Compare commits
17 Commits
v0.1.64-ap
...
v0.1.133
Author | SHA1 | Date | |
---|---|---|---|
|
61046f1d42 | ||
|
7a5fac90ab | ||
|
b38bd6a249 | ||
|
a8b22a95c8 | ||
|
93cdf1f2f1 | ||
|
8d6fc6fde0 | ||
|
b1e8df29e7 | ||
|
176d23c086 | ||
|
aba8af9bb4 | ||
|
7fc40ce970 | ||
|
a0af6ec84c | ||
|
f9171c6ca4 | ||
|
8fbf29fc45 | ||
|
e95ad5c25f | ||
|
d964d7d264 | ||
|
06e0f5075e | ||
|
c7b9ab18bb |
158
CLAUDE.md
Normal file
158
CLAUDE.md
Normal file
@@ -0,0 +1,158 @@
|
||||
Cloudron Application Packaging System Prompt
|
||||
|
||||
You are a Cloudron packaging expert specializing in creating complete, production-ready Cloudron packages. When a user requests packaging an application, follow this comprehensive process:
|
||||
|
||||
Core Process
|
||||
|
||||
1. Application Research: Research the target application's architecture, dependencies, configuration requirements, and deployment patterns
|
||||
2. Package Generation: Create all required Cloudron packaging files
|
||||
3. Documentation: Provide build and deployment instructions
|
||||
|
||||
Required Files to Generate
|
||||
|
||||
CloudronManifest.json
|
||||
|
||||
- Use reverse-domain notation for app ID (e.g., io.example.appname)
|
||||
- Configure memory limits based on application requirements (minimum 128MB)
|
||||
- Set httpPort matching NGINX configuration
|
||||
- Include necessary addons: postgresql, mysql, mongodb, redis, localstorage, sendmail
|
||||
- Add complete metadata: title, description, author, website, contactEmail
|
||||
- Configure authentication: oidc (preferred) or ldap
|
||||
- Include postInstallMessage with login credentials if applicable
|
||||
- Add health check endpoints
|
||||
- Set proper minBoxVersion (typically "7.0.0")
|
||||
|
||||
Dockerfile
|
||||
|
||||
- Base image: FROM cloudron/base:5.0.0
|
||||
- Cloudron filesystem structure:
|
||||
- /app/code - application code (read-only)
|
||||
- /app/data - persistent data (backed up)
|
||||
- /tmp - temporary files
|
||||
- /run - runtime files
|
||||
- Install dependencies and application
|
||||
- Copy initialization data to /tmp/data
|
||||
- Set proper permissions and ownership
|
||||
- Configure services to log to stdout/stderr
|
||||
- Entry point: CMD ["/app/code/start.sh"]
|
||||
|
||||
start.sh
|
||||
|
||||
- Initialize /app/data from /tmp/data on first run
|
||||
- Configure application using Cloudron environment variables
|
||||
- Handle addon configurations (database connections, etc.)
|
||||
- Generate secrets/API keys on first run
|
||||
- Set proper file permissions (chown cloudron:cloudron)
|
||||
- Run database migrations if needed
|
||||
- Configure authentication providers
|
||||
- Launch application with supervisor or directly
|
||||
|
||||
NGINX Configuration
|
||||
|
||||
- Listen on port specified in CloudronManifest.json
|
||||
- Handle proxy headers properly:
|
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
proxy_set_header X-Forwarded-Proto $scheme;
|
||||
proxy_set_header Host $host;
|
||||
- Configure static file serving
|
||||
- Set up authentication routes for OIDC callbacks
|
||||
- Ensure logs go to stdout/stderr
|
||||
|
||||
Supervisor Configuration (if needed)
|
||||
|
||||
- Multiple process management
|
||||
- Proper signal handling
|
||||
- Run processes as cloudron user
|
||||
- Configure log output to stdout/stderr
|
||||
|
||||
Authentication Integration
|
||||
|
||||
OIDC (Preferred)
|
||||
|
||||
- Environment variables: CLOUDRON_OIDC_IDENTIFIER, CLOUDRON_OIDC_CLIENT_ID, CLOUDRON_OIDC_CLIENT_SECRET
|
||||
- Callback route: /api/v1/session/callback
|
||||
- User provisioning and group mapping
|
||||
- Session management compatible with Cloudron proxy
|
||||
|
||||
LDAP (Fallback)
|
||||
|
||||
- Environment variables: CLOUDRON_LDAP_SERVER, CLOUDRON_LDAP_PORT, CLOUDRON_LDAP_BIND_DN, CLOUDRON_LDAP_BIND_PASSWORD
|
||||
- User search base and group mapping
|
||||
- Proper LDAP query configuration
|
||||
|
||||
Cloudron Environment Variables
|
||||
|
||||
Always utilize these standard variables:
|
||||
- CLOUDRON_APP_ORIGIN - Application URL
|
||||
- CLOUDRON_MAIL_SMTP_* - Email configuration
|
||||
- Database addon variables (e.g., CLOUDRON_POSTGRESQL_URL)
|
||||
- CLOUDRON_LDAP_* - LDAP configuration
|
||||
- CLOUDRON_OIDC_* - OIDC configuration
|
||||
|
||||
Best Practices
|
||||
|
||||
1. Security: Never expose secrets, use environment variables
|
||||
2. Persistence: Store data in /app/data, initialize from /tmp/data
|
||||
3. Updates: Handle schema migrations and configuration updates
|
||||
4. Logging: All logs to stdout/stderr for Cloudron log aggregation
|
||||
5. Health Checks: Implement endpoints for monitoring
|
||||
6. Process Management: Use supervisor for multi-process applications
|
||||
7. File Permissions: Ensure cloudron user can read/write necessary files
|
||||
8. Building: use the cloudron build service under builder.docker.due.ren
|
||||
9. Installation: always uninstall and install fresh, never update an app during development
|
||||
|
||||
Build Instructions Format
|
||||
|
||||
Create a markdown file with:
|
||||
- Prerequisites and dependencies
|
||||
- Build commands (cloudron build, cloudron install)
|
||||
- Testing procedures
|
||||
- Deployment steps
|
||||
- Troubleshooting common issues
|
||||
- Configuration examples
|
||||
|
||||
Documentation References
|
||||
|
||||
- Cloudron CLI: https://docs.cloudron.io/packaging/cli/
|
||||
- Packaging Tutorial: https://docs.cloudron.io/packaging/tutorial/
|
||||
- Manifest Reference: https://docs.cloudron.io/packaging/manifest/
|
||||
- Addons Guide: https://docs.cloudron.io/packaging/addons/
|
||||
|
||||
Viewing logs
|
||||
|
||||
To view the logs of an app, use the logs command:
|
||||
```cloudron logs --app blog.example.com```
|
||||
```cloudron logs --app 52aae895-5b7d-4625-8d4c-52980248ac21```
|
||||
Pass the -f to follow the logs. Note that not all apps log to stdout/stderr. For this reason, you may need to look further in the file system for logs:
|
||||
```cloudron exec --app blog.example.com # shell into the app's file system```
|
||||
``# tail -f /run/wordpress/wp-debug.log # note that log file path and name is specific to the app```
|
||||
|
||||
|
||||
When packaging an application, research thoroughly, create production-ready configurations, and provide comprehensive documentation for successful deployment.
|
||||
|
||||
Always Build with the build service (switch out name and version) build with cloudron build --set-build-service builder.docker.due.ren --build-service-token
|
||||
e3265de06b1d0e7bb38400539012a8433a74c2c96a17955e --set-repository andreasdueren/ente-cloudron --tag 0.1.0
|
||||
|
||||
cloudron install --location ente.due.ren --image andreasdueren/ente-cloudron:0.1.0
|
||||
|
||||
After install and build, don’t wait more than 30 seconds for feedback. When there is an error during install, this will not finish and you will wait forever.
|
||||
|
||||
Remember all of this crucial information throughout the packaging process. Create a file for persistency if necessary to poll from later.
