Commit Graph

166 Commits

Author SHA1 Message Date
Matt c094fdd25b CRITICAL FIX: Enhanced OIDC session configuration for Keycloak authentication
##  **Session Management Improvements:**

### **OIDC Configuration (nuxt.config.ts):**
-  Added proper session configuration with automatic refresh
-  Configured secure cookies for HTTPS production environment
-  Added OAuth scopes: ['openid', 'profile', 'email']
-  Set proper response type and grant type for Keycloak
-  Added session expiration checking and automatic refresh

### **Session Cookie Settings:**
- sameSite: 'lax' - Required for cross-domain OAuth redirects
- secure: true - Required for HTTPS in production
- expirationThreshold: 60 - Refresh tokens 60 seconds before expiry

### **Debug Tools:**
-  Added /api/debug/oidc-session endpoint to monitor session state
- Tracks cookie presence and session establishment
- Safe debugging without exposing sensitive tokens

##  **Problem Being Solved:**
User authentication succeeds with Keycloak but session expires immediately,
causing redirect back to login page instead of dashboard access.

##  **Root Cause Analysis:**
- Sessions were not being established properly after OAuth callback
- Cookie configuration was not optimized for HTTPS/production
- Missing proper OAuth scopes and session refresh configuration

##  **Expected Results:**
 Successful Keycloak authentication should now persist session
 Users should be redirected to dashboard after login
 Sessions should automatically refresh before expiry
 No more immediate redirects back to login page

##  **Next Steps:**
1. Rebuild container in Portainer with these session fixes
2. Test authentication flow end-to-end
3. Use debug endpoint to verify session establishment
4. Monitor container logs for OIDC session activity
2025-06-14 16:17:58 +02:00
Matt 12403233c0 🔧 FIX: Disable OIDC global middleware to prevent redirect loops
CRITICAL FIX: The nuxt-oidc-auth module was causing infinite redirect loops
because its global middleware was active on ALL pages, including /login.

## 🚨 **Problem Solved:**
- Login page was redirecting to itself infinitely
- OIDC module auto-authenticating on every route
- 502 Bad Gateway errors from redirect loops

##  **Changes Made:**

### **nuxt.config.ts:**
- Added globalMiddlewareEnabled: false to OIDC middleware config
- This disables automatic authentication on all routes
- Prevents redirect loops on login page

### **Cleanup:**
- Removed obsolete pages/dashboard/keycloak-test.vue
- Fixed TypeScript errors from missing useKeycloak composable

## 🎯 **Result:**
 Login page should now load without redirect loops
 SSO button should work properly when clicked
 Manual authentication control via our middleware
 Maintains Directus auth compatibility

## 📋 **Next Steps:**
1. Rebuild container in Portainer with these changes
2. Test login page loads properly
3. Test SSO authentication flow
4. Verify no more 502 errors on callback

This fixes the core issue blocking the Keycloak SSO integration!
2025-06-14 16:07:01 +02:00
Matt 0ae190b255 MAJOR: Replace keycloak-js with nuxt-oidc-auth for seamless SSO integration
##  **SOLUTION: Migrate to Server-Side OIDC Authentication**

This completely replaces the problematic keycloak-js client-side implementation
with nuxt-oidc-auth, eliminating all CORS and iframe issues.

###  **Benefits:**
- **No more CORS errors** - Server-side OAuth flow
- **No iframe dependencies** - Eliminates cross-domain issues
- **Works with nginx proxy** - No proxy configuration conflicts
- **Better security** - Tokens handled server-side
- **Cleaner integration** - Native Nuxt patterns
- **Maintains Directus compatibility** - Dual auth support

###  **Installation & Configuration:**
- Added
uxt-oidc-auth module to nuxt.config.ts
- Configured Keycloak provider with proper OIDC settings
- Updated environment variables for security keys

###  **Code Changes:**

#### **Authentication Flow:**
- **middleware/authentication.ts** - Updated to check both Directus + OIDC auth
- **composables/useUnifiedAuth.ts** - Migrated to use useOidcAuth()
- **pages/login.vue** - Updated SSO button to use oidcLogin('keycloak')

#### **Configuration:**
- **nuxt.config.ts** - Added OIDC provider configuration
- **.env.example** - Updated with nuxt-oidc-auth environment variables
- Removed old Keycloak runtime config

#### **Cleanup:**
- Removed keycloak-js dependency from package.json
- Deleted obsolete files:
  - composables/useKeycloak.ts
  - pages/auth/callback.vue
  - server/utils/keycloak-oauth.ts
  - server/api/debug/ directory

