/** * Typed accessors for port-level configuration with env-fallback. * * Settings are stored in the `system_settings` table keyed by (key, portId). * The functions in this module resolve a port's effective configuration for * a given domain (email, Documenso, branding, reminders) by reading the * port-scoped row first, falling back to the global row, and finally to the * env var when neither is set. */ import { env } from '@/lib/env'; import { getSetting } from '@/lib/services/settings.service'; // ─── Setting key constants ─────────────────────────────────────────────────── export const SETTING_KEYS = { // Email emailFromName: 'email_from_name', emailFromAddress: 'email_from_address', emailReplyTo: 'email_reply_to', emailSignatureHtml: 'email_signature_html', emailFooterHtml: 'email_footer_html', emailAllowPersonalAccountSends: 'email_allow_personal_account_sends', smtpHostOverride: 'smtp_host_override', smtpPortOverride: 'smtp_port_override', smtpUserOverride: 'smtp_user_override', smtpPassOverride: 'smtp_pass_override', // Documenso / EOI documensoApiUrlOverride: 'documenso_api_url_override', documensoApiKeyOverride: 'documenso_api_key_override', documensoApiVersionOverride: 'documenso_api_version_override', documensoEoiTemplateId: 'documenso_eoi_template_id', // Documenso template recipient slot IDs are per-Documenso-instance // numeric values, so they have to follow the per-port template config. // Falling back to env keeps single-tenant deploys working. documensoClientRecipientId: 'documenso_client_recipient_id', documensoDeveloperRecipientId: 'documenso_developer_recipient_id', documensoApprovalRecipientId: 'documenso_approval_recipient_id', // Per-port Documenso webhook secret — two ports pointed at different // Documenso instances cannot share the global env secret. The receiver // resolves the matching port by trying each enabled secret with a // timing-safe comparison. documensoWebhookSecret: 'documenso_webhook_secret', eoiDefaultPathway: 'eoi_default_pathway', // Branding brandingLogoUrl: 'branding_logo_url', brandingPrimaryColor: 'branding_primary_color', brandingAppName: 'branding_app_name', brandingEmailHeaderHtml: 'branding_email_header_html', brandingEmailFooterHtml: 'branding_email_footer_html', // Reminders (port-level defaults) reminderDefaultDays: 'reminder_default_days', reminderDefaultEnabled: 'reminder_default_enabled', reminderDigestEnabled: 'reminder_digest_enabled', reminderDigestTime: 'reminder_digest_time', reminderDigestTimezone: 'reminder_digest_timezone', } as const; // ─── Helper ────────────────────────────────────────────────────────────────── async function readSetting(key: string, portId: string): Promise { const setting = await getSetting(key, portId); if (!setting) return null; return setting.value as T; } // ─── Email ────────────────────────────────────────────────────────────────── export interface PortEmailConfig { fromName: string; fromAddress: string; replyTo: string | null; signatureHtml: string | null; footerHtml: string | null; smtpHost: string; smtpPort: number; smtpUser: string | null; smtpPass: string | null; /** * When false, only the system (port-config) sender identity is allowed. * When true, admins/users may send via their connected personal email * account. Defaults to false for safety. */ allowPersonalAccountSends: boolean; } export async function getPortEmailConfig(portId: string): Promise { const [ fromName, fromAddress, replyTo, signatureHtml, footerHtml, smtpHost, smtpPort, smtpUser, smtpPass, allowPersonalAccountSends, ] = await Promise.all([ readSetting(SETTING_KEYS.emailFromName, portId), readSetting(SETTING_KEYS.emailFromAddress, portId), readSetting(SETTING_KEYS.emailReplyTo, portId), readSetting(SETTING_KEYS.emailSignatureHtml, portId), readSetting(SETTING_KEYS.emailFooterHtml, portId), readSetting(SETTING_KEYS.smtpHostOverride, portId), readSetting(SETTING_KEYS.smtpPortOverride, portId), readSetting(SETTING_KEYS.smtpUserOverride, portId), readSetting(SETTING_KEYS.smtpPassOverride, portId), readSetting(SETTING_KEYS.emailAllowPersonalAccountSends, portId), ]); // Parse env.SMTP_FROM into name + address if no port override let envFromName = 'Port Nimara CRM'; let envFromAddress = `noreply@${env.SMTP_HOST}`; if (env.SMTP_FROM) { const match = env.SMTP_FROM.match(/^(.+?)\s*<(.+)>$/); if (match) { envFromName = match[1]!.trim(); envFromAddress = match[2]!.trim(); } else { envFromAddress = env.SMTP_FROM; } } return { fromName: fromName ?? envFromName, fromAddress: fromAddress ?? envFromAddress, replyTo: replyTo ?? null, signatureHtml: signatureHtml ?? null, footerHtml: footerHtml ?? null, smtpHost: smtpHost ?? env.SMTP_HOST, smtpPort: smtpPort ?? env.SMTP_PORT, smtpUser: smtpUser ?? env.SMTP_USER ?? null, smtpPass: smtpPass ?? env.SMTP_PASS ?? null, allowPersonalAccountSends: allowPersonalAccountSends ?? false, }; } // ─── Documenso ────────────────────────────────────────────────────────────── export type EoiPathway = 'documenso-template' | 'inapp'; export type DocumensoApiVersion = 'v1' | 'v2'; export interface PortDocumensoConfig { apiUrl: string; apiKey: string; apiVersion: DocumensoApiVersion; eoiTemplateId: number; defaultPathway: EoiPathway; /** Documenso template recipient slot IDs (per-instance numeric). */ clientRecipientId: number; developerRecipientId: number; approvalRecipientId: number; } function toIntOrNull(raw: unknown): number | null { if (typeof raw === 'number' && Number.isFinite(raw)) return raw; if (typeof raw === 'string' && raw.trim()) { const n = Number(raw); return Number.isFinite(n) ? n : null; } return null; } export async function getPortDocumensoConfig(portId: string): Promise { const [ apiUrl, apiKey, apiVersion, eoiTemplateId, clientRecipientId, developerRecipientId, approvalRecipientId, defaultPathway, ] = await Promise.all([ readSetting(SETTING_KEYS.documensoApiUrlOverride, portId), readSetting(SETTING_KEYS.documensoApiKeyOverride, portId), readSetting(SETTING_KEYS.documensoApiVersionOverride, portId), readSetting(SETTING_KEYS.documensoEoiTemplateId, portId), readSetting(SETTING_KEYS.documensoClientRecipientId, portId), readSetting(SETTING_KEYS.documensoDeveloperRecipientId, portId), readSetting(SETTING_KEYS.documensoApprovalRecipientId, portId), readSetting(SETTING_KEYS.eoiDefaultPathway, portId), ]); return { apiUrl: apiUrl ?? env.DOCUMENSO_API_URL, apiKey: apiKey ?? env.DOCUMENSO_API_KEY, apiVersion: apiVersion ?? env.DOCUMENSO_API_VERSION, eoiTemplateId: toIntOrNull(eoiTemplateId) ?? env.DOCUMENSO_TEMPLATE_ID_EOI, clientRecipientId: toIntOrNull(clientRecipientId) ?? env.DOCUMENSO_CLIENT_RECIPIENT_ID, developerRecipientId: toIntOrNull(developerRecipientId) ?? env.DOCUMENSO_DEVELOPER_RECIPIENT_ID, approvalRecipientId: toIntOrNull(approvalRecipientId) ?? env.DOCUMENSO_APPROVAL_RECIPIENT_ID, defaultPathway: defaultPathway ?? 