firefox/addon/simplelogin/">
|
|
<img src="https://img.shields.io/amo/rating/simplelogin?label=Firefox%20Add-On&logo=SimpleLogin">
|
|
</a>
|
|
|
|
<a href="https://stats.uptimerobot.com/APkzziNWoM">
|
|
<img src="https://img.shields.io/uptimerobot/ratio/7/m782965045-15d8e413b20b5376f58db050">
|
|
</a>
|
|
|
|
<a href="./LICENSE">
|
|
<img src="https://img.shields.io/github/license/simple-login/app">
|
|
</a>
|
|
|
|
<a href="https://twitter.com/simple_login">
|
|
<img src="https://img.shields.io/twitter/follow/simple_login?style=social">
|
|
</a>
|
|
|
|
</p>
|
|
|
|
> Yet another email forwarding service?
|
|
|
|
In some way yes... However, SimpleLogin is a bit different because:
|
|
|
|
- Fully open source: both the server and client code (browser extension, JS library) are open source so anyone can freely inspect and (hopefully) improve the code.
|
|
|
|
- The only email forwarding solution that is **self-hostable**: with our detailed self-hosting instructions and most of components running as Docker container, anyone who knows `ssh` is able to deploy SimpleLogin on their server.
|
|
|
|
- Not just email alias: SimpleLogin is a privacy-first and developer-friendly identity provider that:
|
|
- offers privacy for users
|
|
- is simple to use for developers. SimpleLogin is a privacy-focused alternative to the "Login with Facebook/Google/Twitter" buttons.
|
|
|
|
- Plenty of features: browser extension, custom domain, catch-all alias, OAuth libraries, etc.
|
|
|
|
- Open roadmap at https://trello.com/b/4d6A69I4/open-roadmap: you know the exciting features we are working on.
|
|
|
|
At the heart of SimpleLogin is `email alias`: an alias is a normal email address but all emails sent to an alias are **forwarded** to your email inbox. SimpleLogin alias can also **send** emails: for your contact, the alias is therefore your email address. Use alias whenever you need to give out your email address to protect your online identity. More info on our website at https://simplelogin.io
|
|
|
|
<p align="center">
|
|
<img src="./docs/custom-alias.png" height="150px">
|
|
</p>
|
|
|
|
# Quick start
|
|
|
|
If you have Docker installed, run the following command to start SimpleLogin local server:
|
|
|
|
|
|
```bash
|
|
docker run --name sl -it --rm \
|
|
-e RESET_DB=true \
|
|
-e CONFIG=/code/example.env \
|
|
-p 7777:7777 \
|
|
simplelogin/app:3.1.0 python server.py
|
|
```
|
|
|
|
Then open http://localhost:7777, you should be able to login with `john@wick.com/password` account!
|
|
|
|
To use SimpleLogin aliases, you need to deploy it on your server with some DNS setup though,
|
|
the following section will show a step-by-step guide on how to get your own email forwarder service!
|
|
|
|
# Table of Contents
|
|
|
|
[1. General Architecture](#general-architecture)
|
|
|
|
[2. Self Hosting](#self-hosting)
|
|
|
|
[3. Contributing Guide](#contributing)
|
|
|
|
|
|
## General Architecture
|
|
|
|
<p align="center">
|
|
<img src="./docs/archi.png" height="450px">
|
|
</p>
|
|
|
|
SimpleLogin backend consists of 2 main components:
|
|
|
|
- the `webapp` used by several clients: web UI (the dashboard), browser extension (Chrome & Firefox for now), OAuth clients (apps that integrate "Login with SimpleLogin" button) and mobile app (work in progress).
|
|
|
|
- the `email handler`: implements the email forwarding (i.e. alias receiving email) and email sending (i.e. alias sending email).
|
|
|
|
## Self hosting
|
|
|
|
### Prerequisites
|
|
|
|
- a Linux server (either a VM or dedicated server). This doc shows the setup for Ubuntu 18.04 LTS but the steps could be adapted for other popular Linux distributions. As most of components run as Docker container and Docker can be a bit heavy, having at least 2 GB of RAM is recommended. The server needs to have the port 25 (email), 80, 443 (for the webapp), 22 (so you can ssh into it) open.
|
|
|
|
- a domain that you can config the DNS. It could be a sub-domain. In the rest of the doc, let's say it's `mydomain.com` for the email and `app.mydomain.com` for SimpleLogin webapp. Please make sure to replace these values by your domain name whenever they appear in the doc. A trick we use is to download this README file on your computer and replace all `mydomain.com` occurrences by your domain.
|
|
|
|
- [Optional] AWS S3, Sentry, Google/Facebook/Github developer accounts. These are necessary only if you want to activate these options.
|
|
|
|
|
|
Except for the DNS setup that is usually done on your domain registrar interface, all the below steps are to be done on your server. The commands are to run with `bash` (or any bash-compatible shell like `zsh`) being the shell. If you use other shells like `fish`, please make sure to adapt the commands.
|
|
|
|
### Some utility packages
|
|
|
|
These packages are used to verify the setup. Install them by:
|
|
|
|
```bash
|
|
sudo apt install -y dnsutils
|
|
```
|
|
|
|
Create a directory to store SimpleLogin data:
|
|
|
|
```bash
|
|
mkdir sl
|
|
mkdir sl/pgp # to store PGP key
|
|
mkdir sl/db # to store database
|
|
```
|
|
|
|
|
|
|
|
### DKIM
|
|
|
|
From Wikipedia https://en.wikipedia.org/wiki/DomainKeys_Identified_Mail
|
|
|
|
> DomainKeys Identified Mail (DKIM) is an email authentication method designed to detect forged sender addresses in emails (email spoofing), a technique often used in phishing and email spam.
|
|
|
|
Setting up DKIM is highly recommended to reduce the chance your emails ending up in the recipient's Spam folder.
|
|
|
|
First you need to generate a private and public key for DKIM:
|
|
|
|
```bash
|
|
openssl genrsa -out dkim.key 1024
|
|
openssl rsa -in dkim.key -pubout -out dkim.pub.key
|
|
```
|
|
|
|
You will need the files `dkim.key` and `dkim.pub.key` for the next steps.
|
|
|
|
For email gurus, we have chosen 1024 key length instead of 2048 for DNS simplicity as some registrars don't play well with long TXT record.