###  **Authentication Routes (Auto-Generated):**
- /auth/keycloak/login - SSO login endpoint
- /auth/keycloak/logout - SSO logout endpoint
- /auth/keycloak/callback - OAuth callback (handled automatically)

###  **Security Setup Required:**
Environment variables needed for production:
- NUXT_OIDC_PROVIDERS_KEYCLOAK_CLIENT_SECRET
- NUXT_OIDC_TOKEN_KEY (base64 encoded 32-byte key)
- NUXT_OIDC_SESSION_SECRET (48-character random string)
- NUXT_OIDC_AUTH_SESSION_SECRET (48-character random string)

###  **Expected Results:**
 SSO login should work without CORS errors
 Compatible with nginx proxy setup
 Maintains existing Directus authentication
 Server-side session management
 Automatic token refresh

Ready for container rebuild and production testing!
2025-06-14 15:58:03 +02:00
Matt c29f64b50b Enable debug logging for Keycloak authentication troubleshooting
DEBUGGING: Add comprehensive console logging to track authentication flow

## Changes Made:

### 1. Configuration Updates (nuxt.config.ts)
- Temporarily enabled keycloakDebug: true for production
- Allows detailed logging to troubleshoot authentication issues

### 2. Enhanced Error Logging (composables/useKeycloak.ts)
- Added [KEYCLOAK] prefixed console logs throughout login flow
- Enhanced error reporting with message, stack, and name details
- Added logging for initialization status and redirect URIs
- TypeScript-safe error handling with instanceof checks

## Debug Information Now Available:
- Keycloak initialization status
- Login function execution tracking
- Redirect URI generation details
- Authentication state monitoring
- Detailed error messages with stack traces

This will help identify exactly where the authentication process is failing
and provide actionable debugging information in the browser console.

Ready for container rebuild and testing.
2025-06-14 15:44:28 +02:00
Matt a2e1067432 Fix Keycloak CORS and iframe issues for cross-domain authentication
CRITICAL FIX: Resolve SSO login endless loading and CORS errors

## Issues Resolved:

### 1. CORS Policy Violations
- Disabled checkLoginIframe (causes cross-origin iframe errors)
- Removed silentCheckSsoRedirectUri (blocked by modern browsers)
- Disabled checkLoginIframeInterval to prevent 3rd party cookie checks

### 2. Cross-Domain Compatibility
- Set responseMode to 'query' for better proxy compatibility
- Configured standard flow instead of implicit
- Added proper timeout handling (messageReceiveTimeout: 10000)
- Enhanced debug logging for troubleshooting

### 3. Redirect URI Consistency
- Fixed login() to use proper baseUrl for redirect URIs
- Ensures HTTPS URLs in production environment
- Consistent URL generation across initialization and login

### 4. Browser Security Compliance
- Disabled enableLogging to reduce console noise
- Removed iframe-based features that modern browsers block
- Maintained PKCE (S256) for security while fixing compatibility

## Technical Details:

The previous errors were caused by Keycloak trying to use:
- /protocol/openid-connect/3p-cookies/step1.html
- /protocol/openid-connect/login-status-iframe.html

These are blocked by browsers' cross-origin policies when the app and
Keycloak are on different domains (client.portnimara.dev vs auth.portnimara.dev).

This fix disables these problematic features while maintaining full OAuth
functionality and security. The SSO login should now work without endless
loading issues.
2025-06-14 15:38:40 +02:00
Matt 0c9cd89667 Implement Official Keycloak JS Adapter with Proxy-Aware Configuration
MAJOR ENHANCEMENT: Complete Keycloak integration with proper HTTPS/proxy handling

## Core Improvements:

### 1. Enhanced Configuration (nuxt.config.ts)
- Added proxy trust configuration for nginx environments
- Configured baseUrl for production HTTPS enforcement
- Added debug mode configuration for development

### 2. Proxy-Aware Keycloak Composable (composables/useKeycloak.ts)
- Intelligent base URL detection (production vs development)
- Force HTTPS redirect URIs in production environments
- Enhanced debugging and logging capabilities
- Proper PKCE implementation for security
- Automatic token refresh mechanism

### 3. Dual Authentication System
- Updated middleware to support both Directus and Keycloak
- Enhanced useUnifiedAuth for seamless auth source switching
- Maintains backward compatibility with existing Directus users

### 4. OAuth Flow Implementation
- Created proper callback handler (pages/auth/callback.vue)
- Comprehensive error handling and user feedback
- Automatic redirect to dashboard on success

