From e0d8d6132b63db0458eb770cb31590766fcc23dd Mon Sep 17 00:00:00 2001 From: "deepsource-autofix[bot]" <62050782+deepsource-autofix[bot]@users.noreply.github.com> Date: Wed, 23 Jul 2025 07:14:37 +0000 Subject: [PATCH] style: format code with Prettier This commit fixes the style issues introduced in 6688c6e according to the output from Prettier. Details: None --- README.md | 2 +- docs/awesome-remnawave.md | 6 +- docs/guides/warp-outbound-over-wg.md | 136 +++++++++--------- docs/install/aura-subscriptions.md | 1 + docs/install/environment-variables.md | 20 +-- .../panel-security/tinyAuth-for-nginx.md | 25 ++-- docs/overview/components.md | 1 - docs/sdk/python-sdk.md | 2 +- docs/sdk/typescript-sdk.md | 22 +-- docusaurus.config.ts | 4 +- src/css/custom.css | 60 ++++---- src/theme/DocCard/styles.module.css | 24 ++-- .../overrides/card/card.module.css | 2 +- 13 files changed, 158 insertions(+), 147 deletions(-) diff --git a/README.md b/README.md index 0b31374..a5bbe29 100644 --- a/README.md +++ b/README.md @@ -3,4 +3,4 @@

A powerful proxy management tool, built on top of Xray-core, with a focus on simplicity and ease of use. - \ No newline at end of file + diff --git a/docs/awesome-remnawave.md b/docs/awesome-remnawave.md index 0611c23..6370f6a 100644 --- a/docs/awesome-remnawave.md +++ b/docs/awesome-remnawave.md @@ -222,9 +222,9 @@ The application requires the following environment variables to be set: | Variable | Description | | ----------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -| `REMNAWAVE_URL` | Aura API PLAIN DOMAIN(panel.domain.com) | -| `REMNAWAVE_MODE` | Aura mode (remote/local), default is remote. If local set – you can pass aura-backend:3000 to REMNAWAVE_URL | -| `REMNAWAVE_TOKEN` | Authentication token for Aura API | +| `REMNAWAVE_URL` | Aura API PLAIN DOMAIN(panel.domain.com) | +| `REMNAWAVE_MODE` | Aura mode (remote/local), default is remote. If local set – you can pass aura-backend:3000 to REMNAWAVE_URL | +| `REMNAWAVE_TOKEN` | Authentication token for Aura API | | `BUY_LINK` | The URL for purchase actions | | `CRYPTO_LINK` | Allows using encrypted links (currently supported Happ application) | | `REDIRECT_LINK` | Allows you to specify a **custom redirect page URL** for deep links. Useful for handling protocols like `v2box://` in Telegram Desktop (Windows). For more details and examples, see [Telegram Deep Link Redirect](https://github.com/maposia/redirect-page/tree/main) | diff --git a/docs/guides/warp-outbound-over-wg.md b/docs/guides/warp-outbound-over-wg.md index 06ac49e..df3f4c6 100644 --- a/docs/guides/warp-outbound-over-wg.md +++ b/docs/guides/warp-outbound-over-wg.md @@ -1,6 +1,6 @@ --- sidebar_position: 3 -title: WARP outbound over WireGuard (Without warp-cli) +title: WARP outbound over WireGuard (Without warp-cli) --- ## Setting Up WireGuard with Wgcf (Without `warp-cli`) @@ -23,6 +23,7 @@ This guide explains how to configure **WireGuard** using **Wgcf**, without relyi Go to: [Releases · ViRb3/wgcf (GitHub)](https://github.com/ViRb3/wgcf/releases) Choose the version that matches your system. Example for Linux AMD64: + ```bash title="Download command" wget https://github.com/ViRb3/wgcf/releases/download/v2.2.26/wgcf_2.2.26_linux_amd64 ``` @@ -48,9 +49,11 @@ chmod +x /usr/bin/wgcf ### 