feat: enhance time synchronization and Jitsi configuration handling

- Implemented a comprehensive time synchronization mechanism that applies GMT offsets based on user configuration, ensuring accurate timestamps across the application.
- Updated the Jitsi configuration to include SSH settings, allowing for better integration with Docker setups.
- Refactored the backend queries and mutations to handle the new SSH configuration fields, ensuring secure and flexible server management.
- Enhanced error handling and logging for time synchronization processes, providing clearer feedback for users and developers.
This commit is contained in:
2025-11-22 18:18:16 -03:00
parent 54089f5eca
commit c056506ce5
17 changed files with 1765 additions and 257 deletions

View File

@@ -2,6 +2,7 @@ import { v } from "convex/values";
import { mutation, query, action, internalMutation } from "./_generated/server";
import { registrarAtividade } from "./logsAtividades";
import { api, internal } from "./_generated/api";
import { encryptSMTPPassword } from "./auth/utils";
/**
* Obter configuração de Jitsi ativa
@@ -32,6 +33,45 @@ export const obterConfigJitsi = query({
},
});
/**
* Obter configuração completa de Jitsi (incluindo SSH, mas sem senha)
*/
export const obterConfigJitsiCompleta = query({
args: {
configId: v.id("configuracaoJitsi"),
},
handler: async (ctx, args) => {
const config = await ctx.db.get(args.configId);
if (!config) {
return null;
}
return {
_id: config._id,
domain: config.domain,
appId: config.appId,
roomPrefix: config.roomPrefix,
useHttps: config.useHttps,
acceptSelfSignedCert: config.acceptSelfSignedCert ?? false,
ativo: config.ativo,
testadoEm: config.testadoEm,
atualizadoEm: config.atualizadoEm,
configuradoEm: config.configuradoEm,
// Configurações SSH (sem senha)
sshHost: config.sshHost,
sshPort: config.sshPort,
sshUsername: config.sshUsername,
sshPasswordHash: config.sshPasswordHash ? "********" : undefined, // Mascarar
sshKeyPath: config.sshKeyPath,
dockerComposePath: config.dockerComposePath,
jitsiConfigPath: config.jitsiConfigPath,
configuradoNoServidor: config.configuradoNoServidor ?? false,
configuradoNoServidorEm: config.configuradoNoServidorEm,
};
},
});
/**
* Salvar configuração de Jitsi (apenas TI_MASTER)
*/
@@ -43,6 +83,14 @@ export const salvarConfigJitsi = mutation({
useHttps: v.boolean(),
acceptSelfSignedCert: v.boolean(),
configuradoPorId: v.id("usuarios"),
// Opcionais: configurações SSH/Docker
sshHost: v.optional(v.string()),
sshPort: v.optional(v.number()),
sshUsername: v.optional(v.string()),
sshPassword: v.optional(v.string()), // Senha nova (será criptografada)
sshKeyPath: v.optional(v.string()),
dockerComposePath: v.optional(v.string()),
jitsiConfigPath: v.optional(v.string()),
},
returns: v.union(
v.object({ sucesso: v.literal(true), configId: v.id("configuracaoJitsi") }),
@@ -73,6 +121,12 @@ export const salvarConfigJitsi = mutation({
};
}
// Buscar config ativa anterior para manter senha SSH se não fornecida
const configAtiva = await ctx.db
.query("configuracaoJitsi")
.withIndex("by_ativo", (q) => q.eq("ativo", true))
.first();
// Desativar config anterior
const configsAntigas = await ctx.db
.query("configuracaoJitsi")
@@ -83,6 +137,16 @@ export const salvarConfigJitsi = mutation({
await ctx.db.patch(config._id, { ativo: false });
}
// Determinar senha SSH: usar nova senha se fornecida, senão manter a atual
let sshPasswordHash: string | undefined = undefined;
if (args.sshPassword && args.sshPassword.trim().length > 0) {
// Nova senha fornecida, criptografar
sshPasswordHash = await encryptSMTPPassword(args.sshPassword);
} else if (configAtiva && configAtiva.sshPasswordHash) {
// Senha não fornecida, manter a atual (já criptografada)
sshPasswordHash = configAtiva.sshPasswordHash;
}
// Criar nova config
const configId = await ctx.db.insert("configuracaoJitsi", {
domain: args.domain.trim(),
@@ -93,6 +157,14 @@ export const salvarConfigJitsi = mutation({
ativo: true,
configuradoPor: args.configuradoPorId,
atualizadoEm: Date.now(),
// Configurações SSH/Docker
sshHost: args.sshHost?.trim() || undefined,
sshPort: args.sshPort || undefined,
sshUsername: args.sshUsername?.trim() || undefined,
sshPasswordHash: sshPasswordHash,
sshKeyPath: args.sshKeyPath?.trim() || undefined,
dockerComposePath: args.dockerComposePath?.trim() || undefined,
jitsiConfigPath: args.jitsiConfigPath?.trim() || undefined,
});
// Log de atividade
@@ -280,3 +352,21 @@ export const marcarConfigTestada = mutation({
},
});
/**
* Mutation interna para marcar que a configuração foi aplicada no servidor
*/
export const marcarConfiguradoNoServidor = internalMutation({
args: {
configId: v.id("configuracaoJitsi"),
},
returns: v.null(),
handler: async (ctx, args) => {
await ctx.db.patch(args.configId, {
configuradoNoServidor: true,
configuradoNoServidorEm: Date.now(),
configuradoEm: Date.now(),
});
return null;
},
});