|
|
|
|
### DNS
|
|
|
|
Please note that DNS changes could take up to 24 hours to propagate. In practice, it's a lot faster though (~1 minute or so in our test). In DNS setup, we usually use domain with a trailing dot (`.`) at the end to to force using absolute domain.
|
|
|
|
|
|
#### MX record
|
|
Create a **MX record** that points `mydomain.com.` to `app.mydomain.com.` with priority 10.
|
|
|
|
To verify if the DNS works, the following command
|
|
|
|
```bash
|
|
dig @1.1.1.1 mydomain.com mx
|
|
```
|
|
|
|
should return:
|
|
|
|
```
|
|
mydomain.com. 3600 IN MX 10 app.mydomain.com.
|
|
```
|
|
|
|
#### A record
|
|
An **A record** that points `app.mydomain.com.` to your server IP. To verify, the following command
|
|
|
|
```bash
|
|
dig @1.1.1.1 app.mydomain.com a
|
|
```
|
|
|
|
should return your server IP.
|
|
|
|
#### DKIM
|
|
Set up DKIM by adding a TXT record for `dkim._domainkey.mydomain.com.` with the following value:
|
|
|
|
```
|
|
v=DKIM1; k=rsa; p=PUBLIC_KEY
|
|
```
|
|
|
|
with `PUBLIC_KEY` being your `dkim.pub.key` but
|
|
- remove the `-----BEGIN PUBLIC KEY-----` and `-----END PUBLIC KEY-----`
|
|
- join all the lines on a single line.
|
|
|
|
For example, if your `dkim.pub.key` is
|
|
|
|
```
|
|
-----BEGIN PUBLIC KEY-----
|
|
ab
|
|
cd
|
|
ef
|
|
gh
|
|
-----END PUBLIC KEY-----
|
|
```
|
|
|
|
then the `PUBLIC_KEY` would be `abcdefgh`.
|
|
|
|
You can get the `PUBLIC_KEY` by running this command:
|
|
|
|
```bash
|
|
sed "s/-----BEGIN PUBLIC KEY-----/v=DKIM1; k=rsa; p=/g" dkim.pub.key | sed 's/-----END PUBLIC KEY-----//g' |tr -d '\n'
|
|
```
|
|
|
|
To verify, the following command
|
|
|
|
```bash
|
|
dig @1.1.1.1 dkim._domainkey.mydomain.com txt
|
|
```
|
|
|
|
should return the above value.
|
|
|
|
#### SPF
|
|
|
|
From Wikipedia https://en.wikipedia.org/wiki/Sender_Policy_Framework
|
|
|
|
> Sender Policy Framework (SPF) is an email authentication method designed to detect forging sender addresses during the delivery of the email
|
|
|
|
Similar to DKIM, setting up SPF is highly recommended.
|
|
Add a TXT record for `mydomain.com.` with the value:
|
|
|
|
```
|
|
v=spf1 mx -all
|
|
```
|
|
|
|
What it means is only your server can send email with `@mydomain.com` domain.
|
|
To verify, the following command
|
|
|
|
```bash
|
|
dig @1.1.1.1 mydomain.com txt
|
|
```
|
|
|
|
should return the above value.
|
|
|
|
#### DMARC
|
|
|
|
From Wikipedia https://en.wikipedia.org/wiki/DMARC
|
|
|
|
> It (DMARC) is designed to give email domain owners the ability to protect their domain from unauthorized use, commonly known as email spoofing
|
|
|
|
Setting up DMARC is also recommended.
|
|
Add a TXT record for `_dmarc.mydomain.com.` with the following value
|
|
|
|
```
|
|
v=DMARC1; p=quarantine; adkim=r; aspf=r
|
|
```
|
|
|
|
This is a `relaxed` DMARC policy. You can also use a more strict policy with `v=DMARC1; p=reject; adkim=s; aspf=s` value.
|
|
|
|
To verify, the following command
|
|
|
|
```bash
|
|
dig @1.1.1.1 _dmarc.mydomain.com txt
|
|
```
|
|
|
|
should return the set value.
|
|
|
|
For more information on DMARC, please consult https://tools.ietf.org/html/rfc7489
|
|
|
|
### Docker
|
|
|
|
Now the boring DNS stuffs are done, let's do something more fun!
|
|
|
|
If you don't already have Docker installed on your server, please follow the steps on [Docker CE for Ubuntu](https://docs.docker.com/v17.12/install/linux/docker-ce/ubuntu/) to install Docker.
|
|
|
|
Tips: if you are not using `root` user and you want to run Docker without the `sudo` prefix, add your account to `docker` group with the following command.
|
|
You might need to exit and ssh again to your server for this to be taken into account.
|
|
|
|
```bash
|
|
sudo usermod -a -G docker $USER
|
|
```
|
|
|
|
### Prepare the Docker network
|
|
|
|
This Docker network will be used by the other Docker containers run in the next steps.
|
|
Later, we will setup Postfix to authorize this network.
|
|
|
|
```bash
|
|
sudo docker network create -d bridge \
|
|
--subnet=240.0.0.0/24 \
|
|
--gateway=240.0.0.1 \
|
|
sl-network
|
|
```
|
|
|
|
### Postgres
|
|
|
|
This section creates a Postgres database using Docker.
|
|
|
|
If you already have a Postgres database in use, you can skip this section and just copy the database configuration (i.e. host, port, username, password, database name) to use in the next sections.
|
|
|
|
Run a Postgres Docker container as your Postgres database server. Make sure to replace `myuser` and `mypassword` with something more secret.
|
|
|
|
```bash
|
|
sudo docker run -d \
|
|
--name sl-db \
|
|
-e POSTGRES_PASSWORD=mypassword \
|
|
-e POSTGRES_USER=myuser \
|
|
-e POSTGRES_DB=simplelogin \
|
|
-p 5432:5432 \
|
|
-v $(pwd)/sl/db:/var/lib/postgresql/data \
|
|
--restart always \
|
|
--network="sl-network" \
|
|
postgres:12.1
|
|
```
|
|
|
|
To test whether the database operates correctly or not, run the following command:
|
|
|
|
```bash
|
|
sudo docker exec -it sl-db psql -U myuser simplelogin
|
|
```
|
|
|
|
you should be logged in the postgres console. Type `exit` to exit postgres console.