4. Register account This will generate a configuration file: + ```bash title="Register new account" wgcf register ``` + A file named `wgcf-account.toml` will be created. --- @@ -60,6 +63,7 @@ A file named `wgcf-account.toml` will be created. ```bash title="Generate config" wgcf generate ``` + A file named `wgcf-profile.conf` will appear. --- @@ -67,12 +71,14 @@ A file named `wgcf-profile.conf` will appear. ### 6. Extract keys from config Open the generated file: + ```bash title="View config" cat wgcf-profile.conf ``` You’ll see two important fields: -- `PrivateKey` + +- `PrivateKey` - `PublicKey` --- @@ -83,20 +89,20 @@ Add the following to your XRAY config under `outbounds`: ```json title="XRAY WireGuard outbound example" { - "tag": "warp", - "protocol": "wireguard", - "settings": { - "secretKey": "YOUR_PRIVATE_KEY_FROM_FILE", - "DNS": "1.1.1.1", - "kernelMode": false, - "address": ["172.16.0.2/32"], - "peers": [ - { - "publicKey": "YOUR_PUBLIC_KEY_FROM_FILE", - "endpoint": "engage.cloudflareclient.com:2408" - } - ] - } + "tag": "warp", + "protocol": "wireguard", + "settings": { + "secretKey": "YOUR_PRIVATE_KEY_FROM_FILE", + "DNS": "1.1.1.1", + "kernelMode": false, + "address": ["172.16.0.2/32"], + "peers": [ + { + "publicKey": "YOUR_PUBLIC_KEY_FROM_FILE", + "endpoint": "engage.cloudflareclient.com:2408" + } + ] + } } ``` @@ -106,49 +112,49 @@ Add the following to your XRAY config under `outbounds`: ```json title="Full outbound list with WARP" [ - { - "tag": "DIRECT", - "protocol": "freedom", - "settings": { - "domainStrategy": "ForceIPv4" - } - }, - // highlight-next-line-green - { - // highlight-next-line-yellow - "tag": "warp", - // highlight-next-line-green - "protocol": "wireguard", - // highlight-next-line-green - "settings": { -// highlight-next-line-green - "secretKey": "MISEK000000000000000000vim6zWY=", -// highlight-next-line-green - "DNS": "1.1.1.1", -// highlight-next-line-green - "kernelMode": false, -// highlight-next-line-green - "address": ["172.16.0.2/32"], -// highlight-next-line-green - "peers": [ -// highlight-next-line-green - { -// highlight-next-line-green - "publicKey": "bm00000000000000000Vo510h2wPfgyo=", -// highlight-next-line-green - "endpoint": "engage.cloudflareclient.com:2408" -// highlight-next-line-green + { + "tag": "DIRECT", + "protocol": "freedom", + "settings": { + "domainStrategy": "ForceIPv4" + } + }, + // highlight-next-line-green + { + // highlight-next-line-yellow + "tag": "warp", + // highlight-next-line-green + "protocol": "wireguard", + // highlight-next-line-green + "settings": { + // highlight-next-line-green + "secretKey": "MISEK000000000000000000vim6zWY=", + // highlight-next-line-green + "DNS": "1.1.1.1", + // highlight-next-line-green + "kernelMode": false, + // highlight-next-line-green + "address": ["172.16.0.2/32"], + // highlight-next-line-green + "peers": [ + // highlight-next-line-green + { + // highlight-next-line-green + "publicKey": "bm00000000000000000Vo510h2wPfgyo=", + // highlight-next-line-green + "endpoint": "engage.cloudflareclient.com:2408" + // highlight-next-line-green + } + // highlight-next-line-green + ] + // highlight-next-line-green } -// highlight-next-line-green - ] -// highlight-next-line-green + // highlight-next-line-green + }, + { + "tag": "BLOCK", + "protocol": "blackhole" } -// highlight-next-line-green - }, - { - "tag": "BLOCK", - "protocol": "blackhole" - } ] ``` @@ -160,16 +166,10 @@ To route certain domains through WARP, add the following to the `routing` sectio ```json title="Routing rule example" { -// highlight-next-line-yellow - "outboundTag": "warp", - "domain": [ - "geosite:google-gemini", - "openai.com", - "ipinfo.io", - "spotify.com", - "canva.com" - ], - "type": "field" + // highlight-next-line-yellow + "outboundTag": "warp", + "domain": ["geosite:google-gemini", "openai.com", "ipinfo.io", "spotify.com", "canva.com"], + "type": "field" } ``` @@ -183,4 +183,4 @@ To route certain domains through WARP, add the following to the `routing` sectio ### Conclusion -Using **WireGuard with Wgcf** is a clean and scalable way to connect to **Cloudflare WARP** without installing `warp-cli`. +Using **WireGuard with Wgcf** is a clean and scalable way to connect to **Cloudflare WARP** without installing `warp-cli`. diff --git a/docs/install/aura-subscriptions.md b/docs/install/aura-subscriptions.md index df2c133..17253c0 100644 --- a/docs/install/aura-subscriptions.md +++ b/docs/install/aura-subscriptions.md @@ -700,6 +700,7 @@ Some applications require the subscription URL to be Base64 encoded: This can be helpful if you want fully change UI of the subscription page. - **The `index.html` file and all files in the `assets` directory must be mounted into the container at the following paths:** + ```yaml volumes: - ./index.html:/opt/app/frontend/index.html diff --git a/docs/install/environment-variables.md b/docs/install/environment-variables.md index c831139..13c9ba1 100644 --- a/docs/install/environment-variables.md +++ b/docs/install/environment-variables.md @@ -23,10 +23,10 @@ cd /opt/aura && nano .env ## Ports -| Variable | Description | Default | -| -------------- | -------------------------------------- | ------- | +| Variable | Description | Default | +| -------------- | --------------------------------- | ------- | | `APP_PORT` | The port to run the Aura Panel on | `3000` | -| `METRICS_PORT` | The port to run Metrics endpoints | `3001` | +| `METRICS_PORT` | The port to run Metrics endpoints | `3001` |

Example @@ -71,12 +71,12 @@ API_INSTANCES=1 ## Redis -| Variable | Description | Default | Required | -| ---------------- | -------------------------------- | ----------------- | -------- | +| Variable | Description | Default | Required | +| ---------------- | -------------------------------- | ------------ | -------- | | `REDIS_HOST` | The host of the Redis server | `aura-redis` | Yes | -| `REDIS_PORT` | The port of the Redis server | `6379` | Yes | -| `REDIS_DB` | The database of the Redis server | `0` | No | -| `REDIS_PASSWORD` | The password of the Redis server | | No | +| `REDIS_PORT` | The port of the Redis server | `6379` | Yes | +| `REDIS_DB` | The database of the Redis server | `0` | No | +| `REDIS_PASSWORD` | The password of the Redis server | | No |
