diff --git a/.github/ISSUE_TEMPLATE.md b/.github/ISSUE_TEMPLATE/bug_report.md
similarity index 83%
rename from .github/ISSUE_TEMPLATE.md
rename to .github/ISSUE_TEMPLATE/bug_report.md
index 3a375bcbe9..9c0577106e 100644
--- a/.github/ISSUE_TEMPLATE.md
+++ b/.github/ISSUE_TEMPLATE/bug_report.md
@@ -1,10 +1,19 @@
+---
+name: Bug report
+about: Report a bug
+title: ''
+labels: type:bug
+assignees: ''
+
+---
+
diff --git a/README.md b/README.md
index 5214b0e547..33e7a8956b 100644
--- a/README.md
+++ b/README.md
@@ -37,6 +37,12 @@ The present "extended" version of Overleaf CE includes:
- Symbol Palette
- "From External URL" feature
+> [!CAUTION]
+> Overleaf Community Edition is intended for use in environments where **all** users are trusted. Community Edition is **not** appropriate for scenarios where isolation of users is required due to Sandbox Compiles not being available. When not using Sandboxed Compiles, users have full read and write access to the `sharelatex` container resources (filesystem, network, environment variables) when running LaTeX compiles.
+Therefore, in any environment where not all users can be fully trusted, it is strongly recommended to enable the Sandboxed Compiles feature available in the Extended Community Edition.
+
+For more information on Sandbox Compiles check out Overleaf [documentation](https://docs.overleaf.com/on-premises/configuration/overleaf-toolkit/server-pro-only-configuration/sandboxed-compiles).
+
## Enterprise
If you want help installing and maintaining Overleaf in your lab or workplace, Overleaf offers an officially supported version called [Overleaf Server Pro](https://www.overleaf.com/for/enterprises).
@@ -44,1010 +50,16 @@ If you want help installing and maintaining Overleaf in your lab or workplace, O
## Installation
Detailed installation instructions can be found in the [Overleaf Toolkit](https://github.com/overleaf/toolkit/).
-To run a custom image, add a file named docker-compose.override.yml with the following or similar content into the `overleaf-toolkit/config directory`:
-
-```yml
----
-services:
- sharelatex:
- image: sharelatex/sharelatex:ext-ce
- volumes:
- - ../config/certs:/overleaf/certs
-```
-Here, the attached volume provides convenient access for the container to the certificates needed for SAML or LDAP authentication.
-
-If you want to build a Docker image of the extended CE based on the upstream v5.5.0 codebase, you can check out the corresponding tag by running:
-```
-git checkout v5.5.0-ext-v3
-```
-After building the image, switch to the latest state of the repository and check the `server-ce/hotfix` directory. If a subdirectory matching your version (e.g., `5.5.1`) exists, build a patched image.
-Alternatively, you can download a prebuilt image from Docker Hub:
-```
-docker pull overleafcep/sharelatex:5.5.0-ext-v3
-```
-Make sure to update the image name in overleaf-toolkit/config/docker-compose.override.yml accordingly.
-
-### New in `v5.4.0-ext-v2`:
-
-- Added "From External URL" feature
-- Introduced Template Gallery
-- Improved keyboard input experience in the Symbol Palette
-- Fixed compilation error when using the `minted` package
-
-### New in `v5.4.1-ext-v3`:
-
-- Based on upstream codebase v5.4.1
-- Sandboxed compiles: Made the `TEX_LIVE_DOCKER_IMAGE` environment variable optional
-- Template Gallery: Fixed bugs
-- Template Gallery: improved visual presentation of modals and enhanced keyboard interactions
-- Template Gallery **breaking change**: Replaced the free-text license field with a dropdown (select box)
-
-
-
Details
-The free-text license field in the Template Gallery code has been replaced with a dropdown (select box).