### 5. Enhanced Login Experience (pages/login.vue)
- Restored SSO login button with proper error handling
- Maintained existing Directus login form
- Clear separation between auth methods with visual divider

### 6. Comprehensive Testing Suite (pages/dashboard/keycloak-test.vue)
- Real-time configuration display
- Authentication status monitoring
- Interactive testing tools
- Detailed debug logging system

## Technical Solutions:

 **Proxy Detection**: Automatically detects nginx proxy and uses correct HTTPS URLs
 **HTTPS Enforcement**: Forces secure redirect URIs in production
 **Error Handling**: Comprehensive error catching with user-friendly messages
 **Debug Capabilities**: Enhanced logging for troubleshooting
 **Security**: Implements PKCE and secure token handling

## Infrastructure Compatibility:
- Works with nginx reverse proxy setups
- Compatible with Docker container networking
- Handles SSL termination at proxy level
- Supports both development and production environments

This implementation specifically addresses the HTTP/HTTPS redirect URI mismatch
that was causing 'unauthorized_client' errors in the proxy environment.
2025-06-14 15:26:26 +02:00
Matt fa35fcd235 CRITICAL: Temporarily disable Keycloak to restore application functionality
- Disable Keycloak integration in authentication middleware
- Update useUnifiedAuth to only use Directus authentication
- Rebuild login page with only Directus auth form
- Remove all Keycloak references that were causing JavaScript errors
- This restores the application to working state with Directus auth only

Application should now load and function normally. Keycloak can be re-enabled later once issues are resolved.
2025-06-14 15:07:41 +02:00
Matt 8c7bf4cc00 Fix SSR and defensive coding for Keycloak integration
- Add proper SSR guards and error handling
- Make authentication middleware more defensive
- Add null checks in useUnifiedAuth composable
- Prevent JavaScript errors from breaking page load
- Prioritize Directus auth over Keycloak for stability
2025-06-14 15:01:45 +02:00
Matt a797c13867 MAJOR: Replace nuxt-openid-connect with official Keycloak JS adapter
- Remove problematic nuxt-openid-connect module that was causing OAuth issues
- Install and implement official keycloak-js adapter for better reliability
- Create new useKeycloak composable with proper token management
- Update useUnifiedAuth to work with new Keycloak implementation
- Fix authentication middleware to support both auth methods
- Update login page to use new Keycloak login function
- Clean up configuration and remove deprecated OIDC settings
- This should resolve all the HTTP/HTTPS redirect and token exchange issues
2025-06-14 14:50:29 +02:00
Matt bd8f1d9926 Add token exchange debug endpoint and remove invalid baseUrl config 2025-06-14 14:43:19 +02:00
Matt 2ceff9a67d Final fix for client secret reading - remove runtime config conflict and force non-null environment variable 2025-06-14 14:39:05 +02:00
Matt 2effbb74bb Fix runtime config to properly read KEYCLOAK_CLIENT_SECRET from environment variables 2025-06-14 14:35:34 +02:00
Matt d286da4a8e Add debug mode and OIDC config debug endpoint to troubleshoot client authentication 2025-06-14 14:32:14 +02:00
Matt 8e9d6d07ad Remove unused auth callback page and clean up OIDC config - module uses /oidc/cb automatically 2025-06-14 14:26:21 +02:00
Matt f9ea96d5a1 Fix OIDC configuration structure - remove duplicate runtimeConfig and use proper callback URL from env var 2025-06-14 14:22:27 +02:00
Matt c98cbc5388 Fix Keycloak callback URL configuration - use path only instead of full URL 2025-06-14 14:16:35 +02:00
Matt 5f8720bb63 Implement Keycloak authentication integration and unify user management 2025-06-14 14:09:56 +02:00
Matt 72ea543485 Update logo references and email logo URL in configuration 2025-06-13 13:36:14 +02:00
Matt e57756e433 Add phone number formatting and improve UI components
- Integrate libphonenumber-js for proper phone number formatting
- Display phone numbers in national format in PhoneInput component
- Strip non-numeric characters from phone input automatically
- Fix refresh button icon rendering in EmailThreadView
- Improve EOI button layout alignment and centering
2025-06-12 22:35:17 +02:00
Matt 331d8b8194 REVERT Network Updates 2025-06-12 21:54:47 +02:00
Matt f6508aa435 Major Updates to Network and Load Balancing 2025-06-12 21:50:01 +02:00
Matt f111f76a3b email server updates 2025-06-12 18:05:42 +02:00
Matt be935e2ba6 fixes 2025-06-12 17:58:25 +02:00
Matt da2d965da8 fixes 2025-06-12 17:52:57 +02:00
Matt 1a2e0d7ab0 updates 2025-06-12 17:42:42 +02:00
Matt 9f792be7de CRITICAL FIX: Resolve NocoDB field clearing issue for EOI cleanup
Root Cause Resolution:
- NocoDB API requires null values (not undefined) to clear database fields
- Updated updateInterest utility to automatically convert undefined  null
- This ensures signature links and documensoID are properly cleared from database

