Compare commits

...

34 Commits

Author SHA1 Message Date
Daniel Luiz Alves
e7ae7833ad [RELEASE] v3.1.8-beta (#187) 2025-08-01 10:15:20 -03:00
Daniel Luiz Alves
22f34f6f81 chore: increment version numbers to 3.1.8-beta across all package.json files 2025-08-01 10:04:06 -03:00
Daniel Luiz Alves
29efe0a10e refactor: format public paths in RedirectHandler for improved readability
- Reformatted the publicPaths array in the RedirectHandler component for better code clarity and maintainability.
2025-08-01 10:02:52 -03:00
Daniel Luiz Alves
965c64b468 feat: update public paths in RedirectHandler for enhanced routing
- Added new public paths ("/s/" and "/r/") to the RedirectHandler component to support additional routes for unauthenticated users.
2025-08-01 10:01:59 -03:00
Daniel Luiz Alves
ce57cda672 feat: enhance authentication flow and user redirection (#183) 2025-07-30 02:03:19 -03:00
Daniel Luiz Alves
a59857079e feat: add QR code modal translations for multiple languages
- Introduced translations for the QR code sharing modal in various languages including Arabic, German, Spanish, French, Hindi, Italian, Japanese, Korean, Dutch, Polish, Portuguese, Russian, Turkish, and Chinese.
- Removed duplicate QR code modal entries from the respective language files to maintain consistency.
2025-07-30 01:31:44 -03:00
Daniel Luiz Alves
9ae2a0c628 feat: enhance authentication flow and user redirection
- Updated the getCurrentUser method to return null for unauthorized access instead of error messages.
- Modified API documentation to reflect changes in the response structure for the current user endpoint.
- Introduced a RedirectHandler component to manage user redirection based on authentication status.
- Enhanced home and login pages to handle loading states and redirect users appropriately based on authentication.
- Improved the useHome hook to manage visibility of the home page based on user authentication status.
2025-07-30 01:29:16 -03:00
Daniel Luiz Alves
f2c514cd82 refactor: remove demo functionality and related components (#182) 2025-07-30 00:43:03 -03:00
Daniel Luiz Alves
6755230c53 refactor: remove demo functionality and related components
- Deleted the demo page and its associated client component to streamline the application.
- Removed demo-related button from the home page.
- Updated environment variable configuration by removing the DEMO_MODE setting.
- Simplified file controller and storage service logic by eliminating demo mode checks.
2025-07-30 00:40:57 -03:00
Daniel Luiz Alves
f2a0e60f20 [RELEASE] v3.1.7-beta (#181) 2025-07-29 22:54:19 -03:00
Daniel Luiz Alves
6cb21e95c4 chore: increment version numbers to 3.1.7-beta across all package.json files 2025-07-29 22:20:56 -03:00
Daniel Luiz Alves
868add68a5 feat: enhance localization with new placeholders and error messages
- Added "namePlaceholder" to share creation modals across multiple languages for improved user guidance.
- Updated error messages in various languages to maintain consistency and clarity.
- Introduced "filesQueued" message for better user feedback during file uploads in multiple languages.
2025-07-29 22:16:07 -03:00
Daniel Luiz Alves
307148d951 fix: enhance reset-password script and update navbar responsiveness
- Updated reset-password.sh to set DATABASE_URL if not already defined and ensure the database directory exists.
- Improved navbar component responsiveness by adjusting visibility classes for navigation items and added a new sponsor link.
2025-07-29 18:37:22 -03:00
Daniel Luiz Alves
9cb4235550 [Release] v3.1.6-beta (#174) 2025-07-22 19:28:55 -03:00
Daniel Luiz Alves
6014b3e961 chore: update environment variable configurations and documentation
- Updated docker-compose files to provide clearer environment variable options for S3 and filesystem encryption.
- Removed default values for ENABLE_S3 and DISABLE_FILESYSTEM_ENCRYPTION in favor of commented guidance for user customization.
- Incremented version numbers to 3.1.6-beta across all relevant package.json files.
- Enhanced documentation to reflect changes in configuration and deployment instructions, including UID/GID handling and storage options.
2025-07-22 18:53:54 -03:00
Daniel Luiz Alves
32f0a891ba refactor: update filesystem encryption handling and configuration
refactor: simplify server startup script and move provider/config checks to separate files

docs: update documentation to reflect encryption changes and default UID/GID values

- Changed default behavior to disable filesystem encryption for improved performance.
- Updated environment variable handling for DISABLE_FILESYSTEM_ENCRYPTION and ENCRYPTION_KEY across multiple configuration files.
- Added new scripts and configuration files for managing application settings and providers.
- Adjusted Dockerfile and server start scripts to reflect changes in UID/GID handling and file management.
- Enhanced documentation to clarify encryption options and their implications.
2025-07-22 16:02:44 -03:00
Daniel Luiz Alves
124ac46eeb [Release] v3.1.5-beta (#172) 2025-07-22 01:09:27 -03:00
Daniel Luiz Alves
d3e76c19bf chore: update package versions to 3.1.5-beta across all apps 2025-07-22 00:36:11 -03:00
Daniel Luiz Alves
dd1ce189ae refactor: improve file download handling and memory management (#171) 2025-07-22 00:28:43 -03:00
Daniel Luiz Alves
82e43b06c6 refactor(filesystem): improve file download handling and memory management
- Replace separate large/small file download methods with unified stream handling
- Add memory usage tracking and garbage collection for download operations
- Implement proper stream cleanup and error handling
- Remove redundant comments and simplify interval configuration
2025-07-22 00:24:47 -03:00
Daniel Luiz Alves
aab4e6d9df [Release] v3.1.4-beta (#169) 2025-07-21 18:42:28 -03:00
Daniel Luiz Alves
1f097678ce chore: add monorepo version update to the update-versions script 2025-07-21 18:11:19 -03:00
Daniel Luiz Alves
96cb4a04ec chore: update package versions to 3.1.4-beta across all apps 2025-07-21 18:07:03 -03:00
Daniel Luiz Alves
b7c4b37e89 Feat: Implement disable password authentication (#168) 2025-07-21 18:02:39 -03:00
Daniel Luiz Alves
952cf27ecb refactor: streamline authentication and password handling
- Removed unnecessary parameters from the GET request in the auth config route.
- Adjusted import order in the forgot password hook for consistency.
- Cleaned up password validation logic in the login schema for better readability.
2025-07-21 17:59:40 -03:00
Daniel Luiz Alves
765810e4e5 feat: implement disable password authentication configuration and validation
- Added a new configuration option for enabling/disabling password authentication.
- Implemented validation to prevent disabling password authentication if no other authentication providers are active.
- Updated authentication and login services to handle scenarios based on the password authentication setting.
- Enhanced the UI to reflect the password authentication status and provide user feedback accordingly.
- Added translations and error messages for better user experience across multiple languages.
2025-07-21 17:43:54 -03:00
Daniel Luiz Alves
36d09a7679 Feat: Enhance email sharing functionality (#166) 2025-07-21 15:26:13 -03:00
Daniel Luiz Alves
c6d6648942 feat: implement batch file upload notifications in reverse share service
- Added functionality to send email notifications upon batch file uploads to reverse shares.
- Integrated EmailService to handle email sending with a structured HTML template for notifications.
- Enhanced ReverseShareService to manage upload sessions and trigger notifications after file uploads.
2025-07-21 15:24:16 -03:00
Daniel Luiz Alves
54ca7580b0 feat: enhance email sharing functionality with sender information and improved HTML template
- Updated the sendShareNotification method to include senderName as an optional parameter.
- Enhanced the email template with a more structured HTML layout for better presentation.
- Integrated user service to retrieve sender information based on user ID, improving the personalization of share notifications.
2025-07-21 14:11:42 -03:00
Daniel Luiz Alves
4e53d239bb Feat: Add system information endpoint and integrate s3 support (#165) 2025-07-21 11:57:40 -03:00
Daniel Luiz Alves
6491894f0e fix: update dependency in GlobalDropZone to include S3 status 2025-07-21 11:52:09 -03:00
Daniel Luiz Alves
93e05dd913 feat: add system information endpoint and integrate S3 support
- Implemented a new endpoint to retrieve system information, including the active storage provider and S3 status.
- Updated the AppService to fetch system information and return relevant data.
- Integrated system information fetching in the FileUploadSection, GlobalDropZone, and UploadFileModal components to adjust upload behavior based on S3 availability.
- Enhanced chunked upload logic to conditionally use chunked uploads based on the storage provider.
2025-07-21 11:50:13 -03:00
Daniel Luiz Alves
2efe69e50b Feat: improve file download handling with streaming support (#163) 2025-07-21 10:32:29 -03:00
Daniel Luiz Alves
761865a6a3 feat: improve file download handling with streaming support
- Replaced buffer-based file downloads with streaming for large files in FilesystemController.
- Added createDecryptedReadStream method in FilesystemStorageProvider to facilitate streaming decryption.
- Updated chunk download method to use streams, enhancing performance and memory efficiency.
2025-07-21 10:30:59 -03:00
86 changed files with 2092 additions and 1105 deletions

1
.gitignore vendored
View File

@@ -30,6 +30,7 @@ apps/server/dist/*
#DEFAULT #DEFAULT
.env .env
.steering
data/ data/
node_modules/ node_modules/

View File

@@ -82,7 +82,7 @@ RUN addgroup --system --gid ${PALMR_GID} nodejs
RUN adduser --system --uid ${PALMR_UID} --ingroup nodejs palmr RUN adduser --system --uid ${PALMR_UID} --ingroup nodejs palmr
# Create application directories # Create application directories
RUN mkdir -p /app/palmr-app /app/web /home/palmr/.npm /home/palmr/.cache RUN mkdir -p /app/palmr-app /app/web /app/infra /home/palmr/.npm /home/palmr/.cache
RUN chown -R palmr:nodejs /app /home/palmr RUN chown -R palmr:nodejs /app /home/palmr
# === Copy Server Files to /app/palmr-app (separate from /app/server for bind mounts) === # === Copy Server Files to /app/palmr-app (separate from /app/server for bind mounts) ===
@@ -117,10 +117,13 @@ WORKDIR /app
# Create supervisor configuration # Create supervisor configuration
RUN mkdir -p /etc/supervisor/conf.d RUN mkdir -p /etc/supervisor/conf.d
# Copy server start script # Copy server start script and configuration files
COPY infra/server-start.sh /app/server-start.sh COPY infra/server-start.sh /app/server-start.sh
COPY infra/configs.json /app/infra/configs.json
COPY infra/providers.json /app/infra/providers.json
COPY infra/check-missing.js /app/infra/check-missing.js
RUN chmod +x /app/server-start.sh RUN chmod +x /app/server-start.sh
RUN chown palmr:nodejs /app/server-start.sh RUN chown -R palmr:nodejs /app/server-start.sh /app/infra
# Copy supervisor configuration # Copy supervisor configuration
COPY infra/supervisord.conf /etc/supervisor/conf.d/supervisord.conf COPY infra/supervisord.conf /etc/supervisor/conf.d/supervisord.conf
@@ -133,7 +136,7 @@ set -e
echo "Starting Palmr Application..." echo "Starting Palmr Application..."
echo "Storage Mode: \${ENABLE_S3:-false}" echo "Storage Mode: \${ENABLE_S3:-false}"
echo "Secure Site: \${SECURE_SITE:-false}" echo "Secure Site: \${SECURE_SITE:-false}"
echo "Encryption: \${DISABLE_FILESYSTEM_ENCRYPTION:-false}" echo "Encryption: \${DISABLE_FILESYSTEM_ENCRYPTION:-true}"
echo "Database: SQLite" echo "Database: SQLite"
# Set global environment variables # Set global environment variables

View File

@@ -30,8 +30,6 @@ services:
```bash ```bash
docker run -d \ docker run -d \
--name palmr \ --name palmr \
-e ENABLE_S3=false \
-e ENCRYPTION_KEY=change-this-key-in-production-min-32-chars \
-p 5487:5487 \ -p 5487:5487 \
-p 3333:3333 \ -p 3333:3333 \
-v palmr_data:/app/server \ -v palmr_data:/app/server \

View File

@@ -45,9 +45,9 @@ Palmr. uses **filesystem storage** as the default storage solution, keeping thin
#### Performance Considerations with Encryption #### Performance Considerations with Encryption
By default, filesystem storage uses encryption (AES-256-CBC) to protect files at rest, which adds CPU overhead during uploads (encryption) and downloads (decryption). This can make operations slower and consume more resources, particularly for large files or in resource-constrained environments like containers or low-end VMs. By default, filesystem storage operates without encryption for optimal performance, providing fast uploads and downloads with minimal CPU overhead. This approach is ideal for most use cases where performance is prioritized.
If performance is a priority and you don't need encryption (e.g., for non-sensitive data or testing), you can disable it by setting the environment variable `DISABLE_FILESYSTEM_ENCRYPTION=true` in your `.env` file or Docker configuration. Note that disabling encryption stores files in plaintext on disk, reducing security. If you need to protect sensitive files at rest, you can enable encryption by setting `DISABLE_FILESYSTEM_ENCRYPTION=false` and providing an `ENCRYPTION_KEY` in your configuration. When enabled, Palmr uses AES-256-CBC encryption, which adds CPU overhead during uploads (encryption) and downloads (decryption), particularly for large files or in resource-constrained environments like containers or low-end VMs.
For optimal performance with encryption enabled, ensure your hardware supports AES-NI acceleration (check with `cat /proc/cpuinfo | grep aes` on Linux). For optimal performance with encryption enabled, ensure your hardware supports AES-NI acceleration (check with `cat /proc/cpuinfo | grep aes` on Linux).

View File

@@ -47,12 +47,12 @@ docker exec -it <container_name_or_id> /bin/sh
Replace `<container_name_or_id>` with the name or ID of your Palmr container. This command opens an interactive shell session inside the container, allowing you to execute commands directly. Replace `<container_name_or_id>` with the name or ID of your Palmr container. This command opens an interactive shell session inside the container, allowing you to execute commands directly.
### 3. Navigate to the server directory ### 3. Navigate to the application directory
Once inside the container, navigate to the server directory where the reset script is located: Once inside the container, navigate to the application directory where the reset script is located:
```bash ```bash
cd /app/server cd /app/palmr-app
``` ```
This directory contains the necessary scripts and configurations for managing Palmr's backend operations. This directory contains the necessary scripts and configurations for managing Palmr's backend operations.
@@ -135,11 +135,11 @@ If you encounter issues while running the script, refer to the following solutio
- Confirm that the `prisma/palmr.db` file exists and has the correct permissions. - Confirm that the `prisma/palmr.db` file exists and has the correct permissions.
- Verify that the container has access to the database volume. - Verify that the container has access to the database volume.
- **Error: "Script must be run from server directory"** - **Error: "Script must be run from application directory"**
This error appears if you are not in the correct directory. Navigate to the server directory with: This error appears if you are not in the correct directory. Navigate to the application directory with:
```bash ```bash
cd /app/server cd /app/palmr-app
``` ```
- **Error: "User not found"** - **Error: "User not found"**

View File

@@ -3,224 +3,250 @@ title: Quick Start (Docker)
icon: "Rocket" icon: "Rocket"
--- ---
import { Callout } from "fumadocs-ui/components/callout";
import { Tab, Tabs } from "fumadocs-ui/components/tabs";
import { Card, CardGrid } from "@/components/ui/card";
Welcome to the fastest way to deploy <span className="font-bold">Palmr.</span> - your secure, self-hosted file sharing solution. This guide will have you up and running in minutes, whether you're new to self-hosting or an experienced developer. Welcome to the fastest way to deploy <span className="font-bold">Palmr.</span> - your secure, self-hosted file sharing solution. This guide will have you up and running in minutes, whether you're new to self-hosting or an experienced developer.
Palmr. offers flexible deployment options to match your infrastructure needs. This guide focuses on Docker deployment with our recommended filesystem storage, perfect for most use cases. Palmr. offers flexible deployment options to match your infrastructure needs. This guide focuses on Docker deployment with our recommended filesystem storage, perfect for most use cases.
## Prerequisites ## Prerequisites
Ensure you have the following installed on your system: Before you begin, make sure you have:
- **Docker** - Container runtime ([installation guide](https://docs.docker.com/get-docker/)) - **Docker** - Container runtime ([installation guide](https://docs.docker.com/get-docker/))
- **Docker Compose** - Multi-container orchestration ([installation guide](https://docs.docker.com/compose/install/)) - **Docker Compose** - Multi-container orchestration ([installation guide](https://docs.docker.com/compose/install/))
- **2GB+ available disk space** for the application and your files
- **Port 5487** available for the web interface
- **Port 3333** available for API access (optional)
> **Platform Support**: Palmr. is developed on macOS and extensively tested on Linux servers. While we haven't formally tested other platforms, Docker's cross-platform nature should ensure compatibility. Report any issues on our [GitHub repository](https://github.com/kyantech/Palmr/issues). <Callout>
**Platform Support**: Palmr. is developed on macOS and extensively tested on Linux servers. While we haven't formally
tested other platforms, Docker's cross-platform nature should ensure compatibility. Report any issues on our [GitHub
repository](https://github.com/kyantech/Palmr/issues).
</Callout>
## Storage Options ## Storage Options
Palmr. supports two storage approaches for persistent data: Palmr. supports two storage approaches for persistent data:
### Named Volumes (Recommended) - **Named Volumes (Recommended)** - Docker-managed storage with optimal performance and no permission issues
- **Bind Mounts** - Direct host filesystem access, ideal for development and direct file management
**Best for**: Production environments, automated deployments ## Deployment Options
- ✅ **Managed by Docker**: No permission issues or manual path management Choose your storage method based on your needs:
- ✅ **Optimized Performance**: Docker-native storage optimization
- ✅ **Cross-platform**: Consistent behavior across operating systems
- ✅ **Simplified Backups**: Docker volume commands for backup/restore
### Bind Mounts <Tabs items={['Named Volumes (Recommended)', 'Bind Mounts']}>
<Tab value="Named Volumes (Recommended)">
Docker-managed storage that provides the best balance of performance, security, and ease of use:
**Best for**: Development, direct file access requirements - **No Permission Issues**: Docker handles all permission management automatically
- **Performance**: Optimized for container workloads with better I/O performance
- **Production Ready**: Recommended for production deployments
- ✅ **Direct Access**: Files stored in local directory you specify ### Configuration
- ✅ **Transparent Storage**: Direct filesystem access from host
- ✅ **Custom Backup**: Use existing file system backup solutions
- ⚠️ **Permission Considerations**: **Common Issue** - Requires UID/GID configuration (see troubleshooting below)
--- Create a `docker-compose.yml` file:
## Option 1: Named Volumes (Recommended) ```yaml
services:
palmr:
image: kyantech/palmr:latest
container_name: palmr
restart: unless-stopped
ports:
- "5487:5487" # Web interface
# - "3333:3333" # API (optional)
environment:
# Optional: Uncomment and configure as needed (if you don`t use, you can remove)
# - ENABLE_S3=true # Set to true to enable S3-compatible storage
# - DISABLE_FILESYSTEM_ENCRYPTION=true # Set to false to enable file encryption
# - ENCRYPTION_KEY=your-secure-key-min-32-chars # Required only if encryption is enabled
# - PALMR_UID=1000 # UID for the container processes (default is 1000)
# - PALMR_GID=1000 # GID for the container processes (default is 1000)
# - SECURE_SITE=false # Set to true if you are using a reverse proxy
# - DEFAULT_LANGUAGE=en-US # Default language for the application (optional, defaults to en-US)
volumes:
- palmr_data:/app/server
Named volumes provide the best performance and are managed entirely by Docker.
### Configuration
Use the provided `docker-compose.yaml` for named volumes:
```yaml
services:
palmr:
image: kyantech/palmr:latest
container_name: palmr
environment:
- ENABLE_S3=false
- ENCRYPTION_KEY=change-this-key-in-production-min-32-chars # CHANGE THIS KEY FOR SECURITY
# - DISABLE_FILESYSTEM_ENCRYPTION=false # Set to true to disable file encryption (ENCRYPTION_KEY becomes optional)
# - SECURE_SITE=false # Set to true if you are using a reverse proxy
# - DEFAULT_LANGUAGE=en-US # Default language for the application (optional, defaults to en-US)
ports:
- "5487:5487" # Web interface
- "3333:3333" # API port (OPTIONAL EXPOSED - ONLY IF YOU WANT TO ACCESS THE API DIRECTLY)
volumes: volumes:
- palmr_data:/app/server # Named volume for the application data palmr_data:
restart: unless-stopped # Restart the container unless it is stopped ```
volumes: <Callout type="info">
palmr_data: **Having upload or permission issues?** Add `PALMR_UID=1000` and `PALMR_GID=1000` to your environment variables. Check our [UID/GID Configuration](/docs/3.1-beta/uid-gid-configuration) guide for more details.
``` </Callout>
> **Note:** If you haveing problem with uploading files, try to change the `PALMR_UID` and `PALMR_GID` to the UID and GID of the user running the container. You can find the UID and GID of the user running the container with the command `id -u` and `id -g`. in Linux systems the default user is `1000` and the default group is `1000`. For test you can add the environment variables below to the `docker-compose.yaml` file and restart the container. ### Deploy
```yaml ```bash
environment: docker-compose up -d
- PALMR_UID=1000 # UID for the container processes (default is 1001) ```
- PALMR_GID=1000 # GID for the container processes (default is 1001)
```
> **Note:** For more information about UID and GID, see our [UID/GID Configuration](/docs/3.1-beta/uid-gid-configuration) guide. </Tab>
<Tab value="Bind Mounts">
Direct mapping to host filesystem directories, providing direct file access:
### Deployment - **Direct Access**: Files are directly accessible from your host system
- **Development Friendly**: Easy to inspect, modify, or backup files manually
- **Platform Dependent**: May require UID/GID configuration, especially on NAS systems
```bash ### Configuration
docker-compose up -d
```
--- Create a `docker-compose.yml` file:
## Option 2: Bind Mounts ```yaml
services:
palmr:
image: kyantech/palmr:latest
container_name: palmr
restart: unless-stopped
ports:
- "5487:5487" # Web interface
# - "3333:3333" # API (optional)
environment:
# Optional: Uncomment and configure as needed (if you don`t use, you can remove)
# - ENABLE_S3=true # Set to true to enable S3-compatible storage
# - DISABLE_FILESYSTEM_ENCRYPTION=false # Set to false to enable file encryption
# - ENCRYPTION_KEY=your-secure-key-min-32-chars # Required only if encryption is enabled
# - PALMR_UID=1000 # UID for the container processes (default is 1000)
# - PALMR_GID=1000 # GID for the container processes (default is 1000)
# - SECURE_SITE=false # Set to true if you are using a reverse proxy
# - DEFAULT_LANGUAGE=en-US # Default language for the application (optional, defaults to en-US)
volumes:
- ./data:/app/server
```
Bind mounts store data in a local directory, providing direct file system access. <Callout type="info">
**Having upload or permission issues?** Add `PALMR_UID=1000` and `PALMR_GID=1000` to your environment variables. Check our [UID/GID Configuration](/docs/3.1-beta/uid-gid-configuration) guide for more details.
</Callout>
### Configuration ### Deploy
To use bind mounts, **replace the content** of your `docker-compose.yaml` with the following configuration (you can also reference `docker-compose-bind-mount-example.yaml` as a template): ```bash
docker-compose up -d
```
```yaml </Tab>
services: </Tabs>
palmr:
image: kyantech/palmr:latest
container_name: palmr
environment:
- ENABLE_S3=false
- ENCRYPTION_KEY=change-this-key-in-production-min-32-chars # CHANGE THIS KEY FOR SECURITY
- PALMR_UID=1000 # UID for the container processes (default is 1001)
- PALMR_GID=1000 # GID for the container processes (default is 1001)
# - DISABLE_FILESYSTEM_ENCRYPTION=false # Set to true to disable file encryption (ENCRYPTION_KEY becomes optional)
# - SECURE_SITE=false # Set to true if you are using a reverse proxy
# - DEFAULT_LANGUAGE=en-US # Default language for the application (optional, defaults to en-US)
ports:
- "5487:5487" # Web port
- "3333:3333" # API port (OPTIONAL EXPOSED - ONLY IF YOU WANT TO ACCESS THE API DIRECTLY)
volumes:
# Bind mount for persistent data (uploads, database, temp files)
- ./data:/app/server # Local directory for the application data
restart: unless-stopped # Restart the container unless it is stopped
```
### Deployment ## Configuration
```bash Customize Palmr's behavior with these environment variables:
docker-compose up -d
```
> **Permission Configuration**: If you encounter permission issues with bind mounts (common on NAS systems), see our [UID/GID Configuration](/docs/3.1-beta/uid-gid-configuration) guide for automatic permission handling. | Variable | Default | Description |
| ------------------------------- | ------- | -------------------------------------------------------------------------------------------- |
| `ENABLE_S3` | `false` | Enable S3-compatible storage backends |
| `ENCRYPTION_KEY` | - | **Required when encryption is enabled**: 32+ character key for file encryption |
| `DISABLE_FILESYSTEM_ENCRYPTION` | `true` | Disable file encryption for better performance (set to `false` to enable encryption) |
| `SECURE_SITE` | `false` | Enable secure cookies for HTTPS/reverse proxy deployments |
| `DEFAULT_LANGUAGE` | `en-US` | Default application language ([see available languages](/docs/3.1-beta/available-languages)) |
| `PALMR_UID` | `1000` | User ID for container processes (helps with file permissions) |
| `PALMR_GID` | `1000` | Group ID for container processes (helps with file permissions) |
--- <Callout type="info">
**Performance First**: Palmr runs without encryption by default for optimal speed and lower resource usage—perfect for
most use cases.
</Callout>
## Environment Variables <Callout type="warn">
**Encryption Notice**: To enable encryption, set `DISABLE_FILESYSTEM_ENCRYPTION=false` and provide a 32+ character
`ENCRYPTION_KEY`. **Important**: This choice is permanent—switching encryption modes after uploading files will break
access to existing uploads.
</Callout>
Configure Palmr. behavior through environment variables: <Callout>
**Using a Reverse Proxy?** Set `SECURE_SITE=true` and check our [Reverse Proxy
Configuration](/docs/3.1-beta/reverse-proxy-configuration) guide for proper HTTPS setup.
</Callout>
| Variable | Default | Description | ### Generate Encryption Keys (Optional)
| ------------------------------- | ------- | ----------------------------------------------------------------------------------------------------------------- |
| `ENABLE_S3` | `false` | Enable S3-compatible storage |
| `ENCRYPTION_KEY` | - | **Required** (unless encryption disabled): Minimum 32 characters for file encryption |
| `DISABLE_FILESYSTEM_ENCRYPTION` | `false` | Disable file encryption for direct filesystem access |
| `SECURE_SITE` | `false` | Enable secure cookies for HTTPS/reverse proxy setups |
| `DEFAULT_LANGUAGE` | `en-US` | Set the default application language (see supported languages in docs [here](/docs/3.1-beta/available-languages)) |
| `PALMR_UID` | `1001` | Set the UID for the container processes (OPTIONAL - default is 1001) |
| `PALMR_GID` | `1001` | Set the GID for the container processes (OPTIONAL - default is 1001) |
> **⚠️ Security Warning**: Always change the `ENCRYPTION_KEY` in production when encryption is enabled. This key encrypts your files - losing it makes files permanently inaccessible. Need file encryption? Generate a secure key:
> **🔓 File Encryption Control**: The `DISABLE_FILESYSTEM_ENCRYPTION` variable allows you to store files without encryption for direct filesystem access. When set to `true`, the `ENCRYPTION_KEY` becomes optional. **Important**: Once set, this configuration is permanent for your deployment. Switching between encrypted and unencrypted modes will break file access for existing uploads. Choose your strategy before uploading files. For more details on performance implications of encryption, see [Performance Considerations with Encryption](/docs/3.1-beta/architecture#performance-considerations-with-encryption).
> **🔗 Reverse Proxy**: If deploying behind a reverse proxy (Traefik, Nginx, etc.), set `SECURE_SITE=true` and review our [Reverse Proxy Configuration](/docs/3.1-beta/reverse-proxy-configuration) guide for proper setup.
### Generate Secure Encryption Keys
Need a strong key for `ENCRYPTION_KEY`? Use our built-in generator to create cryptographically secure keys:
<KeyGenerator /> <KeyGenerator />
> **💡 Pro Tip**: If you're using `DISABLE_FILESYSTEM_ENCRYPTION=true`, you can skip the `ENCRYPTION_KEY` entirely for a simpler setup. However, remember that files will be stored unencrypted on your filesystem. > **Pro Tip**: Only enable encryption if you're handling sensitive data. For most users, the default unencrypted mode provides better performance.
--- ## Access Your Instance
## Accessing Palmr. Once deployed, open Palmr in your browser:
Once deployed, access Palmr. through your web browser: - **Web Interface**: `http://localhost:5487` (local) or `http://YOUR_SERVER_IP:5487` (remote)
- **API Documentation**: `http://localhost:3333/docs` (if port 3333 is exposed)
- **Local**: `http://localhost:5487` <Callout type="info">
- **Server**: `http://YOUR_SERVER_IP:5487` **Learn More**: For complete API documentation, authentication, and integration examples, see our [API
Reference](/docs/3.1-beta/api) guide
</Callout>
### API Access (Optional) <Callout type="warn">
**Production Ready?** Configure HTTPS with a valid SSL certificate for secure production deployments.
If you exposed port 3333 in your configuration, you can also access: </Callout>
- **API Documentation**: `http://localhost:3333/docs` (local) or `http://YOUR_SERVER_IP:3333/docs` (server)
- **API Endpoints**: Available at `http://localhost:3333` (local) or `http://YOUR_SERVER_IP:3333` (server)
> **📚 Learn More**: For complete API documentation, authentication, and integration examples, see our [API Reference](/docs/3.1-beta/api) guide.
> **💡 Production Tip**: For production deployments, configure HTTPS with a valid SSL certificate for enhanced security.
--- ---
## Docker CLI Alternative ## Docker CLI Alternative
Prefer using Docker directly? Both storage options are supported: Prefer Docker commands over Compose? Here are the equivalent commands:
**Named Volume:** <Tabs items={["Named Volume", "Bind Mount"]}>
<Tab value="Named Volume">
```bash ```bash
docker run -d \ docker run -d \
--name palmr \ --name palmr \
-e ENABLE_S3=false \ # Optional: Uncomment and configure as needed (if you don`t use, you can remove)
-e ENCRYPTION_KEY=your-secure-key-min-32-chars \ # -e ENABLE_S3=true \ # Set to true to enable S3-compatible storage (OPTIONAL - default is false)
# -e PALMR_UID=1000 # UID for the container processes (default is 1001) # -e DISABLE_FILESYSTEM_ENCRYPTION=false \ # Set to false to enable file encryption (ENCRYPTION_KEY becomes required) | (OPTIONAL - default is true)
# -e PALMR_GID=1000 # GID for the container processes (default is 1001) # -e ENCRYPTION_KEY=your-secure-key-min-32-chars # Required only if encryption is enabled
# -e DISABLE_FILESYSTEM_ENCRYPTION=true # Uncomment to disable file encryption (ENCRYPTION_KEY becomes optional) # -e PALMR_UID=1000 # UID for the container processes (default is 1000)
# -e SECURE_SITE=false # Set to true if you are using a reverse proxy # -e PALMR_GID=1000 # GID for the container processes (default is 1000)
# -e DEFAULT_LANGUAGE=en-US # Default language for the application (optional, defaults to en-US) # -e SECURE_SITE=false # Set to true if you are using a reverse proxy
-p 5487:5487 \ # -e DEFAULT_LANGUAGE=en-US # Default language for the application (optional, defaults to en-US)
-p 3333:3333 \ -p 5487:5487 \
-v palmr_data:/app/server \ -p 3333:3333 \
--restart unless-stopped \ -v palmr_data:/app/server \
kyantech/palmr:latest --restart unless-stopped \
``` kyantech/palmr:latest
```
> **Permission Configuration**: If you encounter permission issues with bind mounts (common on NAS systems), see our [UID/GID Configuration](/docs/3.1-beta/uid-gid-configuration) guide for automatic permission handling.
**Bind Mount:** <Callout type="info">
**Permission Issues?** Add `-e PALMR_UID=1000 -e PALMR_GID=1000` to the command above. See our [UID/GID Configuration](/docs/3.1-beta/uid-gid-configuration) guide for details.
</Callout>
```bash </Tab>
docker run -d \
--name palmr \ <Tab value="Bind Mount">
-e ENABLE_S3=false \
-e ENCRYPTION_KEY=your-secure-key-min-32-chars \ ```bash
-e PALMR_UID=1000 # UID for the container processes (default is 1001) docker run -d \
-e PALMR_GID=1000 # GID for the container processes (default is 1001) --name palmr \
# -e DISABLE_FILESYSTEM_ENCRYPTION=true # Uncomment to disable file encryption (ENCRYPTION_KEY becomes optional) # Optional: Uncomment and configure as needed (if you don`t use, you can remove)
# -e SECURE_SITE=false # Set to true if you are using a reverse proxy # -e ENABLE_S3=true \ # Set to true to enable S3-compatible storage (OPTIONAL - default is false)
# -e DEFAULT_LANGUAGE=en-US # Default language for the application (optional, defaults to en-US) # -e DISABLE_FILESYSTEM_ENCRYPTION=true \ # Set to false to enable file encryption (ENCRYPTION_KEY becomes required) | (OPTIONAL - default is true)
-p 5487:5487 \ # -e ENCRYPTION_KEY=your-secure-key-min-32-chars # Required only if encryption is enabled
-p 3333:3333 \ # -e PALMR_UID=1000 # UID for the container processes (default is 1000)
-v $(pwd)/data:/app/server \ # -e PALMR_GID=1000 # GID for the container processes (default is 1000)
--restart unless-stopped \ # -e SECURE_SITE=false # Set to true if you are using a reverse proxy
kyantech/palmr:latest # -e DEFAULT_LANGUAGE=en-US # Default language for the application (optional, defaults to en-US)
``` -p 5487:5487 \
-p 3333:3333 \
-v $(pwd)/data:/app/server \
--restart unless-stopped \
kyantech/palmr:latest
```
<Callout type="info">
**Permission Issues?** Add `-e PALMR_UID=1000 -e PALMR_GID=1000` to the command above. See our [UID/GID Configuration](/docs/3.1-beta/uid-gid-configuration) guide for details.
</Callout>
</Tab>
</Tabs>
--- ---
@@ -228,52 +254,50 @@ docker run -d \
### Updates ### Updates
Keep Palmr. current with the latest features and security fixes: Keep Palmr up to date with the latest features and security patches:
```bash ```bash
docker-compose pull docker-compose pull
docker-compose up -d docker-compose up -d
``` ```
### Backup & Restore ### Backup Your Data
The backup method depends on which storage option you're using: **Named Volumes:**
**Named Volume Backup:**
```bash ```bash
docker run --rm \ docker run --rm -v palmr_data:/data -v $(pwd):/backup alpine tar czf /backup/palmr-backup.tar.gz -C /data .
-v palmr_data:/data \
-v $(pwd):/backup \
alpine tar czf /backup/palmr-backup.tar.gz -C /data .
``` ```
**Named Volume Restore:** **Bind Mounts:**
```bash
docker run --rm \
-v palmr_data:/data \
-v $(pwd):/backup \
alpine tar xzf /backup/palmr-backup.tar.gz -C /data
```
**Bind Mount Backup:**
```bash ```bash
tar czf palmr-backup.tar.gz ./data tar czf palmr-backup.tar.gz ./data
``` ```
**Bind Mount Restore:** ### Restore From Backup
**Named Volumes:**
```bash ```bash
docker-compose down
docker run --rm -v palmr_data:/data -v $(pwd):/backup alpine tar xzf /backup/palmr-backup.tar.gz -C /data
docker-compose up -d
```
**Bind Mounts:**
```bash
docker-compose down
tar xzf palmr-backup.tar.gz tar xzf palmr-backup.tar.gz
docker-compose up -d
``` ```
--- ---
## Next Steps ## What's Next?
Your Palmr. instance is now ready! Explore additional configuration options: Your Palmr instance is ready! Here's what you can explore:
### Advanced Configuration ### Advanced Configuration
@@ -284,8 +308,11 @@ Your Palmr. instance is now ready! Explore additional configuration options:
### Integration & Development ### Integration & Development
- **[API Reference](/docs/3.1-beta/api)** - Integrate Palmr. with your applications - **[API Reference](/docs/3.1-beta/api)** - Integrate Palmr. with your applications
- **[Architecture Guide](/docs/3.1-beta/architecture)** - Understanding Palmr. components and design
<Callout type="info">
**Need help?** Check our [Troubleshooting Guide](/docs/3.1-beta/troubleshooting) for common issues and solutions.
</Callout>
--- ---
Need help? Visit our [GitHub Issues](https://github.com/kyantech/Palmr/issues) or community discussions. **Questions?** Visit our [GitHub Issues](https://github.com/kyantech/Palmr/issues) or join the community discussions.

View File

@@ -127,7 +127,8 @@ proxy_pass_header Set-Cookie;
environment: environment:
- PALMR_UID=1000 # Your host UID (check with: id) - PALMR_UID=1000 # Your host UID (check with: id)
- PALMR_GID=1000 # Your host GID - PALMR_GID=1000 # Your host GID
- ENCRYPTION_KEY=your-key-here - DISABLE_FILESYSTEM_ENCRYPTION=true # Set to false to enable file encryption
# - ENCRYPTION_KEY=your-key-here # Required only if encryption is enabled
``` ```
> **💡 Note**: Check your host UID/GID with `id` command and use those values. See [UID/GID Configuration](/docs/3.1-beta/uid-gid-configuration) for detailed setup. > **💡 Note**: Check your host UID/GID with `id` command and use those values. See [UID/GID Configuration](/docs/3.1-beta/uid-gid-configuration) for detailed setup.