Fix this packaging of ente for cloudron:
|
||||
|
||||
https://github.com/ente-io/ente/tree/main
|
||||
|
||||
There is documentation about self-hosting here: https://github.com/ente-io/ente/tree/main/docs/docs/self-hosting and here https://github.com/ente-io/ente/tree/main/server
|
||||
|
||||
Use Caddy as a reverse proxy. More info on setting it up: https://help.ente.io/self-hosting/reverse-proxy
|
||||
|
||||
Set up all web-apps (public-albums, cast, accounts, family). Use a path (/albums, /cast…) and not sub domains.: https://help.ente.io/self-hosting/museum
|
||||
|
||||
|
||||
Stick to the original maintainers setup as close as possible while adhering to cordons restricti0ns. Use cloudrons postgresql as a database and an external s3 instance for object storage. You can use the following credentials for development but never commit these to any repository:
|
||||
primary-storage:
|
||||
key: "bbdfcc78c3d8aa970498fc309f1e5876" # Your S3 access key
|
||||
secret: "4969ba66f326b4b7af7ca69716ee4a16931725a351a93643efce6447f81c9d68" # Your S3 secret key
|
||||
endpoint: "40db7844966a4e896ccfac20ac9e7fb5.r2.cloudflarestorage.com" # S3 endpoint URL
|
||||
region: "wnam" # S3 region (e.g. us-east-1)
|
||||
bucket: "ente-due-ren" # Your bucket name
|
||||
Here are the instructions as to how to use an external s3: https://help.ente.io/self-hosting/guides/external-s3
|
@@ -7,7 +7,7 @@
|
||||
"contactEmail": "contact@ente.io",
|
||||
"tagline": "Open Source End-to-End Encrypted Photos & Authentication",
|
||||
"upstreamVersion": "1.0.0",
|
||||
"version": "0.1.64",
|
||||
"version": "0.1.133",
|
||||
"healthCheckPath": "/ping",
|
||||
"httpPort": 3080,
|
||||
"memoryLimit": 1073741824,
|
||||
|
21
Dockerfile
21
Dockerfile
@@ -27,11 +27,9 @@ RUN apt-get update && apt-get install -y git && \
|
||||
# Will help default to yarn version 1.22.22
|
||||
RUN corepack enable
|
||||
|
||||
# Set environment variables for web app build
|
||||
# Set the API endpoint to use current origin - this will work at runtime
|
||||
# Set environment variables for web app build - use relative endpoint
|
||||
ENV NEXT_PUBLIC_ENTE_ENDPOINT="/api"
|
||||
# Use relative path so it works with any domain
|
||||
RUN echo "Building with NEXT_PUBLIC_ENTE_ENDPOINT=/api, will work with any domain via Caddy proxy"
|
||||
RUN echo "Building with relative NEXT_PUBLIC_ENTE_ENDPOINT=/api for self-hosted deployment"
|
||||
|
||||
# Debugging the repository structure
|
||||
RUN find . -type d -maxdepth 3 | sort
|
||||
@@ -122,7 +120,7 @@ WORKDIR /app/code
|
||||
|
||||
# Clone the ente repository during build (for the Museum server)
|
||||
RUN git clone --depth=1 https://github.com/ente-io/ente.git . && \
|
||||
sed -i 's/go 1.23/go 1.24.1/' server/go.mod && \
|
||||
sed -i 's/go 1.23/go 1.24/' server/go.mod && \
|
||||
mkdir -p /app/data/go && \
|
||||
cp -r server/go.mod server/go.sum /app/data/go/ && \
|
||||
chmod 777 /app/data/go/go.mod /app/data/go/go.sum
|
||||
@@ -145,6 +143,7 @@ ENV GOFLAGS="-modfile=/app/data/go/go.mod -mod=mod"
|
||||
ENV PATH="/usr/local/go/bin:${PATH}"
|
||||
ENV GOSUMDB=off
|
||||
ENV GOMODCACHE="/app/data/go/pkg/mod"
|
||||
ENV HOME=/app/data/home
|
||||
|
||||
# Copy the web app built files from the first stage
|
||||
COPY --from=web-builder /build/web/photos /app/web/photos
|
||||
@@ -152,6 +151,18 @@ COPY --from=web-builder /build/web/accounts /app/web/accounts
|
||||
COPY --from=web-builder /build/web/auth /app/web/auth
|
||||
COPY --from=web-builder /build/web/cast /app/web/cast
|
||||
|
||||
# Build Ente CLI and place binary in /app/code
|
||||
WORKDIR /app/code/cli
|
||||
RUN env GOFLAGS= GOMODCACHE=/tmp/cli-go-cache GO111MODULE=on go build -o /app/code/ente . && chmod +x /app/code/ente
|
||||
|
||||
WORKDIR /app/code
|
||||
|
||||
# Symlink CLI into PATH for convenience
|
||||
RUN ln -sf /app/code/ente /usr/local/bin/ente
|
||||
|
||||
# Prepare CLI data directory symlink to persistent storage
|
||||
RUN mkdir -p /app/data/cli-data && ln -s /app/data/cli-data /cli-data
|
||||
|
||||
# Copy Museum server binary from builder stage to app directory (not data volume)
|
||||
RUN mkdir -p /app/museum-bin
|
||||
COPY --from=museum-builder /ente/server/museum /app/museum-bin/museum
|
||||
|
@@ -7,19 +7,28 @@ Before you can use Ente, you need to configure an S3-compatible storage service:
|
||||
1. Go to your Cloudron dashboard
|
||||
2. Click on your Ente app
|
||||
3. Click on "Terminal"
|
||||
4. Edit the S3 configuration template:
|
||||
4. Edit the S3 configuration file:
|
||||
```
|
||||
nano /app/data/config/s3.env.template
|
||||
nano /app/data/config/s3.env
|
||||
```
|
||||
5. Fill in your S3 credentials (AWS S3, MinIO, DigitalOcean Spaces, etc.)
|
||||
6. Save the file and rename it:
|
||||
```
|
||||
mv /app/data/config/s3.env.template /app/data/config/s3.env
|
||||
```
|
||||
7. Restart your Ente app from the Cloudron dashboard
|
||||
5. Uncomment the variables you need and fill in your S3 credentials (AWS S3, Cloudflare R2, MinIO, etc.). The file includes commented examples for the previous Wasabi defaults and a generic Cloudflare R2 setup.
|
||||
6. Save the file and restart your Ente app from the Cloudron dashboard
|
||||
|
||||
## Next Steps
|
||||
|
||||
1. Once S3 is configured, visit your app URL to create an admin account
|
||||
2. Configure your mobile apps to use your custom self-hosted server (Settings → Advanced → Custom Server)
|
||||
3. Enjoy your private, end-to-end encrypted photo storage!
|
||||
|
||||
## Ente CLI
|
||||
|
||||
- The Ente CLI binary is pre-built at `/app/code/ente` inside the app container.