 Database Cleanup Enhancements:
- Fixed all EOI deletion endpoints to properly clear embedded signature links
- Both delete-generated-document and delete-document now clear ALL fields:
  * EmbeddedSignatureLinkClient, EmbeddedSignatureLinkCC, EmbeddedSignatureLinkDeveloper
  * Signature Link Client, Signature Link CC, Signature Link Developer
  * documensoID and all related EOI metadata

 Added Debug Capabilities:
- Created test-eoi-cleanup.ts endpoint for debugging cleanup operations
- Enhanced logging in NocoDB utility for field conversion tracking
- Better error handling and validation throughout cleanup process

 Technical Implementation:
- NocoDB utility now automatically handles undefined  null conversion
- Comprehensive field clearing in allowedFields array
- Proper TypeScript typing for all cleanup operations
- Enhanced logging for troubleshooting database operations

This resolves the persistent issue where signature links and document IDs remained in the database after EOI deletion, ensuring complete cleanup and proper state reset.
2025-06-12 17:36:27 +02:00
Matt 14f725efc5 fix: Enhanced EOI button spacing and comprehensive system improvements
UI/UX Enhancements:
- Improved spacing between Generate EOI and Upload EOI Document buttons
- Mobile: gap-3 (12px), Desktop: gap-4 (16px) for better visual separation
- Enhanced mobile table layout with stacked status badges
- Fixed email thread width issues on mobile devices

 Database Integrity Fixes:
- Fixed missing embedded signature link cleanup in deletion endpoints
- Enhanced validation system to automatically detect and clean orphaned records
- All EOI deletion operations now properly clear:
  * EmbeddedSignatureLinkClient, EmbeddedSignatureLinkCC, EmbeddedSignatureLinkDeveloper
  * Legacy signature links and documensoID references
  * Sales Process Level and EOI Status resets

 Real-time Reactivity Improvements:
- EOI section now immediately updates UI after document deletion/validation
- Added local reactive state for instant visual feedback
- Eliminated phantom signatory status displays
- Enhanced hasGeneratedEOI computed property with validation override

 Mobile Responsiveness:
- Implemented stacked badge layout for interest table
- Contact info + status badges in 60% width column
- Proper email thread text wrapping and width constraints
- Optimized button layouts and touch targets

 Technical Robustness:
- Comprehensive field cleanup using undefined for proper database resets
- Enhanced error handling and logging throughout EOI workflows
- Better handling of edge cases and external document deletions
- Improved validation and cleanup automation

All EOI operations now maintain complete database consistency while providing immediate, accurate visual feedback to users across all devices.
2025-06-12 17:29:05 +02:00
Matt 44a966f87a fix: Comprehensive EOI cleanup and mobile UI improvements
Database Cleanup Enhancements:
- Fixed missing embedded signature link cleanup in deletion endpoints
- Both delete-generated-document and delete-document now properly clear:
  * EmbeddedSignatureLinkClient, EmbeddedSignatureLinkCC, EmbeddedSignatureLinkDeveloper
  * All legacy signature links and documensoID references
- Enhanced validation endpoint to detect and clean orphaned records automatically

 EOI Section Reactivity Fixes:
- Added local reactive state (documentValidated, documentExists) for immediate UI updates
- EOI section now instantly shows Generate UI when documents are deleted/invalid
- No more phantom signatory status displays after document deletion
- Improved hasGeneratedEOI computed property with validation state override

 Mobile UI Improvements:
- Implemented stacked badge layout for interest table on mobile
- Contact info + status badges now stack vertically (60% width)
- Eliminated horizontal scrolling issues on mobile devices
- Enhanced email thread view with proper width constraints and text wrapping
- Made email refresh button round with better mobile styling

 Technical Enhancements:
- Comprehensive field cleanup using undefined instead of null for proper database reset
- Enhanced error handling for document validation and deletion
- Improved logging for debugging EOI state transitions
- Better handling of edge cases where documensoID exists but document was deleted externally