|
|
|
|
### Postfix
|
|
|
|
Install `postfix` and `postfix-pgsql`. The latter is used to connect Postfix and the Postgres database in the next steps.
|
|
|
|
```bash
|
|
sudo apt-get install -y postfix postfix-pgsql -y
|
|
```
|
|
|
|
Choose "Internet Site" in Postfix installation window then keep using the proposed value as *System mail name* in the next window.
|
|
|
|
Replace `/etc/postfix/main.cf` with the following content. Make sure to replace `mydomain.com` by your domain.
|
|
|
|
```
|
|
# POSTFIX config file, adapted for SimpleLogin
|
|
smtpd_banner = $myhostname ESMTP $mail_name (Ubuntu)
|
|
biff = no
|
|
|
|
# appending .domain is the MUA's job.
|
|
append_dot_mydomain = no
|
|
|
|
# Uncomment the next line to generate "delayed mail" warnings
|
|
#delay_warning_time = 4h
|
|
|
|
readme_directory = no
|
|
|
|
# See http://www.postfix.org/COMPATIBILITY_README.html -- default to 2 on
|
|
# fresh installs.
|
|
compatibility_level = 2
|
|
|
|
# TLS parameters
|
|
smtpd_tls_cert_file=/etc/ssl/certs/ssl-cert-snakeoil.pem
|
|
smtpd_tls_key_file=/etc/ssl/private/ssl-cert-snakeoil.key
|
|
smtpd_use_tls=yes
|
|
smtpd_tls_session_cache_database = btree:${data_directory}/smtpd_scache
|
|
smtp_tls_session_cache_database = btree:${data_directory}/smtp_scache
|
|
|
|
# See /usr/share/doc/postfix/TLS_README.gz in the postfix-doc package for
|
|
# information on enabling SSL in the smtp client.
|
|
|
|
alias_maps = hash:/etc/aliases
|
|
mynetworks = 127.0.0.0/8 [::ffff:127.0.0.0]/104 [::1]/128 240.0.0.0/24
|
|
|
|
# Set your domain here
|
|
mydestination =
|
|
myhostname = app.mydomain.com
|
|
mydomain = mydomain.com
|
|
myorigin = mydomain.com
|
|
|
|
relay_domains = pgsql:/etc/postfix/pgsql-relay-domains.cf
|
|
transport_maps = pgsql:/etc/postfix/pgsql-transport-maps.cf
|
|
|
|
# HELO restrictions
|
|
smtpd_delay_reject = yes
|
|
smtpd_helo_required = yes
|
|
smtpd_helo_restrictions =
|
|
permit_mynetworks,
|
|
reject_non_fqdn_helo_hostname,
|
|
reject_invalid_helo_hostname,
|
|
permit
|
|
|
|
# Sender restrictions:
|
|
smtpd_sender_restrictions =
|
|
permit_mynetworks,
|
|
reject_non_fqdn_sender,
|
|
reject_unknown_sender_domain,
|
|
permit
|
|
|
|
# Recipient restrictions:
|
|
smtpd_recipient_restrictions =
|
|
reject_unauth_pipelining,
|
|
reject_non_fqdn_recipient,
|
|
reject_unknown_recipient_domain,
|
|
permit_mynetworks,
|
|
reject_unauth_destination,
|
|
reject_rbl_client zen.spamhaus.org,
|
|
reject_rbl_client bl.spamcop.net,
|
|
permit
|
|
```
|
|
|
|
Create the `/etc/postfix/pgsql-relay-domains.cf` file with the following content.
|
|
Make sure that the database config is correctly set and replace `mydomain.com` with your domain.
|
|
|
|
```
|
|
# postgres config
|
|
hosts = localhost
|
|
user = myuser
|
|
password = mypassword
|
|
dbname = simplelogin
|
|
|
|
query = SELECT domain FROM custom_domain WHERE domain='%s' AND verified=true
|
|
UNION SELECT '%s' WHERE '%s' = 'mydomain.com' LIMIT 1;
|
|
```
|
|
|
|
Create the `/etc/postfix/pgsql-transport-maps.cf` file with the following content.
|
|
Again, make sure that the database config is correctly set and replace `mydomain.com` with your domain.
|
|
|
|
```
|
|
# postgres config
|
|
hosts = localhost
|
|
user = myuser
|
|
password = mypassword
|
|
dbname = simplelogin
|
|
|
|
# forward to smtp:127.0.0.1:20381 for custom domain AND email domain
|
|
query = SELECT 'smtp:127.0.0.1:20381' FROM custom_domain WHERE domain = '%s' AND verified=true
|
|
UNION SELECT 'smtp:127.0.0.1:20381' WHERE '%s' = 'mydomain.com' LIMIT 1;
|
|
```
|
|
|
|
Finally, restart Postfix
|
|
|
|
```bash
|
|
sudo systemctl restart postfix
|
|
```
|
|
|
|
|
|
### Run SimpleLogin Docker containers
|
|
|
|
To run the server, you need a config file. Please have a look at [config example](example.env) for an example to create one. Some parameters are optional and are commented out by default. Some have "dummy" values, fill them up if you want to enable these features (Paddle, AWS, etc).
|
|
|
|
Let's put your config file at `~/simplelogin.env`. Below is an example that you can use right away, make sure to replace `mydomain.com` by your domain and set `FLASK_SECRET` to a secret string.
|
|
|
|
Make sure to update the following variables and replace these values by yours.
|
|
|
|
```.env
|
|
# WebApp URL
|
|
URL=http://app.mydomain.com
|
|
|
|
# domain used to create alias
|
|
EMAIL_DOMAIN=mydomain.com
|
|
|
|
# transactional email is sent from this email address
|
|
SUPPORT_EMAIL=support@mydomain.com
|
|
|
|
# custom domain needs to point to these MX servers
|
|
EMAIL_SERVERS_WITH_PRIORITY=[(10, "app.mydomain.com.")]