|
||||
- Open the Cloudron web terminal (working directory `/app/code`) and run commands with `ente ...` or `./ente ...`.
|
||||
- The CLI configuration at `/app/data/home/.ente/config.yaml` already points to your instance (`https://<your-domain>/api`).
|
||||
- CLI state is stored under `/app/data/cli-data/` so re-logins persist.
|
||||
|
||||
## Museum Server Configuration
|
||||
|
||||
- The active configuration lives at `/app/data/ente/server/configurations/local.yaml` and is created the first time the app starts.
|
||||
- Subsequent restarts leave this file untouched, so you can whitelist admin accounts or adjust other settings as documented by Ente.
|
||||
- Delete the file to regenerate the default template (environment values such as database and S3 credentials are rendered during creation).
|
||||
|
38
debug-network.html
Normal file
38
debug-network.html
Normal file
@@ -0,0 +1,38 @@
|
||||
<!DOCTYPE html>
|
||||
<html>
|
||||
<head>
|
||||
<title>Debug Ente Auth Network Calls</title>
|
||||
</head>
|
||||
<body>
|
||||
<h1>Debug Ente Auth Network Calls</h1>
|
||||
<div id="output"></div>
|
||||
|
||||
<script>
|
||||
// Override fetch to log all network requests
|
||||
const originalFetch = window.fetch;
|
||||
window.fetch = function(...args) {
|
||||
console.log('FETCH REQUEST:', args[0], args[1]);
|
||||
const output = document.getElementById('output');
|
||||
output.innerHTML += '<p>FETCH: ' + args[0] + '</p>';
|
||||
return originalFetch.apply(this, args)
|
||||
.then(response => {
|
||||
console.log('FETCH RESPONSE:', response.status, response.url);
|
||||
output.innerHTML += '<p>RESPONSE: ' + response.status + ' ' + response.url + '</p>';
|
||||
return response;
|
||||
})
|
||||
.catch(error => {
|
||||
console.log('FETCH ERROR:', error);
|
||||
output.innerHTML += '<p>ERROR: ' + error.message + '</p>';
|
||||
throw error;
|
||||
});
|
||||
};
|
||||
|
||||
// Load the Ente Auth app in an iframe to see what happens
|
||||
const iframe = document.createElement('iframe');
|
||||
iframe.src = 'https://ente.due.ren/auth/';
|
||||
iframe.style.width = '100%';
|
||||
iframe.style.height = '400px';
|
||||
document.body.appendChild(iframe);
|
||||
</script>
|
||||
</body>
|
||||
</html>
|
625
start.sh
625
start.sh
@@ -22,6 +22,16 @@ log() {
|
||||
log "INFO" "Starting Ente Cloudron app"
|
||||
log "INFO" "Running in Cloudron environment with domain: ${CLOUDRON_APP_DOMAIN}"
|
||||
|
||||
# Ensure HOME is writable (needed for CLI usage)
|
||||
HOME_DIR="/app/data/home"
|
||||
export HOME="$HOME_DIR"
|
||||
mkdir -p "$HOME"
|
||||
|
||||
# Ensure CLI data directory persists across restarts
|
||||
CLI_DATA_PERSIST="/app/data/cli-data"
|
||||
mkdir -p "$CLI_DATA_PERSIST"
|
||||
|
||||
|
||||
# Prevent infinite loops through startup flag
|
||||
if [ -f "/app/data/startup_in_progress" ]; then
|
||||
if [ "$(find /app/data/startup_in_progress -mmin +2)" ]; then
|
||||
@@ -77,41 +87,158 @@ fi
|
||||
# ===============================================
|
||||
log "INFO" "Setting up configuration"
|
||||
|
||||
# S3 configuration - HARDCODED VALUES
|
||||
S3_ACCESS_KEY="QZ5M3VMBUHDTIFDFCD8E"
|
||||
S3_SECRET_KEY="pz1eHYjU1NwAbbruedc7swzCuszd57p1rGSFVzjv"
|
||||
S3_ENDPOINT="https://s3.eu-central-2.wasabisys.com"
|
||||
S3_REGION="eu-central-2"
|
||||
S3_BUCKET="ente-due-ren"
|
||||
if [ -n "$CLOUDRON_APP_ORIGIN" ]; then
|
||||
BASE_URL="$CLOUDRON_APP_ORIGIN"
|
||||
else
|
||||
BASE_URL="https://${CLOUDRON_APP_DOMAIN:-localhost}"
|
||||
fi
|
||||
RP_ID="${CLOUDRON_APP_FQDN:-${CLOUDRON_APP_DOMAIN:-localhost}}"
|
||||
|
||||
log "INFO" "Using hardcoded S3 configuration"
|
||||
# S3 configuration (overridable post-install)
|
||||
DEFAULT_S3_ACCESS_KEY="QZ5M3VMBUHDTIFDFCD8E"
|
||||
DEFAULT_S3_SECRET_KEY="pz1eHYjU1NwAbbruedc7swzCuszd57p1rGSFVzjv"
|
||||
DEFAULT_S3_ENDPOINT="https://s3.eu-central-2.wasabisys.com"
|
||||
DEFAULT_S3_REGION="eu-central-2"
|
||||
DEFAULT_S3_BUCKET="ente-due-ren"
|
||||
|
||||
S3_CONFIG_DIR="/app/data/config"
|
||||
S3_CONFIG_FILE="$S3_CONFIG_DIR/s3.env"
|
||||
|
||||
write_default_s3_template() {
|
||||
cat > "$S3_CONFIG_FILE" << 'EOF'
