diff --git a/Conf/home.meszely.eu/nginx_conf/admin.matrix.home.meszely.eu.conf b/Conf/home.meszely.eu/nginx_conf/admin.matrix.home.meszely.eu.conf new file mode 100644 index 0000000..e48190c --- /dev/null +++ b/Conf/home.meszely.eu/nginx_conf/admin.matrix.home.meszely.eu.conf @@ -0,0 +1,30 @@ +server { + server_name admin.matrix.home.meszely.eu; + + location / { + proxy_pass http://10.11.3.161:80; + proxy_set_header Host $host; + proxy_set_header X-Real-IP $remote_addr; + proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; + proxy_set_header X-Forwarded-Proto $scheme; + } + + listen 443 ssl; # managed by Certbot + ssl_certificate /etc/letsencrypt/live/admin.matrix.home.meszely.eu/fullchain.pem; # managed by Certbot + ssl_certificate_key /etc/letsencrypt/live/admin.matrix.home.meszely.eu/privkey.pem; # managed by Certbot + include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot + ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot + +} +server { + if ($host = admin.matrix.home.meszely.eu) { + return 301 https://$host$request_uri; + } # managed by Certbot + + + listen 80; + server_name admin.matrix.home.meszely.eu; + return 404; # managed by Certbot + + +} \ No newline at end of file diff --git a/Conf/home.meszely.eu/nginx_conf/gitea.home.meszely.eu.conf b/Conf/home.meszely.eu/nginx_conf/gitea.home.meszely.eu.conf new file mode 100644 index 0000000..0240e73 --- /dev/null +++ b/Conf/home.meszely.eu/nginx_conf/gitea.home.meszely.eu.conf @@ -0,0 +1,39 @@ + server { + server_name gitea.home.meszely.eu; + + # Ezt a sort is kommentezd ki most: + # return 301 https://$host$request_uri; + # Az Nginx-nek tudnia kell, hova tegye a Certbot challenge fájlját. + # Ha nincs beállítva root, ideiglenesen adjunk meg egyet. + # Ez a location blokk elegendő a Certbotnak. + location / { + proxy_pass http://10.11.3.98:3000; + proxy_set_header Host $host; + proxy_set_header X-Real-IP $remote_addr; + proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; + proxy_set_header X-Forwarded-Proto $scheme; + client_max_body_size 500M; + proxy_read_timeout 300s; + } + + listen [::]:443 ssl ipv6only=on; # managed by Certbot + listen 443 ssl; # managed by Certbot + ssl_certificate /etc/letsencrypt/live/gitea.home.meszely.eu/fullchain.pem; # managed by Certbot + ssl_certificate_key /etc/letsencrypt/live/gitea.home.meszely.eu/privkey.pem; # managed by Certbot + include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot + ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot + +} + server { + if ($host = gitea.home.meszely.eu) { + return 301 https://$host$request_uri; + } # managed by Certbot + + + listen 80; + listen [::]:80; + server_name gitea.home.meszely.eu; + return 404; # managed by Certbot + + +} \ No newline at end of file diff --git a/Conf/home.meszely.eu/nginx_matrix.home.meszely.eu.conf b/Conf/home.meszely.eu/nginx_conf/matrix.home.meszely.eu.conf similarity index 100% rename from Conf/home.meszely.eu/nginx_matrix.home.meszely.eu.conf rename to Conf/home.meszely.eu/nginx_conf/matrix.home.meszely.eu.conf diff --git a/Conf/home.meszely.eu/nginx_conf/n8n.home.meszely.eu.conf b/Conf/home.meszely.eu/nginx_conf/n8n.home.meszely.eu.conf new file mode 100644 index 0000000..6e1c396 --- /dev/null +++ b/Conf/home.meszely.eu/nginx_conf/n8n.home.meszely.eu.conf @@ -0,0 +1,35 @@ +server { + server_name n8n.home.meszely.eu; + + location / { + proxy_pass http://10.11.3.199:5678; + proxy_http_version 1.1; + proxy_set_header Upgrade $http_upgrade; + proxy_set_header Connection "upgrade"; + proxy_set_header Host $host; + proxy_set_header X-Real-IP $remote_addr; + proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; + proxy_set_header X-Forwarded-Proto $scheme; + } + + listen 80; + listen 443 ssl; # managed by Certbot + ssl_certificate /etc/letsencrypt/live/n8n.home.meszely.eu/fullchain.pem; # managed by Certbot + ssl_certificate_key /etc/letsencrypt/live/n8n.home.meszely.eu/privkey.pem; # managed by Certbot + include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot + ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot + +} +server { + if ($host = n8n.home.meszely.eu) { + return 301 https://$host$request_uri; + } # managed by Certbot + + + server_name