View File

@@ -17,7 +17,7 @@ docker-compose logs palmr | grep -i "permission\|denied\|eacces"
# Common error messages: # Common error messages:
# EACCES: permission denied, open '/app/server/uploads/file.txt' # EACCES: permission denied, open '/app/server/uploads/file.txt'
# Error: EACCES: permission denied, mkdir '/app/server/temp-chunks' # Error: EACCES: permission denied, mkdir '/app/server/temp-uploads'
``` ```
### The Root Cause ### The Root Cause
@@ -25,7 +25,7 @@ docker-compose logs palmr | grep -i "permission\|denied\|eacces"
**Palmr. defaults**: UID 1001, GID 1001 **Palmr. defaults**: UID 1001, GID 1001
**Linux standard**: UID 1000, GID 1000 **Linux standard**: UID 1000, GID 1000
When using bind mounts, your host directories are owned by UID 1000, but Palmr. runs as UID 1001. When using bind mounts, your host directories may have different ownership than Palmr's default UID/GID.
### Solution 1: Environment Variables (Recommended) ### Solution 1: Environment Variables (Recommended)
@@ -63,8 +63,8 @@ If you prefer to keep Palmr's defaults:
chown -R 1001:1001 ./data chown -R 1001:1001 ./data
# For separate upload/temp directories # For separate upload/temp directories
mkdir -p uploads temp-chunks mkdir -p uploads temp-uploads
chown -R 1001:1001 uploads temp-chunks chown -R 1001:1001 uploads temp-uploads
``` ```
### Solution 3: Docker Volume (Avoid the Issue) ### Solution 3: Docker Volume (Avoid the Issue)
@@ -109,16 +109,19 @@ docker-compose logs palmr
2. **Invalid encryption key** 2. **Invalid encryption key**
```bash ```bash
# Error: Encryption key must be at least 32 characters # Error: Encryption key must be at least 32 characters (only if encryption is enabled)
# Fix: Update ENCRYPTION_KEY in docker-compose.yaml # Fix: Either disable encryption or provide a valid key
environment: environment:
- ENCRYPTION_KEY=your-very-long-secure-key-at-least-32-characters - DISABLE_FILESYSTEM_ENCRYPTION=true # Disable encryption (default)
# OR enable encryption with:
# - DISABLE_FILESYSTEM_ENCRYPTION=false
# - ENCRYPTION_KEY=your-very-long-secure-key-at-least-32-characters
``` ```
3. **Missing environment variables** 3. **Missing environment variables**
```bash ```bash
# Check required variables are set # Check variables are set (encryption is optional)
docker exec palmr env | grep -E "ENCRYPTION_KEY|DATABASE_URL" docker exec palmr env | grep -E "DISABLE_FILESYSTEM_ENCRYPTION|ENCRYPTION_KEY|DATABASE_URL"
``` ```
### Container Starts But App Doesn't Load ### Container Starts But App Doesn't Load
@@ -151,7 +154,7 @@ curl http://localhost:3333/health
```bash ```bash
docker exec palmr ls -la /app/server/uploads/ docker exec palmr ls -la /app/server/uploads/
# Should show ownership by palmr user # Should show ownership by palmr user (UID 1001)
``` ```
3. **Check upload limits:** 3. **Check upload limits:**
@@ -178,13 +181,13 @@ docker exec palmr stat /app/server/uploads/your-file.txt
```bash ```bash
# Using the built-in reset script # Using the built-in reset script
docker exec -it palmr /app/reset-password.sh docker exec -it palmr /app/palmr-app/reset-password.sh
``` ```
2. **Check database permissions:** 2. **Check database permissions:**
```bash ```bash
docker exec palmr ls -la /app/server/prisma/ docker exec palmr ls -la /app/server/prisma/
# palmr.db should be writable by palmr user # palmr.db should be writable by palmr user (UID 1001)
``` ```
### OIDC Authentication Not Working ### OIDC Authentication Not Working
@@ -243,8 +246,8 @@ docker exec palmr ls -la /app/server/prisma/palmr.db
# Check database logs # Check database logs
docker-compose logs palmr | grep -i database docker-compose logs palmr | grep -i database
# Verify Prisma schema # Verify Prisma schema (run from palmr-app directory)
docker exec palmr npx prisma db push --schema=./prisma/schema.prisma docker exec palmr sh -c "cd /app/palmr-app && npx prisma db push"
``` ```
### Database Corruption ### Database Corruption
@@ -283,7 +286,7 @@ docker-compose up -d
3. **Check temp directory permissions:** 3. **Check temp directory permissions:**
```bash ```bash
docker exec palmr ls -la /app/server/temp-chunks/ docker exec palmr ls -la /app/server/temp-uploads/
``` ```
### High Memory Usage ### High Memory Usage
@@ -318,16 +321,19 @@ docker port palmr
echo "4. File Permissions:" echo "4. File Permissions:"
docker exec palmr ls -la /app/server/ docker exec palmr ls -la /app/server/
echo "5. Environment Variables:" echo "5. Application Files:"
docker exec palmr env | grep -E "PALMR_|ENCRYPTION_|DATABASE_" docker exec palmr ls -la /app/palmr-app/
echo "6. API Health:" echo "6. Environment Variables:"
docker exec palmr env | grep -E "PALMR_|DISABLE_FILESYSTEM_ENCRYPTION|ENCRYPTION_|DATABASE_"
echo "7. API Health:"
curl -s http://localhost:3333/health || echo "API not accessible" curl -s http://localhost:3333/health || echo "API not accessible"
echo "7. Web Interface:" echo "8. Web Interface:"
curl -s -o /dev/null -w "%{http_code}" http://localhost:5487 || echo "Web interface not accessible" curl -s -o /dev/null -w "%{http_code}" http://localhost:5487 || echo "Web interface not accessible"
echo "8. Disk Space:" echo "9. Disk Space:"
df -h df -h
echo "=== End Health Check ===" echo "=== End Health Check ==="

View File

@@ -9,15 +9,15 @@ Configure user and group permissions for seamless bind mount compatibility acros
Palmr. supports runtime UID/GID configuration to resolve permission conflicts when using bind mounts. This eliminates the need for manual permission management on your host system. Palmr. supports runtime UID/GID configuration to resolve permission conflicts when using bind mounts. This eliminates the need for manual permission management on your host system.
**⚠️ Important**: Palmr uses **UID 1001, GID 1001** by default, which is different from the standard Linux convention of **UID 1000, GID 1000**. This is the most common cause of permission issues with bind mounts. **⚠️ Important**: Palmr uses **UID 1000, GID 1000** by default, which matches the standard Linux convention. However, some systems may use different UID/GID values, which can cause permission issues with bind mounts.
## The Permission Problem ## The Permission Problem
### Why This Happens ### Why This Happens
- **Palmr Default**: UID 1001, GID 1001 (container) - **Palmr Default**: UID 1000, GID 1000 (container)
- **Linux Standard**: UID 1000, GID 1000 (most host systems) - **Linux Standard**: UID 1000, GID 1000 (most host systems)
- **Result**: Container can't write to host directories - **Result**: Usually compatible, but some systems may use different values
### Common Error Scenarios ### Common Error Scenarios
@@ -30,7 +30,7 @@ EACCES: permission denied, open '/app/server/uploads/file.txt'
# Or when checking permissions: # Or when checking permissions:
$ ls -la uploads/ $ ls -la uploads/
drwxr-xr-x 2 user user 4096 Jan 15 10:00 uploads/ drwxr-xr-x 2 user user 4096 Jan 15 10:00 uploads/
# Container tries to write as UID 1001, but directory is owned by UID 1000 # Container tries to write with different UID/GID than directory owner
``` ```
## Quick Fix ## Quick Fix
@@ -45,15 +45,13 @@ services:
image: kyantech/palmr:latest image: kyantech/palmr:latest
container_name: palmr container_name: palmr
environment: environment:
- ENABLE_S3=false
- ENCRYPTION_KEY=your-secure-key-min-32-chars
- PALMR_UID=1000 - PALMR_UID=1000
- PALMR_GID=1000 - PALMR_GID=1000
ports: ports:
- "5487:5487" - "5487:5487"
volumes: volumes:
- ./uploads:/app/server/uploads:rw - ./uploads:/app/server/uploads:rw
- ./temp-chunks:/app/server/temp-chunks:rw - ./temp-uploads:/app/server/temp-uploads:rw
restart: unless-stopped restart: unless-stopped
``` ```
@@ -63,8 +61,8 @@ If you prefer to keep Palmr's defaults:
```bash ```bash
# Create directories with correct ownership # Create directories with correct ownership
mkdir -p uploads temp-chunks mkdir -p uploads temp-uploads
chown -R 1001:1001 uploads temp-chunks chown -R 1001:1001 uploads temp-uploads
``` ```
## Environment Variables ## Environment Variables
@@ -104,8 +102,6 @@ services:
image: kyantech/palmr:latest image: kyantech/palmr:latest
container_name: palmr container_name: palmr
environment: environment:
- ENABLE_S3=false
- ENCRYPTION_KEY=your-secure-key-min-32-chars
- PALMR_UID=1000 - PALMR_UID=1000
- PALMR_GID=1000 - PALMR_GID=1000
ports: ports:
@@ -123,8 +119,6 @@ services:
image: kyantech/palmr:latest image: kyantech/palmr:latest
container_name: palmr container_name: palmr
environment: environment:
- ENABLE_S3=false
- ENCRYPTION_KEY=your-secure-key-min-32-chars
- PALMR_UID=1026 - PALMR_UID=1026
- PALMR_GID=100 - PALMR_GID=100
ports: ports:
@@ -142,8 +136,6 @@ services:
image: kyantech/palmr:latest image: kyantech/palmr:latest
container_name: palmr container_name: palmr
environment: environment:
- ENABLE_S3=false
- ENCRYPTION_KEY=your-secure-key-min-32-chars
- PALMR_UID=1000 - PALMR_UID=1000
- PALMR_GID=100 - PALMR_GID=100
ports: ports:
@@ -166,7 +158,7 @@ services:
id id
# 2. Check directory ownership # 2. Check directory ownership
ls -la uploads/ temp-chunks/ ls -la uploads/ temp-uploads/
# 3. Fix via environment variables (preferred) # 3. Fix via environment variables (preferred)
# Add to docker-compose.yaml: # Add to docker-compose.yaml:
@@ -174,7 +166,7 @@ ls -la uploads/ temp-chunks/
# - PALMR_GID=1000 # - PALMR_GID=1000
# 4. Or fix via chown (alternative) # 4. Or fix via chown (alternative)
chown -R 1001:1001 uploads temp-chunks chown -R 1001:1001 uploads temp-uploads
``` ```
**Error**: Container starts but files aren't accessible **Error**: Container starts but files aren't accessible
@@ -225,11 +217,11 @@ cat /etc/passwd | grep -v nobody
```bash ```bash
# Check if directories exist and are writable # Check if directories exist and are writable
test -w uploads && echo "uploads writable" || echo "uploads NOT writable" test -w uploads && echo "uploads writable" || echo "uploads NOT writable"
test -w temp-chunks && echo "temp-chunks writable" || echo "temp-chunks NOT writable" test -w temp-uploads && echo "temp-uploads writable" || echo "temp-uploads NOT writable"
# Create directories with correct permissions # Create directories with correct permissions
mkdir -p uploads temp-chunks mkdir -p uploads temp-uploads
sudo chown -R $(id -u):$(id -g) uploads temp-chunks sudo chown -R $(id -u):$(id -g) uploads temp-uploads
``` ```
--- ---
@@ -270,7 +262,7 @@ To add UID/GID configuration to running installations:
cp -r ./data ./data-backup cp -r ./data ./data-backup
# or # or
cp -r ./uploads ./uploads-backup cp -r ./uploads ./uploads-backup
cp -r ./temp-chunks ./temp-chunks-backup cp -r ./temp-uploads ./temp-uploads-backup
``` ```
3. **Check your UID/GID** 3. **Check your UID/GID**
@@ -344,4 +336,4 @@ For most users experiencing permission issues with bind mounts:
``` ```
3. **Restart**: `docker-compose down && docker-compose up -d` 3. **Restart**: `docker-compose down && docker-compose up -d`
This resolves the mismatch between Palmr's default UID 1001 and the standard Linux UID 1000. This ensures compatibility between Palmr's UID/GID and your host system's file ownership.

View File

@@ -1,6 +1,6 @@
{ {
"name": "palmr-docs", "name": "palmr-docs",
"version": "3.1.3-beta", "version": "3.1.8-beta",
"description": "Docs for Palmr", "description": "Docs for Palmr",
"private": true, "private": true,
"author": "Daniel Luiz Alves <daniel@kyantech.com.br>", "author": "Daniel Luiz Alves <daniel@kyantech.com.br>",

View File

@@ -12,7 +12,6 @@ import {
LayoutIcon, LayoutIcon,
LockIcon, LockIcon,
MousePointer, MousePointer,
RadioIcon,
RocketIcon, RocketIcon,
SearchIcon, SearchIcon,
TimerIcon, TimerIcon,
@@ -82,23 +81,6 @@ function Hero() {
<Link href={docsLink}>Documentation</Link> <Link href={docsLink}>Documentation</Link>
</div> </div>
</PulsatingButton> </PulsatingButton>
<RippleButton
onClick={() => {
const demoId = `${Math.random().toString(36).substr(2, 9)}`;
const token = `${Math.random().toString(36).substr(2, 12)}`;
sessionStorage.setItem("demo_token", token);
sessionStorage.setItem("demo_id", demoId);
sessionStorage.setItem("demo_expires", (Date.now() + 5 * 60 * 1000).toString());
window.location.href = `/demo?id=${demoId}&token=${token}`;
}}
>
<div className="flex gap-2 items-center">
<RadioIcon size={18} />
Live Demo
</div>
</RippleButton>
<RippleButton> <RippleButton>
<a <a
href="https://github.com/kyantech/Palmr" href="https://github.com/kyantech/Palmr"

View File

@@ -1,225 +0,0 @@
"use client";
import { useEffect, useState } from "react";
import { useSearchParams } from "next/navigation";
import { Palmtree } from "lucide-react";
import { motion } from "motion/react";
import { BackgroundLights } from "@/components/ui/background-lights";
import { Button } from "@/components/ui/button";
interface DemoStatus {
status: "waiting" | "ready";
url: string | null;
}
interface CreateDemoResponse {
message: string;
url: string | null;
}
function DemoClientInner() {
const searchParams = useSearchParams();
const demoId = searchParams.get("id");
const token = searchParams.get("token");
const [status, setStatus] = useState<DemoStatus | null>(null);
const [isLoading, setIsLoading] = useState(true);
const [error, setError] = useState<string | null>(null);
useEffect(() => {
const validateAccess = () => {
const storedToken = sessionStorage.getItem("demo_token");
const storedId = sessionStorage.getItem("demo_id");
const expiresAt = sessionStorage.getItem("demo_expires");
if (!demoId || !token || !storedToken || !storedId || !expiresAt) {
return false;
}
if (token !== storedToken || demoId !== storedId || Date.now() > parseInt(expiresAt)) {
return false;
}
return true;
};
if (!validateAccess()) {
setError("Unauthorized access. Please use the Live Demo button to access this page.");
setIsLoading(false);
return;
}
const createDemo = async () => {
try {
const response = await fetch("https://palmr-demo-manager.kyantech.com.br/create-demo", {
method: "POST",
headers: {
"Content-Type": "application/json",
},
body: JSON.stringify({
palmr_demo_instance_id: demoId,
}),
});
if (!response.ok) {
throw new Error("Failed to create demo");
}
const data: CreateDemoResponse = await response.json();
console.log("Demo creation response:", data);
} catch (err) {
console.error("Error creating demo:", err);
setError("Failed to create demo. Please try again.");
setIsLoading(false);
}
};
const checkStatus = async () => {
try {
const response = await fetch(`https://palmr-demo-manager.kyantech.com.br/status/${demoId}`);
if (!response.ok) {
throw new Error("Failed to check demo status");
}
const data: DemoStatus = await response.json();
setStatus(data);
if (data.status === "ready" && data.url) {
setIsLoading(false);
}
} catch (err) {
console.error("Error checking status:", err);
setError("Failed to check demo status. Please try again.");
setIsLoading(false);
}
};
createDemo();
const interval = setInterval(checkStatus, 5000); // Check every 5 seconds
checkStatus();
return () => {
clearInterval(interval);
sessionStorage.removeItem("demo_token");
sessionStorage.removeItem("demo_id");
sessionStorage.removeItem("demo_expires");
};
}, [demoId, token]);
const handleGoToDemo = () => {
if (status?.url) {
window.open(status.url, "_blank");
}
window.location.href = "/";
};
if (error) {
return (
<div className="fixed inset-0 bg-background">
<BackgroundLights />
<div className="relative flex flex-col items-center justify-center h-full">
<div className="text-center space-y-6 max-w-md">
<h1 className="text-2xl font-bold text-destructive">Error</h1>
<p className="text-muted-foreground">{error}</p>
<Button
onClick={() => {
sessionStorage.removeItem("demo_token");
sessionStorage.removeItem("demo_id");
sessionStorage.removeItem("demo_expires");
window.location.href = "/";
}}
>
Go Back
</Button>
</div>
</div>
</div>
);
}
if (isLoading) {
return (
<div className="fixed inset-0 bg-background">
<BackgroundLights />
<div className="flex flex-col items-center gap-6 text-center h-full justify-center">
<div className="space-y-4">
<h1 className="text-2xl font-bold">Your demo is being generated, please wait...</h1>
<p className="text-muted-foreground max-w-lg">
This demo will be available for 30 minutes for testing. After that, all data will be permanently deleted
and become inaccessible. You can test Palmr. with a 200MB storage limit.
</p>
</div>
</div>
</div>
);
}
return (
<div className="fixed inset-0 bg-background">
<BackgroundLights />
<div className="relative flex flex-col items-center justify-center h-full">
<motion.div
initial={{ opacity: 0, y: 20 }}
animate={{ opacity: 1, y: 0 }}
transition={{ duration: 0.5 }}
className="container mx-auto max-w-7xl px-6 flex-grow"
>
<section className="relative flex flex-col items-center justify-center gap-6 m-auto h-full">
<motion.div
initial={{ opacity: 0, y: 20 }}
animate={{ opacity: 1, y: 0 }}
transition={{ duration: 0.5, delay: 0.2 }}
className="inline-block max-w-xl text-center justify-center"
>
<div className="flex flex-col gap-8">
<div className="flex flex-col gap-2">
<motion.span
initial={{ opacity: 0, x: -20 }}
animate={{ opacity: 1, x: 0 }}
transition={{ delay: 0.4, duration: 0.5 }}
className="text-4xl lg:text-3xl font-semibold tracking-tight text-primary"
>
Your demo is ready!
</motion.span>
<motion.span
initial={{ opacity: 0, x: 20 }}
animate={{ opacity: 1, x: 0 }}
transition={{ delay: 0.6, duration: 0.5 }}
className="text-3xl leading-9 font-semibold tracking-tight"
>
Click the button below to test
</motion.span>
</div>
</div>
</motion.div>
<motion.div
initial={{ opacity: 0, y: 20 }}
animate={{ opacity: 1, y: 0 }}
transition={{ duration: 0.5, delay: 0.8 }}
className="flex flex-col items-center gap-6"
>
<motion.div
initial={{ opacity: 0, scale: 0.9 }}
animate={{ opacity: 1, scale: 1 }}
transition={{ delay: 1.2, duration: 0.5 }}
>
<Button onClick={handleGoToDemo} className="flex items-center gap-2 px-8 py-4 text-lg">
<Palmtree className="h-5 w-5" />
Go to Palmr. Demo
</Button>
</motion.div>
</motion.div>
</section>
</motion.div>
</div>
</div>
);
}
export default function DemoClient() {
return <DemoClientInner />;
}

View File

@@ -1,13 +0,0 @@
"use client";
import { Suspense } from "react";
import DemoClient from "./components/demo-client";
export default function DemoPage() {
return (
<Suspense>
<DemoClient />
</Suspense>
);
}

View File

@@ -5,14 +5,15 @@ import { cn } from "@/lib/utils";
interface CardProps { interface CardProps {
title: string; title: string;
description: string; description?: string;
href?: string; href?: string;
icon?: ReactNode; icon?: ReactNode;
className?: string; className?: string;
onClick?: () => void; onClick?: () => void;
children?: ReactNode;
} }
export const Card = ({ title, description, href, icon, className, onClick }: CardProps) => { export const Card = ({ title, description, href, icon, className, onClick, children }: CardProps) => {
const cardContent = ( const cardContent = (
<div <div
className={cn( className={cn(
@@ -37,9 +38,16 @@ export const Card = ({ title, description, href, icon, className, onClick }: Car
<h3 className="font-medium text-sm text-foreground mb-1 group-hover:text-primary transition-colors duration-200 mt-3 text-decoration-none"> <h3 className="font-medium text-sm text-foreground mb-1 group-hover:text-primary transition-colors duration-200 mt-3 text-decoration-none">
{title} {title}
</h3> </h3>
<p className="text-xs text-muted-foreground/80 leading-relaxed line-clamp-2 group-hover:text-muted-foreground transition-colors duration-200"> {description && (
{description} <p className="text-xs text-muted-foreground/80 leading-relaxed line-clamp-2 group-hover:text-muted-foreground transition-colors duration-200">
</p> {description}
</p>
)}
{children && (
<div className="text-xs text-muted-foreground/80 leading-relaxed group-hover:text-muted-foreground transition-colors duration-200 mt-2">
{children}
</div>
)}
</div> </div>
<div className="flex-shrink-0 ml-2"> <div className="flex-shrink-0 ml-2">
<div className="w-5 h-5 rounded-full bg-muted/40 flex items-center justify-center opacity-0 group-hover:opacity-100 group-hover:bg-primary/10 transition-all duration-200"> <div className="w-5 h-5 rounded-full bg-muted/40 flex items-center justify-center opacity-0 group-hover:opacity-100 group-hover:bg-primary/10 transition-all duration-200">

View File

@@ -1,6 +1,7 @@
# FOR FILESYSTEM STORAGE ENV VARS # FOR FILESYSTEM STORAGE ENV VARS
ENABLE_S3=false ENABLE_S3=false
ENCRYPTION_KEY=change-this-key-in-production-min-32-chars DISABLE_FILESYSTEM_ENCRYPTION=true
# ENCRYPTION_KEY=change-this-key-in-production-min-32-chars # Required only if encryption is enabled (DISABLE_FILESYSTEM_ENCRYPTION=false)
DATABASE_URL="file:./palmr.db" DATABASE_URL="file:./palmr.db"
# FOR USE WITH S3 COMPATIBLE STORAGE # FOR USE WITH S3 COMPATIBLE STORAGE

View File

@@ -1,6 +1,6 @@
{ {
"name": "palmr-api", "name": "palmr-api",
"version": "3.1.3-beta", "version": "3.1.8-beta",
"description": "API for Palmr", "description": "API for Palmr",
"private": true, "private": true,
"author": "Daniel Luiz Alves <daniel@kyantech.com.br>", "author": "Daniel Luiz Alves <daniel@kyantech.com.br>",

View File

@@ -147,6 +147,12 @@ const defaultConfigs = [
type: "boolean", type: "boolean",
group: "auth-providers", group: "auth-providers",
}, },
{
key: "passwordAuthEnabled",
value: "true",
type: "boolean",
group: "security",
},
{ {
key: "serverUrl", key: "serverUrl",
value: "http://localhost:3333", value: "http://localhost:3333",

View File

@@ -6,7 +6,7 @@
echo "🔐 Palmr Password Reset Tool" echo "🔐 Palmr Password Reset Tool"
echo "=============================" echo "============================="
# Check if we're in the right directory # Check if we're in the right directory and set DATABASE_URL
if [ ! -f "package.json" ]; then if [ ! -f "package.json" ]; then
echo "❌ Error: This script must be run from the server directory (/app/server)" echo "❌ Error: This script must be run from the server directory (/app/server)"
echo " Current directory: $(pwd)" echo " Current directory: $(pwd)"
@@ -14,18 +14,26 @@ if [ ! -f "package.json" ]; then
exit 1 exit 1
fi fi
# Set DATABASE_URL if not already set
if [ -z "$DATABASE_URL" ]; then
export DATABASE_URL="file:/app/server/prisma/palmr.db"
fi
# Ensure database directory exists
mkdir -p /app/server/prisma
# Function to check if tsx is available # Function to check if tsx is available
check_tsx() { check_tsx() {
# Check if tsx binary exists in node_modules # Check if tsx binary exists in node_modules
if [ -f "node_modules/.bin/tsx" ]; then if [ -f "node_modules/.bin/tsx" ]; then
return 0 return 0
fi fi
# Fallback: try npx # Fallback: try npx
if npx tsx --version >/dev/null 2>&1; then if npx tsx --version >/dev/null 2>&1; then
return 0 return 0
fi fi
return 1 return 1
} }
@@ -39,7 +47,7 @@ install_tsx_only() {
else else
return 1 return 1
fi fi
return $? return $?
} }
@@ -62,7 +70,7 @@ ensure_prisma() {
if [ -d "node_modules/@prisma/client" ] && [ -f "node_modules/@prisma/client/index.js" ]; then if [ -d "node_modules/@prisma/client" ] && [ -f "node_modules/@prisma/client/index.js" ]; then
return 0 return 0
fi fi
echo "📦 Generating Prisma client..." echo "📦 Generating Prisma client..."
if npx prisma generate --silent >/dev/null 2>&1; then if npx prisma generate --silent >/dev/null 2>&1; then
echo "✅ Prisma client ready" echo "✅ Prisma client ready"
@@ -81,14 +89,14 @@ if check_tsx; then
echo "✅ tsx is ready" echo "✅ tsx is ready"
else else
echo "📦 tsx not found, installing..." echo "📦 tsx not found, installing..."
# Try quick tsx-only install first # Try quick tsx-only install first
if install_tsx_only && check_tsx; then if install_tsx_only && check_tsx; then
echo "✅ tsx installed successfully" echo "✅ tsx installed successfully"
else else
echo "⚠️ Quick install failed, installing all dependencies..." echo "⚠️ Quick install failed, installing all dependencies..."
install_all_deps install_all_deps
# Final check # Final check
if ! check_tsx; then if ! check_tsx; then
echo "❌ Error: tsx is still not available after full installation" echo "❌ Error: tsx is still not available after full installation"
@@ -119,4 +127,4 @@ if [ -f "node_modules/.bin/tsx" ]; then
node_modules/.bin/tsx src/scripts/reset-password.ts "$@" node_modules/.bin/tsx src/scripts/reset-password.ts "$@"
else else
npx tsx src/scripts/reset-password.ts "$@" npx tsx src/scripts/reset-password.ts "$@"
fi fi

View File

@@ -2,8 +2,8 @@ import { z } from "zod";
const envSchema = z.object({ const envSchema = z.object({
ENABLE_S3: z.union([z.literal("true"), z.literal("false")]).default("false"), ENABLE_S3: z.union([z.literal("true"), z.literal("false")]).default("false"),
ENCRYPTION_KEY: z.string().optional().default("palmr-default-encryption-key-2025"), ENCRYPTION_KEY: z.string().optional(),
DISABLE_FILESYSTEM_ENCRYPTION: z.union([z.literal("true"), z.literal("false")]).default("false"), DISABLE_FILESYSTEM_ENCRYPTION: z.union([z.literal("true"), z.literal("false")]).default("true"),
S3_ENDPOINT: z.string().optional(), S3_ENDPOINT: z.string().optional(),
S3_PORT: z.string().optional(), S3_PORT: z.string().optional(),
S3_USE_SSL: z.string().optional(), S3_USE_SSL: z.string().optional(),
@@ -14,7 +14,6 @@ const envSchema = z.object({
S3_FORCE_PATH_STYLE: z.union([z.literal("true"), z.literal("false")]).default("false"), S3_FORCE_PATH_STYLE: z.union([z.literal("true"), z.literal("false")]).default("false"),
SECURE_SITE: z.union([z.literal("true"), z.literal("false")]).default("false"), SECURE_SITE: z.union([z.literal("true"), z.literal("false")]).default("false"),
DATABASE_URL: z.string().optional().default("file:/app/server/prisma/palmr.db"), DATABASE_URL: z.string().optional().default("file:/app/server/prisma/palmr.db"),
DEMO_MODE: z.union([z.literal("true"), z.literal("false")]).default("false"),
}); });
export const env = envSchema.parse(process.env); export const env = envSchema.parse(process.env);