|
|
|
|
# By default, new aliases must end with ".{random_word}". This is to avoid a person taking all "nice" aliases.
|
|
# this option doesn't make sense in self-hosted. Set this variable to disable this option.
|
|
DISABLE_ALIAS_SUFFIX=1
|
|
|
|
# If you want to use another MTA to send email, you could set the address of your MTA here
|
|
# By default, emails are sent using the the same Postfix server that receives emails
|
|
# POSTFIX_SERVER=my-postfix.com
|
|
|
|
# the DKIM private key used to compute DKIM-Signature
|
|
DKIM_PRIVATE_KEY_PATH=/dkim.key
|
|
|
|
# the DKIM public key used to setup custom domain DKIM
|
|
DKIM_PUBLIC_KEY_PATH=/dkim.pub.key
|
|
|
|
# DB Connection
|
|
DB_URI=postgresql://myuser:mypassword@sl-db:5432/simplelogin
|
|
|
|
FLASK_SECRET=put_something_secret_here
|
|
|
|
GNUPGHOME=/sl/pgp
|
|
```
|
|
|
|
|
|
Before running the webapp, you need to prepare the database by running the migration:
|
|
|
|
```bash
|
|
sudo docker run --rm \
|
|
--name sl-migration \
|
|
-v $(pwd)/sl:/sl \
|
|
-v $(pwd)/dkim.key:/dkim.key \
|
|
-v $(pwd)/dkim.pub.key:/dkim.pub.key \
|
|
-v $(pwd)/simplelogin.env:/code/.env \
|
|
--network="sl-network" \
|
|
simplelogin/app:3.1.0 flask db upgrade
|
|
```
|
|
|
|
This command could take a while to download the `simplelogin/app` docker image.
|
|
|
|
Now, it's time to run the `webapp` container!
|
|
|
|
```bash
|
|
sudo docker run -d \
|
|
--name sl-app \
|
|
-v $(pwd)/sl:/sl \
|
|
-v $(pwd)/simplelogin.env:/code/.env \
|
|
-v $(pwd)/dkim.key:/dkim.key \
|
|
-v $(pwd)/dkim.pub.key:/dkim.pub.key \
|
|
-p 7777:7777 \
|
|
--restart always \
|
|
--network="sl-network" \
|
|
simplelogin/app:3.1.0
|
|
```
|
|
|
|
Next run the `email handler`
|
|
|
|
```bash
|
|
sudo docker run -d \
|
|
--name sl-email \
|
|
-v $(pwd)/sl:/sl \
|
|
-v $(pwd)/simplelogin.env:/code/.env \
|
|
-v $(pwd)/dkim.key:/dkim.key \
|
|
-v $(pwd)/dkim.pub.key:/dkim.pub.key \
|
|
-p 20381:20381 \
|
|
--restart always \
|
|
--network="sl-network" \
|
|
simplelogin/app:3.1.0 python email_handler.py
|
|
```
|
|
|
|
### Nginx
|
|
|
|
Install Nginx
|
|
|
|
```bash
|
|
sudo apt-get install -y nginx
|
|
```
|
|
|
|
Then, create `/etc/nginx/sites-enabled/simplelogin` with the following lines:
|
|
|
|
```
|
|
server {
|
|
server_name app.mydomain.com;
|
|
|
|
location / {
|
|
proxy_pass http://localhost:7777;
|
|
}
|
|
}
|
|
```
|
|
|
|
Reload Nginx with the command below
|
|
|
|
```bash
|
|
sudo systemctl reload nginx
|
|
```
|
|
|
|
At this step, you should also setup the SSL for Nginx. [Certbot](https://certbot.eff.org/lets-encrypt/ubuntuxenial-nginx) can be a good option if you want a free SSL certificate.
|
|
|
|
### Enjoy!
|
|
|
|
If all of the above steps are successful, open http://app.mydomain.com/ and create your first account!
|
|
|
|
By default, new accounts are not premium so don't have unlimited alias. To make your account premium,
|
|
please go to the database, table "users" and set "lifetime" column to "1" or "TRUE".
|
|
|
|
You don't have to pay anything to SimpleLogin to use all its features.
|
|
You could make a donation to SimpleLogin on our Patreon page at https://www.patreon.com/simplelogin if you wish though.
|
|
|
|
### Misc
|
|
|
|
The above self-hosting instructions correspond to a freshly Ubuntu server and doesn't cover all possible server configuration.
|
|
Below are pointers to different topics:
|
|
|
|
- [Enable SSL](docs/ssl.md)
|
|
- [UFW - uncomplicated firewall](docs/ufw.md)
|
|
- [SES - Amazon Simple Email Service](docs/ses.md)
|
|
- [Upgrade existing SimpleLogin installation](docs/upgrade.md)
|
|
- [Enforce SPF](docs/enforce-spf.md)
|
|
|
|
## Contributing
|
|
|
|
All work on SimpleLogin happens directly on GitHub.
|
|
|
|
### Run code locally
|
|
|
|
The project uses Python 3.7+ and Node v10. First, install all dependencies by running the following command. Feel free to use `virtualenv` or similar tools to isolate development environment.
|
|
|
|
```bash
|
|
pip3 install -r requirements.txt
|
|
```
|
|
|
|
You also need to install `gpg`, on Mac it can be done with:
|
|
|
|
```bash
|
|
brew install gnupg
|
|
```
|
|
|
|
|
|
Then make sure all tests pass
|
|
|
|
```bash
|
|
pytest
|
|
```
|
|
|
|
Install npm packages
|
|
|
|
```bash
|
|
cd static && npm install
|
|
```
|
|
|
|
To run the code locally, please create a local setting file based on `example.env`:
|
|
|
|
```
|
|
cp example.env .env
|
|
```
|
|
|
|
Make sure to uncomment the `RESET_DB=true` to create the database locally.
|
|
|
|
Feel free to custom your `.env` file, it would be your default setting when developing locally. This file is ignored by git.
|
|
|
|
You don't need all the parameters, for example, if you don't update images to s3, then
|
|
`BUCKET`, `AWS_ACCESS_KEY_ID` can be empty or if you don't use login with Github locally, `GITHUB_CLIENT_ID` doesn't have to be filled. The `example.env` file contains minimal requirement so that if you run:
|
|
|
|
```
|
|
python3 server.py
|
|
```
|
|
|
|
then open http://localhost:7777, you should be able to login with the following account
|
|
|
|
```
|
|
john@wick.com / password
|
|
```
|
|
|
|
### API
|
|
|
|
SimpleLogin current API clients are Chrome/Firefox/Safari extension and mobile (iOS/Android) app.
|
|
These clients rely on `API Code` for authentication.