-To update your template database, run the following command:
-
-```
-overleaf-toolkit/bin/docker-compose exec -T mongo mongosh sharelatex < updateLicenses.js
-```
-The `updateLicenses.js` script is as follows:
-```
-db.templates.updateMany({ license: { $nin: ["cc_by_4.0", "lppl_1.3c", "other"] } },
- [
- {
- $set: {
- license: {
- $switch: {
- branches: [
- {
- case: { $eq: ["$license", "Creative Commons CC BY 4.0"] },
- then: "cc_by_4.0"
- },
- {
- case: { $eq: ["$license", "LaTeX Project Public License 1.3c"] },
- then: "lppl_1.3c"
- }
- ],
- default: "other"
- }
- }
- }
- }
- ]
-)
-```
-
-
-### New in `v5.5.0-ext-v3`:
-
-- Based on upstream codebase v5.5.0
-
-
-## Sandboxed Compiles
-
-To enable sandboxed compiles (also known as "Sibling containers"), set the following configuration options in `overleaf-toolkit/config/overleaf.rc`:
-
-```
-SERVER_PRO=true
-SIBLING_CONTAINERS_ENABLED=true
-```
-
-The following environment variables are used to specify which TeX Live images to use for sandboxed compiles:
-
-- `ALL_TEX_LIVE_DOCKER_IMAGES` **(required)**
- * A comma-separated list of TeX Live images to use. These images will be downloaded or updated.
- To skip downloading, set `SIBLING_CONTAINERS_PULL=false` in `config/overleaf.rc`.
-- `ALL_TEX_LIVE_DOCKER_IMAGE_NAMES`
- * A comma-separated list of friendly names for the images. If omitted, the version name will be used (e.g., `latest-full`).
-- `TEX_LIVE_DOCKER_IMAGE`
- * The default TeX Live image used for compiling new projects. This image must be included in `ALL_TEX_LIVE_DOCKER_IMAGES`. If not set,
- the first image in `ALL_TEX_LIVE_DOCKER_IMAGES` will be used as the default image.
-
-Users can select the image for their project in the project menu.
-
-Here is an example where the default TeX Live image is `latest-full` from Docker Hub, but the `TL2024-historic` image can be used for older projects:
-```
-ALL_TEX_LIVE_DOCKER_IMAGES=texlive/texlive:latest-full, texlive/texlive:TL2024-historic
-ALL_TEX_LIVE_DOCKER_IMAGE_NAMES=TeXLive 2025, TeXLive 2024
-TEX_LIVE_DOCKER_IMAGE=texlive/texlive:latest-full
-```
-For additional details refer to
-[Server Pro: Sandboxed Compiles](https://github.com/overleaf/overleaf/wiki/Server-Pro:-Sandboxed-Compiles) and
-[Toolkit: Sandboxed Compiles](https://github.com/overleaf/toolkit/blob/master/doc/sandboxed-compiles.md).
-
-When the compilation takes place in a dedicated container, it is relatively safe to permit running external commands from inside the TeX
-file during compilation. This is required for packages like `minted`. For this purpose, the following environment variable can be used:
-
-- `TEX_COMPILER_EXTRA_FLAGS`
- * A list of extra flags for TeX compiler. Example: `-shell-escape -file-line-error`
-
-
-
Sample variables.env file
-
-```
-OVERLEAF_APP_NAME="Our Overleaf Instance"
-
-ENABLED_LINKED_FILE_TYPES=project_file,project_output_file,url
-
-# Enables Thumbnail generation using ImageMagick
-ENABLE_CONVERSIONS=true
-
-# Disables email confirmation requirement
-EMAIL_CONFIRMATION_DISABLED=true
-
-## Nginx
-# NGINX_WORKER_PROCESSES=4
-# NGINX_WORKER_CONNECTIONS=768
-
-## Set for TLS via nginx-proxy
-# OVERLEAF_BEHIND_PROXY=true
-# OVERLEAF_SECURE_COOKIE=true
-
-OVERLEAF_SITE_URL=http://my-overleaf-instance.com
-OVERLEAF_NAV_TITLE=Our Overleaf Instance
-# OVERLEAF_HEADER_IMAGE_URL=http://somewhere.com/mylogo.png
-OVERLEAF_ADMIN_EMAIL=support@example.com
-
-OVERLEAF_LEFT_FOOTER=[{"text": "Contact your support team", "url": "mailto:support@example.com"}]
-OVERLEAF_RIGHT_FOOTER=[{"text":"Hello, I am on the Right", "url":"https://github.com/yu-i-i/overleaf-cep"}]
-
-OVERLEAF_EMAIL_FROM_ADDRESS=team@example.com