View File

@@ -18,6 +18,15 @@ export class AppController {
} }
} }
async getSystemInfo(request: FastifyRequest, reply: FastifyReply) {
try {
const systemInfo = await this.appService.getSystemInfo();
return reply.send(systemInfo);
} catch (error: any) {
return reply.status(400).send({ error: error.message });
}
}
async getAllConfigs(request: FastifyRequest, reply: FastifyReply) { async getAllConfigs(request: FastifyRequest, reply: FastifyReply) {
try { try {
const configs = await this.appService.getAllConfigs(); const configs = await this.appService.getAllConfigs();

View File

@@ -53,6 +53,26 @@ export async function appRoutes(app: FastifyInstance) {
appController.getAppInfo.bind(appController) appController.getAppInfo.bind(appController)
); );
app.get(
"/app/system-info",
{
schema: {
tags: ["App"],
operationId: "getSystemInfo",
summary: "Get system information",
description: "Get system information including storage provider",
response: {
200: z.object({
storageProvider: z.enum(["s3", "filesystem"]).describe("The active storage provider"),
s3Enabled: z.boolean().describe("Whether S3 storage is enabled"),
}),
400: z.object({ error: z.string().describe("Error message") }),
},
},
},
appController.getSystemInfo.bind(appController)
);
app.patch( app.patch(
"/app/configs/:key", "/app/configs/:key",
{ {

View File

@@ -1,3 +1,4 @@
import { isS3Enabled } from "../../config/storage.config";
import { prisma } from "../../shared/prisma"; import { prisma } from "../../shared/prisma";
import { ConfigService } from "../config/service"; import { ConfigService } from "../config/service";
@@ -20,6 +21,13 @@ export class AppService {
}; };
} }
async getSystemInfo() {
return {
storageProvider: isS3Enabled ? "s3" : "filesystem",
s3Enabled: isS3Enabled,
};
}
async getAllConfigs() { async getAllConfigs() {
return prisma.appConfig.findMany({ return prisma.appConfig.findMany({
where: { where: {
@@ -38,6 +46,17 @@ export class AppService {
throw new Error("JWT Secret cannot be updated through this endpoint"); throw new Error("JWT Secret cannot be updated through this endpoint");
} }
if (key === "passwordAuthEnabled") {
if (value === "false") {
const canDisable = await this.configService.validatePasswordAuthDisable();
if (!canDisable) {
throw new Error(
"Password authentication cannot be disabled. At least one authentication provider must be active."
);
}
}
}
const config = await prisma.appConfig.findUnique({ const config = await prisma.appConfig.findUnique({
where: { key }, where: { key },
}); });
@@ -56,6 +75,15 @@ export class AppService {
if (updates.some((update) => update.key === "jwtSecret")) { if (updates.some((update) => update.key === "jwtSecret")) {
throw new Error("JWT Secret cannot be updated through this endpoint"); throw new Error("JWT Secret cannot be updated through this endpoint");
} }
const passwordAuthUpdate = updates.find((update) => update.key === "passwordAuthEnabled");
if (passwordAuthUpdate && passwordAuthUpdate.value === "false") {
const canDisable = await this.configService.validatePasswordAuthDisable();
if (!canDisable) {
throw new Error(
"Password authentication cannot be disabled. At least one authentication provider must be active."
);
}
}
const keys = updates.map((update) => update.key); const keys = updates.map((update) => update.key);
const existingConfigs = await prisma.appConfig.findMany({ const existingConfigs = await prisma.appConfig.findMany({

View File

@@ -1,5 +1,6 @@
import { FastifyReply, FastifyRequest } from "fastify"; import { FastifyReply, FastifyRequest } from "fastify";
import { ConfigService } from "../config/service";
import { UpdateAuthProviderSchema } from "./dto"; import { UpdateAuthProviderSchema } from "./dto";
import { AuthProvidersService } from "./service"; import { AuthProvidersService } from "./service";
import { import {
@@ -39,9 +40,11 @@ const ERROR_MESSAGES = {
export class AuthProvidersController { export class AuthProvidersController {
private authProvidersService: AuthProvidersService; private authProvidersService: AuthProvidersService;
private configService: ConfigService;
constructor() { constructor() {
this.authProvidersService = new AuthProvidersService(); this.authProvidersService = new AuthProvidersService();
this.configService = new ConfigService();
} }
private buildRequestContext(request: FastifyRequest): RequestContext { private buildRequestContext(request: FastifyRequest): RequestContext {
@@ -223,13 +226,24 @@ export class AuthProvidersController {
try { try {
const { id } = request.params; const { id } = request.params;
const data = request.body; const data = request.body as any;
const existingProvider = await this.authProvidersService.getProviderById(id); const existingProvider = await this.authProvidersService.getProviderById(id);
if (!existingProvider) { if (!existingProvider) {
return this.sendErrorResponse(reply, 404, ERROR_MESSAGES.PROVIDER_NOT_FOUND); return this.sendErrorResponse(reply, 404, ERROR_MESSAGES.PROVIDER_NOT_FOUND);
} }
if (data.enabled === false && existingProvider.enabled === true) {
const canDisable = await this.configService.validateAllProvidersDisable();
if (!canDisable) {
return this.sendErrorResponse(
reply,
400,
"Cannot disable the last authentication provider when password authentication is disabled"
);
}
}
const isOfficial = this.authProvidersService.isOfficialProvider(existingProvider.name); const isOfficial = this.authProvidersService.isOfficialProvider(existingProvider.name);
if (isOfficial) { if (isOfficial) {
@@ -300,6 +314,17 @@ export class AuthProvidersController {
return this.sendErrorResponse(reply, 400, ERROR_MESSAGES.OFFICIAL_CANNOT_DELETE); return this.sendErrorResponse(reply, 400, ERROR_MESSAGES.OFFICIAL_CANNOT_DELETE);
} }
if (provider.enabled) {
const canDisable = await this.configService.validateAllProvidersDisable();
if (!canDisable) {
return this.sendErrorResponse(
reply,
400,
"Cannot delete the last authentication provider when password authentication is disabled"
);
}
}
await this.authProvidersService.deleteProvider(id); await this.authProvidersService.deleteProvider(id);
return this.sendSuccessResponse(reply, undefined, "Provider deleted successfully"); return this.sendSuccessResponse(reply, undefined, "Provider deleted successfully");
} catch (error) { } catch (error) {

View File

@@ -1,6 +1,7 @@
import { FastifyReply, FastifyRequest } from "fastify"; import { FastifyReply, FastifyRequest } from "fastify";
import { env } from "../../env"; import { env } from "../../env";
import { ConfigService } from "../config/service";
import { import {
CompleteTwoFactorLoginSchema, CompleteTwoFactorLoginSchema,
createResetPasswordSchema, createResetPasswordSchema,
@@ -11,6 +12,7 @@ import { AuthService } from "./service";
export class AuthController { export class AuthController {
private authService = new AuthService(); private authService = new AuthService();
private configService = new ConfigService();
private getClientInfo(request: FastifyRequest) { private getClientInfo(request: FastifyRequest) {
const realIP = request.headers["x-real-ip"] as string; const realIP = request.headers["x-real-ip"] as string;
@@ -111,14 +113,21 @@ export class AuthController {
async getCurrentUser(request: FastifyRequest, reply: FastifyReply) { async getCurrentUser(request: FastifyRequest, reply: FastifyReply) {
try { try {
const userId = (request as any).user?.userId; let userId: string | null = null;
try {
await request.jwtVerify();
userId = (request as any).user?.userId;
} catch (err) {
return reply.send({ user: null });
}
if (!userId) { if (!userId) {
return reply.status(401).send({ error: "Unauthorized: a valid token is required to access this resource." }); return reply.send({ user: null });
} }
const user = await this.authService.getUserById(userId); const user = await this.authService.getUserById(userId);
if (!user) { if (!user) {
return reply.status(404).send({ error: "User not found" }); return reply.send({ user: null });
} }
return reply.send({ user }); return reply.send({ user });
@@ -169,4 +178,15 @@ export class AuthController {
return reply.status(400).send({ error: error.message }); return reply.status(400).send({ error: error.message });
} }
} }
async getAuthConfig(request: FastifyRequest, reply: FastifyReply) {
try {
const passwordAuthEnabled = await this.configService.getValue("passwordAuthEnabled");
return reply.send({
passwordAuthEnabled: passwordAuthEnabled === "true",
});
} catch (error: any) {
return reply.status(400).send({ error: error.message });
}
}
} }

View File

@@ -153,33 +153,29 @@ export async function authRoutes(app: FastifyInstance) {
tags: ["Authentication"], tags: ["Authentication"],
operationId: "getCurrentUser", operationId: "getCurrentUser",
summary: "Get Current User", summary: "Get Current User",
description: "Returns the current authenticated user's information", description: "Returns the current authenticated user's information or null if not authenticated",
response: { response: {
200: z.object({ 200: z.union([
user: z.object({ z.object({
id: z.string().describe("User ID"), user: z.object({
firstName: z.string().describe("User first name"), id: z.string().describe("User ID"),
lastName: z.string().describe("User last name"), firstName: z.string().describe("User first name"),
username: z.string().describe("User username"), lastName: z.string().describe("User last name"),
email: z.string().email().describe("User email"), username: z.string().describe("User username"),
image: z.string().nullable().describe("User profile image URL"), email: z.string().email().describe("User email"),
isAdmin: z.boolean().describe("User is admin"), image: z.string().nullable().describe("User profile image URL"),
isActive: z.boolean().describe("User is active"), isAdmin: z.boolean().describe("User is admin"),
createdAt: z.date().describe("User creation date"), isActive: z.boolean().describe("User is active"),
updatedAt: z.date().describe("User last update date"), createdAt: z.date().describe("User creation date"),
updatedAt: z.date().describe("User last update date"),
}),
}), }),
}), z.object({
401: z.object({ error: z.string().describe("Error message") }), user: z.null().describe("No user when not authenticated"),
}),
]),
}, },
}, },
preValidation: async (request: FastifyRequest, reply: FastifyReply) => {
try {
await request.jwtVerify();
} catch (err) {
console.error(err);
reply.status(401).send({ error: "Unauthorized: a valid token is required to access this resource." });
}
},
}, },
authController.getCurrentUser.bind(authController) authController.getCurrentUser.bind(authController)
); );
@@ -280,4 +276,23 @@ export async function authRoutes(app: FastifyInstance) {
}, },
authController.removeAllTrustedDevices.bind(authController) authController.removeAllTrustedDevices.bind(authController)
); );
app.get(
"/auth/config",
{
schema: {
tags: ["Authentication"],
operationId: "getAuthConfig",
summary: "Get Authentication Configuration",
description: "Get authentication configuration settings",
response: {
200: z.object({
passwordAuthEnabled: z.boolean().describe("Whether password authentication is enabled"),
}),
400: z.object({ error: z.string().describe("Error message") }),
},
},
},
authController.getAuthConfig.bind(authController)
);
} }

View File

@@ -18,6 +18,11 @@ export class AuthService {
private trustedDeviceService = new TrustedDeviceService(); private trustedDeviceService = new TrustedDeviceService();
async login(data: LoginInput, userAgent?: string, ipAddress?: string) { async login(data: LoginInput, userAgent?: string, ipAddress?: string) {
const passwordAuthEnabled = await this.configService.getValue("passwordAuthEnabled");
if (passwordAuthEnabled === "false") {
throw new Error("Password authentication is disabled. Please use an external authentication provider.");
}
const user = await this.userRepository.findUserByEmailOrUsername(data.emailOrUsername); const user = await this.userRepository.findUserByEmailOrUsername(data.emailOrUsername);
if (!user) { if (!user) {
throw new Error("Invalid credentials"); throw new Error("Invalid credentials");
@@ -146,6 +151,11 @@ export class AuthService {
} }
async requestPasswordReset(email: string, origin: string) { async requestPasswordReset(email: string, origin: string) {
const passwordAuthEnabled = await this.configService.getValue("passwordAuthEnabled");
if (passwordAuthEnabled === "false") {
throw new Error("Password authentication is disabled. Password reset is not available.");
}
const user = await this.userRepository.findUserByEmail(email); const user = await this.userRepository.findUserByEmail(email);
if (!user) { if (!user) {
return; return;
@@ -171,6 +181,11 @@ export class AuthService {
} }
async resetPassword(token: string, newPassword: string) { async resetPassword(token: string, newPassword: string) {
const passwordAuthEnabled = await this.configService.getValue("passwordAuthEnabled");
if (passwordAuthEnabled === "false") {
throw new Error("Password authentication is disabled. Password reset is not available.");
}
const resetRequest = await prisma.passwordReset.findFirst({ const resetRequest = await prisma.passwordReset.findFirst({
where: { where: {
token, token,

View File

@@ -13,6 +13,26 @@ export class ConfigService {
return config.value; return config.value;
} }
async setValue(key: string, value: string): Promise<void> {
await prisma.appConfig.update({
where: { key },
data: { value },
});
}
async validatePasswordAuthDisable(): Promise<boolean> {
const enabledProviders = await prisma.authProvider.findMany({
where: { enabled: true },
});
return enabledProviders.length > 0;
}
async validateAllProvidersDisable(): Promise<boolean> {
const passwordAuthEnabled = await this.getValue("passwordAuthEnabled");
return passwordAuthEnabled === "true";
}
async getGroupConfigs(group: string) { async getGroupConfigs(group: string) {
const configs = await prisma.appConfig.findMany({ const configs = await prisma.appConfig.findMany({
where: { group }, where: { group },

View File

@@ -167,7 +167,7 @@ export class EmailService {
}); });
} }
async sendShareNotification(to: string, shareLink: string, shareName?: string) { async sendShareNotification(to: string, shareLink: string, shareName?: string, senderName?: string) {
const transporter = await this.createTransporter(); const transporter = await this.createTransporter();
if (!transporter) { if (!transporter) {
throw new Error("SMTP is not enabled"); throw new Error("SMTP is not enabled");
@@ -178,19 +178,151 @@ export class EmailService {
const appName = await this.configService.getValue("appName"); const appName = await this.configService.getValue("appName");
const shareTitle = shareName || "Files"; const shareTitle = shareName || "Files";
const sender = senderName || "Someone";
await transporter.sendMail({ await transporter.sendMail({
from: `"${fromName}" <${fromEmail}>`, from: `"${fromName}" <${fromEmail}>`,
to, to,
subject: `${appName} - ${shareTitle} shared with you`, subject: `${appName} - ${shareTitle} shared with you`,
html: ` html: `
<h1>${appName} - Shared Files</h1> <!DOCTYPE html>
<p>Someone has shared "${shareTitle}" with you.</p> <html lang="en">
<p>Click the link below to access the shared files:</p> <head>
<a href="${shareLink}"> <meta charset="UTF-8">
Access Shared Files <meta name="viewport" content="width=device-width, initial-scale=1.0">
</a> <title>${appName} - Shared Files</title>
<p>Note: This share may have an expiration date or view limit.</p> </head>
<body style="margin: 0; padding: 0; font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, 'Helvetica Neue', Arial, sans-serif; background-color: #f5f5f5; color: #333333;">
<div style="max-width: 600px; margin: 0 auto; background-color: #ffffff; box-shadow: 0 2px 8px rgba(0, 0, 0, 0.1); overflow: hidden; margin-top: 40px; margin-bottom: 40px;">
<!-- Header -->
<div style="background-color: #22B14C; padding: 30px 20px; text-align: center;">
<h1 style="margin: 0; color: #ffffff; font-size: 28px; font-weight: 600; letter-spacing: -0.5px;">${appName}</h1>
<p style="margin: 2px 0 0 0; color: #ffffff; font-size: 16px; opacity: 0.9;">Shared Files</p>
</div>
<!-- Content -->
<div style="padding: 40px 30px;">
<div style="text-align: center; margin-bottom: 32px;">
<h2 style="margin: 0 0 12px 0; color: #1f2937; font-size: 24px; font-weight: 600;">Files Shared With You</h2>
<p style="margin: 0; color: #6b7280; font-size: 16px; line-height: 1.6;">
<strong style="color: #374151;">${sender}</strong> has shared <strong style="color: #374151;">"${shareTitle}"</strong> with you.
</p>
</div>
<!-- CTA Button -->
<div style="text-align: center; margin: 32px 0;">
<a href="${shareLink}" style="display: inline-block; background-color: #22B14C; color: #ffffff; text-decoration: none; padding: 12px 24px; font-weight: 600; font-size: 16px; border: 2px solid #22B14C; border-radius: 8px; transition: all 0.3s ease;">
Access Shared Files
</a>
</div>
<!-- Info Box -->
<div style="background-color: #f9fafb; border-left: 4px solid #22B14C; padding: 16px 20px; margin-top: 32px;">
<p style="margin: 0; color: #4b5563; font-size: 14px; line-height: 1.5;">
<strong>Important:</strong> This share may have an expiration date or view limit. Access it as soon as possible to ensure availability.
</p>
</div>
</div>
<!-- Footer -->
<div style="background-color: #f9fafb; padding: 24px 30px; text-align: center; border-top: 1px solid #e5e7eb;">
<p style="margin: 0; color: #6b7280; font-size: 14px;">
This email was sent by <strong>${appName}</strong>
</p>
<p style="margin: 8px 0 0 0; color: #9ca3af; font-size: 12px;">
If you didn't expect this email, you can safely ignore it.
</p>
<p style="margin: 4px 0 0 0; color: #9ca3af; font-size: 10px;">
Powered by <a href="https://kyantech.com.br" style="color: #9ca3af; text-decoration: none;">Kyantech Solutions</a>
</p>
</div>
</div>
</body>
</html>
`,
});
}
async sendReverseShareBatchFileNotification(
recipientEmail: string,
reverseShareName: string,
fileCount: number,
fileList: string,
uploaderName: string
) {
const transporter = await this.createTransporter();
if (!transporter) {
throw new Error("SMTP is not enabled");
}
const fromName = await this.configService.getValue("smtpFromName");
const fromEmail = await this.configService.getValue("smtpFromEmail");
const appName = await this.configService.getValue("appName");
await transporter.sendMail({
from: `"${fromName}" <${fromEmail}>`,
to: recipientEmail,
subject: `${appName} - ${fileCount} file${fileCount > 1 ? "s" : ""} uploaded to "${reverseShareName}"`,
html: `
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<title>${appName} - File Upload Notification</title>
</head>
<body style="margin: 0; padding: 0; font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, 'Helvetica Neue', Arial, sans-serif; background-color: #f5f5f5; color: #333333;">
<div style="max-width: 600px; margin: 0 auto; background-color: #ffffff; box-shadow: 0 2px 8px rgba(0, 0, 0, 0.1); overflow: hidden; margin-top: 40px; margin-bottom: 40px;">
<!-- Header -->
<div style="background-color: #22B14C; padding: 30px 20px; text-align: center;">
<h1 style="margin: 0; color: #ffffff; font-size: 28px; font-weight: 600; letter-spacing: -0.5px;">${appName}</h1>
<p style="margin: 2px 0 0 0; color: #ffffff; font-size: 16px; opacity: 0.9;">File Upload Notification</p>
</div>
<!-- Content -->
<div style="padding: 40px 30px;">
<div style="text-align: center; margin-bottom: 32px;">
<h2 style="margin: 0 0 12px 0; color: #1f2937; font-size: 24px; font-weight: 600;">New File Uploaded</h2>
<p style="margin: 0; color: #6b7280; font-size: 16px; line-height: 1.6;">
<strong style="color: #374151;">${uploaderName}</strong> has uploaded <strong style="color: #374151;">${fileCount} file${fileCount > 1 ? "s" : ""}</strong> to your reverse share <strong style="color: #374151;">"${reverseShareName}"</strong>.
</p>
</div>
<!-- File List -->
<div style="background-color: #f9fafb; border-radius: 8px; padding: 16px; margin: 32px 0; border-left: 4px solid #22B14C;">
<p style="margin: 0 0 8px 0; color: #374151; font-size: 14px;"><strong>Files (${fileCount}):</strong></p>
<ul style="margin: 0; padding-left: 20px; color: #6b7280; font-size: 14px; line-height: 1.5;">
${fileList
.split(", ")
.map((file) => `<li style="margin: 4px 0;">${file}</li>`)
.join("")}
</ul>
</div>
<!-- Info Text -->
<div style="text-align: center; margin-top: 32px;">
<p style="margin: 0; color: #9ca3af; font-size: 12px;">
You can now access and manage these files through your dashboard.
</p>
</div>
</div>
<!-- Footer -->
<div style="background-color: #f9fafb; padding: 24px 30px; text-align: center; border-top: 1px solid #e5e7eb;">
<p style="margin: 0; color: #6b7280; font-size: 14px;">
This email was sent by <strong>${appName}</strong>
</p>
<p style="margin: 8px 0 0 0; color: #9ca3af; font-size: 12px;">
If you didn't expect this email, you can safely ignore it.
</p>
<p style="margin: 4px 0 0 0; color: #9ca3af; font-size: 10px;">
Powered by <a href="https://kyantech.com.br" style="color: #9ca3af; text-decoration: none;">Kyantech Solutions</a>
</p>
</div>
</div>
</body>
</html>
`, `,
}); });
} }

View File

@@ -56,17 +56,7 @@ export class FileController {
}); });
} }
// Check if DEMO_MODE is enabled const maxTotalStorage = BigInt(await this.configService.getValue("maxTotalStoragePerUser"));
const isDemoMode = env.DEMO_MODE === "true";
let maxTotalStorage: bigint;
if (isDemoMode) {
// In demo mode, limit all users to 200MB
maxTotalStorage = BigInt(200 * 1024 * 1024); // 200MB in bytes
} else {
// Normal behavior - use maxTotalStoragePerUser configuration
maxTotalStorage = BigInt(await this.configService.getValue("maxTotalStoragePerUser"));
}
const userFiles = await prisma.file.findMany({ const userFiles = await prisma.file.findMany({
where: { userId }, where: { userId },
@@ -138,17 +128,7 @@ export class FileController {
}); });
} }
// Check if DEMO_MODE is enabled const maxTotalStorage = BigInt(await this.configService.getValue("maxTotalStoragePerUser"));
const isDemoMode = env.DEMO_MODE === "true";
let maxTotalStorage: bigint;
if (isDemoMode) {
// In demo mode, limit all users to 200MB
maxTotalStorage = BigInt(200 * 1024 * 1024); // 200MB in bytes
} else {
// Normal behavior - use maxTotalStoragePerUser configuration
maxTotalStorage = BigInt(await this.configService.getValue("maxTotalStoragePerUser"));
}
const userFiles = await prisma.file.findMany({ const userFiles = await prisma.file.findMany({
where: { userId }, where: { userId },

View File

@@ -8,9 +8,6 @@ import { ChunkManager, ChunkMetadata } from "./chunk-manager";
export class FilesystemController { export class FilesystemController {
private chunkManager = ChunkManager.getInstance(); private chunkManager = ChunkManager.getInstance();
/**
* Safely encode filename for Content-Disposition header
*/
private encodeFilenameForHeader(filename: string): string { private encodeFilenameForHeader(filename: string): string {
if (!filename || filename.trim() === "") { if (!filename || filename.trim() === "") {
return 'attachment; filename="download"'; return 'attachment; filename="download"';
@@ -103,9 +100,6 @@ export class FilesystemController {
await provider.uploadFileFromStream(objectName, request.raw); await provider.uploadFileFromStream(objectName, request.raw);
} }
/**
* Extract chunk metadata from request headers
*/
private extractChunkMetadata(request: FastifyRequest): ChunkMetadata | null { private extractChunkMetadata(request: FastifyRequest): ChunkMetadata | null {
const fileId = request.headers["x-file-id"] as string; const fileId = request.headers["x-file-id"] as string;
const chunkIndex = request.headers["x-chunk-index"] as string; const chunkIndex = request.headers["x-chunk-index"] as string;
@@ -132,9 +126,6 @@ export class FilesystemController {
return metadata; return metadata;
} }
/**
* Handle chunked upload with streaming
*/
private async handleChunkedUpload(request: FastifyRequest, metadata: ChunkMetadata, originalObjectName: string) { private async handleChunkedUpload(request: FastifyRequest, metadata: ChunkMetadata, originalObjectName: string) {
const stream = request.raw; const stream = request.raw;
@@ -145,9 +136,6 @@ export class FilesystemController {
return await this.chunkManager.processChunk(metadata, stream, originalObjectName); return await this.chunkManager.processChunk(metadata, stream, originalObjectName);
} }
/**
* Get upload progress for chunked uploads
*/
async getUploadProgress(request: FastifyRequest, reply: FastifyReply) { async getUploadProgress(request: FastifyRequest, reply: FastifyReply) {
try { try {
const { fileId } = request.params as { fileId: string }; const { fileId } = request.params as { fileId: string };
@@ -164,9 +152,6 @@ export class FilesystemController {
} }
} }
/**
* Cancel chunked upload
*/
async cancelUpload(request: FastifyRequest, reply: FastifyReply) { async cancelUpload(request: FastifyRequest, reply: FastifyReply) {
try { try {
const { fileId } = request.params as { fileId: string }; const { fileId } = request.params as { fileId: string };
@@ -194,7 +179,6 @@ export class FilesystemController {
const filePath = provider.getFilePath(tokenData.objectName); const filePath = provider.getFilePath(tokenData.objectName);
const stats = await fs.promises.stat(filePath); const stats = await fs.promises.stat(filePath);
const fileSize = stats.size; const fileSize = stats.size;
const isLargeFile = fileSize > 50 * 1024 * 1024;
const fileName = tokenData.fileName || "download"; const fileName = tokenData.fileName || "download";
const range = request.headers.range; const range = request.headers.range;
@@ -207,28 +191,15 @@ export class FilesystemController {
const parts = range.replace(/bytes=/, "").split("-"); const parts = range.replace(/bytes=/, "").split("-");
const start = parseInt(parts[0], 10); const start = parseInt(parts[0], 10);
const end = parts[1] ? parseInt(parts[1], 10) : fileSize - 1; const end = parts[1] ? parseInt(parts[1], 10) : fileSize - 1;
const chunkSize = end - start + 1;
reply.status(206); reply.status(206);
reply.header("Content-Range", `bytes ${start}-${end}/${fileSize}`); reply.header("Content-Range", `bytes ${start}-${end}/${fileSize}`);
reply.header("Content-Length", chunkSize); reply.header("Content-Length", end - start + 1);
if (isLargeFile) { await this.downloadFileRange(reply, provider, tokenData.objectName, start, end);
await this.downloadLargeFileRange(reply, provider, tokenData.objectName, start, end);
} else {
const buffer = await provider.downloadFile(tokenData.objectName);
const chunk = buffer.slice(start, end + 1);
reply.send(chunk);
}
} else { } else {
reply.header("Content-Length", fileSize); reply.header("Content-Length", fileSize);
await this.downloadFileStream(reply, provider, tokenData.objectName);
if (isLargeFile) {
await this.downloadLargeFile(reply, provider, filePath);
} else {
const buffer = await provider.downloadFile(tokenData.objectName);
reply.send(buffer);
}
} }
provider.consumeDownloadToken(token); provider.consumeDownloadToken(token);
@@ -237,26 +208,75 @@ export class FilesystemController {
} }
} }
private async downloadLargeFile(reply: FastifyReply, provider: FilesystemStorageProvider, filePath: string) { private async downloadFileStream(reply: FastifyReply, provider: FilesystemStorageProvider, objectName: string) {
const readStream = fs.createReadStream(filePath);
const decryptStream = provider.createDecryptStream();
try { try {
await pipeline(readStream, decryptStream, reply.raw); FilesystemStorageProvider.logMemoryUsage(`Download start: ${objectName}`);
const downloadStream = provider.createDownloadStream(objectName);
downloadStream.on("error", (error) => {
console.error("Download stream error:", error);
FilesystemStorageProvider.logMemoryUsage(`Download error: ${objectName}`);
if (!reply.sent) {
reply.status(500).send({ error: "Download failed" });
}
});
reply.raw.on("close", () => {
if (downloadStream.readable && typeof (downloadStream as any).destroy === "function") {
(downloadStream as any).destroy();
}
FilesystemStorageProvider.logMemoryUsage(`Download client disconnect: ${objectName}`);
});
await pipeline(downloadStream, reply.raw);
FilesystemStorageProvider.logMemoryUsage(`Download complete: ${objectName}`);
} catch (error) { } catch (error) {
throw error; console.error("Download error:", error);
FilesystemStorageProvider.logMemoryUsage(`Download failed: ${objectName}`);
if (!reply.sent) {
reply.status(500).send({ error: "Download failed" });
}
} }
} }
private async downloadLargeFileRange( private async downloadFileRange(
reply: FastifyReply, reply: FastifyReply,
provider: FilesystemStorageProvider, provider: FilesystemStorageProvider,
objectName: string, objectName: string,
start: number, start: number,
end: number end: number
) { ) {
const buffer = await provider.downloadFile(objectName); try {
const chunk = buffer.slice(start, end + 1); FilesystemStorageProvider.logMemoryUsage(`Range download start: ${objectName} (${start}-${end})`);
reply.send(chunk);
const rangeStream = await provider.createDownloadRangeStream(objectName, start, end);
rangeStream.on("error", (error) => {
console.error("Range download stream error:", error);
FilesystemStorageProvider.logMemoryUsage(`Range download error: ${objectName} (${start}-${end})`);
if (!reply.sent) {
reply.status(500).send({ error: "Download failed" });
}
});
reply.raw.on("close", () => {
if (rangeStream.readable && typeof (rangeStream as any).destroy === "function") {
(rangeStream as any).destroy();
}
FilesystemStorageProvider.logMemoryUsage(`Range download client disconnect: ${objectName} (${start}-${end})`);
});
await pipeline(rangeStream, reply.raw);
FilesystemStorageProvider.logMemoryUsage(`Range download complete: ${objectName} (${start}-${end})`);
} catch (error) {
console.error("Range download error:", error);
FilesystemStorageProvider.logMemoryUsage(`Range download failed: ${objectName} (${start}-${end})`);
if (!reply.sent) {
reply.status(500).send({ error: "Download failed" });
}
}
} }
} }

View File

@@ -1,7 +1,9 @@
import { PrismaClient } from "@prisma/client"; import { PrismaClient } from "@prisma/client";
import { env } from "../../env"; import { env } from "../../env";
import { EmailService } from "../email/service";
import { FileService } from "../file/service"; import { FileService } from "../file/service";
import { UserService } from "../user/service";
import { import {
CreateReverseShareInput, CreateReverseShareInput,
ReverseShareResponseSchema, ReverseShareResponseSchema,
@@ -41,6 +43,19 @@ const prisma = new PrismaClient();
export class ReverseShareService { export class ReverseShareService {
private reverseShareRepository = new ReverseShareRepository(); private reverseShareRepository = new ReverseShareRepository();
private fileService = new FileService(); private fileService = new FileService();
private emailService = new EmailService();
private userService = new UserService();
private uploadSessions = new Map<
string,
{
reverseShareId: string;
uploaderName: string;
uploaderEmail?: string;
files: string[];
timeout: NodeJS.Timeout;
}
>();
async createReverseShare(data: CreateReverseShareInput, creatorId: string) { async createReverseShare(data: CreateReverseShareInput, creatorId: string) {
const reverseShare = await this.reverseShareRepository.create(data, creatorId); const reverseShare = await this.reverseShareRepository.create(data, creatorId);
@@ -295,6 +310,8 @@ export class ReverseShareService {
size: BigInt(fileData.size), size: BigInt(fileData.size),
}); });
this.addFileToUploadSession(reverseShare, fileData);
return this.formatFileResponse(file); return this.formatFileResponse(file);
} }
@@ -345,6 +362,8 @@ export class ReverseShareService {
size: BigInt(fileData.size), size: BigInt(fileData.size),
}); });
this.addFileToUploadSession(reverseShare, fileData);
return this.formatFileResponse(file); return this.formatFileResponse(file);
} }
@@ -514,17 +533,7 @@ export class ReverseShareService {
throw new Error(`File size exceeds the maximum allowed size of ${maxSizeMB}MB`); throw new Error(`File size exceeds the maximum allowed size of ${maxSizeMB}MB`);
} }
// Check if DEMO_MODE is enabled const maxTotalStorage = BigInt(await configService.getValue("maxTotalStoragePerUser"));
const isDemoMode = env.DEMO_MODE === "true";
let maxTotalStorage: bigint;
if (isDemoMode) {
// In demo mode, limit all users to 200MB
maxTotalStorage = BigInt(200 * 1024 * 1024); // 200MB in bytes
} else {
// Normal behavior - use maxTotalStoragePerUser configuration
maxTotalStorage = BigInt(await configService.getValue("maxTotalStoragePerUser"));
}
const userFiles = await prisma.file.findMany({ const userFiles = await prisma.file.findMany({
where: { userId: creatorId }, where: { userId: creatorId },
@@ -637,6 +646,55 @@ export class ReverseShareService {
}; };
} }
private generateSessionKey(reverseShareId: string, uploaderIdentifier: string): string {
return `${reverseShareId}-${uploaderIdentifier}`;
}
private async sendBatchFileUploadNotification(reverseShare: any, uploaderName: string, fileNames: string[]) {
try {
const creator = await this.userService.getUserById(reverseShare.creatorId);
const reverseShareName = reverseShare.name || "Unnamed Reverse Share";
const fileCount = fileNames.length;
const fileList = fileNames.join(", ");
await this.emailService.sendReverseShareBatchFileNotification(
creator.email,
reverseShareName,
fileCount,
fileList,
uploaderName
);
} catch (error) {
console.error("Failed to send reverse share batch file notification:", error);
}
}
private addFileToUploadSession(reverseShare: any, fileData: UploadToReverseShareInput) {
const uploaderIdentifier = fileData.uploaderEmail || fileData.uploaderName || "anonymous";
const sessionKey = this.generateSessionKey(reverseShare.id, uploaderIdentifier);
const uploaderName = fileData.uploaderName || "Someone";
const existingSession = this.uploadSessions.get(sessionKey);
if (existingSession) {
clearTimeout(existingSession.timeout);
existingSession.files.push(fileData.name);
} else {
this.uploadSessions.set(sessionKey, {
reverseShareId: reverseShare.id,
uploaderName,
uploaderEmail: fileData.uploaderEmail,
files: [fileData.name],
timeout: null as any,
});
}
const session = this.uploadSessions.get(sessionKey)!;
session.timeout = setTimeout(async () => {
await this.sendBatchFileUploadNotification(reverseShare, session.uploaderName, session.files);
this.uploadSessions.delete(sessionKey);
}, 5000);
}
private formatReverseShareResponse(reverseShare: ReverseShareData) { private formatReverseShareResponse(reverseShare: ReverseShareData) {
const result = { const result = {
id: reverseShare.id, id: reverseShare.id,