'documenso-template', }; } /** * List every (portId, webhookSecret) pair configured across the platform, * plus a wildcard-port entry for the global env secret. The Documenso * webhook receiver iterates the list with `timingSafeEqual` until it * finds a match, then dispatches with the resolved portId. * * `null` portId in the returned array means "matches but no port was * resolved" — the caller falls back to the legacy global path. */ export interface DocumensoSecretEntry { portId: string | null; secret: string; } export async function listDocumensoWebhookSecrets(): Promise { const { db } = await import('@/lib/db'); const { systemSettings } = await import('@/lib/db/schema/system'); const { eq, isNotNull } = await import('drizzle-orm'); const rows = await db .select({ portId: systemSettings.portId, value: systemSettings.value }) .from(systemSettings) .where(eq(systemSettings.key, SETTING_KEYS.documensoWebhookSecret)); void isNotNull; // imported for future filters const out: DocumensoSecretEntry[] = []; for (const row of rows) { if (typeof row.value !== 'string' || !row.value || !row.portId) continue; out.push({ portId: row.portId, secret: row.value }); } // Append the global env secret as a fallback ONLY when it's a real, // non-empty value. An empty env secret would otherwise match an empty // X-Documenso-Secret header (verifyDocumensoSecret guards this too, // but skipping the entry here keeps the matched-secret loop honest). if (env.DOCUMENSO_WEBHOOK_SECRET) { out.push({ portId: null, secret: env.DOCUMENSO_WEBHOOK_SECRET }); } return out; } // ─── Branding ─────────────────────────────────────────────────────────────── export interface PortBrandingConfig { logoUrl: string | null; primaryColor: string; appName: string; emailHeaderHtml: string | null; emailFooterHtml: string | null; } const DEFAULT_BRANDING: PortBrandingConfig = { logoUrl: null, primaryColor: '#1e293b', appName: 'Port Nimara CRM', emailHeaderHtml: null, emailFooterHtml: null, }; export async function getPortBrandingConfig(portId: string): Promise { const [logoUrl, primaryColor, appName, emailHeaderHtml, emailFooterHtml] = await Promise.all([ readSetting(SETTING_KEYS.brandingLogoUrl, portId), readSetting(SETTING_KEYS.brandingPrimaryColor, portId), readSetting(SETTING_KEYS.brandingAppName, portId), readSetting(SETTING_KEYS.brandingEmailHeaderHtml, portId), readSetting(SETTING_KEYS.brandingEmailFooterHtml, portId), ]); return { logoUrl: logoUrl ?? DEFAULT_BRANDING.logoUrl, primaryColor: primaryColor ?? DEFAULT_BRANDING.primaryColor, appName: appName ?? DEFAULT_BRANDING.appName, emailHeaderHtml: emailHeaderHtml ?? DEFAULT_BRANDING.emailHeaderHtml, emailFooterHtml: emailFooterHtml ?? DEFAULT_BRANDING.emailFooterHtml, }; } // ─── Reminders ────────────────────────────────────────────────────────────── export interface PortReminderConfig { defaultDays: number; defaultEnabled: boolean; digestEnabled: boolean; digestTime: string; // 'HH:MM' digestTimezone: string; } const DEFAULT_REMINDER: PortReminderConfig = { defaultDays: 7, defaultEnabled: false, digestEnabled: false, digestTime: '09:00', digestTimezone: 'Europe/Warsaw', }; export async function getPortReminderConfig(portId: string): Promise { const [defaultDays, defaultEnabled, digestEnabled, digestTime, digestTimezone] = await Promise.all([ readSetting(SETTING_KEYS.reminderDefaultDays, portId), readSetting(SETTING_KEYS.reminderDefaultEnabled, portId), readSetting(SETTING_KEYS.reminderDigestEnabled, portId), readSetting(SETTING_KEYS.reminderDigestTime, portId), readSetting(SETTING_KEYS.reminderDigestTimezone, portId), ]); return { defaultDays: defaultDays ?? DEFAULT_REMINDER.defaultDays, defaultEnabled: defaultEnabled ?? DEFAULT_REMINDER.defaultEnabled, digestEnabled: digestEnabled ?? DEFAULT_REMINDER.digestEnabled, digestTime: digestTime ?? DEFAULT_REMINDER.digestTime, digestTimezone: digestTimezone ?? DEFAULT_REMINDER.digestTimezone, }; }