-OVERLEAF_EMAIL_SMTP_HOST=smtp.example.com
-OVERLEAF_EMAIL_SMTP_PORT=587
-OVERLEAF_EMAIL_SMTP_SECURE=false
-# OVERLEAF_EMAIL_SMTP_USER=
-# OVERLEAF_EMAIL_SMTP_PASS=
-# OVERLEAF_EMAIL_SMTP_NAME=
-OVERLEAF_EMAIL_SMTP_LOGGER=false
-OVERLEAF_EMAIL_SMTP_TLS_REJECT_UNAUTH=true
-OVERLEAF_EMAIL_SMTP_IGNORE_TLS=false
-OVERLEAF_CUSTOM_EMAIL_FOOTER=This system is run by department x
-
-OVERLEAF_PROXY_LEARN=true
-NAV_HIDE_POWERED_BY=true
-
-########################
-## Sandboxed Compiles ##
-########################
-
-ALL_TEX_LIVE_DOCKER_IMAGES=texlive/texlive:latest-full, texlive/texlive:TL2024-historic
-ALL_TEX_LIVE_DOCKER_IMAGE_NAMES=TeXLive 2024, TeXLive 2023
-TEX_LIVE_DOCKER_IMAGE=texlive/texlive:latest-full
-TEX_COMPILER_EXTRA_FLAGS=-shell-escape
-```
-
-
-## "From External URL" feature
-
-To enable the ["From External URL"](https://www.overleaf.com/learn/how-to/How_to_upload_a_file_using_an_external_URL) feature the variable
-`ENABLED_LINKED_FILE_TYPES` must include `url` type:
-```
-ENABLED_LINKED_FILE_TYPES=project_file,project_output_file,url
-```
-This will extend both the *Add Files* menu and the *Insert Figure* dropdown in the toolbar: the *Add Files* menu allows you to add a
-file to your project using its URL, while the *Insert Figure* dropdown lets you insert an image into your document directly from its URL.
-
-## Template Gallery
-
-
-The Template Gallery feature is controlled using the following environment variables:
-
-- `OVERLEAF_TEMPLATE_GALLERY`: Set to `true` to enable the Template Gallery.
-
-- `OVERLEAF_TEMPLATE_CATEGORIES`: An optional whitespace-separated list of zero or more template category keys. Valid keys include:
- _`academic-journal book presentation poster cv homework bibliography calendar formal-letter report thesis newsletter`_
-
- The special key `all` is automatically appended. This key represents a category that includes all templates.
-
- For each category key, the following optional environment variables can be set:
- - `TEMPLATE__NAME`: The display name of the template category.
- - `TEMPLATE__DESCRIPTION`: A short description of the category.
-
- If a category key contains a hyphen (`-`), replace it with an underscore (`_`) in the environment variable names.
-
-- `ENABLE_CONVERSIONS`: Must be set to `true` to enable thumbnail and preview generation for templates.
-
-- `OVERLEAF_NON_ADMIN_CAN_PUBLISH_TEMPLATES`: Determines whether non-admin users can publish templates. Defaults to `false`.
-
-To publish a project as a template, select the appropriate option from the project menu. In the form that appears, enter the template details:
-
-
-- The *Title* must be unique.
-- The *Description* field supports Markdown formatting.
-- The *Author* field accepts Markdown-formatted links.
-
-After submission, template details can be edited, or the template can be deleted via the Template Gallery page.
-Users can manage their own templates; admins can manage any template.
-
-
-
Example
-
-```
-#################
-# TEMPLATES #
-#################
-
-ENABLE_CONVERSIONS=true
-
-OVERLEAF_TEMPLATE_GALLERY=true
-OVERLEAF_NON_ADMIN_CAN_PUBLISH_TEMPLATES=true
-OVERLEAF_TEMPLATE_CATEGORIES=academic-journal book presentation poster cv homework bibliography calendar formal-letter report thesis newsletter
-
-TEMPLATE_ACADEMIC_JOURNAL_NAME=Journal articles
-TEMPLATE_ACADEMIC_JOURNAL_DESCRIPTION=Templates for academic journal submissions, including formats for major publishers and preprint servers.
-
-TEMPLATE_BIBLIOGRAPHY_NAME=Bibliographies
-TEMPLATE_BIBLIOGRAPHY_DESCRIPTION=Styles for creating and managing bibliographies with BibTeX or BibLaTeX. Suitable for use in academic papers, theses, and reports.