View File

@@ -2,6 +2,7 @@ import bcrypt from "bcryptjs";
import { prisma } from "../../shared/prisma"; import { prisma } from "../../shared/prisma";
import { EmailService } from "../email/service"; import { EmailService } from "../email/service";
import { UserService } from "../user/service";
import { CreateShareInput, ShareResponseSchema, UpdateShareInput } from "./dto"; import { CreateShareInput, ShareResponseSchema, UpdateShareInput } from "./dto";
import { IShareRepository, PrismaShareRepository } from "./repository"; import { IShareRepository, PrismaShareRepository } from "./repository";
@@ -9,6 +10,7 @@ export class ShareService {
constructor(private readonly shareRepository: IShareRepository = new PrismaShareRepository()) {} constructor(private readonly shareRepository: IShareRepository = new PrismaShareRepository()) {}
private emailService = new EmailService(); private emailService = new EmailService();
private userService = new UserService();
private formatShareResponse(share: any) { private formatShareResponse(share: any) {
return { return {
@@ -339,11 +341,26 @@ export class ShareService {
throw new Error("No recipients found for this share"); throw new Error("No recipients found for this share");
} }
// Get sender information
let senderName = "Someone";
try {
const sender = await this.userService.getUserById(userId);
if (sender.firstName && sender.lastName) {
senderName = `${sender.firstName} ${sender.lastName}`;
} else if (sender.firstName) {
senderName = sender.firstName;
} else if (sender.username) {
senderName = sender.username;
}
} catch (error) {
console.error(`Failed to get sender information for user ${userId}:`, error);
}
const notifiedRecipients: string[] = []; const notifiedRecipients: string[] = [];
for (const recipient of share.recipients) { for (const recipient of share.recipients) {
try { try {
await this.emailService.sendShareNotification(recipient.email, shareLink, share.name || undefined); await this.emailService.sendShareNotification(recipient.email, shareLink, share.name || undefined, senderName);
notifiedRecipients.push(recipient.email); notifiedRecipients.push(recipient.email);
} catch (error) { } catch (error) {
console.error(`Failed to send email to ${recipient.email}:`, error); console.error(`Failed to send email to ${recipient.email}:`, error);

View File

@@ -324,89 +324,45 @@ export class StorageService {
uploadAllowed: boolean; uploadAllowed: boolean;
}> { }> {
try { try {
const isDemoMode = env.DEMO_MODE === "true";
if (isAdmin) { if (isAdmin) {
if (isDemoMode) { const diskInfo = await this._getDiskSpaceMultiplePaths();
const demoMaxStorage = 200 * 1024 * 1024;
const demoMaxStorageGB = this._ensureNumber(demoMaxStorage / (1024 * 1024 * 1024), 0);
const userFiles = await prisma.file.findMany({ if (!diskInfo) {
where: { userId }, throw new Error("Unable to determine actual disk space - system configuration issue");
select: { size: true },
});
const totalUsedStorage = userFiles.reduce((acc, file) => acc + file.size, BigInt(0));
const usedStorageGB = this._ensureNumber(Number(totalUsedStorage) / (1024 * 1024 * 1024), 0);
const availableStorageGB = this._ensureNumber(demoMaxStorageGB - usedStorageGB, 0);
return {
diskSizeGB: Number(demoMaxStorageGB.toFixed(2)),
diskUsedGB: Number(usedStorageGB.toFixed(2)),
diskAvailableGB: Number(availableStorageGB.toFixed(2)),
uploadAllowed: availableStorageGB > 0,
};
} else {
const diskInfo = await this._getDiskSpaceMultiplePaths();
if (!diskInfo) {
throw new Error("Unable to determine actual disk space - system configuration issue");
}
const { total, available } = diskInfo;
const used = total - available;
const diskSizeGB = this._ensureNumber(total / (1024 * 1024 * 1024), 0);
const diskUsedGB = this._ensureNumber(used / (1024 * 1024 * 1024), 0);
const diskAvailableGB = this._ensureNumber(available / (1024 * 1024 * 1024), 0);
return {
diskSizeGB: Number(diskSizeGB.toFixed(2)),
diskUsedGB: Number(diskUsedGB.toFixed(2)),
diskAvailableGB: Number(diskAvailableGB.toFixed(2)),
uploadAllowed: diskAvailableGB > 0.1,
};
} }
const { total, available } = diskInfo;
const used = total - available;
const diskSizeGB = this._ensureNumber(total / (1024 * 1024 * 1024), 0);
const diskUsedGB = this._ensureNumber(used / (1024 * 1024 * 1024), 0);
const diskAvailableGB = this._ensureNumber(available / (1024 * 1024 * 1024), 0);
return {
diskSizeGB: Number(diskSizeGB.toFixed(2)),
diskUsedGB: Number(diskUsedGB.toFixed(2)),
diskAvailableGB: Number(diskAvailableGB.toFixed(2)),
uploadAllowed: diskAvailableGB > 0.1,
};
} else if (userId) { } else if (userId) {
if (isDemoMode) { const maxTotalStorage = BigInt(await this.configService.getValue("maxTotalStoragePerUser"));
const demoMaxStorage = 200 * 1024 * 1024; const maxStorageGB = this._ensureNumber(Number(maxTotalStorage) / (1024 * 1024 * 1024), 10);
const demoMaxStorageGB = this._ensureNumber(demoMaxStorage / (1024 * 1024 * 1024), 0);
const userFiles = await prisma.file.findMany({ const userFiles = await prisma.file.findMany({
where: { userId }, where: { userId },
select: { size: true }, select: { size: true },
}); });
const totalUsedStorage = userFiles.reduce((acc, file) => acc + file.size, BigInt(0)); const totalUsedStorage = userFiles.reduce((acc, file) => acc + file.size, BigInt(0));
const usedStorageGB = this._ensureNumber(Number(totalUsedStorage) / (1024 * 1024 * 1024), 0); const usedStorageGB = this._ensureNumber(Number(totalUsedStorage) / (1024 * 1024 * 1024), 0);
const availableStorageGB = this._ensureNumber(demoMaxStorageGB - usedStorageGB, 0); const availableStorageGB = this._ensureNumber(maxStorageGB - usedStorageGB, 0);
return { return {
diskSizeGB: Number(demoMaxStorageGB.toFixed(2)), diskSizeGB: Number(maxStorageGB.toFixed(2)),
diskUsedGB: Number(usedStorageGB.toFixed(2)), diskUsedGB: Number(usedStorageGB.toFixed(2)),
diskAvailableGB: Number(availableStorageGB.toFixed(2)), diskAvailableGB: Number(availableStorageGB.toFixed(2)),
uploadAllowed: availableStorageGB > 0, uploadAllowed: availableStorageGB > 0,
}; };
} else {
const maxTotalStorage = BigInt(await this.configService.getValue("maxTotalStoragePerUser"));
const maxStorageGB = this._ensureNumber(Number(maxTotalStorage) / (1024 * 1024 * 1024), 10);
const userFiles = await prisma.file.findMany({
where: { userId },
select: { size: true },
});
const totalUsedStorage = userFiles.reduce((acc, file) => acc + file.size, BigInt(0));
const usedStorageGB = this._ensureNumber(Number(totalUsedStorage) / (1024 * 1024 * 1024), 0);
const availableStorageGB = this._ensureNumber(maxStorageGB - usedStorageGB, 0);
return {
diskSizeGB: Number(maxStorageGB.toFixed(2)),
diskUsedGB: Number(usedStorageGB.toFixed(2)),
diskAvailableGB: Number(availableStorageGB.toFixed(2)),
uploadAllowed: availableStorageGB > 0,
};
}
} }
throw new Error("User ID is required for non-admin users"); throw new Error("User ID is required for non-admin users");

View File

@@ -20,9 +20,16 @@ export class FilesystemStorageProvider implements StorageProvider {
private constructor() { private constructor() {
this.uploadsDir = directoriesConfig.uploads; this.uploadsDir = directoriesConfig.uploads;
if (!this.isEncryptionDisabled && !this.encryptionKey) {
throw new Error(
"Encryption is enabled but ENCRYPTION_KEY is not provided. " +
"Please set ENCRYPTION_KEY environment variable or set DISABLE_FILESYSTEM_ENCRYPTION=true to disable encryption."
);
}
this.ensureUploadsDir(); this.ensureUploadsDir();
setInterval(() => this.cleanExpiredTokens(), 5 * 60 * 1000); setInterval(() => this.cleanExpiredTokens(), 5 * 60 * 1000);
setInterval(() => this.cleanupEmptyTempDirs(), 10 * 60 * 1000); // Every 10 minutes setInterval(() => this.cleanupEmptyTempDirs(), 10 * 60 * 1000);
} }
public static getInstance(): FilesystemStorageProvider { public static getInstance(): FilesystemStorageProvider {
@@ -62,6 +69,11 @@ export class FilesystemStorageProvider implements StorageProvider {
} }
private createEncryptionKey(): Buffer { private createEncryptionKey(): Buffer {
if (!this.encryptionKey) {
throw new Error(
"Encryption key is required when encryption is enabled. Please set ENCRYPTION_KEY environment variable."
);
}
return crypto.scryptSync(this.encryptionKey, "salt", 32); return crypto.scryptSync(this.encryptionKey, "salt", 32);
} }
@@ -253,6 +265,183 @@ export class FilesystemStorageProvider implements StorageProvider {
return this.decryptFileLegacy(fileBuffer); return this.decryptFileLegacy(fileBuffer);
} }
createDownloadStream(objectName: string): NodeJS.ReadableStream {
const filePath = this.getFilePath(objectName);
const fileStream = fsSync.createReadStream(filePath);
if (this.isEncryptionDisabled) {
fileStream.on("end", () => {
if (global.gc) {
global.gc();
}
});
fileStream.on("close", () => {
if (global.gc) {
global.gc();
}
});
return fileStream;
}
const decryptStream = this.createDecryptStream();
let isDestroyed = false;
const cleanup = () => {
if (isDestroyed) return;
isDestroyed = true;
try {
if (fileStream && !fileStream.destroyed) {
fileStream.destroy();
}
if (decryptStream && !decryptStream.destroyed) {
decryptStream.destroy();
}
} catch (error) {
console.warn("Error during download stream cleanup:", error);
}
if (global.gc) {
global.gc();
}
};
fileStream.on("error", cleanup);
decryptStream.on("error", cleanup);
decryptStream.on("end", cleanup);
decryptStream.on("close", cleanup);
decryptStream.on("pipe", (src: any) => {
if (src && src.on) {
src.on("close", cleanup);
src.on("error", cleanup);
}
});
return fileStream.pipe(decryptStream);
}
async createDownloadRangeStream(objectName: string, start: number, end: number): Promise<NodeJS.ReadableStream> {
if (!this.isEncryptionDisabled) {
return this.createRangeStreamFromDecrypted(objectName, start, end);
}
const filePath = this.getFilePath(objectName);
return fsSync.createReadStream(filePath, { start, end });
}
private createRangeStreamFromDecrypted(objectName: string, start: number, end: number): NodeJS.ReadableStream {
const { Transform, PassThrough } = require("stream");
const filePath = this.getFilePath(objectName);
const fileStream = fsSync.createReadStream(filePath);
const decryptStream = this.createDecryptStream();
const rangeStream = new PassThrough();
let bytesRead = 0;
let rangeEnded = false;
let isDestroyed = false;
const rangeTransform = new Transform({
transform(chunk: Buffer, encoding: any, callback: any) {
if (rangeEnded || isDestroyed) {
callback();
return;
}
const chunkStart = bytesRead;
const chunkEnd = bytesRead + chunk.length - 1;
bytesRead += chunk.length;
if (chunkEnd < start) {
callback();
return;
}
if (chunkStart > end) {
rangeEnded = true;
this.end();
callback();
return;
}
let sliceStart = 0;
let sliceEnd = chunk.length;
if (chunkStart < start) {
sliceStart = start - chunkStart;
}
if (chunkEnd > end) {
sliceEnd = end - chunkStart + 1;
rangeEnded = true;
}
const slicedChunk = chunk.slice(sliceStart, sliceEnd);
this.push(slicedChunk);
if (rangeEnded) {
this.end();
}
callback();
},
flush(callback: any) {
if (global.gc) {
global.gc();
}
callback();
},
});
const cleanup = () => {
if (isDestroyed) return;
isDestroyed = true;
try {
if (fileStream && !fileStream.destroyed) {
fileStream.destroy();
}
if (decryptStream && !decryptStream.destroyed) {
decryptStream.destroy();
}
if (rangeTransform && !rangeTransform.destroyed) {
rangeTransform.destroy();
}
if (rangeStream && !rangeStream.destroyed) {
rangeStream.destroy();
}
} catch (error) {
console.warn("Error during stream cleanup:", error);
}
if (global.gc) {
global.gc();
}
};
fileStream.on("error", cleanup);
decryptStream.on("error", cleanup);
rangeTransform.on("error", cleanup);
rangeStream.on("error", cleanup);
rangeStream.on("close", cleanup);
rangeStream.on("end", cleanup);
rangeStream.on("pipe", (src: any) => {
if (src && src.on) {
src.on("close", cleanup);
src.on("error", cleanup);
}
});
fileStream.pipe(decryptStream).pipe(rangeTransform).pipe(rangeStream);
return rangeStream;
}
private decryptFileBuffer(encryptedBuffer: Buffer): Buffer { private decryptFileBuffer(encryptedBuffer: Buffer): Buffer {
const key = this.createEncryptionKey(); const key = this.createEncryptionKey();
const iv = encryptedBuffer.slice(0, 16); const iv = encryptedBuffer.slice(0, 16);
@@ -264,11 +453,69 @@ export class FilesystemStorageProvider implements StorageProvider {
} }
private decryptFileLegacy(encryptedBuffer: Buffer): Buffer { private decryptFileLegacy(encryptedBuffer: Buffer): Buffer {
if (!this.encryptionKey) {
throw new Error(
"Encryption key is required when encryption is enabled. Please set ENCRYPTION_KEY environment variable."
);
}
const CryptoJS = require("crypto-js"); const CryptoJS = require("crypto-js");
const decrypted = CryptoJS.AES.decrypt(encryptedBuffer.toString("utf8"), this.encryptionKey); const decrypted = CryptoJS.AES.decrypt(encryptedBuffer.toString("utf8"), this.encryptionKey);
return Buffer.from(decrypted.toString(CryptoJS.enc.Utf8), "base64"); return Buffer.from(decrypted.toString(CryptoJS.enc.Utf8), "base64");
} }
static logMemoryUsage(context: string = "Unknown"): void {
const memUsage = process.memoryUsage();
const formatBytes = (bytes: number) => {
const mb = bytes / 1024 / 1024;
return `${mb.toFixed(2)} MB`;
};
const rssInMB = memUsage.rss / 1024 / 1024;
const heapUsedInMB = memUsage.heapUsed / 1024 / 1024;
if (rssInMB > 1024 || heapUsedInMB > 512) {
console.warn(`[MEMORY WARNING] ${context} - High memory usage detected:`);
console.warn(` RSS: ${formatBytes(memUsage.rss)}`);
console.warn(` Heap Used: ${formatBytes(memUsage.heapUsed)}`);
console.warn(` Heap Total: ${formatBytes(memUsage.heapTotal)}`);
console.warn(` External: ${formatBytes(memUsage.external)}`);
if (global.gc) {
console.warn(" Forcing garbage collection...");
global.gc();
const afterGC = process.memoryUsage();
console.warn(` After GC - RSS: ${formatBytes(afterGC.rss)}, Heap: ${formatBytes(afterGC.heapUsed)}`);
}
} else {
console.log(
`[MEMORY INFO] ${context} - RSS: ${formatBytes(memUsage.rss)}, Heap: ${formatBytes(memUsage.heapUsed)}`
);
}
}
static forceGarbageCollection(context: string = "Manual"): void {
if (global.gc) {
const beforeGC = process.memoryUsage();
global.gc();
const afterGC = process.memoryUsage();
const formatBytes = (bytes: number) => `${(bytes / 1024 / 1024).toFixed(2)} MB`;
console.log(`[GC] ${context} - Before: RSS ${formatBytes(beforeGC.rss)}, Heap ${formatBytes(beforeGC.heapUsed)}`);
console.log(`[GC] ${context} - After: RSS ${formatBytes(afterGC.rss)}, Heap ${formatBytes(afterGC.heapUsed)}`);
const rssSaved = beforeGC.rss - afterGC.rss;
const heapSaved = beforeGC.heapUsed - afterGC.heapUsed;
if (rssSaved > 0 || heapSaved > 0) {
console.log(`[GC] ${context} - Freed: RSS ${formatBytes(rssSaved)}, Heap ${formatBytes(heapSaved)}`);
}
} else {
console.warn(`[GC] ${context} - Garbage collection not available. Start Node.js with --expose-gc flag.`);
}
}
async fileExists(objectName: string): Promise<boolean> { async fileExists(objectName: string): Promise<boolean> {
const filePath = this.getFilePath(objectName); const filePath = this.getFilePath(objectName);
try { try {
@@ -313,9 +560,6 @@ export class FilesystemStorageProvider implements StorageProvider {
this.downloadTokens.delete(token); this.downloadTokens.delete(token);
} }
/**
* Clean up temporary file and its parent directory if empty
*/
private async cleanupTempFile(tempPath: string): Promise<void> { private async cleanupTempFile(tempPath: string): Promise<void> {
try { try {
await fs.unlink(tempPath); await fs.unlink(tempPath);
@@ -338,9 +582,6 @@ export class FilesystemStorageProvider implements StorageProvider {
} }
} }
/**
* Clean up empty temporary directories periodically
*/
private async cleanupEmptyTempDirs(): Promise<void> { private async cleanupEmptyTempDirs(): Promise<void> {
try { try {
const tempUploadsDir = directoriesConfig.tempUploads; const tempUploadsDir = directoriesConfig.tempUploads;

View File

@@ -159,7 +159,8 @@
"passwordLabel": "كلمة المرور", "passwordLabel": "كلمة المرور",
"create": "إنشاء مشاركة", "create": "إنشاء مشاركة",
"success": "تم إنشاء المشاركة بنجاح", "success": "تم إنشاء المشاركة بنجاح",
"error": "فشل في إنشاء المشاركة" "error": "فشل في إنشاء المشاركة",
"namePlaceholder": "أدخل اسمًا لمشاركتك"
}, },
"dashboard": { "dashboard": {
"loadError": "فشل في تحميل بيانات لوحة التحكم", "loadError": "فشل في تحميل بيانات لوحة التحكم",
@@ -313,7 +314,8 @@
"title": "نسيت كلمة المرور", "title": "نسيت كلمة المرور",
"description": "أدخل بريدك الإلكتروني وسنرسل لك تعليمات إعادة تعيين كلمة المرور.", "description": "أدخل بريدك الإلكتروني وسنرسل لك تعليمات إعادة تعيين كلمة المرور.",
"resetInstructions": "تم إرسال تعليمات إعادة التعيين إلى بريدك الإلكتروني", "resetInstructions": "تم إرسال تعليمات إعادة التعيين إلى بريدك الإلكتروني",
"pageTitle": "نسيت كلمة المرور" "pageTitle": "نسيت كلمة المرور",
"passwordAuthDisabled": "تم تعطيل المصادقة بكلمة المرور. يرجى الاتصال بالمسؤول أو استخدام مزود مصادقة خارجي."
}, },
"generateShareLink": { "generateShareLink": {
"generateTitle": "إنشاء رابط المشاركة", "generateTitle": "إنشاء رابط المشاركة",
@@ -453,6 +455,11 @@
}, },
"pageTitle": "الملف الشخصي" "pageTitle": "الملف الشخصي"
}, },
"qrCodeModal": {
"title": "مشاركة رمز QR",
"description": "امسح رمز QR هذا للوصول إلى الرابط.",
"download": "تحميل رمز QR"
},
"quickAccess": { "quickAccess": {
"files": { "files": {
"title": "ملفاتي", "title": "ملفاتي",
@@ -629,7 +636,7 @@
}, },
"status": { "status": {
"active": "نشط", "active": "نشط",
"inactive": "غير نشط", "inactive": "غير نشط",
"expired": "منتهي الصلاحية", "expired": "منتهي الصلاحية",
"protected": "محمي", "protected": "محمي",
"public": "عام" "public": "عام"
@@ -1130,6 +1137,10 @@
"smtpTrustSelfSigned": { "smtpTrustSelfSigned": {
"title": "الوثوق بالشهادات الموقعة ذاتياً", "title": "الوثوق بالشهادات الموقعة ذاتياً",
"description": "قم بتمكين هذا للوثوق بشهادات SSL/TLS الموقعة ذاتياً (مفيد لبيئات التطوير)" "description": "قم بتمكين هذا للوثوق بشهادات SSL/TLS الموقعة ذاتياً (مفيد لبيئات التطوير)"
},
"passwordAuthEnabled": {
"title": "المصادقة بالكلمة السرية",
"description": "تمكين أو تعطيل المصادقة بالكلمة السرية"
} }
}, },
"buttons": { "buttons": {
@@ -1139,7 +1150,8 @@
}, },
"errors": { "errors": {
"loadFailed": "فشل في تحميل الإعدادات", "loadFailed": "فشل في تحميل الإعدادات",
"updateFailed": "فشل في تحديث الإعدادات" "updateFailed": "فشل في تحديث الإعدادات",
"passwordAuthRequiresProvider": "لا يمكن تعطيل المصادقة بالكلمة السرية دون وجود على الأقل موفرين مصادقة مفعلين"
}, },
"messages": { "messages": {
"noChanges": "لا توجد تغييرات للحفظ", "noChanges": "لا توجد تغييرات للحفظ",
@@ -1653,7 +1665,8 @@
"title": "إفلات الملفات للرفع", "title": "إفلات الملفات للرفع",
"description": "حرر للرفع ملفاتك" "description": "حرر للرفع ملفاتك"
}, },
"pasteSuccess": "{count, plural, =1 {تم لصق الصورة ورفعها بنجاح} other {تم لصق # صور ورفعها بنجاح}}" "pasteSuccess": "{count, plural, =1 {تم لصق الصورة ورفعها بنجاح} other {تم لصق # صور ورفعها بنجاح}}",
"filesQueued": "{count, plural, one {# ملف في الصف} other {# ملفات في الصف}}"
}, },
"users": { "users": {
"modes": { "modes": {
@@ -1738,10 +1751,5 @@
"passwordRequired": "كلمة المرور مطلوبة", "passwordRequired": "كلمة المرور مطلوبة",
"nameRequired": "الاسم مطلوب", "nameRequired": "الاسم مطلوب",
"required": "هذا الحقل مطلوب" "required": "هذا الحقل مطلوب"
},
"qrCodeModal": {
"title": "مشاركة رمز QR",
"description": "امسح رمز QR هذا للوصول إلى الرابط.",
"download": "تحميل رمز QR"
} }
} }

View File

@@ -159,7 +159,8 @@
"passwordLabel": "Passwort", "passwordLabel": "Passwort",
"create": "Freigabe Erstellen", "create": "Freigabe Erstellen",
"success": "Freigabe erfolgreich erstellt", "success": "Freigabe erfolgreich erstellt",
"error": "Fehler beim Erstellen der Freigabe" "error": "Fehler beim Erstellen der Freigabe",
"namePlaceholder": "Geben Sie einen Namen für Ihre Freigabe ein"
}, },
"dashboard": { "dashboard": {
"loadError": "Fehler beim Laden der Dashboard-Daten", "loadError": "Fehler beim Laden der Dashboard-Daten",
@@ -313,7 +314,8 @@
"title": "Passwort vergessen", "title": "Passwort vergessen",
"description": "Geben Sie Ihre E-Mail-Adresse ein und wir senden Ihnen Anweisungen zum Zurücksetzen Ihres Passworts.", "description": "Geben Sie Ihre E-Mail-Adresse ein und wir senden Ihnen Anweisungen zum Zurücksetzen Ihres Passworts.",
"resetInstructions": "Anweisungen zum Zurücksetzen wurden an Ihre E-Mail gesendet", "resetInstructions": "Anweisungen zum Zurücksetzen wurden an Ihre E-Mail gesendet",
"pageTitle": "Passwort vergessen" "pageTitle": "Passwort vergessen",
"passwordAuthDisabled": "Passwortauthentifizierung ist deaktiviert. Bitte kontaktieren Sie Ihren Administrator oder verwenden Sie einen externen Authentifizierungsanbieter."
}, },
"generateShareLink": { "generateShareLink": {
"generateTitle": "Freigabe-Link generieren", "generateTitle": "Freigabe-Link generieren",
@@ -453,6 +455,11 @@
}, },
"pageTitle": "Profil" "pageTitle": "Profil"
}, },
"qrCodeModal": {
"title": "QR-Code teilen",
"description": "Scannen Sie diesen QR-Code, um auf den Link zuzugreifen.",
"download": "QR-Code herunterladen"
},
"quickAccess": { "quickAccess": {
"files": { "files": {
"title": "Meine Dateien", "title": "Meine Dateien",
@@ -628,7 +635,7 @@
"viewQrCode": "QR-Code anzeigen" "viewQrCode": "QR-Code anzeigen"
}, },
"status": { "status": {
"active": "Aktiv", "active": "Aktiv",
"inactive": "Inaktiv", "inactive": "Inaktiv",
"expired": "Abgelaufen", "expired": "Abgelaufen",
"protected": "Geschützt", "protected": "Geschützt",
@@ -636,7 +643,7 @@
}, },
"actions": { "actions": {
"copyLink": "Link kopieren", "copyLink": "Link kopieren",
"editAlias": "Alias bearbeiten", "editAlias": "Alias bearbeiten",
"createAlias": "Alias erstellen", "createAlias": "Alias erstellen",
"viewDetails": "Details anzeigen", "viewDetails": "Details anzeigen",
"edit": "Bearbeiten", "edit": "Bearbeiten",
@@ -1128,6 +1135,10 @@
"tls": "STARTTLS (Port 587)", "tls": "STARTTLS (Port 587)",
"none": "Keine (Unsicher)" "none": "Keine (Unsicher)"
} }
},
"passwordAuthEnabled": {
"title": "Passwort-Authentifizierung",
"description": "Passwort-basierte Authentifizierung aktivieren oder deaktivieren"
} }
}, },
"buttons": { "buttons": {
@@ -1137,7 +1148,8 @@
}, },
"errors": { "errors": {
"loadFailed": "Fehler beim Laden der Einstellungen", "loadFailed": "Fehler beim Laden der Einstellungen",
"updateFailed": "Fehler beim Aktualisieren der Einstellungen" "updateFailed": "Fehler beim Aktualisieren der Einstellungen",
"passwordAuthRequiresProvider": "Passwort-basierte Authentifizierung kann nicht deaktiviert werden, wenn kein aktiver Authentifizierungsanbieter vorhanden ist"
}, },
"messages": { "messages": {
"noChanges": "Keine Änderungen zum Speichern", "noChanges": "Keine Änderungen zum Speichern",
@@ -1245,7 +1257,7 @@
"editSecurity": "Sicherheit bearbeiten", "editSecurity": "Sicherheit bearbeiten",
"editExpiration": "Ablauf bearbeiten", "editExpiration": "Ablauf bearbeiten",
"clickToEnlargeQrCode": "Klicken Sie zum Vergrößern des QR-Codes", "clickToEnlargeQrCode": "Klicken Sie zum Vergrößern des QR-Codes",
"downloadQrCode": "QR-Code herunterladen", "downloadQrCode": "QR-Code herunterladen",
"qrCode": "QR-Code" "qrCode": "QR-Code"
}, },
"shareExpiration": { "shareExpiration": {
@@ -1651,7 +1663,8 @@
"title": "Dateien zum Hochladen ablegen", "title": "Dateien zum Hochladen ablegen",
"description": "Loslassen, um Ihre Dateien hochzuladen" "description": "Loslassen, um Ihre Dateien hochzuladen"
}, },
"pasteSuccess": "{count, plural, =1 {Bild erfolgreich eingefügt und hochgeladen} other {# Bilder erfolgreich eingefügt und hochgeladen}}" "pasteSuccess": "{count, plural, =1 {Bild erfolgreich eingefügt und hochgeladen} other {# Bilder erfolgreich eingefügt und hochgeladen}}",
"filesQueued": "{count, plural, one {# Datei in der Warteschlange} other {# Dateien in der Warteschlange}}"
}, },
"users": { "users": {
"modes": { "modes": {
@@ -1736,10 +1749,5 @@
"passwordRequired": "Passwort ist erforderlich", "passwordRequired": "Passwort ist erforderlich",
"nameRequired": "Name ist erforderlich", "nameRequired": "Name ist erforderlich",
"required": "Dieses Feld ist erforderlich" "required": "Dieses Feld ist erforderlich"
},
"qrCodeModal": {
"title": "QR-Code teilen",
"description": "Scannen Sie diesen QR-Code, um auf den Link zuzugreifen.",
"download": "QR-Code herunterladen"
} }
} }

View File

@@ -149,6 +149,7 @@
"createShare": { "createShare": {
"title": "Create Share", "title": "Create Share",
"nameLabel": "Share Name", "nameLabel": "Share Name",
"namePlaceholder": "Enter a name for your share",
"descriptionLabel": "Description", "descriptionLabel": "Description",
"descriptionPlaceholder": "Enter a description (optional)", "descriptionPlaceholder": "Enter a description (optional)",
"expirationLabel": "Expiration Date", "expirationLabel": "Expiration Date",
@@ -313,7 +314,8 @@
"title": "Forgot Password", "title": "Forgot Password",
"description": "Enter your email address and we'll send you instructions to reset your password", "description": "Enter your email address and we'll send you instructions to reset your password",
"resetInstructions": "Reset instructions sent to your email", "resetInstructions": "Reset instructions sent to your email",
"pageTitle": "Forgot Password" "pageTitle": "Forgot Password",
"passwordAuthDisabled": "Password authentication is disabled. Please contact your administrator or use an external authentication provider."
}, },
"generateShareLink": { "generateShareLink": {
"generateTitle": "Generate Share Link", "generateTitle": "Generate Share Link",
@@ -1131,6 +1133,10 @@
"serverUrl": { "serverUrl": {
"title": "Server URL", "title": "Server URL",
"description": "Base URL of the Palmr server (e.g.: https://palmr.example.com)" "description": "Base URL of the Palmr server (e.g.: https://palmr.example.com)"
},
"passwordAuthEnabled": {
"title": "Password Authentication",
"description": "Enable or disable password-based authentication"
} }
}, },
"buttons": { "buttons": {
@@ -1140,7 +1146,8 @@
}, },
"errors": { "errors": {
"loadFailed": "Failed to load settings", "loadFailed": "Failed to load settings",
"updateFailed": "Failed to update settings" "updateFailed": "Failed to update settings",
"passwordAuthRequiresProvider": "Cannot disable password authentication without having at least one active authentication provider"
}, },
"messages": { "messages": {
"noChanges": "No changes to save", "noChanges": "No changes to save",
@@ -1628,6 +1635,7 @@
"selectFile": "Click to select a file", "selectFile": "Click to select a file",
"selectMultipleFiles": "Click to select one or multiple files", "selectMultipleFiles": "Click to select one or multiple files",
"dragAndDrop": "or drag and drop files here", "dragAndDrop": "or drag and drop files here",
"filesQueued": "{count, plural, one {# file queued for upload} other {# files queued for upload}}",
"preview": "Preview", "preview": "Preview",
"uploadProgress": "Upload progress", "uploadProgress": "Upload progress",
"upload": "Upload", "upload": "Upload",
@@ -1739,4 +1747,4 @@
"nameRequired": "Name is required", "nameRequired": "Name is required",
"required": "This field is required" "required": "This field is required"
} }
} }