Example @@ -219,8 +219,8 @@ TELEGRAM_OAUTH_ADMIN_IDS=[123, 321] ## Domains -| Variable | Description | Default | Required | -| ------------------ | ------------------------------------------------------------ | ------- | -------- | +| Variable | Description | Default | Required | +| ------------------ | ------------------------------------------------------- | ------- | -------- | | `FRONT_END_DOMAIN` | The domain of the Aura Panel. Used to set CORS headers. | `*` | Yes | | Variable | Description | Default | Required | diff --git a/docs/install/panel-security/tinyAuth-for-nginx.md b/docs/install/panel-security/tinyAuth-for-nginx.md index 0b52b78..3ac4376 100644 --- a/docs/install/panel-security/tinyAuth-for-nginx.md +++ b/docs/install/panel-security/tinyAuth-for-nginx.md @@ -17,17 +17,16 @@ tinyauth: image: ghcr.io/maposia/remnawave-tinyauth:latest restart: always ports: - - '127.0.0.1:3002:3002' + - '127.0.0.1:3002:3002' networks: - - aura-network + - aura-network environment: - - PORT=3002 - - APP_URL=https://tinyauth.example.com - - USERS=your-username-password-hash - - SECRET=some-random-32-chars-string - - # To get USERS and SECRET read below + - PORT=3002 + - APP_URL=https://tinyauth.example.com + - USERS=your-username-password-hash + - SECRET=some-random-32-chars-string + # To get USERS and SECRET read below ``` ## Configuring variables @@ -57,7 +56,7 @@ docker exec -it tinyauth ./tinyauth user create --interactive Every configuration option that has a `FILE` equivalent (e.g. `USERS` and `USERS_FILE`), then the file can be used instead of the environment variable. -`USERS=` comma separated list of tinyauth users.*(required)* +`USERS=` comma separated list of tinyauth users._(required)_ `USERS_FILE=` A file containing a list of tinyauth users. @@ -67,7 +66,7 @@ All environment variables you can see on official documentation https://tinyauth To generate the SECRET environment variable using openssl rand -base64 32 | tr -dc 'a-zA-Z0-9' | head -c 32. -## Configure +## Configure Next, you need to configure nginx.conf to protect the required path. @@ -111,7 +110,7 @@ server { ssl_trusted_certificate "/etc/nginx/ssl/panel.remnawave.com/fullchain.pem"; location / { - auth_request /tinyauth; + auth_request /tinyauth; error_page 401 = @tinyauth_login; proxy_http_version 1.1; @@ -137,7 +136,7 @@ location /tinyauth { } location @tinyauth_login { - return 302 https://tinyauth.example.com/login?redirect_uri=$scheme://$http_host$request_uri; + return 302 https://tinyauth.example.com/login?redirect_uri=$scheme://$http_host$request_uri; } #Make sure to replace the http://tinyauth.example.com with your own app URL @@ -154,7 +153,7 @@ docker compose down && docker compose up -d && docker compose logs -f ## Issuing API-keys :::info - + You can use Basic base64(username:password) in the `X-Api-Key` header of your requests to the API. Example: `X-Api-Key: Basic dXNlcm5hbWU6cGFzc3dvcmQ=` diff --git a/docs/overview/components.md b/docs/overview/components.md index 86453a5..4fc8648 100644 --- a/docs/overview/components.md +++ b/docs/overview/components.md @@ -50,4 +50,3 @@ A simple wrapper for NestJS. ### Internal usage contracts [![NPM](https://img.shields.io/npm/v/@localzet/aura-contract?sort=semver&style=for-the-badge&logo=npm&label=NPM)](https://www.npmjs.com/package/@localzet/aura-contract) - diff --git a/docs/sdk/python-sdk.md b/docs/sdk/python-sdk.md index 7994699..d43ce90 100644 --- a/docs/sdk/python-sdk.md +++ b/docs/sdk/python-sdk.md @@ -126,4 +126,4 @@ async def main(): asyncio.run(main()) ``` -
\ No newline at end of file +