-
-TEMPLATE_BOOK_NAME=Books
-TEMPLATE_BOOK_DESCRIPTION=Templates for writing books or long-form documents, including chapter structuring, front matter, and indexing.
-
-TEMPLATE_CALENDAR_NAME=Calendars
-TEMPLATE_CALENDAR_DESCRIPTION=Templates to create yearly, monthly, or weekly calendars. Useful for personal planners or event scheduling.
-
-TEMPLATE_CV_NAME=CVs and résumés
-TEMPLATE_CV_DESCRIPTION=Templates for CVs and résumés with various formats for academic, industry, and creative positions.
-
-TEMPLATE_FORMAL_LETTER_NAME=Formal letters
-TEMPLATE_FORMAL_LETTER_DESCRIPTION=Templates for professional letters, such as cover letters, recommendation letters, and official correspondence.
-
-TEMPLATE_HOMEWORK_NAME=Assignments
-TEMPLATE_HOMEWORK_DESCRIPTION=Templates for homework, coursework, and problem sets. Designed to be clean and well-structured for students and educators.
-
-TEMPLATE_NEWSLETTER_NAME=Newsletters
-TEMPLATE_NEWSLETTER_DESCRIPTION=Templates for creating newsletters with formats for academic, corporate, or community communications.
-
-TEMPLATE_POSTER_NAME=Posters
-TEMPLATE_POSTER_DESCRIPTION=Templates for scientific and academic posters, typically used in conferences and research presentations.
-
-TEMPLATE_PRESENTATION_NAME=Presentations
-TEMPLATE_PRESENTATION_DESCRIPTION=Templates for Beamer and other presentation formats, tailored for academic talks and lectures.
-
-TEMPLATE_REPORT_NAME=Reports
-TEMPLATE_REPORT_DESCRIPTION=Templates for technical, lab, or project reports. Includes sections for figures, tables, and references.
-
-TEMPLATE_THESIS_NAME=Theses
-TEMPLATE_THESIS_DESCRIPTION=Templates for writing theses and dissertations, following institutional formatting and citation guidelines.
-
-TEMPLATE_ALL_NAME=All templates
-TEMPLATE_ALL_DESCRIPTION=Browse a collection of all available LaTeX templates, categorized by document type, style, and purpose.
-
-```
-
-
-
-
-## Authentication Methods
-
-The following authentication methods are supported: local authentication, LDAP authentication, SAML authentication,
-and OpenID Connect (OIDC) authentication. Local authentication is always active. The environment variable `EXTERNAL_AUTH`
-specifies which external authentication methods are activated. The value of this variable is a list. If the list includes `ldap`, `saml`, or `oidc`,
-then LDAP authentication, SAML authentication, and OIDC authentication will be activated, respectively.
-
-For example: `EXTERNAL_AUTH=ldap saml oidc`
-
-This configuration activates all available authentication methods, although this is rarely necessary.
-
-
-
Local Authentication
-
-Password of local users stored in the MongoDB database. An admin user can create a new local user. For details, visit the
-[wiki of Overleaf project](https://github.com/overleaf/overleaf/wiki/Creating-and-managing-users).
-
-It is possible to enforce password restrictions on local users:
-
-
-* `OVERLEAF_PASSWORD_VALIDATION_MIN_LENGTH`: The minimum length required
-
-* `OVERLEAF_PASSWORD_VALIDATION_MAX_LENGTH`: The maximum length allowed
-
-* `OVERLEAF_PASSWORD_VALIDATION_PATTERN`: is used to validate password strength
-
- - `abc123` – password requires 3 letters and 3 numbers and be at least 6 characters long
- - `aA` – password requires lower and uppercase letters and be at least 2 characters long
- - `ab$3` – it must contain letters, digits and symbols and be at least 4 characters long
- - There are 4 groups of characters: letters, UPPERcase letters, digits, symbols. Anything that is neither a letter nor a digit is considered to be a symbol.
-
-
-
-
-
LDAP Authentication
-
-Internally, Overleaf LDAP uses the [passport-ldapauth](https://github.com/vesse/passport-ldapauth) library. Most of these configuration options are passed through to the `server` config object which is used to configure `passport-ldapauth`. If you are having issues configuring LDAP, it is worth reading the README for `passport-ldapauth` to understand the configuration it expects.