View File

@@ -159,7 +159,8 @@
"passwordLabel": "Contraseña", "passwordLabel": "Contraseña",
"create": "Crear Compartir", "create": "Crear Compartir",
"success": "Compartir creado exitosamente", "success": "Compartir creado exitosamente",
"error": "Error al crear compartir" "error": "Error al crear compartir",
"namePlaceholder": "Ingrese un nombre para su compartir"
}, },
"dashboard": { "dashboard": {
"loadError": "Error al cargar los datos del tablero", "loadError": "Error al cargar los datos del tablero",
@@ -313,7 +314,8 @@
"title": "Recuperar contraseña", "title": "Recuperar contraseña",
"description": "Introduce tu dirección de correo electrónico y te enviaremos instrucciones para restablecer tu contraseña.", "description": "Introduce tu dirección de correo electrónico y te enviaremos instrucciones para restablecer tu contraseña.",
"resetInstructions": "Instrucciones de restablecimiento enviadas a tu correo electrónico", "resetInstructions": "Instrucciones de restablecimiento enviadas a tu correo electrónico",
"pageTitle": "Recuperar contraseña" "pageTitle": "Recuperar contraseña",
"passwordAuthDisabled": "La autenticación por contraseña está deshabilitada. Por favor, contacta a tu administrador o usa un proveedor de autenticación externo."
}, },
"generateShareLink": { "generateShareLink": {
"generateTitle": "Generar enlace de compartir", "generateTitle": "Generar enlace de compartir",
@@ -453,6 +455,11 @@
}, },
"pageTitle": "Perfil" "pageTitle": "Perfil"
}, },
"qrCodeModal": {
"title": "Compartir Código QR",
"description": "Escanea este código QR para acceder al enlace.",
"download": "Descargar Código QR"
},
"quickAccess": { "quickAccess": {
"files": { "files": {
"title": "Mis archivos", "title": "Mis archivos",
@@ -1128,6 +1135,10 @@
"tls": "STARTTLS (Puerto 587)", "tls": "STARTTLS (Puerto 587)",
"none": "Ninguno (Inseguro)" "none": "Ninguno (Inseguro)"
} }
},
"passwordAuthEnabled": {
"title": "Autenticación por Contraseña",
"description": "Habilitar o deshabilitar la autenticación basada en contraseña"
} }
}, },
"buttons": { "buttons": {
@@ -1137,7 +1148,8 @@
}, },
"errors": { "errors": {
"loadFailed": "Error al cargar la configuración", "loadFailed": "Error al cargar la configuración",
"updateFailed": "Error al actualizar la configuración" "updateFailed": "Error al actualizar la configuración",
"passwordAuthRequiresProvider": "No se puede deshabilitar la autenticación por contraseña sin tener al menos un proveedor de autenticación activo"
}, },
"messages": { "messages": {
"noChanges": "No hay cambios para guardar", "noChanges": "No hay cambios para guardar",
@@ -1651,7 +1663,8 @@
"title": "Suelta archivos para subir", "title": "Suelta archivos para subir",
"description": "Suelta para subir tus archivos" "description": "Suelta para subir tus archivos"
}, },
"pasteSuccess": "{count, plural, =1 {Imagen pegada y subida exitosamente} other {# imágenes pegadas y subidas exitosamente}}" "pasteSuccess": "{count, plural, =1 {Imagen pegada y subida exitosamente} other {# imágenes pegadas y subidas exitosamente}}",
"filesQueued": "{count, plural, one {# archivo en cola para subir} other {# archivos en cola para subir}}"
}, },
"users": { "users": {
"modes": { "modes": {
@@ -1736,10 +1749,5 @@
"passwordRequired": "Se requiere la contraseña", "passwordRequired": "Se requiere la contraseña",
"nameRequired": "El nombre es obligatorio", "nameRequired": "El nombre es obligatorio",
"required": "Este campo es obligatorio" "required": "Este campo es obligatorio"
},
"qrCodeModal": {
"title": "Compartir Código QR",
"description": "Escanea este código QR para acceder al enlace.",
"download": "Descargar Código QR"
} }
} }

View File

@@ -159,7 +159,8 @@
"passwordLabel": "Mot de Passe", "passwordLabel": "Mot de Passe",
"create": "Créer un Partage", "create": "Créer un Partage",
"success": "Partage créé avec succès", "success": "Partage créé avec succès",
"error": "Échec de la création du partage" "error": "Échec de la création du partage",
"namePlaceholder": "Entrez un nom pour votre partage"
}, },
"dashboard": { "dashboard": {
"loadError": "Échec du chargement des données du tableau de bord", "loadError": "Échec du chargement des données du tableau de bord",
@@ -313,7 +314,8 @@
"title": "Mot de Passe Oublié", "title": "Mot de Passe Oublié",
"description": "Entrez votre adresse email et nous vous enverrons les instructions pour réinitialiser votre mot de passe.", "description": "Entrez votre adresse email et nous vous enverrons les instructions pour réinitialiser votre mot de passe.",
"resetInstructions": "Instructions de réinitialisation envoyées à votre email", "resetInstructions": "Instructions de réinitialisation envoyées à votre email",
"pageTitle": "Mot de Passe Oublié" "pageTitle": "Mot de Passe Oublié",
"passwordAuthDisabled": "L'authentification par mot de passe est désactivée. Veuillez contacter votre administrateur ou utiliser un fournisseur d'authentification externe."
}, },
"generateShareLink": { "generateShareLink": {
"generateTitle": "Générer un lien de partage", "generateTitle": "Générer un lien de partage",
@@ -453,6 +455,11 @@
}, },
"pageTitle": "Profil" "pageTitle": "Profil"
}, },
"qrCodeModal": {
"title": "Code QR de Partage",
"description": "Scannez ce code QR pour accéder au lien.",
"download": "Télécharger le Code QR"
},
"quickAccess": { "quickAccess": {
"files": { "files": {
"title": "Mes Fichiers", "title": "Mes Fichiers",
@@ -1131,6 +1138,10 @@
"smtpTrustSelfSigned": { "smtpTrustSelfSigned": {
"title": "Faire Confiance aux Certificats Auto-signés", "title": "Faire Confiance aux Certificats Auto-signés",
"description": "Activez cette option pour faire confiance aux certificats SSL/TLS auto-signés (utile pour les environnements de développement)" "description": "Activez cette option pour faire confiance aux certificats SSL/TLS auto-signés (utile pour les environnements de développement)"
},
"passwordAuthEnabled": {
"title": "Authentification par Mot de Passe",
"description": "Activer ou désactiver l'authentification basée sur mot de passe"
} }
}, },
"buttons": { "buttons": {
@@ -1140,7 +1151,8 @@
}, },
"errors": { "errors": {
"loadFailed": "Échec du chargement des paramètres", "loadFailed": "Échec du chargement des paramètres",
"updateFailed": "Échec de la mise à jour des paramètres" "updateFailed": "Échec de la mise à jour des paramètres",
"passwordAuthRequiresProvider": "Impossible de désactiver l'authentification par mot de passe sans avoir au moins un fournisseur d'authentification actif"
}, },
"messages": { "messages": {
"noChanges": "Aucun changement à enregistrer", "noChanges": "Aucun changement à enregistrer",
@@ -1651,7 +1663,8 @@
"title": "Déposer des fichiers pour télécharger", "title": "Déposer des fichiers pour télécharger",
"description": "Relâchez pour télécharger vos fichiers" "description": "Relâchez pour télécharger vos fichiers"
}, },
"pasteSuccess": "{count, plural, =1 {Image collée et téléchargée avec succès} other {# images collées et téléchargées avec succès}}" "pasteSuccess": "{count, plural, =1 {Image collée et téléchargée avec succès} other {# images collées et téléchargées avec succès}}",
"filesQueued": "{count, plural, one {# fichier en attente de téléchargement} other {# fichiers en attente de téléchargement}}"
}, },
"users": { "users": {
"modes": { "modes": {
@@ -1736,10 +1749,5 @@
"passwordRequired": "Le mot de passe est requis", "passwordRequired": "Le mot de passe est requis",
"nameRequired": "Nome é obrigatório", "nameRequired": "Nome é obrigatório",
"required": "Este campo é obrigatório" "required": "Este campo é obrigatório"
},
"qrCodeModal": {
"title": "Code QR de Partage",
"description": "Scannez ce code QR pour accéder au lien.",
"download": "Télécharger le Code QR"
} }
} }

View File

@@ -159,7 +159,8 @@
"passwordLabel": "पासवर्ड", "passwordLabel": "पासवर्ड",
"create": "साझाकरण बनाएं", "create": "साझाकरण बनाएं",
"success": "साझाकरण सफलतापूर्वक बनाया गया", "success": "साझाकरण सफलतापूर्वक बनाया गया",
"error": "साझाकरण बनाने में विफल" "error": "साझाकरण बनाने में विफल",
"namePlaceholder": "अपने साझाकरण के लिए एक नाम दर्ज करें"
}, },
"dashboard": { "dashboard": {
"loadError": "डैशबोर्ड डेटा लोड करने में त्रुटि", "loadError": "डैशबोर्ड डेटा लोड करने में त्रुटि",
@@ -313,7 +314,8 @@
"title": "पासवर्ड भूल गए", "title": "पासवर्ड भूल गए",
"description": "अपना ईमेल पता दर्ज करें और हम आपको पासवर्ड रीसेट करने के निर्देश भेजेंगे।", "description": "अपना ईमेल पता दर्ज करें और हम आपको पासवर्ड रीसेट करने के निर्देश भेजेंगे।",
"resetInstructions": "रीसेट निर्देश आपके ईमेल पर भेज दिए गए हैं", "resetInstructions": "रीसेट निर्देश आपके ईमेल पर भेज दिए गए हैं",
"pageTitle": "पासवर्ड भूल गए" "pageTitle": "पासवर्ड भूल गए",
"passwordAuthDisabled": "पासवर्ड ऑथेंटिकेशन अक्टिवेटेड है। कृपया अपने एडमिन से संपर्क करें या एक बाहरी ऑथेंटिकेशन प्रोवाइडर का उपयोग करें।"
}, },
"generateShareLink": { "generateShareLink": {
"generateTitle": "साझाकरण लिंक उत्पन्न करें", "generateTitle": "साझाकरण लिंक उत्पन्न करें",
@@ -453,6 +455,11 @@
}, },
"pageTitle": "प्रोफ़ाइल" "pageTitle": "प्रोफ़ाइल"
}, },
"qrCodeModal": {
"title": "QR कोड साझा करें",
"description": "इस QR कोड को स्कैन करके लिंक तक पहुंच सकते हैं।",
"download": "QR कोड डाउनलोड करें"
},
"quickAccess": { "quickAccess": {
"files": { "files": {
"title": "मेरी फाइलें", "title": "मेरी फाइलें",
@@ -1128,6 +1135,10 @@
"smtpTrustSelfSigned": { "smtpTrustSelfSigned": {
"title": "स्व-हस्ताक्षरित प्रमाणपत्रों पर विश्वास करें", "title": "स्व-हस्ताक्षरित प्रमाणपत्रों पर विश्वास करें",
"description": "स्व-हस्ताक्षरित SSL/TLS प्रमाणपत्रों पर विश्वास करने के लिए इसे सक्षम करें (विकास वातावरण के लिए उपयोगी)" "description": "स्व-हस्ताक्षरित SSL/TLS प्रमाणपत्रों पर विश्वास करने के लिए इसे सक्षम करें (विकास वातावरण के लिए उपयोगी)"
},
"passwordAuthEnabled": {
"title": "पासवर्ड प्रमाणीकरण",
"description": "पासवर्ड आधारित प्रमाणीकरण सक्षम या अक्षम करें"
} }
}, },
"buttons": { "buttons": {
@@ -1137,7 +1148,8 @@
}, },
"errors": { "errors": {
"loadFailed": "सेटिंग्स लोड करने में विफल", "loadFailed": "सेटिंग्स लोड करने में विफल",
"updateFailed": "सेटिंग्स अपडेट करने में विफल" "updateFailed": "सेटिंग्स अपडेट करने में विफल",
"passwordAuthRequiresProvider": "कम से कम एक सक्रिय प्रमाणीकरण प्रदाता के बिना पासवर्ड प्रमाणीकरण अक्षम नहीं किया जा सकता"
}, },
"messages": { "messages": {
"noChanges": "सहेजने के लिए कोई परिवर्तन नहीं", "noChanges": "सहेजने के लिए कोई परिवर्तन नहीं",
@@ -1651,7 +1663,8 @@
"title": "अपलोड करने के लिए फ़ाइलें छोड़ें", "title": "अपलोड करने के लिए फ़ाइलें छोड़ें",
"description": "अपनी फ़ाइलें अपलोड करने के लिए छोड़ें" "description": "अपनी फ़ाइलें अपलोड करने के लिए छोड़ें"
}, },
"pasteSuccess": "{count, plural, =1 {छवि सफलतापूर्वक चिपकाई और अपलोड की गई} other {# छवियाँ सफलतापूर्वक चिपकाई और अपलोड की गईं}}" "pasteSuccess": "{count, plural, =1 {छवि सफलतापूर्वक चिपकाई और अपलोड की गई} other {# छवियाँ सफलतापूर्वक चिपकाई और अपलोड की गईं}}",
"filesQueued": "{count, plural, one {# फ़ाइल अपलोड के लिए इंतजार में है} other {# फ़ाइलें अपलोड के लिए इंतजार में हैं}}"
}, },
"users": { "users": {
"modes": { "modes": {
@@ -1736,10 +1749,5 @@
"passwordRequired": "पासवर्ड आवश्यक है", "passwordRequired": "पासवर्ड आवश्यक है",
"nameRequired": "नाम आवश्यक है", "nameRequired": "नाम आवश्यक है",
"required": "यह फ़ील्ड आवश्यक है" "required": "यह फ़ील्ड आवश्यक है"
},
"qrCodeModal": {
"title": "QR कोड साझा करें",
"description": "इस QR कोड को स्कैन करके लिंक तक पहुंच सकते हैं।",
"download": "QR कोड डाउनलोड करें"
} }
} }

View File

@@ -159,7 +159,8 @@
"passwordLabel": "Password", "passwordLabel": "Password",
"create": "Crea Condivisione", "create": "Crea Condivisione",
"success": "Condivisione creata con successo", "success": "Condivisione creata con successo",
"error": "Errore nella creazione della condivisione" "error": "Errore nella creazione della condivisione",
"namePlaceholder": "Inserisci un nome per la tua condivisione"
}, },
"dashboard": { "dashboard": {
"loadError": "Errore durante il caricamento dei dati del pannello di controllo", "loadError": "Errore durante il caricamento dei dati del pannello di controllo",
@@ -313,7 +314,8 @@
"title": "Parola d'accesso Dimenticata", "title": "Parola d'accesso Dimenticata",
"description": "Inserisci il tuo indirizzo email e ti invieremo le istruzioni per reimpostare la parola d'accesso.", "description": "Inserisci il tuo indirizzo email e ti invieremo le istruzioni per reimpostare la parola d'accesso.",
"resetInstructions": "Istruzioni di reimpostazione inviate alla tua email", "resetInstructions": "Istruzioni di reimpostazione inviate alla tua email",
"pageTitle": "Parola d'accesso Dimenticata" "pageTitle": "Parola d'accesso Dimenticata",
"passwordAuthDisabled": "L'autenticazione tramite password è disabilitata. Contatta il tuo amministratore o utilizza un provider di autenticazione esterno."
}, },
"generateShareLink": { "generateShareLink": {
"generateTitle": "Genera link di condivisione", "generateTitle": "Genera link di condivisione",
@@ -453,6 +455,11 @@
}, },
"pageTitle": "Profilo" "pageTitle": "Profilo"
}, },
"qrCodeModal": {
"title": "Condividi QR Code",
"description": "Scansiona questo codice QR per accedere al link.",
"download": "Scarica QR Code"
},
"quickAccess": { "quickAccess": {
"files": { "files": {
"title": "I Miei File", "title": "I Miei File",
@@ -1128,6 +1135,10 @@
"smtpTrustSelfSigned": { "smtpTrustSelfSigned": {
"title": "Accetta Certificati Auto-Firmati", "title": "Accetta Certificati Auto-Firmati",
"description": "Abilita questa opzione per accettare certificati SSL/TLS auto-firmati (utile per ambienti di sviluppo)" "description": "Abilita questa opzione per accettare certificati SSL/TLS auto-firmati (utile per ambienti di sviluppo)"
},
"passwordAuthEnabled": {
"title": "Autenticazione Password",
"description": "Abilita o disabilita l'autenticazione basata su password"
} }
}, },
"buttons": { "buttons": {
@@ -1137,7 +1148,8 @@
}, },
"errors": { "errors": {
"loadFailed": "Errore durante il caricamento delle impostazioni", "loadFailed": "Errore durante il caricamento delle impostazioni",
"updateFailed": "Errore durante l'aggiornamento delle impostazioni" "updateFailed": "Errore durante l'aggiornamento delle impostazioni",
"passwordAuthRequiresProvider": "Impossibile disabilitare l'autenticazione password senza avere almeno un provider di autenticazione attivo"
}, },
"messages": { "messages": {
"noChanges": "Nessuna modifica da salvare", "noChanges": "Nessuna modifica da salvare",
@@ -1651,7 +1663,8 @@
"title": "Rilascia i file per caricarli", "title": "Rilascia i file per caricarli",
"description": "Rilascia per caricare i tuoi file" "description": "Rilascia per caricare i tuoi file"
}, },
"pasteSuccess": "{count, plural, =1 {Immagine incollata e caricata con successo} other {# immagini incollate e caricate con successo}}" "pasteSuccess": "{count, plural, =1 {Immagine incollata e caricata con successo} other {# immagini incollate e caricate con successo}}",
"filesQueued": "{count, plural, one {# file in coda per il caricamento} other {# files in coda per il caricamento}}"
}, },
"users": { "users": {
"modes": { "modes": {
@@ -1736,10 +1749,5 @@
"passwordMinLength": "La password deve contenere almeno 6 caratteri", "passwordMinLength": "La password deve contenere almeno 6 caratteri",
"nameRequired": "Il nome è obbligatorio", "nameRequired": "Il nome è obbligatorio",
"required": "Questo campo è obbligatorio" "required": "Questo campo è obbligatorio"
},
"qrCodeModal": {
"title": "Condividi QR Code",
"description": "Scansiona questo codice QR per accedere al link.",
"download": "Scarica QR Code"
} }
} }

View File

@@ -159,7 +159,8 @@
"passwordLabel": "パスワード", "passwordLabel": "パスワード",
"create": "共有を作成", "create": "共有を作成",
"success": "共有が正常に作成されました", "success": "共有が正常に作成されました",
"error": "共有の作成に失敗しました" "error": "共有の作成に失敗しました",
"namePlaceholder": "共有の名前を入力してください"
}, },
"dashboard": { "dashboard": {
"loadError": "ダッシュボードデータの読み込みに失敗しました", "loadError": "ダッシュボードデータの読み込みに失敗しました",
@@ -313,7 +314,8 @@
"title": "パスワードをお忘れですか?", "title": "パスワードをお忘れですか?",
"description": "メールアドレスを入力すると、パスワードリセットの指示を送信します。", "description": "メールアドレスを入力すると、パスワードリセットの指示を送信します。",
"resetInstructions": "パスワードリセットの指示がメールに送信されました", "resetInstructions": "パスワードリセットの指示がメールに送信されました",
"pageTitle": "パスワードをお忘れですか?" "pageTitle": "パスワードをお忘れですか?",
"passwordAuthDisabled": "パスワード認証が無効になっています。管理者に連絡するか、外部認証プロバイダーを使用してください。"
}, },
"generateShareLink": { "generateShareLink": {
"generateTitle": "共有リンクを生成", "generateTitle": "共有リンクを生成",
@@ -453,6 +455,11 @@
}, },
"pageTitle": "プロフィール" "pageTitle": "プロフィール"
}, },
"qrCodeModal": {
"title": "QRコードを共有",
"description": "このQRコードをスキャンしてリンクにアクセスしてください。",
"download": "QRコードをダウンロード"
},
"quickAccess": { "quickAccess": {
"files": { "files": {
"title": "マイファイル", "title": "マイファイル",
@@ -1128,6 +1135,10 @@
"smtpTrustSelfSigned": { "smtpTrustSelfSigned": {
"title": "自己署名証明書を信頼", "title": "自己署名証明書を信頼",
"description": "自己署名SSL/TLS証明書を信頼するように設定します開発環境で便利" "description": "自己署名SSL/TLS証明書を信頼するように設定します開発環境で便利"
},
"passwordAuthEnabled": {
"title": "パスワード認証",
"description": "パスワード認証を有効または無効にする"
} }
}, },
"buttons": { "buttons": {
@@ -1137,7 +1148,8 @@
}, },
"errors": { "errors": {
"loadFailed": "設定の読み込みに失敗しました", "loadFailed": "設定の読み込みに失敗しました",
"updateFailed": "設定の更新に失敗しました" "updateFailed": "設定の更新に失敗しました",
"passwordAuthRequiresProvider": "少なくとも1つのアクティブな認証プロバイダーがない場合、パスワード認証を無効にできません"
}, },
"messages": { "messages": {
"noChanges": "保存する変更はありません", "noChanges": "保存する変更はありません",
@@ -1651,7 +1663,8 @@
"title": "アップロードするファイルをドロップ", "title": "アップロードするファイルをドロップ",
"description": "ファイルをアップロードするにはリリースしてください" "description": "ファイルをアップロードするにはリリースしてください"
}, },
"pasteSuccess": "{count, plural, =1 {画像が貼り付けられ、正常にアップロードされました} other {#個の画像が貼り付けられ、正常にアップロードされました}}" "pasteSuccess": "{count, plural, =1 {画像が貼り付けられ、正常にアップロードされました} other {#個の画像が貼り付けられ、正常にアップロードされました}}",
"filesQueued": "{count, plural, one {# ファイルがアップロード待ち} other {# ファイルがアップロード待ち}}"
}, },
"users": { "users": {
"modes": { "modes": {
@@ -1736,10 +1749,5 @@
"passwordRequired": "パスワードは必須です", "passwordRequired": "パスワードは必須です",
"nameRequired": "名前は必須です", "nameRequired": "名前は必須です",
"required": "このフィールドは必須です" "required": "このフィールドは必須です"
},
"qrCodeModal": {
"title": "QRコードを共有",
"description": "このQRコードをスキャンしてリンクにアクセスしてください。",
"download": "QRコードをダウンロード"
} }
} }

View File

@@ -159,7 +159,8 @@
"passwordLabel": "비밀번호", "passwordLabel": "비밀번호",
"create": "공유 생성", "create": "공유 생성",
"success": "공유가 성공적으로 생성되었습니다", "success": "공유가 성공적으로 생성되었습니다",
"error": "공유 생성에 실패했습니다" "error": "공유 생성에 실패했습니다",
"namePlaceholder": "공유 이름을 입력하세요"
}, },
"dashboard": { "dashboard": {
"loadError": "대시보드 데이터를 불러오는데 실패했습니다", "loadError": "대시보드 데이터를 불러오는데 실패했습니다",
@@ -313,7 +314,8 @@
"title": "비밀번호를 잊으셨나요?", "title": "비밀번호를 잊으셨나요?",
"description": "이메일 주소를 입력하면 비밀번호 재설정 지침을 보내드립니다.", "description": "이메일 주소를 입력하면 비밀번호 재설정 지침을 보내드립니다.",
"resetInstructions": "비밀번호 재설정 지침이 이메일로 전송되었습니다", "resetInstructions": "비밀번호 재설정 지침이 이메일로 전송되었습니다",
"pageTitle": "비밀번호를 잊으셨나요?" "pageTitle": "비밀번호를 잊으셨나요?",
"passwordAuthDisabled": "비밀번호 인증이 비활성화되어 있습니다. 관리자에게 문의하거나 외부 인증 공급자를 사용하세요."
}, },
"generateShareLink": { "generateShareLink": {
"generateTitle": "공유 링크 생성", "generateTitle": "공유 링크 생성",
@@ -453,6 +455,11 @@
}, },
"pageTitle": "프로필" "pageTitle": "프로필"
}, },
"qrCodeModal": {
"title": "QR 코드 공유",
"description": "이 QR 코드를 스캔하여 링크에 접근할 수 있습니다.",
"download": "QR 코드 다운로드"
},
"quickAccess": { "quickAccess": {
"files": { "files": {
"title": "내 파일", "title": "내 파일",
@@ -1128,6 +1135,10 @@
"smtpTrustSelfSigned": { "smtpTrustSelfSigned": {
"title": "자체 서명된 인증서 신뢰", "title": "자체 서명된 인증서 신뢰",
"description": "자체 서명된 SSL/TLS 인증서를 신뢰하려면 활성화하세요 (개발 환경에서 유용)" "description": "자체 서명된 SSL/TLS 인증서를 신뢰하려면 활성화하세요 (개발 환경에서 유용)"
},
"passwordAuthEnabled": {
"title": "비밀번호 인증",
"description": "비밀번호 기반 인증 활성화 또는 비활성화"
} }
}, },
"buttons": { "buttons": {
@@ -1137,7 +1148,8 @@
}, },
"errors": { "errors": {
"loadFailed": "설정을 불러오는데 실패했습니다", "loadFailed": "설정을 불러오는데 실패했습니다",
"updateFailed": "설정 업데이트에 실패했습니다" "updateFailed": "설정 업데이트에 실패했습니다",
"passwordAuthRequiresProvider": "최소 하나의 활성 인증 제공자가 없으면 비밀번호 인증을 비활성화할 수 없습니다"
}, },
"messages": { "messages": {
"noChanges": "저장할 변경 사항이 없습니다", "noChanges": "저장할 변경 사항이 없습니다",
@@ -1651,7 +1663,8 @@
"title": "업로드할 파일 드롭", "title": "업로드할 파일 드롭",
"description": "파일을 업로드하려면 놓으세요" "description": "파일을 업로드하려면 놓으세요"
}, },
"pasteSuccess": "{count, plural, =1 {이미지가 성공적으로 붙여넣기 및 업로드되었습니다} other {# 개의 이미지가 성공적으로 붙여넣기 및 업로드되었습니다}}" "pasteSuccess": "{count, plural, =1 {이미지가 성공적으로 붙여넣기 및 업로드되었습니다} other {# 개의 이미지가 성공적으로 붙여넣기 및 업로드되었습니다}}",
"filesQueued": "{count, plural, one {# 파일이 업로드 대기 중} other {# 파일이 업로드 대기 중}}"
}, },
"users": { "users": {
"modes": { "modes": {
@@ -1736,10 +1749,5 @@
"passwordRequired": "비밀번호는 필수입니다", "passwordRequired": "비밀번호는 필수입니다",
"nameRequired": "이름은 필수입니다", "nameRequired": "이름은 필수입니다",
"required": "이 필드는 필수입니다" "required": "이 필드는 필수입니다"
},
"qrCodeModal": {
"title": "QR 코드 공유",
"description": "이 QR 코드를 스캔하여 링크에 접근할 수 있습니다.",
"download": "QR 코드 다운로드"
} }
} }

View File

@@ -159,7 +159,8 @@
"passwordLabel": "Wachtwoord", "passwordLabel": "Wachtwoord",
"create": "Delen Maken", "create": "Delen Maken",
"success": "Delen succesvol aangemaakt", "success": "Delen succesvol aangemaakt",
"error": "Fout bij het aanmaken van delen" "error": "Fout bij het aanmaken van delen",
"namePlaceholder": "Voer een naam in voor uw delen"
}, },
"dashboard": { "dashboard": {
"loadError": "Fout bij het laden van controlepaneel gegevens", "loadError": "Fout bij het laden van controlepaneel gegevens",
@@ -313,7 +314,8 @@
"title": "Wachtwoord Vergeten", "title": "Wachtwoord Vergeten",
"description": "Voer je e-mailadres in en we sturen je instructies om je wachtwoord te resetten.", "description": "Voer je e-mailadres in en we sturen je instructies om je wachtwoord te resetten.",
"resetInstructions": "Reset instructies verzonden naar je e-mail", "resetInstructions": "Reset instructies verzonden naar je e-mail",
"pageTitle": "Wachtwoord Vergeten" "pageTitle": "Wachtwoord Vergeten",
"passwordAuthDisabled": "Wachtwoordauthenticatie is uitgeschakeld. Neem contact op met uw beheerder of gebruik een externe authenticatieprovider."
}, },
"generateShareLink": { "generateShareLink": {
"generateTitle": "Deel-link genereren", "generateTitle": "Deel-link genereren",
@@ -453,6 +455,11 @@
}, },
"pageTitle": "Profiel" "pageTitle": "Profiel"
}, },
"qrCodeModal": {
"title": "QR Code Delen",
"description": "Scan deze QR-code om toegang te krijgen tot de link.",
"download": "QR Code Downloaden"
},
"quickAccess": { "quickAccess": {
"files": { "files": {
"title": "Mijn Bestanden", "title": "Mijn Bestanden",
@@ -1128,6 +1135,10 @@
"smtpTrustSelfSigned": { "smtpTrustSelfSigned": {
"title": "Vertrouw Zelf-Ondertekende Certificaten", "title": "Vertrouw Zelf-Ondertekende Certificaten",
"description": "Schakel dit in om zelf-ondertekende SSL/TLS certificaten te vertrouwen (handig voor ontwikkelomgevingen)" "description": "Schakel dit in om zelf-ondertekende SSL/TLS certificaten te vertrouwen (handig voor ontwikkelomgevingen)"
},
"passwordAuthEnabled": {
"title": "Wachtwoord Authenticatie",
"description": "Wachtwoord-gebaseerde authenticatie inschakelen of uitschakelen"
} }
}, },
"buttons": { "buttons": {
@@ -1137,7 +1148,8 @@
}, },
"errors": { "errors": {
"loadFailed": "Fout bij het laden van instellingen", "loadFailed": "Fout bij het laden van instellingen",
"updateFailed": "Fout bij het bijwerken van instellingen" "updateFailed": "Fout bij het bijwerken van instellingen",
"passwordAuthRequiresProvider": "Wachtwoordauthenticatie kan niet worden uitgeschakeld zonder ten minste één actieve authenticatieprovider"
}, },
"messages": { "messages": {
"noChanges": "Geen wijzigingen om op te slaan", "noChanges": "Geen wijzigingen om op te slaan",
@@ -1651,7 +1663,8 @@
"title": "Sleep bestanden om te uploaden", "title": "Sleep bestanden om te uploaden",
"description": "Laat los om je bestanden te uploaden" "description": "Laat los om je bestanden te uploaden"
}, },
"pasteSuccess": "{count, plural, =1 {Afbeelding geplakt en succesvol geüpload} other {# afbeeldingen geplakt en succesvol geüpload}}" "pasteSuccess": "{count, plural, =1 {Afbeelding geplakt en succesvol geüpload} other {# afbeeldingen geplakt en succesvol geüpload}}",
"filesQueued": "{count, plural, one {# bestand in de wachtrij voor upload} other {# bestanden in de wachtrij voor upload}}"
}, },
"users": { "users": {
"modes": { "modes": {
@@ -1736,10 +1749,5 @@
"passwordMinLength": "Wachtwoord moet minimaal 6 tekens bevatten", "passwordMinLength": "Wachtwoord moet minimaal 6 tekens bevatten",
"nameRequired": "Naam is verplicht", "nameRequired": "Naam is verplicht",
"required": "Dit veld is verplicht" "required": "Dit veld is verplicht"
},
"qrCodeModal": {
"title": "QR Code Delen",
"description": "Scan deze QR-code om toegang te krijgen tot de link.",
"download": "QR Code Downloaden"
} }
} }