|
||||
# S3 configuration overrides for Ente on Cloudron.
|
||||
# Uncomment and set any of the variables below to override the packaged defaults.
|
||||
# After editing this file, restart the Ente app from the Cloudron dashboard.
|
||||
#
|
||||
# Example (previous Wasabi defaults bundled with this package):
|
||||
#S3_ACCESS_KEY=QZ5M3VMBUHDTIFDFCD8E
|
||||
#S3_SECRET_KEY=pz1eHYjU1NwAbbruedc7swzCuszd57p1rGSFVzjv
|
||||
#S3_ENDPOINT=https://s3.eu-central-2.wasabisys.com
|
||||
#S3_REGION=eu-central-2
|
||||
#S3_BUCKET=ente-due-ren
|
||||
#
|
||||
# Example (Cloudflare R2 — replace placeholders):
|
||||
#S3_ACCESS_KEY=R2_ACCESS_KEY
|
||||
#S3_SECRET_KEY=R2_SECRET_KEY
|
||||
#S3_ENDPOINT=https://<ACCOUNT_ID>.r2.cloudflarestorage.com
|
||||
#S3_REGION=auto
|
||||
#S3_BUCKET=<bucket-name>
|
||||
#
|
||||
#S3_ACCESS_KEY=
|
||||
#S3_SECRET_KEY=
|
||||
#S3_ENDPOINT=
|
||||
#S3_REGION=
|
||||
#S3_BUCKET=
|
||||
EOF
|
||||
chown cloudron:cloudron "$S3_CONFIG_FILE" || true
|
||||
}
|
||||
|
||||
mkdir -p "$S3_CONFIG_DIR"
|
||||
|
||||
if [ -f "$S3_CONFIG_FILE" ]; then
|
||||
if ! grep -q "previous Wasabi defaults" "$S3_CONFIG_FILE" && ! grep -Eq '^[[:space:]]*[^#[:space:]]' "$S3_CONFIG_FILE"; then
|
||||
log "INFO" "Refreshing S3 configuration template with example values"
|
||||
write_default_s3_template
|
||||
fi
|
||||
log "INFO" "Loading S3 configuration overrides from $S3_CONFIG_FILE"
|
||||
# shellcheck disable=SC1090
|
||||
set -a
|
||||
. "$S3_CONFIG_FILE"
|
||||
set +a
|
||||
else
|
||||
log "INFO" "S3 configuration file not found, writing template to $S3_CONFIG_FILE"
|
||||
write_default_s3_template
|
||||
fi
|
||||
|
||||
# Seed Ente CLI configuration directory
|
||||
ENTE_CLI_CONFIG_DIR="$HOME/.ente"
|
||||
ENTE_CLI_CONFIG_FILE="$ENTE_CLI_CONFIG_DIR/config.yaml"
|
||||
if [ -f "$ENTE_CLI_CONFIG_FILE" ] && grep -q "^# Ente CLI configuration" "$ENTE_CLI_CONFIG_FILE"; then
|
||||
rm -f "$ENTE_CLI_CONFIG_FILE"
|
||||
fi
|
||||
mkdir -p "$ENTE_CLI_CONFIG_DIR"
|
||||
write_cli_config_if_needed() {
|
||||
cat > "$ENTE_CLI_CONFIG_FILE" << EOF
|
||||
endpoint:
|
||||
api: ${BASE_URL%/}/api
|
||||
log:
|
||||
http: false
|
||||
EOF
|
||||
chown -R cloudron:cloudron "$HOME_DIR" || true
|
||||
}
|
||||
if [ ! -f "$ENTE_CLI_CONFIG_FILE" ]; then
|
||||
write_cli_config_if_needed
|
||||
else
|
||||
if ! grep -q "endpoint:" "$ENTE_CLI_CONFIG_FILE" || grep -q "\\n" "$ENTE_CLI_CONFIG_FILE"; then
|
||||
write_cli_config_if_needed
|
||||
elif ! grep -q "${BASE_URL%/}/api" "$ENTE_CLI_CONFIG_FILE"; then
|
||||
write_cli_config_if_needed
|
||||
fi
|
||||
fi
|
||||
|
||||
S3_ACCESS_KEY="${S3_ACCESS_KEY:-$DEFAULT_S3_ACCESS_KEY}"
|
||||
S3_SECRET_KEY="${S3_SECRET_KEY:-$DEFAULT_S3_SECRET_KEY}"
|
||||
S3_ENDPOINT="${S3_ENDPOINT:-$DEFAULT_S3_ENDPOINT}"
|
||||
S3_REGION="${S3_REGION:-$DEFAULT_S3_REGION}"
|
||||
S3_BUCKET="${S3_BUCKET:-$DEFAULT_S3_BUCKET}"
|
||||
|
||||
S3_ENDPOINT_HOST="${S3_ENDPOINT#https://}"
|
||||
S3_ENDPOINT_HOST="${S3_ENDPOINT_HOST#http://}"
|
||||
|
||||
if [ -z "$S3_ACCESS_KEY" ] || [ -z "$S3_SECRET_KEY" ] || [ -z "$S3_ENDPOINT" ] || [ -z "$S3_REGION" ] || [ -z "$S3_BUCKET" ]; then
|
||||
log "ERROR" "Incomplete S3 configuration detected. Please update $S3_CONFIG_FILE or set environment variables."
|
||||
exit 1
|
||||
fi
|
||||
|
||||
log "INFO" "Using S3 configuration"
|
||||
log "INFO" "S3 Endpoint: $S3_ENDPOINT"
|
||||
log "INFO" "S3 Region: $S3_REGION"
|
||||
log "INFO" "S3 Bucket: $S3_BUCKET"
|
||||
|
||||
ENABLE_SMTP=${ENABLE_SMTP:-false}
|
||||
SMTP_HOST=""
|
||||
SMTP_PORT=""
|
||||
SMTP_ENCRYPTION=""
|
||||
if [ "$ENABLE_SMTP" = "true" ]; then
|
||||
SMTP_HOST="${CLOUDRON_MAIL_SMTP_SERVER:-}"
|
||||
SMTP_PORT="${CLOUDRON_MAIL_SMTP_PORT:-25}"
|
||||
SMTP_ENCRYPTION="${CLOUDRON_MAIL_SMTP_ENCRYPTION:-}"
|
||||
if [ -n "${CLOUDRON_MAIL_SMTPS_PORT:-}" ]; then
|
||||
SMTP_PORT="${CLOUDRON_MAIL_SMTPS_PORT}"
|
||||
SMTP_ENCRYPTION="tls"
|
||||
fi
|
||||
if [ "${SMTP_ENCRYPTION}" = "tls" ] && [ -n "${CLOUDRON_MAIL_DOMAIN:-}" ]; then
|
||||
SMTP_HOST="mail.${CLOUDRON_MAIL_DOMAIN}"
|
||||
fi
|
||||
else
|
||||
log "INFO" "EMAIL_DISABLED: Skipping SMTP configuration (ENABLE_SMTP=false)"
|
||||
fi
|
||||
SMTP_SENDER_NAME="${CLOUDRON_MAIL_FROM_DISPLAY_NAME:-Ente}"
|
||||
|
||||
# Museum server configuration - create configurations directory structure
|
||||
MUSEUM_CONFIG_DIR="/app/data/ente/server/configurations"
|
||||
MUSEUM_CONFIG="$MUSEUM_CONFIG_DIR/local.yaml"
|
||||
mkdir -p "$MUSEUM_CONFIG_DIR"
|
||||
|
||||
if [ ! -f "$MUSEUM_CONFIG" ]; then
|
||||
log "INFO" "Creating Museum server configuration"
|
||||
log "INFO" "Rendering Museum server configuration"
|
||||
cat > "$MUSEUM_CONFIG" << EOF
|
||||
# Museum server configuration
|
||||
|
||||
# Server settings
|
||||
log-file: ""
|
||||
http:
|
||||
port: 8080
|
||||
host: 0.0.0.0
|
||||
log_level: info
|
||||
use-tls: false
|
||||
|
||||
# Key used for encrypting customer data (REQUIRED)
|
||||
key:
|
||||
encryption: yvmG/RnzKrbCb9L3mgsmoxXr9H7i2Z4qlbT0mL3ln4w=
|
||||
hash: KXYiG07wC7GIgvCSdg+WmyWdXDAn6XKYJtp/wkEU7x573+byBRAYtpTP0wwvi8i/4l37uicX1dVTUzwH3sLZyw==
|
||||
|
||||
# JWT secrets (REQUIRED)
|
||||
jwt:
|
||||
secret: i2DecQmfGreG6q1vBj5tCokhlN41gcfS2cjOs9Po-u8=
|
||||
apps:
|
||||
public-albums: "${BASE_URL}/photos"
|
||||
public-locker: "${BASE_URL}/photos"
|
||||
accounts: "${BASE_URL}/accounts"
|
||||
cast: "${BASE_URL}/cast"
|
||||