All EOI-related operations now properly maintain database consistency and provide immediate visual feedback to users.
2025-06-12 17:27:10 +02:00
Matt 79a706efe3 feat: Implement stacked mobile layout for interest table
Mobile Table Redesign:
- Redesigned mobile table layout with stacked status badges under contact info
- Contact information takes 60% width with badges stacked below name/email
- All status badges (Sales Process, EOI, Contract, Lead Category) now stack vertically
- Eliminated horizontal scrolling issues and cramped mobile display

 Visual Improvements:
- Optimized badge sizing (x-small) for mobile to fit more content
- Enhanced spacing and alignment for better readability
- Improved touch targets and visual hierarchy
- Contact info and badges properly aligned for clean appearance

 Layout Structure:
- Mobile: 3 columns (Contact+Badges 60%, Status 20%, Created 20%)
- Desktop: Maintains original 6-column layout unchanged
- Responsive breakpoint at 768px for optimal mobile experience

 User Experience Enhancements:
- All status information visible without horizontal scrolling
- Better content density and information accessibility
- Maintained click functionality and hover effects
- Consistent design language across mobile and desktop

The mobile table now provides a much cleaner, more accessible experience with all status information clearly visible in a stacked format.
2025-06-12 17:24:06 +02:00
Matt 24dcee57d9 fix: Enhanced EOI section reactivity for immediate UI updates after deletion
EOI State Management Improvements:
- Added local reactive state (documentValidated, documentExists) to handle immediate UI updates
- Enhanced hasGeneratedEOI computed property to use local state when validation completes
- Fixed issue where EOI signatory status would persist after document deletion

 Real-time UI Responsiveness:
- Component now immediately switches to Generate EOI UI when validation detects cleanup
- No longer requires manual page refresh to see correct state
- Proper state synchronization between validation results and UI display

 Validation Logic Enhancement:
- validateDocument function now sets local reactive state immediately upon cleanup detection
- Added comprehensive logging for debugging EOI state transitions
- Handles edge cases where documensoID exists but document was deleted externally

 User Experience Improvements:
- Automatic UI state transitions without user intervention
- Clear visual feedback when orphaned data is cleaned up
- Prevents phantom EOI states from confusing users

The EOI section now correctly and immediately shows the generate UI when no valid document exists, eliminating the confusion from phantom signatory status displays.
2025-06-12 17:18:53 +02:00
Matt 8ec6c883ab fix: Comprehensive mobile UI improvements and fixes
Interest Table Mobile Layout:
- Fixed broken table layout on mobile screens
- Optimized column widths to fit mobile viewports better
- Improved horizontal scrolling with visual indicators
- Enhanced responsive design for contact information display
- Better badge sizing and text truncation on mobile

 Mobile Actions Enhancement:
- Added delete interest button to mobile actions section
- Improved button layout in 2x2 grid for better accessibility
- Added proper loading states and disabled states
- Enhanced visual hierarchy with icons and labels

 Email Communication Fixes:
- Fixed refresh email button icon display on mobile
- Added proper mobile styling and tooltips
- Made button more accessible with larger touch targets

 Email Thread Width Issues:
- Fixed email threads exceeding screen width on mobile
- Implemented proper text wrapping and overflow handling
- Optimized timeline layout for mobile viewports
- Enhanced email card responsiveness
- Better handling of long email addresses and content
- Improved expansion panel sizing and spacing

 Mobile UX Improvements:
- Better touch targets and button sizing
- Improved visual feedback and loading states
- Enhanced text readability with optimized font sizes
- Consistent mobile spacing and padding throughout
- Fixed container overflow issues across components

All mobile components now properly respect viewport constraints and provide optimal user experience on mobile devices.
2025-06-12 17:14:14 +02:00
Matt 41a6f7f1c8 feat: Implement EOI document validation and orphaned data cleanup
- Add new /api/eoi/validate-document endpoint to check document existence
- Automatically clean up orphaned database records when documents don't exist in Documenso
- Update EOISection component to validate documents on mount
- Enhanced delete-generated-document endpoint to handle already-deleted documents
- Updated check-signature-status endpoint with validation logic
- Prevents EOI section from showing when document no longer exists
- Self-healing system that fixes data inconsistencies automatically