View File

@@ -159,7 +159,8 @@
"passwordLabel": "Hasło", "passwordLabel": "Hasło",
"create": "Utwórz Udostępnienie", "create": "Utwórz Udostępnienie",
"success": "Udostępnienie utworzone pomyślnie", "success": "Udostępnienie utworzone pomyślnie",
"error": "Nie udało się utworzyć udostępnienia" "error": "Nie udało się utworzyć udostępnienia",
"namePlaceholder": "Wprowadź nazwę dla swojego udostępnienia"
}, },
"dashboard": { "dashboard": {
"loadError": "Nie udało się załadować danych panelu głównego", "loadError": "Nie udało się załadować danych panelu głównego",
@@ -313,7 +314,8 @@
"title": "Zapomniałeś hasła?", "title": "Zapomniałeś hasła?",
"description": "Wprowadź swój adres e-mail, a wyślemy Ci instrukcje resetowania hasła", "description": "Wprowadź swój adres e-mail, a wyślemy Ci instrukcje resetowania hasła",
"resetInstructions": "Instrukcje resetowania wysłane na Twój adres e-mail", "resetInstructions": "Instrukcje resetowania wysłane na Twój adres e-mail",
"pageTitle": "Zapomniałeś hasła?" "pageTitle": "Zapomniałeś hasła?",
"passwordAuthDisabled": "Uwierzytelnianie hasłem jest wyłączone. Skontaktuj się z administratorem lub użyj zewnętrznego dostawcy uwierzytelniania."
}, },
"generateShareLink": { "generateShareLink": {
"generateTitle": "Generuj link do udostępniania", "generateTitle": "Generuj link do udostępniania",
@@ -453,6 +455,11 @@
}, },
"pageTitle": "Profil" "pageTitle": "Profil"
}, },
"qrCodeModal": {
"title": "Udostępnij kod QR",
"description": "Skanuj ten kod QR, aby uzyskać dostęp do linku.",
"download": "Pobierz kod QR"
},
"quickAccess": { "quickAccess": {
"files": { "files": {
"title": "Moje pliki", "title": "Moje pliki",
@@ -1128,6 +1135,10 @@
"smtpTrustSelfSigned": { "smtpTrustSelfSigned": {
"title": "Zaufaj certyfikatom samopodpisanym", "title": "Zaufaj certyfikatom samopodpisanym",
"description": "Włącz tę opcję, aby zaufać samopodpisanym certyfikatom SSL/TLS (przydatne w środowiskach deweloperskich)" "description": "Włącz tę opcję, aby zaufać samopodpisanym certyfikatom SSL/TLS (przydatne w środowiskach deweloperskich)"
},
"passwordAuthEnabled": {
"title": "Uwierzytelnianie hasłem",
"description": "Włącz lub wyłącz uwierzytelnianie oparte na haśle"
} }
}, },
"buttons": { "buttons": {
@@ -1137,7 +1148,8 @@
}, },
"errors": { "errors": {
"loadFailed": "Nie udało się załadować ustawień", "loadFailed": "Nie udało się załadować ustawień",
"updateFailed": "Nie udało się zaktualizować ustawień" "updateFailed": "Nie udało się zaktualizować ustawień",
"passwordAuthRequiresProvider": "Uwierzytelnianie oparte na haśle nie może być wyłączone, jeśli nie ma co najmniej jednego aktywnego dostawcy uwierzytelniania"
}, },
"messages": { "messages": {
"noChanges": "Brak zmian do zapisania", "noChanges": "Brak zmian do zapisania",
@@ -1651,7 +1663,8 @@
"title": "Upuść pliki, aby przesłać", "title": "Upuść pliki, aby przesłać",
"description": "Zwolnij, aby przesłać pliki" "description": "Zwolnij, aby przesłać pliki"
}, },
"pasteSuccess": "{count, plural, =1 {Obraz wklejony i przesłany pomyślnie} other {# obrazy wklejone i przesłane pomyślnie}}" "pasteSuccess": "{count, plural, =1 {Obraz wklejony i przesłany pomyślnie} other {# obrazy wklejone i przesłane pomyślnie}}",
"filesQueued": "{count, plural, one {# plik w kolejce do przesyłania} other {# pliki w kolejce do przesyłania}}"
}, },
"users": { "users": {
"modes": { "modes": {
@@ -1736,10 +1749,5 @@
"passwordMinLength": "Hasło musi mieć co najmniej 6 znaków", "passwordMinLength": "Hasło musi mieć co najmniej 6 znaków",
"nameRequired": "Nazwa jest wymagana", "nameRequired": "Nazwa jest wymagana",
"required": "To pole jest wymagane" "required": "To pole jest wymagane"
},
"qrCodeModal": {
"title": "Udostępnij kod QR",
"description": "Skanuj ten kod QR, aby uzyskać dostęp do linku.",
"download": "Pobierz kod QR"
} }
} }

View File

@@ -159,7 +159,8 @@
"passwordLabel": "Senha", "passwordLabel": "Senha",
"create": "Criar compartilhamento", "create": "Criar compartilhamento",
"success": "Compartilhamento criado com sucesso", "success": "Compartilhamento criado com sucesso",
"error": "Falha ao criar compartilhamento" "error": "Falha ao criar compartilhamento",
"namePlaceholder": "Digite um nome para seu compartilhamento"
}, },
"dashboard": { "dashboard": {
"loadError": "Falha ao carregar dados do painel", "loadError": "Falha ao carregar dados do painel",
@@ -313,7 +314,8 @@
"title": "Esqueceu a Senha", "title": "Esqueceu a Senha",
"description": "Digite seu endereço de email e enviaremos instruções para redefinir sua senha.", "description": "Digite seu endereço de email e enviaremos instruções para redefinir sua senha.",
"resetInstructions": "Instruções de redefinição enviadas para seu email", "resetInstructions": "Instruções de redefinição enviadas para seu email",
"pageTitle": "Esqueceu a Senha" "pageTitle": "Esqueceu a Senha",
"passwordAuthDisabled": "A autenticação por senha está desativada. Por favor, contate seu administrador ou use um provedor de autenticação externo."
}, },
"generateShareLink": { "generateShareLink": {
"generateTitle": "Gerar link de compartilhamento", "generateTitle": "Gerar link de compartilhamento",
@@ -453,6 +455,11 @@
}, },
"pageTitle": "Perfil" "pageTitle": "Perfil"
}, },
"qrCodeModal": {
"title": "Compartilhar QR Code",
"description": "Escaneie este código QR para acessar o link.",
"download": "Baixar QR Code"
},
"quickAccess": { "quickAccess": {
"files": { "files": {
"title": "Meus Arquivos", "title": "Meus Arquivos",
@@ -642,7 +649,7 @@
"edit": "Editar", "edit": "Editar",
"delete": "Excluir", "delete": "Excluir",
"viewFiles": "Arquivos Recebidos", "viewFiles": "Arquivos Recebidos",
"viewQrCode": "[TO_TRANSLATE] View QR Code" "viewQrCode": "Ver QR Code"
}, },
"empty": { "empty": {
"title": "Nenhum link de recebimento criado", "title": "Nenhum link de recebimento criado",
@@ -1136,6 +1143,10 @@
"smtpTrustSelfSigned": { "smtpTrustSelfSigned": {
"title": "Confiar em Certificados Auto-Assinados", "title": "Confiar em Certificados Auto-Assinados",
"description": "Ative isso para confiar em certificados SSL/TLS auto-assinados (útil para ambientes de desenvolvimento)" "description": "Ative isso para confiar em certificados SSL/TLS auto-assinados (útil para ambientes de desenvolvimento)"
},
"passwordAuthEnabled": {
"title": "Autenticação por Senha",
"description": "Ative ou desative a autenticação baseada em senha"
} }
}, },
"buttons": { "buttons": {
@@ -1145,7 +1156,8 @@
}, },
"errors": { "errors": {
"loadFailed": "Falha ao carregar configurações", "loadFailed": "Falha ao carregar configurações",
"updateFailed": "Falha ao atualizar configurações" "updateFailed": "Falha ao atualizar configurações",
"passwordAuthRequiresProvider": "Não é possível desabilitar a autenticação por senha sem ter pelo menos um provedor de autenticação ativo"
}, },
"messages": { "messages": {
"noChanges": "Nenhuma alteração para salvar", "noChanges": "Nenhuma alteração para salvar",
@@ -1651,7 +1663,8 @@
"continue": "Continuar Uploads", "continue": "Continuar Uploads",
"cancel": "Cancelar Uploads" "cancel": "Cancelar Uploads"
}, },
"pasteSuccess": "{count, plural, =1 {Imagem colada e enviada com sucesso} other {# imagens coladas e enviadas com sucesso}}" "pasteSuccess": "{count, plural, =1 {Imagem colada e enviada com sucesso} other {# imagens coladas e enviadas com sucesso}}",
"filesQueued": "{count, plural, one {# arquivo na fila para upload} other {# arquivos na fila para upload}}"
}, },
"users": { "users": {
"modes": { "modes": {
@@ -1736,10 +1749,5 @@
"lastNameRequired": "O sobrenome é necessário", "lastNameRequired": "O sobrenome é necessário",
"usernameLength": "O nome de usuário deve ter pelo menos 3 caracteres", "usernameLength": "O nome de usuário deve ter pelo menos 3 caracteres",
"usernameSpaces": "O nome de usuário não pode conter espaços" "usernameSpaces": "O nome de usuário não pode conter espaços"
},
"qrCodeModal": {
"title": "Compartilhar QR Code",
"description": "Escaneie este código QR para acessar o link.",
"download": "Baixar QR Code"
} }
} }

View File

@@ -159,7 +159,8 @@
"success": "Общий доступ успешно создан", "success": "Общий доступ успешно создан",
"error": "Не удалось создать общий доступ", "error": "Не удалось создать общий доступ",
"descriptionLabel": "Описание", "descriptionLabel": "Описание",
"descriptionPlaceholder": "Введите описание (опционально)" "descriptionPlaceholder": "Введите описание (опционально)",
"namePlaceholder": "Введите имя для вашего общего доступа"
}, },
"dashboard": { "dashboard": {
"loadError": "Ошибка загрузки данных панели управления", "loadError": "Ошибка загрузки данных панели управления",
@@ -313,7 +314,8 @@
"title": "Забыли пароль", "title": "Забыли пароль",
"description": "Введите адрес электронной почты, и мы отправим вам инструкции по сбросу пароля.", "description": "Введите адрес электронной почты, и мы отправим вам инструкции по сбросу пароля.",
"resetInstructions": "Инструкции по сбросу отправлены на вашу электронную почту", "resetInstructions": "Инструкции по сбросу отправлены на вашу электронную почту",
"pageTitle": "Забыли пароль" "pageTitle": "Забыли пароль",
"passwordAuthDisabled": "Парольная аутентификация отключена. Пожалуйста, свяжитесь с администратором или используйте внешний провайдер аутентификации."
}, },
"generateShareLink": { "generateShareLink": {
"generateTitle": "Создать ссылку для обмена", "generateTitle": "Создать ссылку для обмена",
@@ -453,6 +455,11 @@
}, },
"pageTitle": "Профиль" "pageTitle": "Профиль"
}, },
"qrCodeModal": {
"title": "Поделиться QR-кодом",
"description": "Отсканируйте этот QR-код, чтобы получить доступ к ссылке.",
"download": "Скачать QR-код"
},
"quickAccess": { "quickAccess": {
"files": { "files": {
"title": "Мои файлы", "title": "Мои файлы",
@@ -1128,6 +1135,10 @@
"smtpTrustSelfSigned": { "smtpTrustSelfSigned": {
"title": "Доверять самоподписанным сертификатам", "title": "Доверять самоподписанным сертификатам",
"description": "Включите это для доверия самоподписанным SSL/TLS сертификатам (полезно для сред разработки)" "description": "Включите это для доверия самоподписанным SSL/TLS сертификатам (полезно для сред разработки)"
},
"passwordAuthEnabled": {
"title": "Парольная аутентификация",
"description": "Включить или отключить парольную аутентификацию"
} }
}, },
"buttons": { "buttons": {
@@ -1137,7 +1148,8 @@
}, },
"errors": { "errors": {
"loadFailed": "Ошибка загрузки настроек", "loadFailed": "Ошибка загрузки настроек",
"updateFailed": "Ошибка обновления настроек" "updateFailed": "Ошибка обновления настроек",
"passwordAuthRequiresProvider": "Парольную аутентификацию нельзя отключить, если нет хотя бы одного активного поставщика аутентификации"
}, },
"messages": { "messages": {
"noChanges": "Изменений для сохранения нет", "noChanges": "Изменений для сохранения нет",
@@ -1651,7 +1663,8 @@
"title": "Перетащите файлы для загрузки", "title": "Перетащите файлы для загрузки",
"description": "Отпустите, чтобы загрузить файлы" "description": "Отпустите, чтобы загрузить файлы"
}, },
"pasteSuccess": "{count, plural, =1 {Изображение вставлено и успешно загружено} other {# изображений вставлено и успешно загружено}}" "pasteSuccess": "{count, plural, =1 {Изображение вставлено и успешно загружено} other {# изображений вставлено и успешно загружено}}",
"filesQueued": "{count, plural, one {# файл в очереди для загрузки} other {# файлов в очереди для загрузки}}"
}, },
"users": { "users": {
"modes": { "modes": {
@@ -1736,10 +1749,5 @@
"passwordRequired": "Требуется пароль", "passwordRequired": "Требуется пароль",
"nameRequired": "Требуется имя", "nameRequired": "Требуется имя",
"required": "Это поле обязательно" "required": "Это поле обязательно"
},
"qrCodeModal": {
"title": "Поделиться QR-кодом",
"description": "Отсканируйте этот QR-код, чтобы получить доступ к ссылке.",
"download": "Скачать QR-код"
} }
} }

View File

@@ -159,7 +159,8 @@
"success": "Paylaşım başarıyla oluşturuldu", "success": "Paylaşım başarıyla oluşturuldu",
"error": "Paylaşım oluşturulamadı", "error": "Paylaşım oluşturulamadı",
"descriptionLabel": "Açıklama", "descriptionLabel": "Açıklama",
"descriptionPlaceholder": "Açıklama girin (isteğe bağlı)" "descriptionPlaceholder": "Açıklama girin (isteğe bağlı)",
"namePlaceholder": "Paylaşımınız için bir ad girin"
}, },
"dashboard": { "dashboard": {
"loadError": "Gösterge paneli verileri yüklenemedi", "loadError": "Gösterge paneli verileri yüklenemedi",
@@ -313,7 +314,8 @@
"title": "Şifrenizi mi Unuttunuz?", "title": "Şifrenizi mi Unuttunuz?",
"description": "E-posta adresinizi girin, şifre sıfırlama talimatlarını göndereceğiz.", "description": "E-posta adresinizi girin, şifre sıfırlama talimatlarını göndereceğiz.",
"resetInstructions": "Şifre sıfırlama talimatları e-posta adresinize gönderildi", "resetInstructions": "Şifre sıfırlama talimatları e-posta adresinize gönderildi",
"pageTitle": "Şifrenizi mi Unuttunuz?" "pageTitle": "Şifrenizi mi Unuttunuz?",
"passwordAuthDisabled": "Şifre doğrulama devre dışı. Lütfen yöneticinize başvurun veya dış doğrulama sağlayıcısı kullanın."
}, },
"generateShareLink": { "generateShareLink": {
"generateTitle": "Paylaşım Bağlantısı Oluştur", "generateTitle": "Paylaşım Bağlantısı Oluştur",
@@ -453,6 +455,11 @@
}, },
"pageTitle": "Profil" "pageTitle": "Profil"
}, },
"qrCodeModal": {
"title": "QR Kodu Paylaş",
"description": "Bu QR kodu tarayarak bağlantıya erişebilirsiniz.",
"download": "QR Kodu İndir"
},
"quickAccess": { "quickAccess": {
"files": { "files": {
"title": "Benim Dosyalarım", "title": "Benim Dosyalarım",
@@ -1128,6 +1135,10 @@
"smtpTrustSelfSigned": { "smtpTrustSelfSigned": {
"title": "Kendinden İmzalı Sertifikalara Güven", "title": "Kendinden İmzalı Sertifikalara Güven",
"description": "Kendinden imzalı SSL/TLS sertifikalarına güvenmek için bunu etkinleştirin (geliştirme ortamları için kullanışlıdır)" "description": "Kendinden imzalı SSL/TLS sertifikalarına güvenmek için bunu etkinleştirin (geliştirme ortamları için kullanışlıdır)"
},
"passwordAuthEnabled": {
"title": "Şifre Doğrulama",
"description": "Şifre tabanlı doğrulamayı etkinleştirme veya devre dışı bırakma"
} }
}, },
"buttons": { "buttons": {
@@ -1137,7 +1148,8 @@
}, },
"errors": { "errors": {
"loadFailed": "Ayarlar yüklenemedi", "loadFailed": "Ayarlar yüklenemedi",
"updateFailed": "Ayarlar güncellenemedi" "updateFailed": "Ayarlar güncellenemedi",
"passwordAuthRequiresProvider": "En az bir aktif kimlik doğrulama sağlayıcısı olmadan şifre doğrulaması devre dışı bırakılamaz"
}, },
"messages": { "messages": {
"noChanges": "Kaydedilecek değişiklik yok", "noChanges": "Kaydedilecek değişiklik yok",
@@ -1651,7 +1663,8 @@
"title": "Yüklemek için dosyaları bırakın", "title": "Yüklemek için dosyaları bırakın",
"description": "Dosyalarınızı yüklemek için bırakın" "description": "Dosyalarınızı yüklemek için bırakın"
}, },
"pasteSuccess": "{count, plural, =1 {Görüntü yapıştırıldı ve başarıyla yüklendi} other {# görüntü yapıştırıldı ve başarıyla yüklendi}}" "pasteSuccess": "{count, plural, =1 {Görüntü yapıştırıldı ve başarıyla yüklendi} other {# görüntü yapıştırıldı ve başarıyla yüklendi}}",
"filesQueued": "{count, plural, one {# dosya yükleme için bekliyor} other {# dosya yükleme için bekliyor}}"
}, },
"users": { "users": {
"modes": { "modes": {
@@ -1736,10 +1749,5 @@
"passwordRequired": "Şifre gerekli", "passwordRequired": "Şifre gerekli",
"nameRequired": "İsim gereklidir", "nameRequired": "İsim gereklidir",
"required": "Bu alan zorunludur" "required": "Bu alan zorunludur"
},
"qrCodeModal": {
"title": "QR Kodu Paylaş",
"description": "Bu QR kodu tarayarak bağlantıya erişebilirsiniz.",
"download": "QR Kodu İndir"
} }
} }

View File

@@ -159,7 +159,8 @@
"passwordLabel": "密码", "passwordLabel": "密码",
"create": "创建分享", "create": "创建分享",
"success": "分享创建成功", "success": "分享创建成功",
"error": "创建分享失败" "error": "创建分享失败",
"namePlaceholder": "输入分享名称"
}, },
"dashboard": { "dashboard": {
"loadError": "加载仪表盘数据失败", "loadError": "加载仪表盘数据失败",
@@ -313,7 +314,8 @@
"title": "忘记密码?", "title": "忘记密码?",
"description": "请输入您的电子邮件,我们将发送密码重置指令给您。", "description": "请输入您的电子邮件,我们将发送密码重置指令给您。",
"resetInstructions": "密码重置指令已发送到您的电子邮件", "resetInstructions": "密码重置指令已发送到您的电子邮件",
"pageTitle": "忘记密码?" "pageTitle": "忘记密码?",
"passwordAuthDisabled": "密码认证已禁用。请联系您的管理员或使用外部认证提供商。"
}, },
"generateShareLink": { "generateShareLink": {
"generateTitle": "生成分享链接", "generateTitle": "生成分享链接",
@@ -453,6 +455,11 @@
}, },
"pageTitle": "个人资料" "pageTitle": "个人资料"
}, },
"qrCodeModal": {
"title": "分享QR Code",
"description": "扫描此QR Code以访问链接。",
"download": "下载QR Code"
},
"quickAccess": { "quickAccess": {
"files": { "files": {
"title": "我的文件", "title": "我的文件",
@@ -1128,6 +1135,10 @@
"smtpTrustSelfSigned": { "smtpTrustSelfSigned": {
"title": "信任自签名证书", "title": "信任自签名证书",
"description": "启用此选项以信任自签名SSL/TLS证书对开发环境有用" "description": "启用此选项以信任自签名SSL/TLS证书对开发环境有用"
},
"passwordAuthEnabled": {
"title": "密码认证",
"description": "启用或禁用基于密码的认证"
} }
}, },
"buttons": { "buttons": {
@@ -1137,7 +1148,8 @@
}, },
"errors": { "errors": {
"loadFailed": "加载设置失败", "loadFailed": "加载设置失败",
"updateFailed": "更新设置失败" "updateFailed": "更新设置失败",
"passwordAuthRequiresProvider": "没有至少一个活动认证提供者时,无法禁用密码认证"
}, },
"messages": { "messages": {
"noChanges": "没有需要保存的更改", "noChanges": "没有需要保存的更改",
@@ -1500,11 +1512,7 @@
"copyToClipboard": "复制到剪贴板", "copyToClipboard": "复制到剪贴板",
"savedMessage": "我已保存备用码", "savedMessage": "我已保存备用码",
"available": "可用备用码:{count}个", "available": "可用备用码:{count}个",
"instructions": [ "instructions": ["• 将这些代码保存在安全的位置", "• 每个备用码只能使用一次", "• 您可以随时生成新的备用码"]
"• 将这些代码保存在安全的位置",
"• 每个备用码只能使用一次",
"• 您可以随时生成新的备用码"
]
}, },
"verification": { "verification": {
"title": "双重认证", "title": "双重认证",
@@ -1651,7 +1659,8 @@
"title": "拖放文件以上传", "title": "拖放文件以上传",
"description": "松开以上传您的文件" "description": "松开以上传您的文件"
}, },
"pasteSuccess": "{count, plural, =1 {图片已成功粘贴并上传} other {# 张图片已成功粘贴并上传}}" "pasteSuccess": "{count, plural, =1 {图片已成功粘贴并上传} other {# 张图片已成功粘贴并上传}}",
"filesQueued": "{count, plural, one {# 文件正在等待上传} other {# 文件正在等待上传}}"
}, },
"users": { "users": {
"modes": { "modes": {
@@ -1736,10 +1745,5 @@
"passwordRequired": "密码为必填项", "passwordRequired": "密码为必填项",
"nameRequired": "名称为必填项", "nameRequired": "名称为必填项",
"required": "此字段为必填项" "required": "此字段为必填项"
},
"qrCodeModal": {
"title": "分享QR Code",
"description": "扫描此QR Code以访问链接。",
"download": "下载QR Code"
} }
} }

View File

@@ -1,6 +1,6 @@
{ {
"name": "palmr-web", "name": "palmr-web",
"version": "3.1.3-beta", "version": "3.1.8-beta",
"description": "Frontend for Palmr", "description": "Frontend for Palmr",
"private": true, "private": true,
"author": "Daniel Luiz Alves <daniel@kyantech.com.br>", "author": "Daniel Luiz Alves <daniel@kyantech.com.br>",

View File

@@ -29,7 +29,7 @@ export function Navbar() {
{appLogo && <img alt="App Logo" className="h-8 w-8 object-contain rounded" src={appLogo} />} {appLogo && <img alt="App Logo" className="h-8 w-8 object-contain rounded" src={appLogo} />}
<p className="font-bold text-2xl">{appName}</p> <p className="font-bold text-2xl">{appName}</p>
</Link> </Link>
<nav className="hidden lg:flex ml-2 gap-4"> <nav className="hidden md:flex ml-2 gap-4">
{siteConfig.navItems.map((item) => ( {siteConfig.navItems.map((item) => (
<Link <Link
key={item.href} key={item.href}
@@ -44,7 +44,7 @@ export function Navbar() {
))} ))}
</nav> </nav>
</div> </div>
<div className="hidden md:flex items-center gap-2"> <div className="hidden lg:flex items-center gap-2">
<LanguageSwitcher /> <LanguageSwitcher />
<ModeToggle /> <ModeToggle />
@@ -56,7 +56,7 @@ export function Navbar() {
</Button> </Button>
</div> </div>
<div className="flex items-center gap-2 sm:hidden"> <div className="flex items-center gap-2 md:hidden">
<LanguageSwitcher /> <LanguageSwitcher />
<ModeToggle /> <ModeToggle />
<Sheet open={isMenuOpen} onOpenChange={setIsMenuOpen}> <Sheet open={isMenuOpen} onOpenChange={setIsMenuOpen}>
@@ -79,6 +79,16 @@ export function Navbar() {
{item.label} {item.label}
</Link> </Link>
))} ))}
<Link
href={siteConfig.links.sponsor}
target="_blank"
rel="noopener noreferrer"
className="text-foreground text-lg font-medium flex items-center gap-2"
onClick={() => setIsMenuOpen(false)}
>
<IconHeart className="h-4 w-4 text-destructive" />
Sponsor
</Link>
</div> </div>
</div> </div>
</SheetContent> </SheetContent>

View File

@@ -4,34 +4,51 @@ import { useEffect } from "react";
import { useRouter } from "next/navigation"; import { useRouter } from "next/navigation";
import { create } from "zustand"; import { create } from "zustand";
import { useAuth } from "@/contexts/auth-context";
import { useSecureConfigValue } from "@/hooks/use-secure-configs"; import { useSecureConfigValue } from "@/hooks/use-secure-configs";
interface HomeStore { interface HomeStore {
isLoading: boolean; isLoading: boolean;
shouldShowHomePage: boolean;
setIsLoading: (loading: boolean) => void; setIsLoading: (loading: boolean) => void;
setShouldShowHomePage: (show: boolean) => void;
} }
const useHomeStore = create<HomeStore>((set) => ({ const useHomeStore = create<HomeStore>((set) => ({
isLoading: true, isLoading: true,
shouldShowHomePage: false,
setIsLoading: (loading: boolean) => set({ isLoading: loading }), setIsLoading: (loading: boolean) => set({ isLoading: loading }),
setShouldShowHomePage: (show: boolean) => set({ shouldShowHomePage: show }),
})); }));
export function useHome() { export function useHome() {
const router = useRouter(); const router = useRouter();
const { isLoading, setIsLoading } = useHomeStore(); const { isLoading, shouldShowHomePage, setIsLoading, setShouldShowHomePage } = useHomeStore();
const { isAuthenticated } = useAuth();
const { value: showHomePage, isLoading: configLoading } = useSecureConfigValue("showHomePage"); const { value: showHomePage, isLoading: configLoading } = useSecureConfigValue("showHomePage");
useEffect(() => { useEffect(() => {
if (!configLoading) { if (isAuthenticated === true) {
router.replace("/dashboard");
return;
}
}, [isAuthenticated, router]);
useEffect(() => {
if (!configLoading && isAuthenticated !== null) {
setIsLoading(false); setIsLoading(false);
if (showHomePage !== "true") { if (showHomePage !== "true") {
router.push("/login"); router.push("/login");
setShouldShowHomePage(false);
} else if (isAuthenticated === false) {
setShouldShowHomePage(true);
} }
} }
}, [router, showHomePage, configLoading, setIsLoading]); }, [router, showHomePage, configLoading, isAuthenticated, setIsLoading, setShouldShowHomePage]);
return { return {
isLoading, isLoading,
shouldShowHomePage,
}; };
} }

View File

@@ -7,9 +7,9 @@ import { Navbar } from "./components/navbar";
import { useHome } from "./hooks/use-home"; import { useHome } from "./hooks/use-home";
export default function HomePage() { export default function HomePage() {
const { isLoading } = useHome(); const { isLoading, shouldShowHomePage } = useHome();
if (isLoading) { if (isLoading || !shouldShowHomePage) {
return <LoadingScreen />; return <LoadingScreen />;
} }

View File

@@ -14,6 +14,7 @@ import { Label } from "@/components/ui/label";
import { Progress } from "@/components/ui/progress"; import { Progress } from "@/components/ui/progress";
import { Textarea } from "@/components/ui/textarea"; import { Textarea } from "@/components/ui/textarea";
import { getPresignedUrlForUploadByAlias, registerFileUploadByAlias } from "@/http/endpoints"; import { getPresignedUrlForUploadByAlias, registerFileUploadByAlias } from "@/http/endpoints";
import { getSystemInfo } from "@/http/endpoints/app";
import { ChunkedUploader } from "@/utils/chunked-upload"; import { ChunkedUploader } from "@/utils/chunked-upload";
import { formatFileSize } from "@/utils/format-file-size"; import { formatFileSize } from "@/utils/format-file-size";
import { FILE_STATUS, UPLOAD_CONFIG, UPLOAD_PROGRESS } from "../constants"; import { FILE_STATUS, UPLOAD_CONFIG, UPLOAD_PROGRESS } from "../constants";
@@ -25,9 +26,24 @@ export function FileUploadSection({ reverseShare, password, alias, onUploadSucce
const [uploaderEmail, setUploaderEmail] = useState(""); const [uploaderEmail, setUploaderEmail] = useState("");
const [description, setDescription] = useState(""); const [description, setDescription] = useState("");
const [isUploading, setIsUploading] = useState(false); const [isUploading, setIsUploading] = useState(false);
const [isS3Enabled, setIsS3Enabled] = useState<boolean | null>(null);
const t = useTranslations(); const t = useTranslations();
useEffect(() => {
const fetchSystemInfo = async () => {
try {
const response = await getSystemInfo();
setIsS3Enabled(response.data.s3Enabled);
} catch (error) {
console.warn("Failed to fetch system info, defaulting to filesystem mode:", error);
setIsS3Enabled(false);
}
};
fetchSystemInfo();
}, []);
const validateFileSize = useCallback( const validateFileSize = useCallback(
(file: File): string | null => { (file: File): string | null => {
if (!reverseShare.maxFileSize) return null; if (!reverseShare.maxFileSize) return null;
@@ -139,7 +155,7 @@ export function FileUploadSection({ reverseShare, password, alias, onUploadSucce
presignedUrl: string, presignedUrl: string,
onProgress?: (progress: number) => void onProgress?: (progress: number) => void
): Promise<void> => { ): Promise<void> => {
const shouldUseChunked = ChunkedUploader.shouldUseChunkedUpload(file.size); const shouldUseChunked = ChunkedUploader.shouldUseChunkedUpload(file.size, isS3Enabled ?? undefined);
if (shouldUseChunked) { if (shouldUseChunked) {
const chunkSize = ChunkedUploader.calculateOptimalChunkSize(file.size); const chunkSize = ChunkedUploader.calculateOptimalChunkSize(file.size);
@@ -148,6 +164,7 @@ export function FileUploadSection({ reverseShare, password, alias, onUploadSucce
file, file,
url: presignedUrl, url: presignedUrl,
chunkSize, chunkSize,
isS3Enabled: isS3Enabled ?? undefined,
onProgress, onProgress,
}); });

View File

@@ -0,0 +1,31 @@
import { NextRequest, NextResponse } from "next/server";
const API_BASE_URL = process.env.API_BASE_URL || "http://localhost:3333";
export async function GET(req: NextRequest) {
const cookieHeader = req.headers.get("cookie");
const url = `${API_BASE_URL}/app/system-info`;
const apiRes = await fetch(url, {
method: "GET",
headers: {
cookie: cookieHeader || "",
},
redirect: "manual",
});
const resBody = await apiRes.text();
const res = new NextResponse(resBody, {
status: apiRes.status,
headers: {
"Content-Type": "application/json",
},
});
const setCookie = apiRes.headers.getSetCookie?.() || [];
if (setCookie.length > 0) {
res.headers.set("Set-Cookie", setCookie.join(","));
}
return res;
}

View File

@@ -0,0 +1,32 @@
import { NextResponse } from "next/server";
const API_BASE_URL = process.env.API_BASE_URL || "http://localhost:3333";
export async function GET() {
try {
const url = `${API_BASE_URL}/auth/config`;
const apiRes = await fetch(url, {
method: "GET",
headers: {
"Content-Type": "application/json",
},
redirect: "manual",
});
const resBody = await apiRes.text();
const res = new NextResponse(resBody, {
status: apiRes.status,
statusText: apiRes.statusText,
});
apiRes.headers.forEach((value, key) => {
res.headers.set(key, value);
});
return res;
} catch (error) {
console.error("Error proxying auth config request:", error);
return NextResponse.json({ error: "Internal server error" }, { status: 500 });
}
}