-
-When using Local and LDAP authentication methods, a user enters a `username` and `password` in the login form. If LDAP authentication is enabled, it is attempted first:
-
-1. An LDAP user is searched for in the LDAP directory using the filter defined by `OVERLEAF_LDAP_SEARCH_FILTER` and authenticated.
-2. If authentication is successful, the Overleaf users database is checked for a user with the primary email address that matches the email address of the authenticated LDAP user:
- - If a matching user is found, the `hashedPassword` field for this user is deleted (if it exists). This ensures that the user can only log in via LDAP authentication in the future.
- - If no matching user is found, a new Overleaf user is created using the email, first name, and last name retrieved from the LDAP server.
-3. If LDAP authentication fails or is unsuccessful, local authentication is attempted.
-
-#### Environment Variables
-
-- `OVERLEAF_LDAP_URL` **(required)**
- * URL of the LDAP server.
-
- - Example: `ldaps://ldap.example.com:636` (LDAP over SSL)
- - Example: `ldap://ldap.example.com:389` (unencrypted or STARTTLS, if configured).
-
-- `OVERLEAF_LDAP_EMAIL_ATT`
- * The email attribute returned by the LDAP server, default `mail`. Each LDAP user must have at least one email address.
- If multiple addresses are provided, only the first one will be used.
-
-- `OVERLEAF_LDAP_FIRST_NAME_ATT`
- * The property name holding the first name of the user which is used in the application, usually `givenName`.
-
-- `OVERLEAF_LDAP_LAST_NAME_ATT`
- * The property name holding the family name of the user which is used in the application, usually `sn`.
-
-- `OVERLEAF_LDAP_NAME_ATT`
- * The property name holding the full name of the user, usually `cn`. If either of the two previous variables is not defined,
- the first and/or last name of the user is extracted from this variable. Otherwise, it is not used.
-
-- `OVERLEAF_LDAP_PLACEHOLDER`
- * The placeholder for the login form, defaults to `Username`.
-
-- `OVERLEAF_LDAP_UPDATE_USER_DETAILS_ON_LOGIN`
- * If set to `true`, updates the LDAP user `first_name` and `last_name` field on login, and turn off the user details form on the `/user/settings`
- page for LDAP users. Otherwise, details will be fetched only on first login.
-
-- `OVERLEAF_LDAP_BIND_DN`
- * The distinguished name of the LDAP user that should be used for the LDAP connection
- (this user should be able to search/list accounts on the LDAP server),
- e.g., `cn=ldap_reader,dc=example,dc=com`. If not defined, anonymous binding is used.
-
-- `OVERLEAF_LDAP_BIND_CREDENTIALS`
- * Password for `OVERLEAF_LDAP_BIND_DN`.
-
-- `OVERLEAF_LDAP_BIND_PROPERTY`
- * Property of the user to bind against the client, defaults to `dn`.
-
-- `OVERLEAF_LDAP_SEARCH_BASE` **(required)**
- * The base DN from which to search for users. E.g., `ou=people,dc=example,dc=com`.
-
-- `OVERLEAF_LDAP_SEARCH_FILTER`
- * LDAP search filter with which to find a user. Use the literal '{{username}}' to have the given username be interpolated in for the LDAP search.
-
- - Example: `(|(uid={{username}})(mail={{username}}))` (user can login with email or with login name).
- - Example: `(sAMAccountName={{username}})` (Active Directory).
-
-- `OVERLEAF_LDAP_SEARCH_SCOPE`
- * The scope of the search can be `base`, `one`, or `sub` (default).
-
-- `OVERLEAF_LDAP_SEARCH_ATTRIBUTES`
- * JSON array of attributes to fetch from the LDAP server, e.g., `["uid", "mail", "givenName", "sn"]`.
- By default, all attributes are fetched.
-
-- `OVERLEAF_LDAP_STARTTLS`
- * If `true`, LDAP over TLS is used.
-
-- `OVERLEAF_LDAP_TLS_OPTS_CA_PATH`
- * Path to the file containing the CA certificate used to verify the LDAP server's SSL/TLS certificate. If there are multiple certificates, then
- it can be a JSON array of paths to the certificates. The files must be accessible to the docker container.