|
|
|
|
Once the `Api Code` is obtained, either via user entering it (in Browser extension case) or by logging in (in Mobile case),
|
|
the client includes the `api code` in `Authentication` header in almost all requests.
|
|
|
|
For some endpoints, the `hostname` should be passed in query string. `hostname` is the the URL hostname (cf https://en.wikipedia.org/wiki/URL), for ex if URL is http://www.example.com/index.html then the hostname is `www.example.com`. This information is important to know where an alias is used in order to suggest user the same alias if they want to create on alias on the same website in the future.
|
|
|
|
If error, the API returns 4** with body containing the error message, for example:
|
|
|
|
```json
|
|
{
|
|
"error": "request body cannot be empty"
|
|
}
|
|
```
|
|
|
|
The error message could be displayed to user as-is, for example for when user exceeds their alias quota.
|
|
Some errors should be fixed during development however: for example error like `request body cannot be empty` is there to catch development error and should never be shown to user.
|
|
|
|
All following endpoint return `401` status code if the API Key is incorrect.
|
|
|
|
#### GET /api/user_info
|
|
|
|
Given the API Key, return user name and whether user is premium.
|
|
This endpoint could be used to validate the api key.
|
|
|
|
Input:
|
|
- `Authentication` header that contains the api key
|
|
|
|
Output: if api key is correct, return a json with user name and whether user is premium, for example:
|
|
|
|
```json
|
|
{
|
|
"name": "John Wick",
|
|
"is_premium": false,
|
|
"email": "john@wick.com",
|
|
"in_trial": true
|
|
}
|
|
```
|
|
|
|
If api key is incorrect, return 401.
|
|
|
|
|
|
#### GET /api/v4/alias/options
|
|
|
|
User alias info and suggestion. Used by the first extension screen when user opens the extension.
|
|
|
|
Input:
|
|
- `Authentication` header that contains the api key
|
|
- (Optional but recommended) `hostname` passed in query string.
|
|
|
|
Output: a json with the following field:
|
|
- can_create: boolean. Whether user can create new alias
|
|
- suffixes: list of `[suffix, signed-suffix]`. List of alias `suffix` that user can use. The `signed-suffix` is necessary to avoid request tampering.
|
|
- prefix_suggestion: string. Suggestion for the `alias prefix`. Usually this is the website name extracted from `hostname`. If no `hostname`, then the `prefix_suggestion` is empty.
|
|
- recommendation: optional field, dictionary. If an alias is already used for this website, the recommendation will be returned. There are 2 subfields in `recommendation`: `alias` which is the recommended alias and `hostname` is the website on which this alias is used before.
|
|
|
|
For ex:
|
|
```json
|
|
{
|
|
"can_create": true,
|
|
"prefix_suggestion": "",
|
|
"suffixes": [
|
|
[
|
|
"@ab.cd",
|
|
"@ab.cd.Xq2BOA.zBebBB-QYikFkbPZ9CPKGpJ2-PU"
|
|
],
|
|
[
|
|
".yeah@local1.localhost",
|
|
".yeah@local1.localhost.Xq2BOA.dM9gyHyHcSXuJ8ps4i3wpJZ_Frw"
|
|
]
|
|
]
|
|
}
|
|
```
|
|
|
|
#### POST /api/v2/alias/custom/new
|
|
|
|
Create a new custom alias.
|
|
|
|
Input:
|
|
- `Authentication` header that contains the api key
|
|
- (Optional but recommended) `hostname` passed in query string
|
|
- Request Message Body in json (`Content-Type` is `application/json`)
|
|
- alias_prefix: string. The first part of the alias that user can choose.
|
|
- signed_suffix: should be one of the suffixes returned in the `GET /api/v4/alias/options` endpoint.
|
|
- (Optional) note: alias note
|
|
|
|
Output:
|
|
If success, 201 with the new alias, for example
|
|
|
|
```json
|
|
{
|
|
"alias": "www_groupon_com@my_domain.com",
|
|
"creation_date": "2020-02-04 16:23:02+00:00",
|
|
"creation_timestamp": 1580833382,
|
|
"email": "www_groupon_com@my_domain.com",
|
|
"id": 4,
|
|
"nb_block": 0,
|
|
"nb_forward": 0,
|
|
"nb_reply": 0,
|
|
"enabled": true,
|
|
"note": "This is a note"
|
|
}
|
|
```
|
|
|
|
#### POST /api/alias/random/new
|
|
|
|
Create a new random alias.
|
|
|
|
Input:
|
|
- `Authentication` header that contains the api key
|
|
- (Optional but recommended) `hostname` passed in query string
|
|
- (Optional) mode: either `uuid` or `word`. By default, use the user setting when creating new random alias.
|
|
- Request Message Body in json (`Content-Type` is `application/json`)
|
|
- (Optional) note: alias note
|
|
|
|
Output:
|
|
If success, 201 with the new alias, for example
|
|
|
|
```json
|
|
{
|
|
"alias": "prefix.suffix@my_domain.com",
|
|
"creation_date": "2020-02-04 16:23:02+00:00",
|
|
"creation_timestamp": 1580833382,
|
|
"email": "www_groupon_com@my_domain.com",
|
|
"id": 4,
|
|
"nb_block": 0,
|
|
"nb_forward": 0,
|
|
"nb_reply": 0,
|
|
"enabled": true,
|
|
"note": "This is a note"
|
|
}
|
|
```
|
|
|
|
#### POST /api/auth/login
|
|
|
|
Input:
|
|
- email
|
|
- password
|
|
- device: device name. Used to create the API Key. Should be humanly readable so user can manage later on the "API Key" page.
|
|
|
|
Output:
|
|
- name: user name, could be an empty string
|
|
- mfa_enabled: boolean
|
|
- mfa_key: only useful when user enables MFA. In this case, user needs to enter their OTP token in order to login.
|
|
- api_key: if MFA is not enabled, the `api key` is returned right away.
|
|
|
|
The `api_key` is used in all subsequent requests. It's empty if MFA is enabled.
|
|
If user hasn't enabled MFA, `mfa_key` is empty.
|
|
|
|
Return 403 if user has enabled FIDO. The client can display a message to suggest user to use the `API Key` instead.