View File

@@ -1,5 +1,6 @@
"use client"; "use client";
import { useEffect, useState } from "react";
import { useRouter } from "next/navigation"; import { useRouter } from "next/navigation";
import { zodResolver } from "@hookform/resolvers/zod"; import { zodResolver } from "@hookform/resolvers/zod";
import axios from "axios"; import axios from "axios";
@@ -8,7 +9,7 @@ import { useForm } from "react-hook-form";
import { toast } from "sonner"; import { toast } from "sonner";
import { z } from "zod"; import { z } from "zod";
import { requestPasswordReset } from "@/http/endpoints"; import { getAuthConfig, requestPasswordReset } from "@/http/endpoints";
export type ForgotPasswordFormData = { export type ForgotPasswordFormData = {
email: string; email: string;
@@ -17,16 +18,39 @@ export type ForgotPasswordFormData = {
export function useForgotPassword() { export function useForgotPassword() {
const t = useTranslations(); const t = useTranslations();
const router = useRouter(); const router = useRouter();
const [passwordAuthEnabled, setPasswordAuthEnabled] = useState(true);
const [authConfigLoading, setAuthConfigLoading] = useState(true);
const forgotPasswordSchema = z.object({ const forgotPasswordSchema = z.object({
email: z.string().email(t("validation.invalidEmail")), email: z.string().email(t("validation.invalidEmail")),
}); });
useEffect(() => {
const fetchAuthConfig = async () => {
try {
const response = await getAuthConfig();
setPasswordAuthEnabled((response as any).data.passwordAuthEnabled);
} catch (error) {
console.error("Failed to fetch auth config:", error);
setPasswordAuthEnabled(true);
} finally {
setAuthConfigLoading(false);
}
};
fetchAuthConfig();
}, []);
const form = useForm<ForgotPasswordFormData>({ const form = useForm<ForgotPasswordFormData>({
resolver: zodResolver(forgotPasswordSchema), resolver: zodResolver(forgotPasswordSchema),
}); });
const onSubmit = async (data: ForgotPasswordFormData) => { const onSubmit = async (data: ForgotPasswordFormData) => {
if (!passwordAuthEnabled) {
toast.error(t("errors.passwordAuthDisabled"));
return;
}
try { try {
await requestPasswordReset({ await requestPasswordReset({
email: data.email, email: data.email,
@@ -46,5 +70,7 @@ export function useForgotPassword() {
return { return {
form, form,
onSubmit, onSubmit,
passwordAuthEnabled,
authConfigLoading,
}; };
} }

View File

@@ -1,6 +1,8 @@
"use client"; "use client";
import Link from "next/link";
import { motion } from "framer-motion"; import { motion } from "framer-motion";
import { useTranslations } from "next-intl";
import { DefaultFooter } from "@/components/ui/default-footer"; import { DefaultFooter } from "@/components/ui/default-footer";
import { StaticBackgroundLights } from "../login/components/static-background-lights"; import { StaticBackgroundLights } from "../login/components/static-background-lights";
@@ -10,6 +12,7 @@ import { useForgotPassword } from "./hooks/use-forgot-password";
export default function ForgotPasswordPage() { export default function ForgotPasswordPage() {
const forgotPassword = useForgotPassword(); const forgotPassword = useForgotPassword();
const t = useTranslations("ForgotPassword");
return ( return (
<div className="relative flex min-h-screen flex-col"> <div className="relative flex min-h-screen flex-col">
@@ -22,7 +25,24 @@ export default function ForgotPasswordPage() {
initial={{ opacity: 0, y: 20 }} initial={{ opacity: 0, y: 20 }}
> >
<ForgotPasswordHeader /> <ForgotPasswordHeader />
<ForgotPasswordForm form={forgotPassword.form} onSubmit={forgotPassword.onSubmit} /> {forgotPassword.authConfigLoading ? (
<div className="flex justify-center items-center py-8">
<div className="animate-spin rounded-full h-8 w-8 border-b-2 border-primary"></div>
</div>
) : !forgotPassword.passwordAuthEnabled ? (
<div className="mt-8 space-y-4">
<div className="text-center p-4 bg-muted/50 rounded-lg">
<p className="text-muted-foreground">{t("forgotPassword.passwordAuthDisabled")}</p>
</div>
<div className="text-center">
<Link className="text-muted-foreground hover:text-primary text-sm" href="/login">
{t("forgotPassword.backToLogin")}
</Link>
</div>
</div>
) : (
<ForgotPasswordForm form={forgotPassword.form} onSubmit={forgotPassword.onSubmit} />
)}
</motion.div> </motion.div>
</div> </div>
</div> </div>

View File

@@ -4,6 +4,7 @@ import { getLocale } from "next-intl/server";
import "./globals.css"; import "./globals.css";
import { RedirectHandler } from "@/components/auth/redirect-handler";
import { Favicon } from "@/components/layout/favicon"; import { Favicon } from "@/components/layout/favicon";
import { DynamicToaster } from "@/components/ui/dynamic-toaster"; import { DynamicToaster } from "@/components/ui/dynamic-toaster";
import { useAppInfo } from "@/contexts/app-info-context"; import { useAppInfo } from "@/contexts/app-info-context";
@@ -39,7 +40,9 @@ export default async function RootLayout({
<NextIntlClientProvider> <NextIntlClientProvider>
<ThemeProvider attribute="class" defaultTheme="system" enableSystem disableTransitionOnChange> <ThemeProvider attribute="class" defaultTheme="system" enableSystem disableTransitionOnChange>
<AuthProvider> <AuthProvider>
<ShareProvider>{children}</ShareProvider> <RedirectHandler>
<ShareProvider>{children}</ShareProvider>
</RedirectHandler>
</AuthProvider> </AuthProvider>
<DynamicToaster /> <DynamicToaster />
</ThemeProvider> </ThemeProvider>

View File

@@ -1,3 +1,4 @@
import { useEffect, useState } from "react";
import Link from "next/link"; import Link from "next/link";
import { zodResolver } from "@hookform/resolvers/zod"; import { zodResolver } from "@hookform/resolvers/zod";
import { useTranslations } from "next-intl"; import { useTranslations } from "next-intl";
@@ -6,6 +7,7 @@ import { useForm } from "react-hook-form";
import { Button } from "@/components/ui/button"; import { Button } from "@/components/ui/button";
import { Form, FormControl, FormField, FormItem, FormLabel, FormMessage } from "@/components/ui/form"; import { Form, FormControl, FormField, FormItem, FormLabel, FormMessage } from "@/components/ui/form";
import { Input } from "@/components/ui/input"; import { Input } from "@/components/ui/input";
import { getEnabledProviders } from "@/http/endpoints";
import { createLoginSchema, type LoginFormValues } from "../schemas/schema"; import { createLoginSchema, type LoginFormValues } from "../schemas/schema";
import { MultiProviderButtons } from "./multi-provider-buttons"; import { MultiProviderButtons } from "./multi-provider-buttons";
import { PasswordVisibilityToggle } from "./password-visibility-toggle"; import { PasswordVisibilityToggle } from "./password-visibility-toggle";
@@ -15,21 +17,50 @@ interface LoginFormProps {
isVisible: boolean; isVisible: boolean;
onToggleVisibility: () => void; onToggleVisibility: () => void;
onSubmit: (data: LoginFormValues) => Promise<void>; onSubmit: (data: LoginFormValues) => Promise<void>;
passwordAuthEnabled: boolean;
authConfigLoading: boolean;
} }
export function LoginForm({ error, isVisible, onToggleVisibility, onSubmit }: LoginFormProps) { export function LoginForm({
error,
isVisible,
onToggleVisibility,
onSubmit,
passwordAuthEnabled,
authConfigLoading,
}: LoginFormProps) {
const t = useTranslations(); const t = useTranslations();
const loginSchema = createLoginSchema(t); const [hasEnabledProviders, setHasEnabledProviders] = useState(false);
const [providersLoading, setProvidersLoading] = useState(true);
const loginSchema = createLoginSchema(t, passwordAuthEnabled);
const form = useForm<LoginFormValues>({ const form = useForm<LoginFormValues>({
resolver: zodResolver(loginSchema), resolver: zodResolver(loginSchema),
defaultValues: { defaultValues: {
emailOrUsername: "", emailOrUsername: "",
password: "", password: passwordAuthEnabled ? "" : undefined,
}, },
}); });
const isSubmitting = form.formState.isSubmitting; const isSubmitting = form.formState.isSubmitting;
useEffect(() => {
const checkProviders = async () => {
try {
const response = await getEnabledProviders();
const data = response.data as any;
setHasEnabledProviders(data.success && data.data && data.data.length > 0);
} catch (error) {
console.error("Error checking providers:", error);
setHasEnabledProviders(false);
} finally {
setProvidersLoading(false);
}
};
checkProviders();
}, []);
const renderErrorMessage = () => const renderErrorMessage = () =>
error && ( error && (
<p className="text-destructive text-sm text-center bg-destructive/10 p-2 rounded-md"> <p className="text-destructive text-sm text-center bg-destructive/10 p-2 rounded-md">
@@ -84,13 +115,41 @@ export function LoginForm({ error, isVisible, onToggleVisibility, onSubmit }: Lo
/> />
); );
if (authConfigLoading || providersLoading) {
return (
<div className="flex justify-center items-center py-8">
<div className="animate-spin rounded-full h-8 w-8 border-b-2 border-primary"></div>
</div>
);
}
if (!passwordAuthEnabled && hasEnabledProviders) {
return (
<>
{renderErrorMessage()}
<MultiProviderButtons showSeparator={false} />
</>
);
}
if (!passwordAuthEnabled && !hasEnabledProviders) {
return (
<>
{renderErrorMessage()}
<div className="text-center py-8">
<p className="text-destructive text-sm">{t("login.noAuthMethodsAvailable")}</p>
</div>
</>
);
}
return ( return (
<> <>
{renderErrorMessage()} {renderErrorMessage()}
<Form {...form}> <Form {...form}>
<form onSubmit={form.handleSubmit(onSubmit)} className="flex flex-col gap-4"> <form onSubmit={form.handleSubmit(onSubmit)} className="flex flex-col gap-4">
{renderEmailOrUsernameField()} {renderEmailOrUsernameField()}
{renderPasswordField()} {passwordAuthEnabled && renderPasswordField()}
<Button className="w-full mt-4 cursor-pointer" variant="default" size="lg" type="submit"> <Button className="w-full mt-4 cursor-pointer" variant="default" size="lg" type="submit">
{isSubmitting ? t("login.signingIn") : t("login.signIn")} {isSubmitting ? t("login.signingIn") : t("login.signIn")}
</Button> </Button>
@@ -99,11 +158,13 @@ export function LoginForm({ error, isVisible, onToggleVisibility, onSubmit }: Lo
<MultiProviderButtons /> <MultiProviderButtons />
<div className="flex w-full items-center justify-center px-1 mt-2"> {passwordAuthEnabled && (
<Link className="text-muted-foreground hover:text-primary text-sm" href="/forgot-password"> <div className="flex w-full items-center justify-center px-1 mt-2">
{t("login.forgotPassword")} <Link className="text-muted-foreground hover:text-primary text-sm" href="/forgot-password">
</Link> {t("login.forgotPassword")}
</div> </Link>
</div>
)}
</> </>
); );
} }

View File

@@ -9,7 +9,11 @@ import { useAppInfo } from "@/contexts/app-info-context";
import { getEnabledProviders } from "@/http/endpoints"; import { getEnabledProviders } from "@/http/endpoints";
import type { EnabledAuthProvider } from "@/http/endpoints/auth/types"; import type { EnabledAuthProvider } from "@/http/endpoints/auth/types";
export function MultiProviderButtons() { interface MultiProviderButtonsProps {
showSeparator?: boolean;
}
export function MultiProviderButtons({ showSeparator = true }: MultiProviderButtonsProps) {
const [providers, setProviders] = useState<EnabledAuthProvider[]>([]); const [providers, setProviders] = useState<EnabledAuthProvider[]>([]);
const [loading, setLoading] = useState(true); const [loading, setLoading] = useState(true);
const { firstAccess } = useAppInfo(); const { firstAccess } = useAppInfo();
@@ -67,14 +71,16 @@ export function MultiProviderButtons() {
return ( return (
<div className="space-y-3"> <div className="space-y-3">
<div className="relative"> {showSeparator && (
<div className="absolute inset-0 flex items-center"> <div className="relative">
<span className="w-full border-t" /> <div className="absolute inset-0 flex items-center">
<span className="w-full border-t" />
</div>
<div className="relative flex justify-center text-xs uppercase">
<span className="bg-background px-2 text-muted-foreground">Or continue with</span>
</div>
</div> </div>
<div className="relative flex justify-center text-xs uppercase"> )}
<span className="bg-background px-2 text-muted-foreground">Or continue with</span>
</div>
</div>
<div className="space-y-2"> <div className="space-y-2">
{providers.map((provider) => ( {providers.map((provider) => (

View File

@@ -8,7 +8,7 @@ import { toast } from "sonner";
import { z } from "zod"; import { z } from "zod";
import { useAuth } from "@/contexts/auth-context"; import { useAuth } from "@/contexts/auth-context";
import { getCurrentUser, login } from "@/http/endpoints"; import { getAuthConfig, getCurrentUser, login } from "@/http/endpoints";
import { completeTwoFactorLogin } from "@/http/endpoints/auth/two-factor"; import { completeTwoFactorLogin } from "@/http/endpoints/auth/two-factor";
import type { LoginResponse } from "@/http/endpoints/auth/two-factor/types"; import type { LoginResponse } from "@/http/endpoints/auth/two-factor/types";
import { LoginFormValues } from "../schemas/schema"; import { LoginFormValues } from "../schemas/schema";
@@ -31,6 +31,14 @@ export function useLogin() {
const [twoFactorUserId, setTwoFactorUserId] = useState<string | null>(null); const [twoFactorUserId, setTwoFactorUserId] = useState<string | null>(null);
const [twoFactorCode, setTwoFactorCode] = useState(""); const [twoFactorCode, setTwoFactorCode] = useState("");
const [isSubmitting, setIsSubmitting] = useState(false); const [isSubmitting, setIsSubmitting] = useState(false);
const [passwordAuthEnabled, setPasswordAuthEnabled] = useState(true);
const [authConfigLoading, setAuthConfigLoading] = useState(true);
useEffect(() => {
if (isAuthenticated === true) {
router.replace("/dashboard");
}
}, [isAuthenticated, router]);
useEffect(() => { useEffect(() => {
const errorParam = searchParams.get("error"); const errorParam = searchParams.get("error");
@@ -60,6 +68,22 @@ export function useLogin() {
} }
}, [searchParams, t]); }, [searchParams, t]);
useEffect(() => {
const fetchAuthConfig = async () => {
try {
const response = await getAuthConfig();
setPasswordAuthEnabled((response as any).data.passwordAuthEnabled);
} catch (error) {
console.error("Failed to fetch auth config:", error);
setPasswordAuthEnabled(true);
} finally {
setAuthConfigLoading(false);
}
};
fetchAuthConfig();
}, []);
const toggleVisibility = () => setIsVisible(!isVisible); const toggleVisibility = () => setIsVisible(!isVisible);
const onSubmit = async (data: LoginFormValues) => { const onSubmit = async (data: LoginFormValues) => {
@@ -67,7 +91,12 @@ export function useLogin() {
setIsSubmitting(true); setIsSubmitting(true);
try { try {
const response = await login(data); if (!passwordAuthEnabled) {
setError(t("errors.passwordAuthDisabled"));
return;
}
const response = await login(data as any);
const loginData = response.data as LoginResponse; const loginData = response.data as LoginResponse;
if (loginData.requiresTwoFactor && loginData.userId) { if (loginData.requiresTwoFactor && loginData.userId) {
@@ -77,7 +106,6 @@ export function useLogin() {
} }
if (loginData.user) { if (loginData.user) {
// Após login bem-sucedido, buscar dados completos do usuário incluindo a imagem
try { try {
const userResponse = await getCurrentUser(); const userResponse = await getCurrentUser();
if (userResponse?.data?.user) { if (userResponse?.data?.user) {
@@ -92,7 +120,6 @@ export function useLogin() {
console.warn("Failed to fetch complete user data, using login data:", userErr); console.warn("Failed to fetch complete user data, using login data:", userErr);
} }
// Fallback para dados do login se falhar ao buscar dados completos
const { isAdmin, ...userData } = loginData.user; const { isAdmin, ...userData } = loginData.user;
setUser({ ...userData, image: null }); setUser({ ...userData, image: null });
setIsAdmin(isAdmin); setIsAdmin(isAdmin);
@@ -129,7 +156,6 @@ export function useLogin() {
rememberDevice: rememberDevice, rememberDevice: rememberDevice,
}); });
// Após two-factor login bem-sucedido, buscar dados completos do usuário incluindo a imagem
try { try {
const userResponse = await getCurrentUser(); const userResponse = await getCurrentUser();
if (userResponse?.data?.user) { if (userResponse?.data?.user) {
@@ -144,7 +170,6 @@ export function useLogin() {
console.warn("Failed to fetch complete user data after 2FA, using response data:", userErr); console.warn("Failed to fetch complete user data after 2FA, using response data:", userErr);
} }
// Fallback para dados da resposta se falhar ao buscar dados completos
const { isAdmin, ...userData } = response.data.user; const { isAdmin, ...userData } = response.data.user;
setUser({ ...userData, image: userData.image ?? null }); setUser({ ...userData, image: userData.image ?? null });
setIsAdmin(isAdmin); setIsAdmin(isAdmin);
@@ -172,5 +197,7 @@ export function useLogin() {
setTwoFactorCode, setTwoFactorCode,
onTwoFactorSubmit, onTwoFactorSubmit,
isSubmitting, isSubmitting,
passwordAuthEnabled,
authConfigLoading,
}; };
} }

View File

@@ -17,7 +17,7 @@ export default function LoginPage() {
const login = useLogin(); const login = useLogin();
const { firstAccess } = useAppInfo(); const { firstAccess } = useAppInfo();
if (login.isAuthenticated === null) { if (login.isAuthenticated === null || login.isAuthenticated === true) {
return <LoadingScreen />; return <LoadingScreen />;
} }
@@ -53,6 +53,8 @@ export default function LoginPage() {
isVisible={login.isVisible} isVisible={login.isVisible}
onSubmit={login.onSubmit} onSubmit={login.onSubmit}
onToggleVisibility={login.toggleVisibility} onToggleVisibility={login.toggleVisibility}
passwordAuthEnabled={login.passwordAuthEnabled}
authConfigLoading={login.authConfigLoading}
/> />
)} )}
</motion.div> </motion.div>

View File

@@ -3,10 +3,10 @@ import * as z from "zod";
type TFunction = ReturnType<typeof useTranslations>; type TFunction = ReturnType<typeof useTranslations>;
export const createLoginSchema = (t: TFunction) => export const createLoginSchema = (t: TFunction, passwordAuthEnabled: boolean = true) =>
z.object({ z.object({
emailOrUsername: z.string().min(1, t("validation.emailOrUsernameRequired")), emailOrUsername: z.string().min(1, t("validation.emailOrUsernameRequired")),
password: z.string().min(1, t("validation.passwordRequired")), password: passwordAuthEnabled ? z.string().min(1, t("validation.passwordRequired")) : z.string().optional(),
}); });
export type LoginFormValues = z.infer<ReturnType<typeof createLoginSchema>>; export type LoginFormValues = z.infer<ReturnType<typeof createLoginSchema>>;

View File

@@ -172,8 +172,19 @@ export function useSettings() {
} }
await refreshAppInfo(); await refreshAppInfo();
} catch { } catch (error: any) {
toast.error(t("settings.errors.updateFailed")); const errorMessage = error?.response?.data?.error || error?.message || "";
if (
errorMessage.includes("autenticação por senha") ||
errorMessage.includes("provedor de autenticação ativo") ||
errorMessage.includes("password authentication") ||
errorMessage.includes("authentication provider")
) {
toast.error(t("settings.errors.passwordAuthRequiresProvider"));
} else {
toast.error(t("settings.errors.updateFailed"));
}
} }
}; };

View File

@@ -1,6 +1,6 @@
"use client"; "use client";
import { useEffect, type ReactNode } from "react"; import { useEffect, useState, type ReactNode } from "react";
import { useRouter } from "next/navigation"; import { useRouter } from "next/navigation";
import { useAuth } from "@/contexts/auth-context"; import { useAuth } from "@/contexts/auth-context";
@@ -14,16 +14,21 @@ type ProtectedRouteProps = {
export function ProtectedRoute({ children, requireAdmin = false }: ProtectedRouteProps) { export function ProtectedRoute({ children, requireAdmin = false }: ProtectedRouteProps) {
const { isAuthenticated, isAdmin } = useAuth(); const { isAuthenticated, isAdmin } = useAuth();
const router = useRouter(); const router = useRouter();
const [hasCheckedAuth, setHasCheckedAuth] = useState(false);
useEffect(() => { useEffect(() => {
if (isAuthenticated === false) { if (isAuthenticated !== null) {
router.replace("/login"); setHasCheckedAuth(true);
} else if (requireAdmin && isAdmin === false) {
router.replace("/dashboard"); if (isAuthenticated === false) {
router.replace("/login");
} else if (requireAdmin && isAdmin === false) {
router.replace("/dashboard");
}
} }
}, [isAuthenticated, isAdmin, requireAdmin, router]); }, [isAuthenticated, isAdmin, requireAdmin, router]);
if (isAuthenticated === null || (requireAdmin && isAdmin === null)) { if (!hasCheckedAuth || isAuthenticated === null || (requireAdmin && isAdmin === null)) {
return <LoadingScreen />; return <LoadingScreen />;
} }

View File

@@ -0,0 +1,63 @@
"use client";
import { useEffect } from "react";
import { usePathname, useRouter } from "next/navigation";
import { LoadingScreen } from "@/components/layout/loading-screen";
import { useAuth } from "@/contexts/auth-context";
interface RedirectHandlerProps {
children: React.ReactNode;
}
const publicPaths = [
"/login",
"/forgot-password",
"/reset-password",
"/auth/callback",
"/auth/oidc/callback",
"/s/",
"/r/",
];
const homePaths = ["/"];
export function RedirectHandler({ children }: RedirectHandlerProps) {
const router = useRouter();
const pathname = usePathname();
const { isAuthenticated } = useAuth();
useEffect(() => {
if (isAuthenticated === true) {
if (publicPaths.some((path) => pathname.startsWith(path)) || homePaths.includes(pathname)) {
router.replace("/dashboard");
return;
}
} else if (isAuthenticated === false) {
if (!publicPaths.some((path) => pathname.startsWith(path)) && !homePaths.includes(pathname)) {
router.replace("/login");
return;
}
}
}, [isAuthenticated, pathname, router]);
if (isAuthenticated === null) {
return <LoadingScreen />;
}
if (
isAuthenticated === true &&
(publicPaths.some((path) => pathname.startsWith(path)) || homePaths.includes(pathname))
) {
return <LoadingScreen />;
}
if (
isAuthenticated === false &&
!publicPaths.some((path) => pathname.startsWith(path)) &&
!homePaths.includes(pathname)
) {
return <LoadingScreen />;
}
return <>{children}</>;
}

View File

@@ -9,6 +9,7 @@ import { toast } from "sonner";
import { Button } from "@/components/ui/button"; import { Button } from "@/components/ui/button";
import { Progress } from "@/components/ui/progress"; import { Progress } from "@/components/ui/progress";
import { checkFile, getPresignedUrl, registerFile } from "@/http/endpoints"; import { checkFile, getPresignedUrl, registerFile } from "@/http/endpoints";
import { getSystemInfo } from "@/http/endpoints/app";
import { ChunkedUploader } from "@/utils/chunked-upload"; import { ChunkedUploader } from "@/utils/chunked-upload";
import { getFileIcon } from "@/utils/file-icons"; import { getFileIcon } from "@/utils/file-icons";
import { generateSafeFileName } from "@/utils/file-utils"; import { generateSafeFileName } from "@/utils/file-utils";
@@ -43,6 +44,7 @@ export function GlobalDropZone({ onSuccess, children }: GlobalDropZoneProps) {
const [isDragOver, setIsDragOver] = useState(false); const [isDragOver, setIsDragOver] = useState(false);
const [fileUploads, setFileUploads] = useState<FileUpload[]>([]); const [fileUploads, setFileUploads] = useState<FileUpload[]>([]);
const [hasShownSuccessToast, setHasShownSuccessToast] = useState(false); const [hasShownSuccessToast, setHasShownSuccessToast] = useState(false);
const [isS3Enabled, setIsS3Enabled] = useState<boolean | null>(null);
const generateFileId = useCallback(() => { const generateFileId = useCallback(() => {
return Date.now().toString() + Math.random().toString(36).substr(2, 9); return Date.now().toString() + Math.random().toString(36).substr(2, 9);
@@ -124,7 +126,7 @@ export function GlobalDropZone({ onSuccess, children }: GlobalDropZoneProps) {
const abortController = new AbortController(); const abortController = new AbortController();
setFileUploads((prev) => prev.map((u) => (u.id === id ? { ...u, abortController } : u))); setFileUploads((prev) => prev.map((u) => (u.id === id ? { ...u, abortController } : u)));
const shouldUseChunked = ChunkedUploader.shouldUseChunkedUpload(file.size); const shouldUseChunked = ChunkedUploader.shouldUseChunkedUpload(file.size, isS3Enabled ?? undefined);
if (shouldUseChunked) { if (shouldUseChunked) {
const chunkSize = ChunkedUploader.calculateOptimalChunkSize(file.size); const chunkSize = ChunkedUploader.calculateOptimalChunkSize(file.size);
@@ -134,6 +136,7 @@ export function GlobalDropZone({ onSuccess, children }: GlobalDropZoneProps) {
url, url,
chunkSize, chunkSize,
signal: abortController.signal, signal: abortController.signal,
isS3Enabled: isS3Enabled ?? undefined,
onProgress: (progress) => { onProgress: (progress) => {
setFileUploads((prev) => prev.map((u) => (u.id === id ? { ...u, progress } : u))); setFileUploads((prev) => prev.map((u) => (u.id === id ? { ...u, progress } : u)));
}, },
@@ -196,7 +199,7 @@ export function GlobalDropZone({ onSuccess, children }: GlobalDropZoneProps) {
); );
} }
}, },
[t] [t, isS3Enabled]
); );
const handleDrop = useCallback( const handleDrop = useCallback(
@@ -256,6 +259,20 @@ export function GlobalDropZone({ onSuccess, children }: GlobalDropZoneProps) {
[uploadFile, t, createFileUpload] [uploadFile, t, createFileUpload]
); );
useEffect(() => {
const fetchSystemInfo = async () => {
try {
const response = await getSystemInfo();
setIsS3Enabled(response.data.s3Enabled);
} catch (error) {
console.warn("Failed to fetch system info, defaulting to filesystem mode:", error);
setIsS3Enabled(false);
}
};
fetchSystemInfo();
}, []);
useEffect(() => { useEffect(() => {
document.addEventListener("dragover", handleDragOver); document.addEventListener("dragover", handleDragOver);
document.addEventListener("dragleave", handleDragLeave); document.addEventListener("dragleave", handleDragLeave);

View File

@@ -1,5 +1,6 @@
"use client"; "use client";
import { useState } from "react";
import Link from "next/link"; import Link from "next/link";
import { useRouter } from "next/navigation"; import { useRouter } from "next/navigation";
import { IconLogout, IconSettings, IconUser, IconUsers } from "@tabler/icons-react"; import { IconLogout, IconSettings, IconUser, IconUsers } from "@tabler/icons-react";
@@ -21,8 +22,22 @@ import { logout as logoutAPI } from "@/http/endpoints";
export function Navbar() { export function Navbar() {
const t = useTranslations(); const t = useTranslations();
const router = useRouter(); const router = useRouter();
const { user, isAdmin, logout } = useAuth(); const { user, isAdmin, logout, isAuthenticated } = useAuth();
const { appName, appLogo } = useAppInfo(); const { appName, appLogo } = useAppInfo();
const [isNavigating, setIsNavigating] = useState(false);
const handleLogoClick = async () => {
if (isNavigating || !isAuthenticated) return;
try {
setIsNavigating(true);
router.replace("/dashboard");
} catch (err) {
console.error("Error navigating to dashboard:", err);
} finally {
setTimeout(() => setIsNavigating(false), 500);
}
};
const handleLogout = async () => { const handleLogout = async () => {
try { try {
@@ -39,10 +54,15 @@ export function Navbar() {
<div className="container flex h-16 max-w-screen-xl items-center mx-auto lg:px-6"> <div className="container flex h-16 max-w-screen-xl items-center mx-auto lg:px-6">
<div className="flex flex-1 items-center justify-between"> <div className="flex flex-1 items-center justify-between">
<div className="flex items-center gap-3"> <div className="flex items-center gap-3">
<Link href="/dashboard" className="flex items-center gap-2 cursor-pointer"> <div
onClick={handleLogoClick}
className={`flex items-center gap-2 cursor-pointer transition-opacity ${
isNavigating ? "opacity-50" : "opacity-100"
}`}
>
{appLogo && <img alt={t("navbar.logoAlt")} className="h-8 w-8 object-contain rounded" src={appLogo} />} {appLogo && <img alt={t("navbar.logoAlt")} className="h-8 w-8 object-contain rounded" src={appLogo} />}
<p className="font-bold text-2xl">{appName}</p> <p className="font-bold text-2xl">{appName}</p>
</Link> </div>
</div> </div>
<div className="flex items-center gap-2 cursor-pointer"> <div className="flex items-center gap-2 cursor-pointer">

View File

@@ -37,7 +37,15 @@ export function CreateShareModal({ isOpen, onClose, onSuccess }: CreateShareModa
name: formData.name, name: formData.name,
description: formData.description || undefined, description: formData.description || undefined,
password: formData.isPasswordProtected ? formData.password : undefined, password: formData.isPasswordProtected ? formData.password : undefined,
expiration: formData.expiresAt ? new Date(formData.expiresAt).toISOString() : undefined, expiration: formData.expiresAt
? (() => {
const dateValue = formData.expiresAt;
if (dateValue.length === 10) {
return new Date(dateValue + "T23:59:59").toISOString();
}
return new Date(dateValue).toISOString();
})()
: undefined,
maxViews: formData.maxViews ? parseInt(formData.maxViews) : undefined, maxViews: formData.maxViews ? parseInt(formData.maxViews) : undefined,
files: [], files: [],
}); });
@@ -71,7 +79,16 @@ export function CreateShareModal({ isOpen, onClose, onSuccess }: CreateShareModa
<div className="flex flex-col gap-4"> <div className="flex flex-col gap-4">
<div className="space-y-2"> <div className="space-y-2">
<Label>{t("createShare.nameLabel")}</Label> <Label>{t("createShare.nameLabel")}</Label>
<Input value={formData.name} onChange={(e) => setFormData({ ...formData, name: e.target.value })} /> <Input
value={formData.name}
onChange={(e) => setFormData({ ...formData, name: e.target.value })}
onPaste={(e) => {
e.preventDefault();
const pastedText = e.clipboardData.getData("text");
setFormData({ ...formData, name: pastedText });
}}
placeholder={t("createShare.namePlaceholder")}
/>
</div> </div>
<div className="space-y-2"> <div className="space-y-2">
@@ -93,6 +110,12 @@ export function CreateShareModal({ isOpen, onClose, onSuccess }: CreateShareModa
type="datetime-local" type="datetime-local"
value={formData.expiresAt} value={formData.expiresAt}
onChange={(e) => setFormData({ ...formData, expiresAt: e.target.value })} onChange={(e) => setFormData({ ...formData, expiresAt: e.target.value })}
onBlur={(e) => {
const value = e.target.value;
if (value && value.length === 10) {
setFormData({ ...formData, expiresAt: value + "T23:59" });
}
}}
/> />
</div> </div>