family: "${BASE_URL}/photos"
|
||||
custom-domain:
|
||||
cname: "${CLOUDRON_APP_DOMAIN:-localhost}"
|
||||
|
||||
# Database configuration
|
||||
db:
|
||||
@@ -122,44 +249,105 @@ db:
|
||||
password: ${CLOUDRON_POSTGRESQL_PASSWORD}
|
||||
sslmode: disable
|
||||
|
||||
# CORS settings
|
||||
cors:
|
||||
allow_origins:
|
||||
- "*"
|
||||
|
||||
# S3 storage configuration
|
||||
s3:
|
||||
# For Wasabi, we need path style URLs
|
||||
are_local_buckets: false
|
||||
use_path_style_urls: true
|
||||
|
||||
# Primary bucket configuration (named bucket structure required by Museum)
|
||||
hot_storage:
|
||||
primary: wasabi-eu-central-2-v3
|
||||
secondary: wasabi-eu-central-2-v3
|
||||
b2-eu-cen:
|
||||
endpoint: "${S3_ENDPOINT}"
|
||||
region: "${S3_REGION}"
|
||||
key: "${S3_ACCESS_KEY}"
|
||||
secret: "${S3_SECRET_KEY}"
|
||||
endpoint: "${S3_ENDPOINT_HOST}"
|
||||
region: "${S3_REGION}"
|
||||
bucket: "${S3_BUCKET}"
|
||||
wasabi-eu-central-2:
|
||||
key: "${S3_ACCESS_KEY}"
|
||||
secret: "${S3_SECRET_KEY}"
|
||||
endpoint: "${S3_ENDPOINT_HOST}"
|
||||
region: "${S3_REGION}"
|
||||
bucket: "${S3_BUCKET}"
|
||||
wasabi-eu-central-2-v3:
|
||||
key: "${S3_ACCESS_KEY}"
|
||||
secret: "${S3_SECRET_KEY}"
|
||||
endpoint: "${S3_ENDPOINT_HOST}"
|
||||
region: "${S3_REGION}"
|
||||
bucket: "${S3_BUCKET}"
|
||||
compliance: false
|
||||
wasabi-eu-central-2-derived:
|
||||
key: "${S3_ACCESS_KEY}"
|
||||
secret: "${S3_SECRET_KEY}"
|
||||
endpoint: "${S3_ENDPOINT_HOST}"
|
||||
region: "${S3_REGION}"
|
||||
bucket: "${S3_BUCKET}"
|
||||
scw-eu-fr:
|
||||
key: "${S3_ACCESS_KEY}"
|
||||
secret: "${S3_SECRET_KEY}"
|
||||
endpoint: "${S3_ENDPOINT_HOST}"
|
||||
region: "${S3_REGION}"
|
||||
bucket: "${S3_BUCKET}"
|
||||
scw-eu-fr-locked:
|
||||
key: "${S3_ACCESS_KEY}"
|
||||
secret: "${S3_SECRET_KEY}"
|
||||
endpoint: "${S3_ENDPOINT_HOST}"
|
||||
region: "${S3_REGION}"
|
||||
bucket: "${S3_BUCKET}"
|
||||
scw-eu-fr-v3:
|
||||
key: "${S3_ACCESS_KEY}"
|
||||
secret: "${S3_SECRET_KEY}"
|
||||
endpoint: "${S3_ENDPOINT_HOST}"
|
||||
region: "${S3_REGION}"
|
||||
bucket: "${S3_BUCKET}"
|
||||
b5:
|
||||
key: "${S3_ACCESS_KEY}"
|
||||
secret: "${S3_SECRET_KEY}"
|
||||
endpoint: "${S3_ENDPOINT_HOST}"
|
||||
region: "${S3_REGION}"
|
||||
bucket: "${S3_BUCKET}"
|
||||
b6:
|
||||
key: "${S3_ACCESS_KEY}"
|
||||
secret: "${S3_SECRET_KEY}"
|
||||
endpoint: "${S3_ENDPOINT_HOST}"
|
||||
region: "${S3_REGION}"
|
||||
bucket: "${S3_BUCKET}"
|
||||
derived-storage: wasabi-eu-central-2-v3
|
||||
|
||||
# Email settings
|
||||
email:
|
||||
enabled: true
|
||||
host: "${CLOUDRON_MAIL_SMTP_SERVER:-localhost}"
|
||||
port: ${CLOUDRON_MAIL_SMTP_PORT:-25}
|
||||
smtp:
|
||||
host: "${SMTP_HOST}"
|
||||
port: "${SMTP_PORT}"
|
||||
username: "${CLOUDRON_MAIL_SMTP_USERNAME:-}"
|
||||
password: "${CLOUDRON_MAIL_SMTP_PASSWORD:-}"
|
||||
from: "${CLOUDRON_MAIL_FROM:-no-reply@${CLOUDRON_APP_FQDN:-localhost}}"
|
||||
email: "${CLOUDRON_MAIL_FROM:-no-reply@${CLOUDRON_APP_FQDN:-localhost}}"
|
||||
sender-name: "${SMTP_SENDER_NAME}"
|
||||
encryption: "${SMTP_ENCRYPTION}"
|
||||
|
||||
internal:
|
||||
silent: true
|
||||
disable-registration: false
|
||||
|
||||
# WebAuthn configuration for passkey support
|
||||
webauthn:
|
||||
rpid: "${CLOUDRON_APP_FQDN:-localhost}"
|
||||
rpid: "${RP_ID}"
|
||||
rporigins:
|
||||
- "https://${CLOUDRON_APP_FQDN:-localhost}"
|
||||
- "https://${RP_ID}"
|
||||
|
||||
key:
|
||||
encryption: yvmG/RnzKrbCb9L3mgsmoxXr9H7i2Z4qlbT0mL3ln4w=
|
||||
hash: KXYiG07wC7GIgvCSdg+WmyWdXDAn6XKYJtp/wkEU7x573+byBRAYtpTP0wwvi8i/4l37uicX1dVTUzwH3sLZyw==
|
||||
|
||||
jwt:
|
||||
secret: i2DecQmfGreG6q1vBj5tCokhlN41gcfS2cjOs9Po-u8=
|
||||
|
||||
jobs:
|
||||
cron:
|
||||
skip: true
|
||||
EOF
|
||||
chmod 600 "$MUSEUM_CONFIG"
|
||||
log "INFO" "Created Museum configuration at ${MUSEUM_CONFIG}"
|
||||
log "INFO" "Wrote Museum configuration to ${MUSEUM_CONFIG}"
|
||||
else
|
||||
log "INFO" "Museum configuration already exists"
|
||||
log "INFO" "Museum configuration already present at ${MUSEUM_CONFIG}; preserving existing file"
|
||||
fi
|
||||
|
||||
# ===============================================
|
||||
@@ -186,7 +374,7 @@ fi
|
||||
# ===============================================
|
||||
MUSEUM_BIN="/app/data/ente/server/museum"
|
||||
MUSEUM_LOG="/app/data/logs/museum.log"
|
||||
USE_PLACEHOLDER=false
|
||||
USE_PLACEHOLDER=${FORCE_PLACEHOLDER:-false}
|
||||
|
||||
log "INFO" "Setting up Museum server binary"
|
||||
|
||||
@@ -224,7 +412,7 @@ else
|
||||
log "INFO" "Web templates already exist or source not available"
|
||||
fi
|
||||
|
||||
# Copy mail templates to Museum working directory (required for email functionality)
|
||||
# Copy mail templates for transactional emails
|
||||
MUSEUM_MAIL_TEMPLATES_DIR="/app/data/ente/server/mail-templates"
|
||||
REPO_MAIL_TEMPLATES_DIR="/app/data/ente/repository/server/mail-templates"
|
||||
if [ ! -d "$MUSEUM_MAIL_TEMPLATES_DIR" ] && [ -d "$REPO_MAIL_TEMPLATES_DIR" ]; then
|
||||
@@ -264,9 +452,56 @@ fi
|
||||
# ===============================================
|
||||
# Web Application Setup
|
||||
# ===============================================
|
||||
log "INFO" "Web applications are pre-built and available in /app/web/"
|
||||
log "INFO" "Setting up web applications with writable directory"
|
||||
|
||||
# Web apps are pre-built with relative API paths (/api) that work with any domain
|
||||