n8n.home.meszely.eu; + + listen 80; + return 404; # managed by Certbot + + +} \ No newline at end of file diff --git a/Conf/home.meszely.eu/nginx_conf/nginx_matrix.home.meszely.eu.conf b/Conf/home.meszely.eu/nginx_conf/nginx_matrix.home.meszely.eu.conf new file mode 100644 index 0000000..c55c58d --- /dev/null +++ b/Conf/home.meszely.eu/nginx_conf/nginx_matrix.home.meszely.eu.conf @@ -0,0 +1,31 @@ +server { + server_name matrix.home.meszely.eu; + + client_max_body_size 10M; + + location / { + proxy_pass http://10.11.3.160:8008; + proxy_set_header X-Forwarded-For $remote_addr; + proxy_set_header Host $host; + proxy_set_header X-Forwarded-Proto $scheme; + } + + listen 443 ssl; # managed by Certbot + ssl_certificate /etc/letsencrypt/live/matrix.home.meszely.eu/fullchain.pem; # managed by Certbot + ssl_certificate_key /etc/letsencrypt/live/matrix.home.meszely.eu/privkey.pem; # managed by Certbot + include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot + ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot + +} +server { + if ($host = matrix.home.meszely.eu) { + return 301 https://$host$request_uri; + } # managed by Certbot + + + listen 80; + server_name matrix.home.meszely.eu; + return 404; # managed by Certbot + + +} \ No newline at end of file diff --git a/Dev/n8n/panda_n8n_execute_command/n8n-data/database.sqlite-shm b/Dev/n8n/panda_n8n_execute_command/n8n-data/database.sqlite-shm index c6f2307..7f68436 100644 Binary files a/Dev/n8n/panda_n8n_execute_command/n8n-data/database.sqlite-shm and b/Dev/n8n/panda_n8n_execute_command/n8n-data/database.sqlite-shm differ diff --git a/Scripts/python/import_pdf_from_o365.py b/Scripts/python/import_pdf_from_o365.py new file mode 100644 index 0000000..a64cd51 --- /dev/null +++ b/Scripts/python/import_pdf_from_o365.py @@ -0,0 +1,156 @@ +import os +import requests +import msal +import base64 + +# ============================================================================== +# KONFIGURÁCIÓ +# ============================================================================== +# Az Azure App Registration-ból kapott adatok +TENANT_ID = "TENANT_ID_MASOLD_BE_IDE" +CLIENT_ID = "CLIENT_ID_MASOLD_BE_IDE" +CLIENT_SECRET = "CLIENT_SECRET_MASOLD_BE_IDE" # A "Value", nem a "Secret ID" + +# A postafiók, amit figyelni kell +USER_EMAIL = "Bestellung-Fax-Eingang@aps-hh.de" + +# Hova mentsük a letöltött PDF-eket +DOWNLOAD_DIR = r"\\aps-nb090\test" + +# A mappa neve, ahova a feldolgozott leveleket helyezzük +PROCESSED_FOLDER_NAME = "erledigt" +# ============================================================================== + +# Microsoft Graph API végpontok +GRAPH_API_ENDPOINT = "https://graph.microsoft.com/v1.0" +AUTHORITY_URL = f"https://login.microsoftonline.com/{TENANT_ID}" +SCOPES = ["https://graph.microsoft.com/.default"] + + +def get_graph_api_token(): + """Beszerzi a hozzáférési tokent a Microsoft Graph API-hoz.""" + app = msal.ConfidentialClientApplication( + client_id=CLIENT_ID, + authority=AUTHORITY_URL, + client_credential=CLIENT_SECRET + ) + result = app.acquire_token_silent(scopes=SCOPES, account=None) + if not result: + result = app.acquire_token_for_client(scopes=SCOPES) + + if "access_token" in result: + return result["access_token"] + else: + print("Hiba a token beszerzése során!") + print(result.get("error")) + print(result.get("error_description")) + return None + +def get_folder_id(access_token, folder_name): + """Megkeresi egy mappa ID-ját a neve alapján.""" + headers = {"Authorization": f"Bearer {access_token}"} + url = f"{GRAPH_API_ENDPOINT}/users/{USER_EMAIL}/mailFolders" + response = requests.get(url, headers=headers) + response.raise_for_status() + folders = response.json().get("value", []) + + for folder in folders: + if folder["displayName"].lower() == folder_name.lower(): + return folder["id"] + + # Kezelhetnénk azt az esetet is, ha a mappa nem létezik, és létrehoznánk. + # Most egyszerűen hibát dobunk. + raise ValueError(f"A '{folder_name}' mappa nem található.") + + +def main(): + """Fő feldolgozó funkció.""" + print("Graph API token beszerzése...") + access_token = get_graph_api_token() + if not access_token: + return + + headers = {"Authorization": f"Bearer {access_token}"} + + try: + print(f"'{PROCESSED_FOLDER_NAME}' mappa ID-jának keresése...") + processed_folder_id = get_folder_id(access_token, PROCESSED_FOLDER_NAME) + print("Mappa ID sikeresen lekérve.") + except (requests.HTTPError, ValueError) as e: + print(f"Hiba a mappa ID lekérése közben: {e}") + return + + # Csak az olvasatlan, csatolmánnyal rendelkező levelek lekérdezése + # $select=id,subject -> Csak a szükséges mezőket kérjük le a hatékonyságért + messages_url = ( + f"{GRAPH_API_ENDPOINT}/users/{USER_EMAIL}/mailFolders/inbox/messages?" + "$filter=isRead eq false and hasAttachments eq true&" + "$select=id,subject" + ) + + response = requests.get(messages_url, headers=headers) + response.raise_for_status() + messages = response.json().get("value", []) + + if not messages: + print("Nincsenek új, feldolgozandó e-mailek.") + return + + print(f"{len(messages)} új e-mail található csatolmánnyal.") + + for message in messages: + msg_id = message["id"] + subject = message.get("subject", "N/A") + print(f"\n--- Feldolgozás alatt: '{subject}' (ID: {msg_id}) ---") + + attachments_url = f"{GRAPH_API_ENDPOINT}/users/{USER_EMAIL}/messages/{msg_id}/attachments" + response = requests.get(attachments_url, headers=headers) + if response.status_code != 200: + print(f" Hiba a csatolmányok lekérésekor: {response.json()}") + continue + + attachments = response.json().get("value", []) + pdf_found = False + + for att in attachments: + filename = att.get("name", "unknown") + content_type = att.get("contentType", "") + + if filename.lower().endswith(".pdf") or content_type == "application/pdf": + print(f" PDF csatolmány található: {filename}") + + # A csatolmány tartalma a 'contentBytes' mezőben van, Base64 kódolással + file_content = base64.b64decode(att["contentBytes"]) + + # Fájlnév "tisztítása" + safe_filename = "".join(c if c.isalnum() or c in (" ", ".", "_", "-") else "_" for c in filename) + filepath = os.path.join(DOWNLOAD_DIR, safe_filename) + + try: + with open(filepath, "wb") as f: + f.write(file_content) + print(f" PDF sikeresen mentve: {filepath}") + pdf_found = True + except Exception as e: + print(f" Hiba a fájl mentése közben: {e}") + + if pdf_found: + print(f" E-mail áthelyezése a '{PROCESSED_FOLDER_NAME}' mappába...") + move_url = f"{GRAPH_API_ENDPOINT}/users/{USER_EMAIL}/messages/{msg_id}/move" + move_payload = {"destinationId": processed_folder_id} + + response = requests.post(move_url, headers=headers, json=move_payload) + if response.status_code == 201: + print(" E-mail sikeresen áthelyezve.") + else: + # Az áthelyezéshez Mail.ReadWrite jogosultság kell! + print(f" Hiba az e-mail áthelyezésekor: {response.status_code} - {response.text}") + + print("\nFeldolgozás befejezve.") + + +if __name__ == "__main__": + if not os.path.exists(DOWNLOAD_DIR): + print(f"Hiba: A letöltési mappa nem létezik: {DOWNLOAD_DIR}") + else: + main() diff --git a/import_pdf_from_o365_de.py b/import_pdf_from_o365_de.py new file mode 100644 index 0000000..0ee7edd --- /dev/null +++ b/import_pdf_from_o365_de.py @@ -0,0 +1,156 @@ +import os +import requests +import msal +import base64 + +# ============================================================================== +# KONFIGURATION +# ============================================================================== +# Daten aus der Azure App-Registrierung +TENANT_ID = "TENANT_ID_HIER_EINFUEGEN" +CLIENT_ID = "CLIENT_ID_HIER_EINFUEGEN" +CLIENT_SECRET = "CLIENT_SECRET_HIER_EINFUEGEN" # Der "Wert", nicht die "Secret ID" + +# Das zu überwachende Postfach +USER_EMAIL = "Bestellung-Fax-Eingang@aps-hh.de" + +# Speicherort für heruntergeladene PDFs +DOWNLOAD_DIR = r"\\aps-nb090\test" + +# Name des Ordners, in den verarbeitete E-Mails verschoben werden +PROCESSED_FOLDER_NAME = "erledigt" +# ============================================================================== + +# Microsoft Graph API Endpunkte +GRAPH_API_ENDPOINT = "https://graph.microsoft.com/v1.0" +AUTHORITY_URL = f"https://login.microsoftonline.com/{TENANT_ID}" +SCOPES = ["https://graph.microsoft.com/.default"] + + +def get_graph_api_token(): + """Ruft das Zugriffstoken für die Microsoft Graph API ab.""" + app = msal.ConfidentialClientApplication( + client_id=CLIENT_ID, + authority=AUTHORITY_URL, + client_credential=CLIENT_SECRET + ) + result = app.acquire_token_silent(scopes=SCOPES, account=None) + if not result: + result = app.acquire_token_for_client(scopes=SCOPES) + + if "access_token" in result: + return result["access_token"] + else: + print("Fehler beim Abrufen des Tokens!") + print(result.get("error")) + print(result.get("error_description")) + return None + +def get_folder_id(access_token, folder_name): + """Sucht die ID eines Ordners anhand seines Namens.""" + headers = {"Authorization": f"Bearer {access_token}"} + url = f"{GRAPH_API_ENDPOINT}/users/{USER_EMAIL}/mailFolders" + response = requests.get(url, headers=headers) + response.raise_for_status() + folders = response.json().get("value", []) + + for folder in folders: + if folder["displayName"].lower() == folder_name.lower(): + return folder["id"] + + # Man könnte auch den Fall behandeln, dass der Ordner nicht existiert, und ihn erstellen. + # Vorerst wird einfach ein Fehler ausgelöst. + raise ValueError(f"Der Ordner '{folder_name}' wurde nicht gefunden.") + + +def main(): + """Hauptverarbeitungsfunktion.""" + print("Graph API-Token wird abgerufen...") + access_token = get_graph_api_token() + if not access_token: + return + + headers = {"Authorization": f"Bearer {access_token}"} + + try: + print(f"Suche nach der ID für den Ordner '{PROCESSED_FOLDER_NAME}'...") + processed_folder_id = get_folder_id(access_token, PROCESSED_FOLDER_NAME) + print("Ordner-ID erfolgreich abgerufen.") + except (requests.HTTPError, ValueError) as e: + print(f"Fehler beim Abrufen der Ordner-ID: {e}") + return + + # Nur ungelesene E-Mails mit Anhängen abfragen + # $select=id,subject -> Nur die notwendigen Felder für mehr Effizienz abfragen + messages_url = ( + f"{GRAPH_API_ENDPOINT}/users/{USER_EMAIL}/mailFolders/inbox/messages?" + f"$filter=isRead eq false and hasAttachments eq true&" + f"$select=id,subject" + ) + + response = requests.get(messages_url, headers=headers) + response.raise_for_status() + messages = response.json().get("value", []) + + if not messages: + print("Keine neuen E-Mails zur Verarbeitung gefunden.") + return + + print(f"{len(messages)} neue E-Mail(s) mit Anhängen gefunden.") + + for message in messages: + msg_id = message["id"] + subject = message.get("subject", "N/A") + print(f"\n--- In Verarbeitung: '{subject}' (ID: {msg_id}) ---") + + attachments_url = f"{GRAPH_API_ENDPOINT}/users/{USER_EMAIL}/messages/{msg_id}/attachments" + response = requests.get(attachments_url, headers=headers) + if response.status_code != 200: + print(f" Fehler beim Abrufen der Anhänge: {response.json()}") + continue + + attachments = response.json().get("value", []) + pdf_found = False + + for att in attachments: + filename = att.get("name", "unknown") + content_type = att.get("contentType", "") + + if filename.lower().endswith(".pdf") or content_type == "application/pdf": + print(f" PDF-Anhang gefunden: {filename}") + + # Der Inhalt des Anhangs befindet sich im Feld 'contentBytes' und ist Base64-kodiert + file_content = base64.b64decode(att["contentBytes"]) + + # Dateinamen bereinigen + safe_filename = "".join(c if c.isalnum() or c in (" ", ".", "_", "-") else "_" for c in filename) + filepath = os.path.join(DOWNLOAD_DIR, safe_filename) + + try: + with open(filepath, "wb") as f: + f.write(file_content) + print(f" PDF erfolgreich gespeichert: {filepath}") + pdf_found = True + except Exception as e: + print(f" Fehler beim Speichern der Datei: {e}") + + if pdf_found: + print(f" E-Mail wird in den Ordner '{PROCESSED_FOLDER_NAME}' verschoben...") + move_url = f"{GRAPH_API_ENDPOINT}/users/{USER_EMAIL}/messages/{msg_id}/move" + move_payload = {"destinationId": processed_folder_id} + + response = requests.post(move_url, headers=headers, json=move_payload) + if response.status_code == 201: + print(" E-Mail erfolgreich verschoben.") + else: + # Für das Verschieben ist die Berechtigung Mail.ReadWrite erforderlich! + print(f" Fehler beim Verschieben der E-Mail: {response.status_code} - {response.text}") + + print("\nVerarbeitung abgeschlossen.") + + +if __name__ == "__main__": + if not os.path.exists(DOWNLOAD_DIR): + print(f"Fehler: Der Download-Ordner existiert nicht: {DOWNLOAD_DIR}") + else: + main()