Key improvements:
- Validates document existence before showing EOI management UI
- Cleans up documensoID, signature links, and status fields when document is missing
- Graceful handling of 404 errors from Documenso API
- Background validation with user-friendly notifications
- Prevents phantom EOI states that appear generated but don't exist
2025-06-12 17:04:45 +02:00
Matt b25e93d2a0 feat: Implement comprehensive PWA functionality
- Add full PWA configuration with manifest and service worker
- Create PWAInstallBanner component with mobile detection
- Implement install banner on login page (shows below login form)
- Add usePWA composable for reusable PWA functionality
- Configure offline support with Workbox caching strategies
- Add PWA initialization plugin
- Update app name to 'Port Nimara Portal' throughout
- Use circular logo in install banner and instructions
- Banner shows only once and hides if already installed
- Support both Android (direct install) and iOS (manual instructions)
- Add comprehensive documentation for PWA implementation

Features:
- Mobile-only install banner with dismissal tracking
- Standalone mode detection to hide banner when installed
- Platform-specific installation instructions
- Offline functionality with API caching
- Auto-updating service worker
- Native app-like experience when installed
2025-06-12 16:36:32 +02:00
Matt 4916c20f64 fixes 2025-06-12 16:26:10 +02:00
Matt af3a68e51b Feat: Complete EOI improvements and PWA implementation
EOI ENHANCEMENTS:
-  Fix EOI deletion to clear ALL signature fields (embedded links, timestamps, etc.)
-  Add EOI creation time tags automatically displayed on interest cards
-  Add signature status tags showing who has signed ( Client,  CC,  Developer)
-  Add pending signature tags for unsigned parties
-  Fix TypeScript errors with new Interest type fields

 UI IMPROVEMENTS:
-  Enhanced InterestDetailsModal with comprehensive status display
-  Fixed component prop naming issues
-  Better mobile and desktop responsiveness for tags

 PWA IMPLEMENTATION:
-  Complete PWA configuration with manifest
-  App installation capability
-  Offline support with service worker
-  Multiple icon sizes (72x72 to 512x512)
-  Branded theme colors and app metadata
-  Auto-update functionality

 USER EXPERIENCE:
- Users can now see EOI creation timestamps at a glance
- Clear visual indication of signature status for all parties
- App can be installed on mobile/desktop devices
- Proper reset of EOI state when deleted
- All embedded signature links properly cleared on deletion

The platform now provides complete EOI lifecycle management with PWA capabilities!
2025-06-12 16:16:30 +02:00
Matt e02d3ab70f Fix: Resolve EOISection.vue build error
- Fixed incomplete Vue component with missing end tag
- Added missing functions: handleUpload, closeUploadDialog, deleteUploadedEOI, deleteGeneratedEOI
- Resolved all TypeScript compilation errors
- Enables successful Docker build
2025-06-12 15:59:17 +02:00
Matt 66729dfad6 Merge branch 'main' of https://code.portnimara.com/ron/client-portal 2025-06-12 15:53:23 +02:00
Matt 64c35b70f8 Improve email session management and add IMAP connection pooling
- Switch from localStorage to sessionStorage for email sessions
- Add session validation on component mount
- Implement IMAP connection pool with folder search capabilities
- Add operation locking utility for concurrent request handling
- Refactor EOI section component structure
- Update API endpoints for better email thread management
2025-06-12 15:53:12 +02:00
Matt 219522e1b5 fixes for endpoints 2025-06-11 20:50:51 +02:00
Matt c8d8042797 fixes 2025-06-11 19:22:50 +02:00
Matt c8113c4148 fixes 2025-06-11 18:59:16 +02:00
Matt d233f3b919 fixes 2025-06-11 18:46:18 +02:00
Matt 061cbea574 fixes 2025-06-11 18:38:43 +02:00
Matt 30e90dd73b fixes 2025-06-11 18:29:56 +02:00
Matt 96aa06d2ed fixes 2025-06-11 18:14:10 +02:00
Matt f891060e7c Add embedded signing support with webhook configuration
- Add helper function to generate embedded signing URLs from Documenso links
- Store embedded signature links for all signers (Client, Developer, CC)
- Add webhook secret configuration for embedded signing
- Add documentation for embedded signing and website implementation
- Update Interest type with embedded signature link fields
2025-06-11 17:57:58 +02:00
Matt 85773fc09e updates 2025-06-11 16:50:31 +02:00
Matt f9f1bcd34a fixes 2025-06-11 16:10:19 +02:00
Matt bc591f687f fixes 2025-06-11 16:05:19 +02:00
Matt 084f27ec91 slider updates 2025-06-11 14:46:42 +02:00