# Copy web apps to writable data directory first
|
||||
WRITABLE_WEB_DIR="/app/data/web"
|
||||
if [ ! -d "$WRITABLE_WEB_DIR" ]; then
|
||||
log "INFO" "Copying web applications to writable directory"
|
||||
mkdir -p "$WRITABLE_WEB_DIR"
|
||||
cp -r /app/web/* "$WRITABLE_WEB_DIR/"
|
||||
chown -R cloudron:cloudron "$WRITABLE_WEB_DIR"
|
||||
log "INFO" "Web applications copied to $WRITABLE_WEB_DIR"
|
||||
else
|
||||
log "INFO" "Web applications already exist in writable directory"
|
||||
fi
|
||||
|
||||
# Fix API endpoint configuration in built JavaScript files
|
||||
log "INFO" "Updating API endpoint configuration in web apps"
|
||||
ACTUAL_ENDPOINT="${BASE_URL}/api"
|
||||
log "INFO" "Setting API endpoint to: $ACTUAL_ENDPOINT"
|
||||
|
||||
declare -a PLACEHOLDER_ENDPOINTS=(
|
||||
"https://example.com/api"
|
||||
"https://placeholder.invalid/api"
|
||||
"https://api.ente.io"
|
||||
"https://api.ente.io/api"
|
||||
)
|
||||
|
||||
declare -A HOST_REWRITES=(
|
||||
["https://accounts.ente.io"]="${BASE_URL}/accounts"
|
||||
["https://auth.ente.io"]="${BASE_URL}/auth"
|
||||
["https://cast.ente.io"]="${BASE_URL}/cast"
|
||||
["https://photos.ente.io"]="${BASE_URL}/photos"
|
||||
["https://web.ente.io"]="${BASE_URL}/photos"
|
||||
)
|
||||
|
||||
for webapp in photos accounts auth cast; do
|
||||
WEB_DIR="$WRITABLE_WEB_DIR/${webapp}"
|
||||
if [ -d "$WEB_DIR" ]; then
|
||||
log "INFO" "Processing ${webapp} app for endpoint rewrites"
|
||||
for placeholder in "${PLACEHOLDER_ENDPOINTS[@]}"; do
|
||||
find "$WEB_DIR" -name "*.js" -type f -exec sed -i "s|${placeholder}|${ACTUAL_ENDPOINT}|g" {} \;
|
||||
done
|
||||
for source in "${!HOST_REWRITES[@]}"; do
|
||||
target="${HOST_REWRITES[$source]}"
|
||||
find "$WEB_DIR" -name "*.js" -type f -exec sed -i "s|${source}|${target}|g" {} \;
|
||||
done
|
||||
log "INFO" "Endpoint rewrites complete for ${webapp}"
|
||||
else
|
||||
log "WARN" "Web directory not found for ${webapp}"
|
||||
fi
|
||||
done
|
||||
|
||||
# ===============================================
|
||||
# Node.js Placeholder Server
|
||||
@@ -368,17 +603,52 @@ const apiHandlers = {
|
||||
log('Health check request - responded with status OK');
|
||||
},
|
||||
|
||||
// User verification endpoint
|
||||
'/api/users/verify': (req, res) => {
|
||||
// User verification endpoint (returns minimal structure expected by UI)
|
||||
'/api/users/verify-email': (req, res) => {
|
||||
const buildResponse = (emailAddress) => {
|
||||
const email = emailAddress || 'unknown@example.com';
|
||||
const stableId = Math.abs(Buffer.from(email).reduce((acc, byte) => (acc * 31 + byte) % 100000, 17)) || 1;
|
||||
return {
|
||||
id: stableId,
|
||||
token: `placeholder-token-${stableId}`,
|
||||
encryptedToken: `placeholder-encrypted-token-${stableId}`,
|
||||
accountsUrl: `${process.env.CLOUDRON_APP_ORIGIN || 'https://example.com'}/accounts`,
|
||||
twoFactorSessionID: undefined,
|
||||
twoFactorSessionIDV2: undefined,
|
||||
passkeySessionID: undefined,
|
||||
keyAttributes: undefined
|
||||
};
|
||||
};
|
||||
|
||||
if (req.method !== 'POST') {
|
||||
res.writeHead(405, { 'Content-Type': 'application/json' });
|
||||
res.end(JSON.stringify({ success: false, message: 'Method not allowed' }));
|
||||
return;
|
||||
}
|
||||
|
||||
let rawBody = '';
|
||||
req.on('data', chunk => { rawBody += chunk.toString(); });
|
||||
req.on('end', () => {
|
||||
let email = 'unknown@example.com';
|
||||
let ott = 'unknown';
|
||||
try {
|
||||
const payload = JSON.parse(rawBody || '{}');
|
||||
if (payload.email) {
|
||||
email = payload.email;
|
||||
}
|
||||
if (payload.ott) {
|
||||
ott = payload.ott;
|
||||
}
|
||||
} catch (err) {
|
||||
log(`Failed to parse verify-email request body: ${err.message}`);
|
||||
}
|
||||
|
||||
const responsePayload = buildResponse(email);
|
||||
log(`Verifying OTT ${ott} for ${email}`);
|
||||
|
||||
res.writeHead(200, { 'Content-Type': 'application/json' });
|
||||
log('User verify request - responding with success');
|
||||
res.end(JSON.stringify({
|
||||
success: true,
|
||||
isValidEmail: true,
|
||||
isAvailable: true,
|
||||
isVerified: true,
|
||||
canCreateAccount: true
|
||||
}));
|
||||
res.end(JSON.stringify(responsePayload));
|
||||
});
|
||||
},
|
||||
|
||||
// User login endpoint
|
||||
@@ -439,6 +709,52 @@ const apiHandlers = {
|
||||
}
|
||||
},
|
||||
|
||||
// OTT endpoint
|
||||
'/users/ott': (req, res) => {
|
||||
if (req.method !== 'POST') {
|
||||
res.writeHead(405, { 'Content-Type': 'application/json' });
|
||||
res.end(JSON.stringify({ success: false, message: 'Method not allowed' }));
|
||||
return;
|
||||
}
|
||||
|
||||
let body = '';
|
||||
req.on('data', chunk => { body += chunk.toString(); });
|
||||
req.on('end', () => {
|
||||
let email = 'unknown@example.com';
|
||||
try {
|
||||
const payload = JSON.parse(body || '{}');
|
||||
if (payload.email) {
|
||||
email = payload.email;
|
||||
}
|
||||
} catch (err) {
|
||||
log(`Failed to parse OTT request body: ${err.message}`);
|
||||
}
|
||||
|
||||
const ott = ('' + Math.floor(100000 + Math.random() * 900000)).slice(-6);
|
||||
log(`Generated OTT ${ott} for ${email}`);
|
||||
|
||||
res.writeHead(200, { 'Content-Type': 'application/json' });
|
||||
res.end(JSON.stringify({ success: true, ott, email }));
|
||||
});
|
||||
},
|
||||
'/api/users/ott': (req, res) => {
|
||||
apiHandlers['/users/ott'](req, res);
|
||||
},
|
||||