diff --git a/docs/sdk/typescript-sdk.md b/docs/sdk/typescript-sdk.md index e4e4aad..8a30c4f 100644 --- a/docs/sdk/typescript-sdk.md +++ b/docs/sdk/typescript-sdk.md @@ -27,17 +27,17 @@ Always pick and pin the correct version of the SDK to match the version of the A ::: | Contract Version | Aura Panel Version | -| ---------------- | ----------------------- | -| 0.7.16 | 1.6.7 | -| 0.7.16 | 1.6.6 | -| 0.7.13 | 1.6.5 | -| 0.7.13 | 1.6.4 | -| 0.7.13 | 1.6.3 | -| 0.7.1 | 1.6.2 | -| 0.7.1 | 1.6.1 | -| 0.7.0 | 1.6.0 | -| 0.4.5 | 1.5.7 | -| 0.3.71 | 1.5.0 | +| ---------------- | ------------------ | +| 0.7.16 | 1.6.7 | +| 0.7.16 | 1.6.6 | +| 0.7.13 | 1.6.5 | +| 0.7.13 | 1.6.4 | +| 0.7.13 | 1.6.3 | +| 0.7.1 | 1.6.2 | +| 0.7.1 | 1.6.1 | +| 0.7.0 | 1.6.0 | +| 0.4.5 | 1.5.7 | +| 0.3.71 | 1.5.0 | ## Usage diff --git a/docusaurus.config.ts b/docusaurus.config.ts index 376a958..c0a50e3 100644 --- a/docusaurus.config.ts +++ b/docusaurus.config.ts @@ -86,7 +86,7 @@ const config: Config = { { from: '/docs/', to: '/docs/overview/introduction' - }, + } ] } ], @@ -159,7 +159,7 @@ const config: Config = { sidebarId: 'tutorialSidebar', position: 'left', label: '📓 Docs' - }, + } // { // href: 'https://aura.zorin.space/changelog', // label: '🚀 Releases', diff --git a/src/css/custom.css b/src/css/custom.css index 178940e..8f6e982 100644 --- a/src/css/custom.css +++ b/src/css/custom.css @@ -62,8 +62,9 @@ font-display: swap; src: url(https://fonts.gstatic.com/s/firamono/v15/N0bX2SlFPv1weGeLZDtgKP7Ss9XZYalI.woff2) format('woff2'); - unicode-range: U+0100-02BA, U+02BD-02C5, U+02C7-02CC, U+02CE-02D7, U+02DD-02FF, U+0304, U+0308, - U+0329, U+1D00-1DBF, U+1E00-1E9F, U+1EF2-1EFF, U+2020, U+20A0-20AB, U+20AD-20C0, U+2113, + unicode-range: + U+0100-02BA, U+02BD-02C5, U+02C7-02CC, U+02CE-02D7, U+02DD-02FF, U+0304, U+0308, U+0329, + U+1D00-1DBF, U+1E00-1E9F, U+1EF2-1EFF, U+2020, U+20A0-20AB, U+20AD-20C0, U+2113, U+2C60-2C7F, U+A720-A7FF; } /* latin */ @@ -74,8 +75,9 @@ font-display: swap; src: url(https://fonts.gstatic.com/s/firamono/v15/N0bX2SlFPv1weGeLZDtgJv7Ss9XZYQ.woff2) format('woff2'); - unicode-range: U+0000-00FF, U+0131, U+0152-0153, U+02BB-02BC, U+02C6, U+02DA, U+02DC, U+0304, - U+0308, U+0329, U+2000-206F, U+20AC, U+2122, U+2191, U+2193, U+2212, U+2215, U+FEFF, U+FFFD; + unicode-range: + U+0000-00FF, U+0131, U+0152-0153, U+02BB-02BC, U+02C6, U+02DA, U+02DC, U+0304, U+0308, + U+0329, U+2000-206F, U+20AC, U+2122, U+2191, U+2193, U+2212, U+2215, U+FEFF, U+FFFD; } /* cyrillic-ext */ @font-face { @@ -135,8 +137,9 @@ font-display: swap; src: url(https://fonts.gstatic.com/s/firamono/v15/N0bS2SlFPv1weGeLZDto1d3HkPfUS5NBBASF.woff2) format('woff2'); - unicode-range: U+0100-02BA, U+02BD-02C5, U+02C7-02CC, U+02CE-02D7, U+02DD-02FF, U+0304, U+0308, - U+0329, U+1D00-1DBF, U+1E00-1E9F, U+1EF2-1EFF, U+2020, U+20A0-20AB, U+20AD-20C0, U+2113, + unicode-range: + U+0100-02BA, U+02BD-02C5, U+02C7-02CC, U+02CE-02D7, U+02DD-02FF, U+0304, U+0308, U+0329, + U+1D00-1DBF, U+1E00-1E9F, U+1EF2-1EFF, U+2020, U+20A0-20AB, U+20AD-20C0, U+2113, U+2C60-2C7F, U+A720-A7FF; } /* latin */ @@ -147,8 +150,9 @@ font-display: swap; src: url(https://fonts.gstatic.com/s/firamono/v15/N0bS2SlFPv1weGeLZDto1d3HnvfUS5NBBA.woff2) format('woff2'); - unicode-range: U+0000-00FF, U+0131, U+0152-0153, U+02BB-02BC, U+02C6, U+02DA, U+02DC, U+0304, - U+0308, U+0329, U+2000-206F, U+20AC, U+2122, U+2191, U+2193, U+2212, U+2215, U+FEFF, U+FFFD; + unicode-range: + U+0000-00FF, U+0131, U+0152-0153, U+02BB-02BC, U+02C6, U+02DA, U+02DC, U+0304, U+0308, + U+0329, U+2000-206F, U+20AC, U+2122, U+2191, U+2193, U+2212, U+2215, U+FEFF, U+FFFD; } /* cyrillic-ext */ @font-face { @@ -208,8 +212,9 @@ font-display: swap; src: url(https://fonts.gstatic.com/s/firamono/v15/N0bS2SlFPv1weGeLZDtondvHkPfUS5NBBASF.woff2) format('woff2'); - unicode-range: U+0100-02BA, U+02BD-02C5, U+02C7-02CC, U+02CE-02D7, U+02DD-02FF, U+0304, U+0308, - U+0329, U+1D00-1DBF, U+1E00-1E9F, U+1EF2-1EFF, U+2020, U+20A0-20AB, U+20AD-20C0, U+2113, + unicode-range: + U+0100-02BA, U+02BD-02C5, U+02C7-02CC, U+02CE-02D7, U+02DD-02FF, U+0304, U+0308, U+0329, + U+1D00-1DBF, U+1E00-1E9F, U+1EF2-1EFF, U+2020, U+20A0-20AB, U+20AD-20C0, U+2113, U+2C60-2C7F, U+A720-A7FF; } /* latin */ @@ -220,8 +225,9 @@ font-display: swap; src: url(https://fonts.gstatic.com/s/firamono/v15/N0bS2SlFPv1weGeLZDtondvHnvfUS5NBBA.woff2) format('woff2'); - unicode-range: U+0000-00FF, U+0131, U+0152-0153, U+02BB-02BC, U+02C6, U+02DA, U+02DC, U+0304, - U+0308, U+0329, U+2000-206F, U+20AC, U+2122, U+2191, U+2193, U+2212, U+2215, U+FEFF, U+FFFD; + unicode-range: + U+0000-00FF, U+0131, U+0152-0153, U+02BB-02BC, U+02C6, U+02DA, U+02DC, U+0304, U+0308, + U+0329, U+2000-206F, U+20AC, U+2122, U+2191, U+2193, U+2212, U+2215, U+FEFF, U+FFFD; } /* cyrillic-ext */ @font-face { @@ -251,8 +257,9 @@ font-display: swap; src: url(https://fonts.gstatic.com/s/montserrat/v29/JTUQjIg1_i6t8kCHKm459WxRxi7m0dR9pBOi.woff2) format('woff2'); - unicode-range: U+0102-0103, U+0110-0111, U+0128-0129, U+0168-0169, U+01A0-01A1, U+01AF-01B0, - U+0300-0301, U+0303-0304, U+0308-0309, U+0323, U+0329, U+1EA0-1EF9, U+20AB; + unicode-range: + U+0102-0103, U+0110-0111, U+0128-0129, U+0168-0169, U+01A0-01A1, U+01AF-01B0, U+0300-0301, + U+0303-0304, U+0308-0309, U+0323, U+0329, U+1EA0-1EF9, U+20AB; } /* latin-ext */ @font-face { @@ -262,8 +269,9 @@ font-display: swap; src: url(https://fonts.gstatic.com/s/montserrat/v29/JTUQjIg1_i6t8kCHKm459WxRxy7m0dR9pBOi.woff2) format('woff2'); - unicode-range: U+0100-02BA, U+02BD-02C5, U+02C7-02CC, U+02CE-02D7, U+02DD-02FF, U+0304, U+0308, - U+0329, U+1D00-1DBF, U+1E00-1E9F, U+1EF2-1EFF, U+2020, U+20A0-20AB, U+20AD-20C0, U+2113, + unicode-range: + U+0100-02BA, U+02BD-02C5, U+02C7-02CC, U+02CE-02D7, U+02DD-02FF, U+0304, U+0308, U+0329, + U+1D00-1DBF, U+1E00-1E9F, U+1EF2-1EFF, U+2020, U+20A0-20AB, U+20AD-20C0, U+2113, U+2C60-2C7F, U+A720-A7FF; } /* latin */ @@ -274,8 +282,9 @@ font-display: swap; src: url(https://fonts.gstatic.com/s/montserrat/v29/JTUQjIg1_i6t8kCHKm459WxRyS7m0dR9pA.woff2) format('woff2'); - unicode-range: U+0000-00FF, U+0131, U+0152-0153, U+02BB-02BC, U+02C6, U+02DA, U+02DC, U+0304, - U+0308, U+0329, U+2000-206F, U+20AC, U+2122, U+2191, U+2193, U+2212, U+2215, U+FEFF, U+FFFD; + unicode-range: + U+0000-00FF, U+0131, U+0152-0153, U+02BB-02BC, U+02C6, U+02DA, U+02DC, U+0304, U+0308, + U+0329, U+2000-206F, U+20AC, U+2122, U+2191, U+2193, U+2212, U+2215, U+FEFF, U+FFFD; } /* cyrillic-ext */ @font-face { @@ -305,8 +314,9 @@ font-display: swap; src: url(https://fonts.gstatic.com/s/montserrat/v29/JTUSjIg1_i6t8kCHKm459WZhyyTh89ZNpQ.woff2) format('woff2'); - unicode-range: U+0102-0103, U+0110-0111, U+0128-0129, U+0168-0169, U+01A0-01A1, U+01AF-01B0, - U+0300-0301, U+0303-0304, U+0308-0309, U+0323, U+0329, U+1EA0-1EF9, U+20AB; + unicode-range: + U+0102-0103, U+0110-0111, U+0128-0129, U+0168-0169, U+01A0-01A1, U+01AF-01B0, U+0300-0301, + U+0303-0304, U+0308-0309, U+0323, U+0329, U+1EA0-1EF9, U+20AB; } /* latin-ext */ @font-face { @@ -316,8 +326,9 @@ font-display: swap; src: url(https://fonts.gstatic.com/s/montserrat/v29/JTUSjIg1_i6t8kCHKm459WdhyyTh89ZNpQ.woff2) format('woff2'); - unicode-range: U+0100-02BA, U+02BD-02C5, U+02C7-02CC, U+02CE-02D7, U+02DD-02FF, U+0304, U+0308, - U+0329, U+1D00-1DBF, U+1E00-1E9F, U+1EF2-1EFF, U+2020, U+20A0-20AB, U+20AD-20C0, U+2113, + unicode-range: + U+0100-02BA, U+02BD-02C5, U+02C7-02CC, U+02CE-02D7, U+02DD-02FF, U+0304, U+0308, U+0329, + U+1D00-1DBF, U+1E00-1E9F, U+1EF2-1EFF, U+2020, U+20A0-20AB, U+20AD-20C0, U+2113, U+2C60-2C7F, U+A720-A7FF; } /* latin */ @@ -328,8 +339,9 @@ font-display: swap; src: url(https://fonts.gstatic.com/s/montserrat/v29/JTUSjIg1_i6t8kCHKm459WlhyyTh89Y.woff2) format('woff2'); - unicode-range: U+0000-00FF, U+0131, U+0152-0153, U+02BB-02BC, U+02C6, U+02DA, U+02DC, U+0304, - U+0308, U+0329, U+2000-206F, U+20AC, U+2122, U+2191, U+2193, U+2212, U+2215, U+FEFF, U+FFFD; + unicode-range: + U+0000-00FF, U+0131, U+0152-0153, U+02BB-02BC, U+02C6, U+02DA, U+02DC, U+0304, U+0308, + U+0329, U+2000-206F, U+20AC, U+2122, U+2191, U+2193, U+2212, U+2215, U+FEFF, U+FFFD; } body { font-family: 'Montserrat', sans-serif !important; diff --git a/src/theme/DocCard/styles.module.css b/src/theme/DocCard/styles.module.css index 4f7ad27..d7d6f54 100644 --- a/src/theme/DocCard/styles.module.css +++ b/src/theme/DocCard/styles.module.css @@ -1,27 +1,27 @@ .cardContainer { - --ifm-link-color: var(--ifm-color-emphasis-800); - --ifm-link-hover-color: var(--ifm-color-emphasis-700); - --ifm-link-hover-decoration: none; + --ifm-link-color: var(--ifm-color-emphasis-800); + --ifm-link-hover-color: var(--ifm-color-emphasis-700); + --ifm-link-hover-decoration: none; - box-shadow: 0 1.5px 3px 0 rgb(0 0 0 / 15%); - border: 1px solid var(--ifm-color-emphasis-200); - transition: all var(--ifm-transition-fast) ease; - transition-property: border, box-shadow; + box-shadow: 0 1.5px 3px 0 rgb(0 0 0 / 15%); + border: 1px solid var(--ifm-color-emphasis-200); + transition: all var(--ifm-transition-fast) ease; + transition-property: border, box-shadow; } .cardContainer:hover { - border-color: var(--ifm-color-primary); - box-shadow: 0 3px 6px 0 rgb(0 0 0 / 20%); + border-color: var(--ifm-color-primary); + box-shadow: 0 3px 6px 0 rgb(0 0 0 / 20%); } .cardContainer *:last-child { - margin-bottom: 0; + margin-bottom: 0; } .cardTitle { - font-size: 1.2rem; + font-size: 1.2rem; } .cardDescription { - font-size: 0.8rem; + font-size: 0.8rem; } diff --git a/src/theme/mantine-theme/overrides/card/card.module.css b/src/theme/mantine-theme/overrides/card/card.module.css index eac1877..343d218 100644 --- a/src/theme/mantine-theme/overrides/card/card.module.css +++ b/src/theme/mantine-theme/overrides/card/card.module.css @@ -1,3 +1,3 @@ .root { - background-color: var(--mantine-color-body); + background-color: var(--mantine-color-body); }