View File

@@ -10,6 +10,7 @@ import { Button } from "@/components/ui/button";
import { Dialog, DialogContent, DialogFooter, DialogHeader, DialogTitle } from "@/components/ui/dialog"; import { Dialog, DialogContent, DialogFooter, DialogHeader, DialogTitle } from "@/components/ui/dialog";
import { Progress } from "@/components/ui/progress"; import { Progress } from "@/components/ui/progress";
import { checkFile, getPresignedUrl, registerFile } from "@/http/endpoints"; import { checkFile, getPresignedUrl, registerFile } from "@/http/endpoints";
import { getSystemInfo } from "@/http/endpoints/app";
import { ChunkedUploader } from "@/utils/chunked-upload"; import { ChunkedUploader } from "@/utils/chunked-upload";
import { getFileIcon } from "@/utils/file-icons"; import { getFileIcon } from "@/utils/file-icons";
import { generateSafeFileName } from "@/utils/file-utils"; import { generateSafeFileName } from "@/utils/file-utils";
@@ -87,8 +88,23 @@ export function UploadFileModal({ isOpen, onClose, onSuccess }: UploadFileModalP
const [isDragOver, setIsDragOver] = useState(false); const [isDragOver, setIsDragOver] = useState(false);
const [showConfirmation, setShowConfirmation] = useState(false); const [showConfirmation, setShowConfirmation] = useState(false);
const [hasShownSuccessToast, setHasShownSuccessToast] = useState(false); const [hasShownSuccessToast, setHasShownSuccessToast] = useState(false);
const [isS3Enabled, setIsS3Enabled] = useState<boolean | null>(null);
const fileInputRef = useRef<HTMLInputElement>(null); const fileInputRef = useRef<HTMLInputElement>(null);
useEffect(() => {
const fetchSystemInfo = async () => {
try {
const response = await getSystemInfo();
setIsS3Enabled(response.data.s3Enabled);
} catch (error) {
console.warn("Failed to fetch system info, defaulting to filesystem mode:", error);
setIsS3Enabled(false);
}
};
fetchSystemInfo();
}, []);
useEffect(() => { useEffect(() => {
return () => { return () => {
fileUploads.forEach((upload) => { fileUploads.forEach((upload) => {
@@ -108,7 +124,11 @@ export function UploadFileModal({ isOpen, onClose, onSuccess }: UploadFileModalP
let previewUrl: string | undefined; let previewUrl: string | undefined;
if (file.type.startsWith("image/")) { if (file.type.startsWith("image/")) {
previewUrl = URL.createObjectURL(file); try {
previewUrl = URL.createObjectURL(file);
} catch (error) {
console.warn("Failed to create preview URL:", error);
}
} }
return { return {
@@ -126,6 +146,10 @@ export function UploadFileModal({ isOpen, onClose, onSuccess }: UploadFileModalP
const newUploads = Array.from(files).map(createFileUpload); const newUploads = Array.from(files).map(createFileUpload);
setFileUploads((prev) => [...prev, ...newUploads]); setFileUploads((prev) => [...prev, ...newUploads]);
setHasShownSuccessToast(false); setHasShownSuccessToast(false);
if (newUploads.length > 0) {
toast.info(t("uploadFile.filesQueued", { count: newUploads.length }));
}
}; };
const handleFileInputChange = (event: React.ChangeEvent<HTMLInputElement>) => { const handleFileInputChange = (event: React.ChangeEvent<HTMLInputElement>) => {
@@ -148,7 +172,12 @@ export function UploadFileModal({ isOpen, onClose, onSuccess }: UploadFileModalP
const handleDrop = (event: React.DragEvent) => { const handleDrop = (event: React.DragEvent) => {
event.preventDefault(); event.preventDefault();
setIsDragOver(false); setIsDragOver(false);
handleFilesSelect(event.dataTransfer.files); event.stopPropagation();
const files = event.dataTransfer.files;
if (files.length > 0) {
handleFilesSelect(files);
}
}; };
const renderFileIcon = (fileName: string) => { const renderFileIcon = (fileName: string) => {
@@ -252,7 +281,7 @@ export function UploadFileModal({ isOpen, onClose, onSuccess }: UploadFileModalP
const abortController = new AbortController(); const abortController = new AbortController();
setFileUploads((prev) => prev.map((u) => (u.id === id ? { ...u, abortController } : u))); setFileUploads((prev) => prev.map((u) => (u.id === id ? { ...u, abortController } : u)));
const shouldUseChunked = ChunkedUploader.shouldUseChunkedUpload(file.size); const shouldUseChunked = ChunkedUploader.shouldUseChunkedUpload(file.size, isS3Enabled ?? undefined);
if (shouldUseChunked) { if (shouldUseChunked) {
const chunkSize = ChunkedUploader.calculateOptimalChunkSize(file.size); const chunkSize = ChunkedUploader.calculateOptimalChunkSize(file.size);
@@ -262,6 +291,7 @@ export function UploadFileModal({ isOpen, onClose, onSuccess }: UploadFileModalP
url, url,
chunkSize, chunkSize,
signal: abortController.signal, signal: abortController.signal,
isS3Enabled: isS3Enabled ?? undefined,
onProgress: (progress) => { onProgress: (progress) => {
setFileUploads((prev) => prev.map((u) => (u.id === id ? { ...u, progress } : u))); setFileUploads((prev) => prev.map((u) => (u.id === id ? { ...u, progress } : u)));
}, },

View File

@@ -39,11 +39,15 @@ export function AuthProvider({ children }: { children: React.ReactNode }) {
}; };
useEffect(() => { useEffect(() => {
let isMounted = true;
const checkAuth = async () => { const checkAuth = async () => {
try { try {
const appInfoResponse = await getAppInfo(); const appInfoResponse = await getAppInfo();
const appInfo = appInfoResponse.data; const appInfo = appInfoResponse.data;
if (!isMounted) return;
if (appInfo.firstUserAccess) { if (appInfo.firstUserAccess) {
setUser(null); setUser(null);
setIsAdmin(false); setIsAdmin(false);
@@ -52,8 +56,14 @@ export function AuthProvider({ children }: { children: React.ReactNode }) {
} }
const response = await getCurrentUser(); const response = await getCurrentUser();
if (!isMounted) return;
if (!response?.data?.user) { if (!response?.data?.user) {
throw new Error("No user data"); setUser(null);
setIsAdmin(false);
setIsAuthenticated(false);
return;
} }
const { isAdmin, ...userData } = response.data.user; const { isAdmin, ...userData } = response.data.user;
@@ -62,6 +72,8 @@ export function AuthProvider({ children }: { children: React.ReactNode }) {
setIsAdmin(isAdmin); setIsAdmin(isAdmin);
setIsAuthenticated(true); setIsAuthenticated(true);
} catch (err) { } catch (err) {
if (!isMounted) return;
console.error(err); console.error(err);
setUser(null); setUser(null);
setIsAdmin(false); setIsAdmin(false);
@@ -70,6 +82,10 @@ export function AuthProvider({ children }: { children: React.ReactNode }) {
}; };
checkAuth(); checkAuth();
return () => {
isMounted = false;
};
}, []); }, []);
return ( return (

View File

@@ -7,6 +7,7 @@ import type {
CheckUploadAllowedResult, CheckUploadAllowedResult,
GetAppInfoResult, GetAppInfoResult,
GetDiskSpaceResult, GetDiskSpaceResult,
GetSystemInfoResult,
RemoveLogoResult, RemoveLogoResult,
UploadLogoBody, UploadLogoBody,
UploadLogoResult, UploadLogoResult,
@@ -20,6 +21,14 @@ export const getAppInfo = <TData = GetAppInfoResult>(options?: AxiosRequestConfi
return apiInstance.get(`/api/app/info`, options); return apiInstance.get(`/api/app/info`, options);
}; };
/**
* Get system information including storage provider
* @summary Get system information
*/
export const getSystemInfo = <TData = GetSystemInfoResult>(options?: AxiosRequestConfig): Promise<TData> => {
return apiInstance.get(`/api/app/system-info`, options);
};
/** /**
* Upload a new app logo (admin only) * Upload a new app logo (admin only)
* @summary Upload app logo * @summary Upload app logo

View File

@@ -32,6 +32,11 @@ export interface GetAppInfo200 {
firstUserAccess: boolean; firstUserAccess: boolean;
} }
export interface GetSystemInfo200 {
storageProvider: "s3" | "filesystem";
s3Enabled: boolean;
}
export interface RemoveLogo200 { export interface RemoveLogo200 {
message: string; message: string;
} }
@@ -49,6 +54,7 @@ export interface UploadLogoBody {
} }
export type GetAppInfoResult = AxiosResponse<GetAppInfo200>; export type GetAppInfoResult = AxiosResponse<GetAppInfo200>;
export type GetSystemInfoResult = AxiosResponse<GetSystemInfo200>;
export type UploadLogoResult = AxiosResponse<UploadLogo200>; export type UploadLogoResult = AxiosResponse<UploadLogo200>;
export type RemoveLogoResult = AxiosResponse<RemoveLogo200>; export type RemoveLogoResult = AxiosResponse<RemoveLogo200>;
export type CheckHealthResult = AxiosResponse<CheckHealth200>; export type CheckHealthResult = AxiosResponse<CheckHealth200>;

View File

@@ -99,3 +99,9 @@ export const updateProvidersOrder = <TData = UpdateProvidersOrderResult>(
): Promise<TData> => { ): Promise<TData> => {
return apiInstance.put(`/api/auth/providers/order`, updateProvidersOrderBody, options); return apiInstance.put(`/api/auth/providers/order`, updateProvidersOrderBody, options);
}; };
export const getAuthConfig = <TData = { passwordAuthEnabled: boolean }>(
options?: AxiosRequestConfig
): Promise<TData> => {
return apiInstance.get(`/api/auth/config`, options);
};

View File

@@ -7,6 +7,7 @@ export interface ChunkedUploadOptions {
onProgress?: (progress: number) => void; onProgress?: (progress: number) => void;
onChunkComplete?: (chunkIndex: number, totalChunks: number) => void; onChunkComplete?: (chunkIndex: number, totalChunks: number) => void;
signal?: AbortSignal; signal?: AbortSignal;
isS3Enabled?: boolean;
} }
export interface ChunkedUploadResult { export interface ChunkedUploadResult {
@@ -23,7 +24,7 @@ export class ChunkedUploader {
static async uploadFile(options: ChunkedUploadOptions): Promise<ChunkedUploadResult> { static async uploadFile(options: ChunkedUploadOptions): Promise<ChunkedUploadResult> {
const { file, url, chunkSize, onProgress, onChunkComplete, signal } = options; const { file, url, chunkSize, onProgress, onChunkComplete, signal } = options;
if (!this.shouldUseChunkedUpload(file.size)) { if (!this.shouldUseChunkedUpload(file.size, options.isS3Enabled)) {
throw new Error( throw new Error(
`File ${file.name} (${(file.size / (1024 * 1024)).toFixed(2)}MB) should not use chunked upload. Use regular upload instead.` `File ${file.name} (${(file.size / (1024 * 1024)).toFixed(2)}MB) should not use chunked upload. Use regular upload instead.`
); );
@@ -238,8 +239,13 @@ export class ChunkedUploader {
/** /**
* Check if file should use chunked upload * Check if file should use chunked upload
* Only use chunked upload for filesystem storage, not for S3
*/ */
static shouldUseChunkedUpload(fileSize: number): boolean { static shouldUseChunkedUpload(fileSize: number, isS3Enabled?: boolean): boolean {
if (isS3Enabled) {
return false;
}
const threshold = 100 * 1024 * 1024; // 100MB const threshold = 100 * 1024 * 1024; // 100MB
const shouldUse = fileSize > threshold; const shouldUse = fileSize > threshold;

View File

@@ -3,13 +3,14 @@ services:
image: kyantech/palmr:latest image: kyantech/palmr:latest
container_name: palmr container_name: palmr
environment: environment:
- ENABLE_S3=false # Optional: Uncomment and configure as needed (if you don`t use, you can remove)
- ENCRYPTION_KEY=change-this-key-in-production-min-32-chars # CHANGE THIS KEY FOR SECURITY (REQUIRED if DISABLE_FILESYSTEM_ENCRYPTION is false) # - ENABLE_S3=true # Set to true to enable S3-compatible storage (OPTIONAL - default is false)
- PALMR_UID=1000 # UID for the container processes (OPTIONAL - default is 1001) | See our UID/GID Documentation for more information # - DISABLE_FILESYSTEM_ENCRYPTION=false # Set to false to enable file encryption (ENCRYPTION_KEY becomes required) | (OPTIONAL - default is true)
- PALMR_GID=1000 # GID for the container processes (OPTIONAL - default is 1001) | See our UID/GID Documentation for more information # - ENCRYPTION_KEY=change-this-key-in-production-min-32-chars # CHANGE THIS KEY FOR SECURITY (REQUIRED if DISABLE_FILESYSTEM_ENCRYPTION is false)
# - PALMR_UID=1000 # UID for the container processes (OPTIONAL - default is 1000) | See our UID/GID Documentation for more information
# - PALMR_GID=1000 # GID for the container processes (OPTIONAL - default is 1000) | See our UID/GID Documentation for more information
# - DEFAULT_LANGUAGE=en-US # Default language for the application (optional, defaults to en-US) | See the docs for see all supported languages # - DEFAULT_LANGUAGE=en-US # Default language for the application (optional, defaults to en-US) | See the docs for see all supported languages
# - SECURE_SITE=true # Set to true if you are using a reverse proxy (OPTIONAL - default is false) # - SECURE_SITE=true # Set to true if you are using a reverse proxy (OPTIONAL - default is false)
# - DISABLE_FILESYSTEM_ENCRYPTION=true # Set to true to disable file encryption (ENCRYPTION_KEY becomes optional) | (OPTIONAL - default is false)
ports: ports:
- "5487:5487" # Web port - "5487:5487" # Web port
- "3333:3333" # API port (OPTIONAL EXPOSED - ONLY IF YOU WANT TO ACCESS THE API DIRECTLY) - "3333:3333" # API port (OPTIONAL EXPOSED - ONLY IF YOU WANT TO ACCESS THE API DIRECTLY)

View File

@@ -12,8 +12,8 @@ services:
- S3_REGION=${S3_REGION:-us-east-1} # S3 region (us-east-1 is the default region) but it depends on your s3 server region - S3_REGION=${S3_REGION:-us-east-1} # S3 region (us-east-1 is the default region) but it depends on your s3 server region
- S3_BUCKET_NAME=${S3_BUCKET_NAME:-palmr-files} # Bucket name for the S3 storage (here we are using palmr-files as the bucket name to understand that this is the bucket for palmr) - S3_BUCKET_NAME=${S3_BUCKET_NAME:-palmr-files} # Bucket name for the S3 storage (here we are using palmr-files as the bucket name to understand that this is the bucket for palmr)
- S3_FORCE_PATH_STYLE=true # For MinIO compatibility we have to set this to true - S3_FORCE_PATH_STYLE=true # For MinIO compatibility we have to set this to true
- PALMR_UID=1000 # UID for the container processes (OPTIONAL - default is 1001) | See our UID/GID Documentation for more information # - PALMR_UID=1000 # UID for the container processes (OPTIONAL - default is 1000) | See our UID/GID Documentation for more information
- PALMR_GID=1000 # GID for the container processes (OPTIONAL - default is 1001) | See our UID/GID Documentation for more information # - PALMR_GID=1000 # GID for the container processes (OPTIONAL - default is 1000) | See our UID/GID Documentation for more information
# - DEFAULT_LANGUAGE=en-US # Default language for the application (optional, defaults to en-US) | See the docs for see all supported languages # - DEFAULT_LANGUAGE=en-US # Default language for the application (optional, defaults to en-US) | See the docs for see all supported languages
# - SECURE_SITE=true # Set to true if you are using a reverse proxy (OPTIONAL - default is false) # - SECURE_SITE=true # Set to true if you are using a reverse proxy (OPTIONAL - default is false)
ports: ports:

View File

@@ -12,8 +12,8 @@ services:
- S3_REGION=${S3_REGION:-us-east-1} # S3 region (us-east-1 is the default region) but it depends on your s3 server region - S3_REGION=${S3_REGION:-us-east-1} # S3 region (us-east-1 is the default region) but it depends on your s3 server region
- S3_BUCKET_NAME=${S3_BUCKET_NAME:-palmr-files} # Bucket name for the S3 storage (here we are using palmr-files as the bucket name to understand that this is the bucket for palmr) - S3_BUCKET_NAME=${S3_BUCKET_NAME:-palmr-files} # Bucket name for the S3 storage (here we are using palmr-files as the bucket name to understand that this is the bucket for palmr)
- S3_FORCE_PATH_STYLE=false # For S3 compatibility we have to set this to false - S3_FORCE_PATH_STYLE=false # For S3 compatibility we have to set this to false
- PALMR_UID=1000 # UID for the container processes (OPTIONAL - default is 1001) | See our UID/GID Documentation for more information # - PALMR_UID=1000 # UID for the container processes (OPTIONAL - default is 1000) | See our UID/GID Documentation for more information
- PALMR_GID=1000 # GID for the container processes (OPTIONAL - default is 1001) | See our UID/GID Documentation for more information # - PALMR_GID=1000 # GID for the container processes (OPTIONAL - default is 1000) | See our UID/GID Documentation for more information
# - DEFAULT_LANGUAGE=en-US # Default language for the application (optional, defaults to en-US) | See the docs for see all supported languages # - DEFAULT_LANGUAGE=en-US # Default language for the application (optional, defaults to en-US) | See the docs for see all supported languages
# - SECURE_SITE=true # Set to true if you are using a reverse proxy (OPTIONAL - default is false) # - SECURE_SITE=true # Set to true if you are using a reverse proxy (OPTIONAL - default is false)
ports: ports:

View File

@@ -3,13 +3,14 @@ services:
image: kyantech/palmr:latest image: kyantech/palmr:latest
container_name: palmr container_name: palmr
environment: environment:
- ENABLE_S3=false # Optional: Uncomment and configure as needed (if you don`t use, you can remove)
- ENCRYPTION_KEY=change-this-key-in-production-min-32-chars # CHANGE THIS KEY FOR SECURITY (REQUIRED if DISABLE_FILESYSTEM_ENCRYPTION is false) # - ENABLE_S3=false # Set to true to enable S3-compatible storage (OPTIONAL - default is false)
- PALMR_UID=1000 # UID for the container processes (OPTIONAL - default is 1001) | See our UID/GID Documentation for more information # - DISABLE_FILESYSTEM_ENCRYPTION=true # Set to false to enable file encryption (ENCRYPTION_KEY becomes required) | (OPTIONAL - default is true)
- PALMR_GID=1000 # GID for the container processes (OPTIONAL - default is 1001) | See our UID/GID Documentation for more information # - ENCRYPTION_KEY=change-this-key-in-production-min-32-chars # CHANGE THIS KEY FOR SECURITY (REQUIRED if DISABLE_FILESYSTEM_ENCRYPTION is false)
# - PALMR_UID=1000 # UID for the container processes (OPTIONAL - default is 1000) | See our UID/GID Documentation for more information
# - PALMR_GID=1000 # GID for the container processes (OPTIONAL - default is 1000) | See our UID/GID Documentation for more information
# - DEFAULT_LANGUAGE=en-US # Default language for the application (optional, defaults to en-US) | See the docs to see all supported languages # - DEFAULT_LANGUAGE=en-US # Default language for the application (optional, defaults to en-US) | See the docs to see all supported languages
# - SECURE_SITE=true # Set to true if you are using a reverse proxy (OPTIONAL - default is false) # - SECURE_SITE=true # Set to true if you are using a reverse proxy (OPTIONAL - default is false)
# - DISABLE_FILESYSTEM_ENCRYPTION=true # Set to true to disable file encryption (ENCRYPTION_KEY becomes optional) | (OPTIONAL - default is false)
ports: ports:
- "5487:5487" # Web port - "5487:5487" # Web port
- "3333:3333" # API port (OPTIONAL EXPOSED - ONLY IF YOU WANT TO ACCESS THE API DIRECTLY) - "3333:3333" # API port (OPTIONAL EXPOSED - ONLY IF YOU WANT TO ACCESS THE API DIRECTLY)

147
infra/check-missing.js Normal file
View File

@@ -0,0 +1,147 @@
const { PrismaClient } = require('@prisma/client');
const fs = require('fs');
const path = require('path');
const prisma = new PrismaClient();
const loadConfigs = () => {
try {
const configsPath = path.join(__dirname, 'configs.json');
const configs = JSON.parse(fs.readFileSync(configsPath, 'utf8'));
return Object.values(configs).flat();
} catch (error) {
console.error('Error loading configs:', error.message);
return [];
}
};
const loadProviders = () => {
try {
const providersPath = path.join(__dirname, 'providers.json');
return JSON.parse(fs.readFileSync(providersPath, 'utf8'));
} catch (error) {
console.error('Error loading providers:', error.message);
return [];
}
};
async function checkSeedingNeeded() {
try {
const appConfigCount = await prisma.appConfig.count();
const userCount = await prisma.user.count();
const authProviderCount = await prisma.authProvider.count();
if (appConfigCount === 0 || userCount === 0) {
console.log('true');
return;
}
if (authProviderCount === 0) {
console.log('true');
return;
}
const allConfigs = loadConfigs();
const existingConfigs = await prisma.appConfig.findMany({
where: {
key: {
in: allConfigs
}
},
select: { key: true }
});
const existingConfigKeys = existingConfigs.map(c => c.key);
const missingConfigs = allConfigs.filter(key => !existingConfigKeys.includes(key));
if (missingConfigs.length > 0) {
console.log('true');
return;
}
const expectedProviders = loadProviders();
const existingProviders = await prisma.authProvider.findMany({
select: { name: true }
});
const existingProviderNames = existingProviders.map(p => p.name);
const missingProviders = expectedProviders.filter(name => !existingProviderNames.includes(name));
if (missingProviders.length > 0) {
console.log('true');
return;
}
console.log('false');
} catch (error) {
console.error('Error checking if seeding is needed:', error);
console.log('true');
} finally {
await prisma.$disconnect();
}
}
async function checkMissingProviders() {
try {
const expectedProviders = loadProviders();
const existingProviders = await prisma.authProvider.findMany({
select: { name: true }
});
const existingProviderNames = existingProviders.map(p => p.name);
const missingProviders = expectedProviders.filter(name => !existingProviderNames.includes(name));
if (missingProviders.length > 0) {
console.log('Missing providers: ' + missingProviders.join(', '));
} else {
console.log('No missing providers');
}
} catch (error) {
console.error('Error checking missing providers:', error);
console.log('Error checking providers');
} finally {
await prisma.$disconnect();
}
}
async function checkMissingConfigs() {
try {
const allConfigs = loadConfigs();
const existingConfigs = await prisma.appConfig.findMany({
where: {
key: {
in: allConfigs
}
},
select: { key: true }
});
const existingConfigKeys = existingConfigs.map(c => c.key);
const missingConfigs = allConfigs.filter(key => !existingConfigKeys.includes(key));
if (missingConfigs.length > 0) {
console.log('Missing configurations: ' + missingConfigs.join(', '));
} else {
console.log('No missing configurations');
}
} catch (error) {
console.error('Error checking missing configurations:', error);
console.log('Error checking configurations');
} finally {
await prisma.$disconnect();
}
}
const command = process.argv[2];
switch (command) {
case 'check-seeding':
checkSeedingNeeded();
break;
case 'check-providers':
checkMissingProviders();
break;
case 'check-configs':
checkMissingConfigs();
break;
default:
console.error('Unknown command. Use: check-seeding, check-providers, or check-configs');
process.exit(1);
}

37
infra/configs.json Normal file
View File

@@ -0,0 +1,37 @@
{
"general": [
"appName",
"showHomePage",
"appDescription",
"appLogo",
"firstUserAccess",
"serverUrl"
],
"storage": [
"maxFileSize",
"maxTotalStoragePerUser"
],
"security": [
"jwtSecret",
"maxLoginAttempts",
"loginBlockDuration",
"passwordMinLength",
"passwordAuthEnabled",
"passwordResetTokenExpiration"
],
"email": [
"smtpEnabled",
"smtpHost",
"smtpPort",
"smtpUser",
"smtpPass",
"smtpFromName",
"smtpFromEmail",
"smtpSecure",
"smtpNoAuth",
"smtpTrustSelfSigned"
],
"auth-providers": [
"authProvidersEnabled"
]
}

11
infra/providers.json Normal file
View File

@@ -0,0 +1,11 @@
[
"google",
"discord",
"github",
"auth0",
"kinde",
"zitadel",
"authentik",
"frontegg",
"pocketid"
]

View File

@@ -3,8 +3,8 @@ set -e
echo "🌴 Starting Palmr Server..." echo "🌴 Starting Palmr Server..."
TARGET_UID=${PALMR_UID:-1001} TARGET_UID=${PALMR_UID:-1000}
TARGET_GID=${PALMR_GID:-1001} TARGET_GID=${PALMR_GID:-1000}
if [ -n "$PALMR_UID" ] || [ -n "$PALMR_GID" ]; then if [ -n "$PALMR_UID" ] || [ -n "$PALMR_GID" ]; then
echo "🔧 Runtime UID/GID: $TARGET_UID:$TARGET_GID" echo "🔧 Runtime UID/GID: $TARGET_UID:$TARGET_GID"
@@ -35,200 +35,59 @@ if [ "$(id -u)" = "0" ]; then
chown -R $TARGET_UID:$TARGET_GID /app/server/prisma 2>/dev/null || true chown -R $TARGET_UID:$TARGET_GID /app/server/prisma 2>/dev/null || true
fi fi
run_as_user() {
if [ "$(id -u)" = "0" ]; then
su-exec $TARGET_UID:$TARGET_GID "$@"
else
"$@"
fi
}
if [ ! -f "/app/server/prisma/configs.json" ]; then
echo "📄 Copying configuration files..."
cp -f /app/infra/configs.json /app/server/prisma/configs.json 2>/dev/null || echo "⚠️ Failed to copy configs.json"
cp -f /app/infra/providers.json /app/server/prisma/providers.json 2>/dev/null || echo "⚠️ Failed to copy providers.json"
cp -f /app/infra/check-missing.js /app/server/prisma/check-missing.js 2>/dev/null || echo "⚠️ Failed to copy check-missing.js"
if [ "$(id -u)" = "0" ]; then
chown $TARGET_UID:$TARGET_GID /app/server/prisma/configs.json /app/server/prisma/providers.json /app/server/prisma/check-missing.js 2>/dev/null || true
fi
fi
if [ ! -f "/app/server/prisma/palmr.db" ]; then if [ ! -f "/app/server/prisma/palmr.db" ]; then
echo "🚀 First run detected - setting up database..." echo "🚀 First run detected - setting up database..."
echo "🗄️ Creating database schema..." echo "🗄️ Creating database schema..."
if [ "$(id -u)" = "0" ]; then run_as_user npx prisma db push --schema=./prisma/schema.prisma --skip-generate
su-exec $TARGET_UID:$TARGET_GID npx prisma db push --schema=./prisma/schema.prisma --skip-generate
else
npx prisma db push --schema=./prisma/schema.prisma --skip-generate
fi
echo "🌱 Seeding database..." echo "🌱 Seeding database..."
if [ "$(id -u)" = "0" ]; then run_as_user node ./prisma/seed.js
su-exec $TARGET_UID:$TARGET_GID node ./prisma/seed.js
else
node ./prisma/seed.js
fi
echo "✅ Database setup completed!" echo "✅ Database setup completed!"
else else
echo "♻️ Existing database found" echo "♻️ Existing database found"
echo "🔧 Checking for schema updates..." echo "🔧 Checking for schema updates..."
if [ "$(id -u)" = "0" ]; then run_as_user npx prisma db push --schema=./prisma/schema.prisma --skip-generate
su-exec $TARGET_UID:$TARGET_GID npx prisma db push --schema=./prisma/schema.prisma --skip-generate
else
npx prisma db push --schema=./prisma/schema.prisma --skip-generate
fi
echo "🔍 Checking if new tables need seeding..." echo "🔍 Checking if new tables need seeding..."
NEEDS_SEEDING=$( NEEDS_SEEDING=$(run_as_user node ./prisma/check-missing.js check-seeding 2>/dev/null || echo "true")
if [ "$(id -u)" = "0" ]; then
su-exec $TARGET_UID:$TARGET_GID node -e "
const { PrismaClient } = require('@prisma/client');
const prisma = new PrismaClient();
async function checkSeedingNeeded() {
try {
const appConfigCount = await prisma.appConfig.count();
const userCount = await prisma.user.count();
const authProviderCount = await prisma.authProvider.count();
if (appConfigCount === 0 || userCount === 0) {
console.log('true');
return;
}
if (authProviderCount === 0) {
console.log('true');
return;
}
const expectedProviders = ['google', 'discord', 'github', 'auth0', 'kinde', 'zitadel', 'authentik', 'frontegg', 'pocketid'];
const existingProviders = await prisma.authProvider.findMany({
select: { name: true }
});
const existingProviderNames = existingProviders.map(p => p.name);
const missingProviders = expectedProviders.filter(name => !existingProviderNames.includes(name));
if (missingProviders.length > 0) {
console.log('true');
return;
}
console.log('false');
} catch (error) {
console.log('true');
} finally {
await prisma.\$disconnect();
}
}
checkSeedingNeeded();
" 2>/dev/null || echo "true"
else
node -e "
const { PrismaClient } = require('@prisma/client');
const prisma = new PrismaClient();
async function checkSeedingNeeded() {
try {
const appConfigCount = await prisma.appConfig.count();
const userCount = await prisma.user.count();
const authProviderCount = await prisma.authProvider.count();
if (appConfigCount === 0 || userCount === 0) {
console.log('true');
return;
}
if (authProviderCount === 0) {
console.log('true');
return;
}
const expectedProviders = ['google', 'discord', 'github', 'auth0', 'kinde', 'zitadel', 'authentik', 'frontegg', 'pocketid'];
const existingProviders = await prisma.authProvider.findMany({
select: { name: true }
});
const existingProviderNames = existingProviders.map(p => p.name);
const missingProviders = expectedProviders.filter(name => !existingProviderNames.includes(name));
if (missingProviders.length > 0) {
console.log('true');
return;
}
console.log('false');
} catch (error) {
console.log('true');
} finally {
await prisma.\$disconnect();
}
}
checkSeedingNeeded();
" 2>/dev/null || echo "true"
fi
)
if [ "$NEEDS_SEEDING" = "true" ]; then if [ "$NEEDS_SEEDING" = "true" ]; then
echo "🌱 New tables detected or missing data, running seed..." echo "🌱 New tables detected or missing data, running seed..."
# Check which providers are missing for better logging MISSING_PROVIDERS=$(run_as_user node ./prisma/check-missing.js check-providers 2>/dev/null || echo "Error checking providers")
MISSING_PROVIDERS=$( MISSING_CONFIGS=$(run_as_user node ./prisma/check-missing.js check-configs 2>/dev/null || echo "Error checking configurations")
if [ "$(id -u)" = "0" ]; then
su-exec $TARGET_UID:$TARGET_GID node -e "
const { PrismaClient } = require('@prisma/client');
const prisma = new PrismaClient();
async function checkMissingProviders() {
try {
const expectedProviders = ['google', 'discord', 'github', 'auth0', 'kinde', 'zitadel', 'authentik', 'frontegg', 'pocketid'];
const existingProviders = await prisma.authProvider.findMany({
select: { name: true }
});
const existingProviderNames = existingProviders.map(p => p.name);
const missingProviders = expectedProviders.filter(name => !existingProviderNames.includes(name));
if (missingProviders.length > 0) {
console.log('Missing providers: ' + missingProviders.join(', '));
} else {
console.log('No missing providers');
}
} catch (error) {
console.log('Error checking providers');
} finally {
await prisma.\$disconnect();
}
}
checkMissingProviders();
" 2>/dev/null || echo "Error checking providers"
else
node -e "
const { PrismaClient } = require('@prisma/client');
const prisma = new PrismaClient();
async function checkMissingProviders() {
try {
const expectedProviders = ['google', 'discord', 'github', 'auth0', 'kinde', 'zitadel', 'authentik', 'frontegg', 'pocketid'];
const existingProviders = await prisma.authProvider.findMany({
select: { name: true }
});
const existingProviderNames = existingProviders.map(p => p.name);
const missingProviders = expectedProviders.filter(name => !existingProviderNames.includes(name));
if (missingProviders.length > 0) {
console.log('Missing providers: ' + missingProviders.join(', '));
} else {
console.log('No missing providers');
}
} catch (error) {
console.log('Error checking providers');
} finally {
await prisma.\$disconnect();
}
}
checkMissingProviders();
" 2>/dev/null || echo "Error checking providers"
fi
)
if [ "$MISSING_PROVIDERS" != "No missing providers" ] && [ "$MISSING_PROVIDERS" != "Error checking providers" ]; then if [ "$MISSING_PROVIDERS" != "No missing providers" ] && [ "$MISSING_PROVIDERS" != "Error checking providers" ]; then
echo "🔍 $MISSING_PROVIDERS" echo "🔍 $MISSING_PROVIDERS"
fi fi
if [ "$(id -u)" = "0" ]; then if [ "$MISSING_CONFIGS" != "No missing configurations" ] && [ "$MISSING_CONFIGS" != "Error checking configurations" ]; then
su-exec $TARGET_UID:$TARGET_GID node ./prisma/seed.js echo "⚙️ $MISSING_CONFIGS"
else
node ./prisma/seed.js
fi fi
run_as_user node ./prisma/seed.js
echo "✅ Seeding completed!" echo "✅ Seeding completed!"
else else
echo "✅ All tables have data, no seeding needed" echo "✅ All tables have data, no seeding needed"
@@ -242,4 +101,4 @@ if [ "$(id -u)" = "0" ]; then
exec su-exec $TARGET_UID:$TARGET_GID node dist/server.js exec su-exec $TARGET_UID:$TARGET_GID node dist/server.js
else else
exec node dist/server.js exec node dist/server.js
fi fi

View File

@@ -31,6 +31,7 @@ update_package_json() {
update_package_json "apps/web/package.json" "Web App" update_package_json "apps/web/package.json" "Web App"
update_package_json "apps/docs/package.json" "Documentation" update_package_json "apps/docs/package.json" "Documentation"
update_package_json "apps/server/package.json" "API Server" update_package_json "apps/server/package.json" "API Server"
update_package_json "./package.json" "Monorepo"
echo "🎉 Version update completed!" echo "🎉 Version update completed!"
echo "📦 All package.json files now have version: $VERSION" echo "📦 All package.json files now have version: $VERSION"

View File

@@ -1,6 +1,6 @@
{ {
"name": "palmr-monorepo", "name": "palmr-monorepo",
"version": "3.1-beta", "version": "3.1.8-beta",
"description": "Palmr monorepo with Husky configuration", "description": "Palmr monorepo with Husky configuration",
"private": true, "private": true,
"packageManager": "pnpm@10.6.0", "packageManager": "pnpm@10.6.0",