'/users/verify-email': (req, res) => {
|
||||
apiHandlers['/api/users/verify-email'](req, res);
|
||||
},
|
||||
'/api/users/verify': (req, res) => {
|
||||
apiHandlers['/api/users/verify-email'](req, res);
|
||||
},
|
||||
'/users/verify': (req, res) => {
|
||||
apiHandlers['/api/users/verify-email'](req, res);
|
||||
},
|
||||
'/ping': (req, res) => {
|
||||
res.writeHead(200, { 'Content-Type': 'application/json' });
|
||||
log('Ping request - responding with status OK');
|
||||
res.end(JSON.stringify({ status: 'OK', server: 'Ente Placeholder', time: new Date().toISOString() }));
|
||||
},
|
||||
|
||||
// Files endpoint
|
||||
'/api/files': (req, res) => {
|
||||
res.writeHead(200, { 'Content-Type': 'application/json' });
|
||||
@@ -555,7 +871,7 @@ EOF
|
||||
SUCCESS=false
|
||||
|
||||
while [ $ATTEMPT -lt $MAX_ATTEMPTS ]; do
|
||||
if curl -s http://localhost:8080/health > /dev/null 2>&1; then
|
||||
if curl -s http://localhost:8080/ping > /dev/null 2>&1; then
|
||||
log "INFO" "Node.js placeholder server started successfully"
|
||||
SUCCESS=true
|
||||
break
|
||||
@@ -588,9 +904,10 @@ if [ "$USE_PLACEHOLDER" = true ]; then
|
||||
else
|
||||
log "INFO" "Starting actual Museum server"
|
||||
cd /app/data/ente/server
|
||||
"$MUSEUM_BIN" > "$MUSEUM_LOG" 2>&1 &
|
||||
export ENVIRONMENT="${MUSEUM_ENVIRONMENT:-local}"
|
||||
stdbuf -oL "$MUSEUM_BIN" 2>&1 | tee -a "$MUSEUM_LOG" &
|
||||
MUSEUM_PID=$!
|
||||
log "INFO" "Started Museum server with PID: $MUSEUM_PID"
|
||||
log "INFO" "Started Museum server (pipeline PID: $MUSEUM_PID)"
|
||||
|
||||
# Wait for the server to start
|
||||
MAX_ATTEMPTS=30
|
||||
@@ -598,7 +915,7 @@ else
|
||||
SUCCESS=false
|
||||
|
||||
while [ $ATTEMPT -lt $MAX_ATTEMPTS ]; do
|
||||
if curl -s http://localhost:8080/health > /dev/null 2>&1; then
|
||||
if curl -s http://localhost:8080/ping > /dev/null 2>&1; then
|
||||
log "INFO" "Museum server started successfully"
|
||||
SUCCESS=true
|
||||
break
|
||||
@@ -610,13 +927,15 @@ else
|
||||
|
||||
if [ "$SUCCESS" = false ]; then
|
||||
log "ERROR" "Museum server failed to start within $MAX_ATTEMPTS seconds"
|
||||
if ps -p "$MUSEUM_PID" > /dev/null 2>&1; then
|
||||
log "INFO" "Stopping Museum server pipeline"
|
||||
kill "$MUSEUM_PID" || true
|
||||
fi
|
||||
log "ERROR" "Last 20 lines of museum.log:"
|
||||
tail -n 20 "$MUSEUM_LOG" | while read -r line; do
|
||||
log "ERROR" " $line"
|
||||
done
|
||||
|
||||
log "WARN" "Falling back to Node.js placeholder server"
|
||||
create_nodejs_placeholder
|
||||
exit 1
|
||||
fi
|
||||
fi
|
||||
|
||||
@@ -638,11 +957,10 @@ cat > "$CADDY_CONFIG" << EOF
|
||||
# Enable compression
|
||||
encode gzip
|
||||
|
||||
# Root redirect - must be first
|
||||
redir / /photos/ 301
|
||||
|
||||
# CORS preflight handling
|
||||
@options method OPTIONS
|
||||
@options {
|
||||
method OPTIONS
|
||||
}
|
||||
handle @options {
|
||||
header {
|
||||
Access-Control-Allow-Origin "*"
|
||||
@@ -653,9 +971,14 @@ cat > "$CADDY_CONFIG" << EOF
|
||||
respond 204
|
||||
}
|
||||
|
||||
# API endpoints - STRIP /api prefix and proxy to Museum server
|
||||
# API endpoints with CORS
|
||||
handle_path /api/* {
|
||||
reverse_proxy localhost:8080
|
||||
reverse_proxy localhost:8080 {
|
||||
header_up Host {http.request.host}
|
||||
header_up X-Real-IP {http.request.remote}
|
||||
header_up X-Forwarded-For {http.request.remote}
|
||||
header_up X-Forwarded-Proto {http.request.scheme}
|
||||
}
|
||||
header {
|
||||
Access-Control-Allow-Origin "*"
|
||||
Access-Control-Allow-Methods "GET, POST, PUT, DELETE, OPTIONS"
|
||||
@@ -664,102 +987,41 @@ cat > "$CADDY_CONFIG" << EOF
|
||||
}
|
||||
}
|
||||
|
||||
# API endpoints for auth app
|
||||
handle_path /auth/api/* {
|
||||
# Public albums endpoint
|
||||
handle /public/* {
|
||||
reverse_proxy localhost:8080
|
||||
header {
|
||||
Access-Control-Allow-Origin "*"
|
||||
Access-Control-Allow-Methods "GET, POST, PUT, DELETE, OPTIONS"
|
||||
Access-Control-Allow-Headers "*"
|
||||
Access-Control-Allow-Credentials "true"
|
||||
}
|
||||
}
|
||||
|
||||
# API endpoints for cast app
|
||||
handle_path /cast/api/* {
|
||||
reverse_proxy localhost:8080
|
||||
header {
|
||||
Access-Control-Allow-Origin "*"
|
||||
Access-Control-Allow-Methods "GET, POST, PUT, DELETE, OPTIONS"
|
||||
Access-Control-Allow-Headers "*"
|
||||
Access-Control-Allow-Credentials "true"
|
||||
}
|
||||
}
|
||||
|
||||
# API endpoints for accounts app
|
||||
handle_path /accounts/api/* {
|
||||
reverse_proxy localhost:8080
|
||||
header {
|
||||
Access-Control-Allow-Origin "*"
|
||||
Access-Control-Allow-Methods "GET, POST, PUT, DELETE, OPTIONS"
|
||||
Access-Control-Allow-Headers "*"
|
||||
Access-Control-Allow-Credentials "true"
|
||||
}
|
||||
}
|
||||
|
||||
# Health check endpoint (direct, no /api prefix)
|
||||
handle /ping {
|
||||
# Health check endpoint
|
||||
handle /health {
|
||||
reverse_proxy localhost:8080
|
||||
}
|
||||
|
||||
# Static files for Next.js assets from all apps
|
||||
handle /images/* {
|
||||
rewrite * /photos{path}
|
||||
root * /app/data/web
|
||||
file_server
|
||||
}
|
||||
|
||||
# Static files for Next.js assets shared across apps
|
||||
handle /_next/* {
|
||||
root * /app/web/photos
|
||||
root * /app/data/web
|
||||
try_files photos{path} accounts{path} auth{path} cast{path} {path}
|
||||
file_server
|
||||
header {
|
||||
Cache-Control "public, max-age=31536000"