|
|
|
|
#### POST /api/auth/mfa
|
|
|
|
Input:
|
|
- mfa_token: OTP token that user enters
|
|
- mfa_key: MFA key obtained in previous auth request, e.g. /api/auth/login
|
|
- device: the device name, used to create an ApiKey associated with this device
|
|
|
|
Output:
|
|
- name: user name, could be an empty string
|
|
- api_key: if MFA is not enabled, the `api key` is returned right away.
|
|
|
|
The `api_key` is used in all subsequent requests. It's empty if MFA is enabled.
|
|
If user hasn't enabled MFA, `mfa_key` is empty.
|
|
|
|
#### POST /api/auth/facebook
|
|
|
|
Input:
|
|
- facebook_token: Facebook access token
|
|
- device: device name. Used to create the API Key. Should be humanly readable so user can manage later on the "API Key" page.
|
|
|
|
Output: Same output as for `/api/auth/login` endpoint
|
|
|
|
|
|
#### POST /api/auth/google
|
|
|
|
Input:
|
|
- google_token: Google access token
|
|
- device: device name. Used to create the API Key. Should be humanly readable so user can manage later on the "API Key" page.
|
|
|
|
Output: Same output as for `/api/auth/login` endpoint
|
|
|
|
#### POST /api/auth/register
|
|
|
|
Input:
|
|
- email
|
|
- password
|
|
|
|
Output: 200 means user is going to receive an email that contains an *activation code*. User needs to enter this code to confirm their account -> next endpoint.
|
|
|
|
|
|
#### POST /api/auth/activate
|
|
|
|
Input:
|
|
- email
|
|
- code: the activation code
|
|
|
|
Output:
|
|
- 200: account is activated. User can login now
|
|
- 400: wrong email, code
|
|
- 410: wrong code too many times. User needs to ask for an reactivation -> next endpoint
|
|
|
|
#### POST /api/auth/reactivate
|
|
|
|
Input:
|
|
- email
|
|
|
|
Output:
|
|
- 200: user is going to receive an email that contains the activation code.
|
|
|
|
#### POST /api/auth/forgot_password
|
|
|
|
Input:
|
|
- email
|
|
|
|
Output: always return 200, even if email doesn't exist. User need to enter correctly their email.
|
|
|
|
#### GET /api/mailboxes
|
|
|
|
Get user verified mailboxes.
|
|
|
|
Input:
|
|
- `Authentication` header that contains the api key
|
|
|
|
Output:
|
|
List of mailboxes. Each mailbox has id, email field.
|
|
|
|
```json
|
|
{
|
|
"mailboxes": [
|
|
{
|
|
"email": "a@b.c",
|
|
"id": 1
|
|
},
|
|
{
|
|
"email": "m1@example.com",
|
|
"id": 2
|
|
}
|
|
]
|
|
}
|
|
```
|
|
|
|
#### GET /api/v2/aliases
|
|
|
|
Get user aliases.
|
|
|
|
Input:
|
|
- `Authentication` header that contains the api key
|
|
- `page_id` in query. Used for the pagination. The endpoint returns maximum 20 aliases for each page. `page_id` starts at 0.
|
|
- (Optional) query: included in request body. Some frameworks might prevent GET request having a non-empty body, in this case this endpoint also supports POST.
|
|
|
|
Output:
|
|
If success, 200 with the list of aliases. Each alias has the following fields:
|
|
|
|
- id
|
|
- email
|
|
- name
|
|
- enabled
|
|
- creation_timestamp
|
|
- note
|
|
- nb_block
|
|
- nb_forward
|
|
- nb_reply
|
|
- mailbox
|
|
- id
|
|
- email
|
|
- (optional) latest_activity:
|
|
- action: forward|reply|block|bounced
|
|
- timestamp
|
|
- contact:
|
|
- email
|
|
- name
|
|
- reverse_alias
|
|
|
|
Here's an example:
|
|
|
|
```json
|
|
{
|
|
"aliases": [
|
|
{
|
|
"creation_date": "2020-04-06 17:57:14+00:00",
|
|
"creation_timestamp": 1586195834,
|
|
"email": "prefix1.cat@sl.local",
|
|
"name": "A Name",
|
|
"enabled": true,
|
|
"id": 3,
|
|
"mailbox": {
|
|
"email": "a@b.c",
|
|
"id": 1
|
|
},
|
|
"latest_activity": {
|
|
"action": "forward",
|
|
"contact": {
|
|
"email": "c1@example.com",
|
|
"name": null,
|
|
"reverse_alias": "\"c1 at example.com\" <re1@SL>"
|
|
},
|
|
"timestamp": 1586195834
|
|
},
|
|
"nb_block": 0,
|
|
"nb_forward": 1,
|
|
"nb_reply": 0,
|
|
"note": null
|
|
},
|
|
{
|
|
"creation_date": "2020-04-06 17:57:14+00:00",
|
|
"creation_timestamp": 1586195834,
|
|
"email": "prefix0.hey@sl.local",
|
|
"name": null,
|
|
"enabled": true,
|
|
"id": 2,
|
|
"mailbox": {
|
|
"email": "a@b.c",
|
|
"id": 1
|
|
},
|
|
"latest_activity": {
|
|
"action": "forward",
|
|
"contact": {
|
|
"email": "c0@example.com",
|
|
"name": null,
|
|
"reverse_alias": "\"c0 at example.com\" <re0@SL>"
|
|
},
|
|
"timestamp": 1586195834
|
|
},
|
|
"nb_block": 0,
|
|
"nb_forward": 1,
|
|
"nb_reply": 0,
|
|
"note": null
|
|
}
|
|
]
|
|
}
|
|
```
|
|
|
|
#### GET /api/aliases/:alias_id
|
|
|
|
Get alias info
|
|
|
|
Input:
|
|
- `Authentication` header that contains the api key
|
|
- `alias_id` in url
|
|
|
|
Output:
|
|
Alias info
|
|
|
|
```json
|
|
{
|
|
"creation_date": "2020-02-04 16:23:02+00:00",
|
|
"creation_timestamp": 1580833382,
|
|
"email": "e3@.alo@sl.local",
|
|
"id": 4,
|
|
"nb_block": 0,
|
|
"nb_forward": 0,
|
|
"nb_reply": 0,
|
|
"enabled": true,
|
|
"note": "This is a note"
|
|
}
|
|
```
|
|
|
|
#### DELETE /api/aliases/:alias_id
|
|
|
|
Delete an alias
|
|
|
|
Input:
|
|
- `Authentication` header that contains the api key
|
|
- `alias_id` in url.
|
|
|
|
Output:
|
|
If success, 200.
|
|
|
|
|
|
```json
|
|
{
|
|
"deleted": true
|
|
}
|
|
```
|
|
|
|
#### POST /api/aliases/:alias_id/toggle
|
|
|
|
Enable/disable alias
|
|
|
|
Input:
|
|
- `Authentication` header that contains the api key
|
|
- `alias_id` in url.
|
|
|
|
Output:
|
|
If success, 200 along with the new alias status:
|
|
|
|
```json
|
|
{
|
|
"enabled": false
|
|
}
|
|
```
|
|
|
|
#### GET /api/aliases/:alias_id/activities
|
|
|
|
Get activities for a given alias.
|
|
|
|
Input:
|
|
- `Authentication` header that contains the api key
|
|
- `alias_id`: the alias id, passed in url.
|
|
- `page_id` used in request query (`?page_id=0`). The endpoint returns maximum 20 aliases for each page. `page_id` starts at 0.
|
|
|
|
Output:
|
|
If success, 200 with the list of activities, for example:
|
|
|
|
```json
|
|
{
|
|
"activities": [
|
|
{
|
|
"action": "reply",
|
|
"from": "yes_meo_chat@sl.local",
|
|
"timestamp": 1580903760,
|
|
"to": "marketing@example.com",
|
|
"reverse_alias": "\"marketing at example.com\" <reply@a.b>"
|
|
},
|
|
{
|
|
"action": "reply",
|
|
"from": "yes_meo_chat@sl.local",
|
|
"timestamp": 1580903760,
|
|
"to": "marketing@example.com",
|
|
"reverse_alias": "\"marketing at example.com\" <reply@a.b>"
|
|
}
|
|
]
|
|
}
|
|
```
|
|
|
|
#### PUT /api/aliases/:alias_id
|
|
|
|
Update alias note. In the future, the endpoint will support other updates (e.g. mailbox update) as well.
|
|
|
|
Input:
|
|
- `Authentication` header that contains the api key
|
|
- `alias_id` in url.
|
|
- (optional) `note` in request body
|
|
- (optional) `mailbox_id` in request body
|
|
- (optional) `name` in request body
|
|
|
|
Output:
|
|
If success, return 200
|
|
|
|
#### GET /api/aliases/:alias_id/contacts
|
|
|
|
Get contacts for a given alias.
|
|
|
|
Input:
|
|
- `Authentication` header that contains the api key
|
|
- `alias_id`: the alias id, passed in url.
|
|
- `page_id` used in request query (`?page_id=0`). The endpoint returns maximum 20 contacts for each page. `page_id` starts at 0.
|
|
|
|
Output:
|
|
If success, 200 with the list of contacts, for example:
|
|
|
|
```json
|
|
{
|
|
"contacts": [
|
|
{
|
|
"id": 1,
|
|
"contact": "marketing@example.com",
|
|
"creation_date": "2020-02-21 11:35:00+00:00",
|
|
"creation_timestamp": 1582284900,
|
|
"last_email_sent_date": null,
|
|
"last_email_sent_timestamp": null,
|
|
"reverse_alias": "marketing at example.com <reply+bzvpazcdedcgcpztehxzgjgzmxskqa@sl.co>"
|
|
},
|
|
{
|
|
"id": 2,
|
|
"contact": "newsletter@example.com",
|
|
"creation_date": "2020-02-21 11:35:00+00:00",
|
|
"creation_timestamp": 1582284900,
|
|
"last_email_sent_date": "2020-02-21 11:35:00+00:00",
|
|
"last_email_sent_timestamp": 1582284900,
|
|
"reverse_alias": "newsletter at example.com <reply+bzvpazcdedcgcpztehxzgjgzmxskqa@sl.co>"
|
|
}
|
|
]
|
|
}
|
|
```
|
|
|
|
Please note that last_email_sent_timestamp and last_email_sent_date can be null.
|
|
|
|
|
|
#### POST /api/aliases/:alias_id/contacts
|
|
|
|
Create a new contact for an alias.
|
|
|
|
Input:
|
|
- `Authentication` header that contains the api key
|
|
- `alias_id` in url.
|
|
- `contact` in request body
|
|
|
|
Output:
|
|
If success, return 201
|
|
Return 409 if contact is already added.
|
|
|
|
```
|
|
{
|
|
"id": 1,
|
|
"contact": "First Last <first@example.com>",
|
|
"creation_date": "2020-03-14 11:52:41+00:00",
|
|
"creation_timestamp": 1584186761,
|
|
"last_email_sent_date": null,
|
|
"last_email_sent_timestamp": null,
|
|
"reverse_alias": "First Last first@example.com <ra+qytyzjhrumrreuszrbjxqjlkh@sl.local>"
|
|
}
|
|
```
|
|
|
|
#### DELETE /api/contacts/:contact_id
|
|
|
|
Delete a contact
|
|
|
|
Input:
|
|
- `Authentication` header that contains the api key
|
|
- `contact_id` in url.
|
|
|
|
Output:
|
|
If success, 200.
|
|
|
|
|
|
```json
|
|
{
|
|
"deleted": true
|
|
}
|
|
```
|
|
|
|
#### POST /api/apple/process_payment
|
|
|
|
Process payment receipt
|
|
|
|
Input:
|
|
- `Authentication` in header: the api key
|
|
- `receipt_data` in body: the receipt_data base64Encoded returned by StoreKit, i.e. `rawReceiptData.base64EncodedString`
|
|
- (optional) `is_macapp` in body: if this field is present, the request is sent from the MacApp (Safari Extension) and not iOS app.
|
|
|
|
Output:
|
|
200 if user is upgraded successfully
|
|
4** if any error.
|
|
|
|
### Database migration
|
|
|
|
The database migration is handled by `alembic`
|
|
|
|
Whenever the model changes, a new migration has to be created.
|
|
|
|
If you have Docker installed, you can create the migration by the following script:
|
|
|
|
```bash
|
|
sh new_migration.sh
|
|
```
|
|
|
|
Make sure to review the migration script before committing it.
|
|
Sometimes (very rarely though), the automatically generated script can be incorrect.