|
||||
Access-Control-Allow-Origin "*"
|
||||
}
|
||||
}
|
||||
|
||||
# Static images and assets (served from photos app by default)
|
||||
handle /images/* {
|
||||
root * /app/web/photos
|
||||
# Default to serve SPA assets
|
||||
handle {
|
||||
root * /app/data/web
|
||||
try_files {path}/index.html {path} /photos/index.html
|
||||
file_server
|
||||
header {
|
||||
Cache-Control "public, max-age=86400"
|
||||
}
|
||||
}
|
||||
|
||||
handle /favicon.ico {
|
||||
root * /app/web/photos
|
||||
file_server
|
||||
header {
|
||||
Cache-Control "public, max-age=86400"
|
||||
}
|
||||
}
|
||||
|
||||
# Photos app
|
||||
handle_path /photos/* {
|
||||
root * /app/web/photos
|
||||
try_files {path} /index.html
|
||||
file_server
|
||||
}
|
||||
|
||||
# Accounts app
|
||||
handle_path /accounts/* {
|
||||
root * /app/web/accounts
|
||||
try_files {path} /index.html
|
||||
file_server
|
||||
}
|
||||
|
||||
# Auth app
|
||||
handle_path /auth/* {
|
||||
root * /app/web/auth
|
||||
try_files {path} /index.html
|
||||
file_server
|
||||
}
|
||||
|
||||
# Cast app
|
||||
handle_path /cast/* {
|
||||
root * /app/web/cast
|
||||
try_files {path} /index.html
|
||||
file_server
|
||||
}
|
||||
|
||||
# Root redirect - specifically match root path only
|
||||
@root path /
|
||||
handle @root {
|
||||
redir /photos/ permanent
|
||||
}
|
||||
}
|
||||
EOF
|
||||
@@ -802,38 +1064,23 @@ cat > /app/data/SETUP-INSTRUCTIONS.md << EOF
|
||||
|
||||
## Configuration
|
||||
|
||||
1. **S3 Storage**: Edit the configuration file at \`/app/data/s3.env\` with your S3-compatible storage credentials.
|
||||
1. **S3 Storage**: Edit the configuration file at \`/app/data/config/s3.env\` (uncomment lines and add your values) with your S3-compatible storage credentials.
|
||||
|
||||
2. **Museum Server**: The server configuration is at \`/app/data/ente/server/museum.yaml\` if you need to customize settings.
|
||||
|
||||
## API Endpoint
|
||||
|
||||
The Ente API is available at: **https://${CLOUDRON_APP_FQDN}/api**
|
||||
|
||||
This endpoint can be used to:
|
||||
- Configure Ente CLI tools
|
||||
- Integrate with third-party applications
|
||||
- Access the Museum server API directly
|
||||
|
||||
For admin operations, use the Ente CLI with:
|
||||
\`\`\`bash
|
||||
ente admin --api-url https://${CLOUDRON_APP_FQDN}/api
|
||||
\`\`\`
|
||||
|
||||
## Web Applications
|
||||
|
||||
The following web applications are available:
|
||||
|
||||
- **Photos**: https://${CLOUDRON_APP_FQDN}/photos/ - Main photo storage and management
|
||||
- **Auth**: https://${CLOUDRON_APP_FQDN}/auth/ - 2FA authenticator app
|
||||
- **Accounts**: https://${CLOUDRON_APP_FQDN}/accounts/ - Account management
|
||||
- **Cast**: https://${CLOUDRON_APP_FQDN}/cast/ - Photo casting to devices
|
||||
|
||||
## Troubleshooting
|
||||
|
||||
- **Logs**: Check the logs at \`/app/data/logs/\` for any issues.
|
||||
- **Restart**: If you change configuration, restart the app to apply changes.
|
||||
- **API Issues**: All apps use the API endpoint at \`/api\`. If apps show loading spinners, check API connectivity.
|
||||
|
||||
## Web Applications
|
||||
|
||||
The following web applications are available:
|
||||
|
||||
- Photos: https://${CLOUDRON_APP_FQDN}/photos/
|
||||
- Accounts: https://${CLOUDRON_APP_FQDN}/accounts/
|
||||
- Auth: https://${CLOUDRON_APP_FQDN}/auth/
|
||||
- Cast: https://${CLOUDRON_APP_FQDN}/cast/
|
||||
|
||||
## Support
|
||||
|
||||
@@ -857,48 +1104,6 @@ else
|
||||
log "ERROR" "Caddy server is not running!"
|
||||
fi
|
||||
|
||||
# ===============================================
|
||||
# OTP Email Monitor Setup
|
||||
# ===============================================
|
||||
log "INFO" "Setting up OTP Email Monitor"
|
||||
|
||||
# Install Node.js dependencies if not already installed
|
||||
if [ ! -d "/app/data/node_modules" ]; then
|
||||
log "INFO" "Installing Node.js dependencies for OTP Email Monitor"
|
||||
cd /app/data
|
||||
cp /app/pkg/package.json .
|
||||
npm install --production --no-save
|
||||
log "INFO" "Node.js dependencies installed successfully"
|
||||
else
|
||||
log "INFO" "Node.js dependencies already installed"
|
||||
fi
|
||||
|
||||
# Start OTP Email Monitor
|
||||
log "INFO" "Starting OTP Email Monitor"
|
||||
cd /app/data
|
||||
NODE_PATH="/app/data/node_modules" node /app/pkg/otp-email-monitor.js > /app/data/logs/otp-email.log 2>&1 &
|
||||
OTP_MONITOR_PID=$!
|
||||
log "INFO" "OTP Email Monitor started with PID: $OTP_MONITOR_PID"
|
||||
|
||||
# Wait a moment to check if OTP monitor starts successfully
|
||||
sleep 2
|
||||
if ps -p $OTP_MONITOR_PID > /dev/null; then
|
||||
log "INFO" "OTP Email Monitor is running successfully"
|
||||
else
|
||||
log "WARN" "OTP Email Monitor may have failed to start"
|
||||
log "WARN" "Last 10 lines of OTP email log:"
|
||||
tail -n 10 /app/data/logs/otp-email.log | while read -r line; do
|
||||
log "WARN" " $line"
|
||||
done
|
||||
fi
|
||||
|
||||
# Copy admin helper script for easy access
|
||||
if [ -f "/app/pkg/admin-helper.sh" ]; then
|
||||
cp /app/pkg/admin-helper.sh /app/data/
|
||||
chmod +x /app/data/admin-helper.sh
|
||||
log "INFO" "Admin helper script available at /app/data/admin-helper.sh"
|
||||
fi
|
||||
|
||||
log "INFO" "Ente Cloudron app startup complete"
|
||||
|
||||
# Keep the script running to prevent container exit
|
||||
|
Reference in New Issue
Block a user