|
|
|
|
We cannot use the local database to generate migration script as the local database doesn't use migration.
|
|
It is created via `db.create_all()` (cf `fake_data()` method). This is convenient for development and
|
|
unit tests as we don't have to wait for the migration.
|
|
|
|
### Code structure
|
|
|
|
The repo consists of the three following entry points:
|
|
|
|
- wsgi.py and server.py: the webapp.
|
|
- email_handler.py: the email handler.
|
|
- cron.py: the cronjob.
|
|
|
|
Here are the small sum-ups of the directory structures and their roles:
|
|
|
|
- app/: main Flask app. It is structured into different packages representing different features like oauth, api, dashboard, etc.
|
|
- local_data/: contains files to facilitate the local development. They are replaced during the deployment.
|
|
- migrations/: generated by flask-migrate. Edit these files will be only edited when you spot (very rare) errors on the database migration files.
|
|
- static/: files available at `/static` url.
|
|
- templates/: contains both html and email templates.
|
|
- tests/: tests. We don't really distinguish unit, functional or integration test. A test is simply here to make sure a feature works correctly.
|
|
|
|
The code is formatted using https://github.com/psf/black, to format the code, simply run
|
|
|
|
```
|
|
black .
|
|
```
|
|
|
|
### OAuth flow
|
|
|
|
SL currently supports code and implicit flow.
|
|
|
|
#### Code flow
|
|
|
|
To trigger the code flow locally, you can go to the following url after running `python server.py`:
|
|
|
|
```
|
|
http://localhost:7777/oauth/authorize?client_id=client-id&state=123456&response_type=code&redirect_uri=http%3A%2F%2Flocalhost%3A7000%2Fcallback&state=random_string
|
|
```
|
|
|
|
You should see there the authorization page where user is asked for permission to share their data. Once user approves, user is redirected to this url with an `authorization code`: `http://localhost:7000/callback?state=123456&code=the_code`
|
|
|
|
Next, exchange the code to get the token with `{code}` replaced by the code obtained in previous step. The `http` tool used here is https://httpie.org
|
|
|
|
```
|
|
http -f -a client-id:client-secret http://localhost:7777/oauth/token grant_type=authorization_code code={code}
|
|
```
|
|
|
|
This should return an `access token` that allows to get user info via the following command. Again, `http` tool is used.
|
|
|
|
```
|
|
http http://localhost:7777/oauth/user_info 'Authorization:Bearer {token}'
|
|
```
|
|
|
|
#### Implicit flow
|
|
|
|
Similar to code flow, except for the the `access token` which we we get back with the redirection.
|
|
For implicit flow, the url is
|
|
|
|
```
|
|
http://localhost:7777/oauth/authorize?client_id=client-id&state=123456&response_type=token&redirect_uri=http%3A%2F%2Flocalhost%3A7000%2Fcallback&state=random_string
|
|
```
|
|
|
|
#### OpenID and OAuth2 response_type & scope
|
|
|
|
According to the sharing web blog titled [Diagrams of All The OpenID Connect Flows](https://medium.com/@darutk/diagrams-of-all-the-openid-connect-flows-6968e3990660), we should pay attention to:
|
|
|
|
- `response_type` can be either `code, token, id_token` or any combination of those attributes.
|
|
- `scope` might contain `openid`
|
|
|
|
Below are the potential combinations that are taken into account in SL until now:
|
|
|
|
```
|
|
response_type=code
|
|
scope:
|
|
with `openid` in scope, return `id_token` at /token: OK
|
|
without: OK
|
|
|
|
response_type=token
|
|
scope:
|
|
with and without `openid`, nothing to do: OK
|
|
|
|
response_type=id_token
|
|
return `id_token` in /authorization endpoint
|
|
|
|
response_type=id_token token
|
|
return `id_token` in addition to `access_token` in /authorization endpoint
|
|
|
|
response_type=id_token code
|
|
return `id_token` in addition to `authorization_code` in /authorization endpoint
|
|
|
|
```
|
|
|
|
|
|
## ❤️ Contributors
|
|
|
|
Thanks go to these wonderful people:
|
|
|
|
<table>
|
|
<tr>
|
|
<td align="center"><a href="https://www.linkedin.com/in/vandungnguyen/"><img src="https://simplelogin.io/about/dung.jpg" width="100px;" alt="Dung Nguyen Van"/><br /><sub><b>Dung Nguyen Van</b></sub></a><br /></td>
|
|
<td align="center"><a href="https://www.linkedin.com/in/giuseppe-f-83449ba4/"><img src="https://simplelogin.io/about/giuseppe.jpeg" width="100px;" alt="Giuseppe Federico"/><br /><sub><b>Giuseppe Federico</b></sub></a><br /></td>
|
|
<td align="center"><a href="https://github.com/NinhDinh"><img src="https://avatars2.githubusercontent.com/u/1419742?s=460&v=4" width="100px;" alt="Ninh Dinh"/><br /><sub><b>Ninh Dinh</b></sub></a><br /></td>
|
|
<td align="center"><a href="https://github.com/ntung"><img src="https://avatars1.githubusercontent.com/u/663341?s=460&v=4" width="100px;" alt="Tung Nguyen V. N."/><br /><sub><b>Tung Nguyen V. N.</b></sub></a><br /></td>
|
|
<td align="center"><a href="https://www.linkedin.com/in/nguyenkims/"><img src="https://simplelogin.io/about/me.jpeg" width="100px;" alt="Son Nguyen Kim"/><br /><sub><b>Son Nguyen Kim</b></sub></a><br /></td>
|
|
<td align="center"><a href="https://github.com/developStorm"><img src="https://avatars1.githubusercontent.com/u/59678453?s=460&u=3813d29a125b3edeb44019234672b704f7b9b76a&v=4" width="100px;" alt="Raymond Nook"/><br /><sub><b>Raymond Nook</b></sub></a><br /></td>
|
|
<td align="center"><a href="https://github.com/SibrenVasse"><img src="https://avatars1.githubusercontent.com/u/5833571?s=460&u=78aea62ffc215885a0319437fc629a7596ddea31&v=4" width="100px;" alt="Sibren Vasse"/><br /><sub><b>Sibren Vasse</b></sub></a><br /></td>
|
|
</tr>
|
|
</table>
|