-
- - Example (one certificate): `/overleaf/certs/ldap_ca_cert.pem`
- - Example (multiple certificates): `["/overleaf/certs/ldap_ca_cert1.pem", "/overleaf/certs/ldap_ca_cert2.pem"]`
-
-- `OVERLEAF_LDAP_TLS_OPTS_REJECT_UNAUTH`
- * If `true`, the server certificate is verified against the list of supplied CAs.
-
-- `OVERLEAF_LDAP_CACHE`
- * If `true`, then up to 100 credentials at a time will be cached for 5 minutes.
-
-- `OVERLEAF_LDAP_TIMEOUT`
- * How long the client should let operations live for before timing out, ms (Default: Infinity).
-
-- `OVERLEAF_LDAP_CONNECT_TIMEOUT`
- * How long the client should wait before timing out on TCP connections, ms (Default: OS default).
-
-- `OVERLEAF_LDAP_IS_ADMIN_ATT` and `OVERLEAF_LDAP_IS_ADMIN_ATT_VALUE`
- * When both environment variables are set, the login process updates `user.isAdmin = true` if the LDAP profile contains the attribute specified by
- `OVERLEAF_LDAP_IS_ADMIN_ATT` and its value either matches `OVERLEAF_LDAP_IS_ADMIN_ATT_VALUE` or is an array containing `OVERLEAF_LDAP_IS_ADMIN_ATT_VALUE`,
- otherwise `user.isAdmin` is set to `false`. If either of these variables is not set, then the admin status is only set to `true` during admin user
- creation in Launchpad.
-
-The following five variables are used to configure how user contacts are retrieved from the LDAP server.
-
-- `OVERLEAF_LDAP_CONTACTS_FILTER`
- * The filter used to search for users in the LDAP server to be loaded into contacts. The placeholder '{{userProperty}}' within the filter is replaced with the value of
- the property specified by `OVERLEAF_LDAP_CONTACTS_PROPERTY` from the LDAP user initiating the search. If not defined, no users are retrieved from the LDAP server into contacts.
-
-- `OVERLEAF_LDAP_CONTACTS_SEARCH_BASE`
- * Specifies the base DN from which to start searching for the contacts. Defaults to `OVERLEAF_LDAP_SEARCH_BASE`.
-
-- `OVERLEAF_LDAP_CONTACTS_SEARCH_SCOPE`
- * The scope of the search can be `base`, `one`, or `sub` (default).
-
-- `OVERLEAF_LDAP_CONTACTS_PROPERTY`
- * Specifies the property of the user object that will replace the '{{userProperty}}' placeholder in the `OVERLEAF_LDAP_CONTACTS_FILTER`.
-
-- `OVERLEAF_LDAP_CONTACTS_NON_LDAP_VALUE`
- * Specifies the value of the `OVERLEAF_LDAP_CONTACTS_PROPERTY` if the search is initiated by a non-LDAP user. If this variable is not defined, the resulting filter
- will match nothing. The value `*` can be used as a wildcard.
-
-
-
Example
-
- OVERLEAF_LDAP_CONTACTS_FILTER=(gidNumber={{userProperty}})
- OVERLEAF_LDAP_CONTACTS_PROPERTY=gidNumber
- OVERLEAF_LDAP_CONTACTS_NON_LDAP_VALUE=1000
-
-The above example results in loading into the contacts of the current LDAP user all LDAP users who have the same UNIX `gid`. Non-LDAP users will have all LDAP users with UNIX `gid=1000` in their contacts.
-
-
-
-
-
-
Sample variables.env file
-
-```
-OVERLEAF_APP_NAME="Our Overleaf Instance"
-
-ENABLED_LINKED_FILE_TYPES=project_file,project_output_file,url
-
-# Enables Thumbnail generation using ImageMagick
-ENABLE_CONVERSIONS=true
-
-# Disables email confirmation requirement
-EMAIL_CONFIRMATION_DISABLED=true
-
-## Nginx
-# NGINX_WORKER_PROCESSES=4
-# NGINX_WORKER_CONNECTIONS=768
-
-## Set for TLS via nginx-proxy
-# OVERLEAF_BEHIND_PROXY=true
-# OVERLEAF_SECURE_COOKIE=true
-
-OVERLEAF_SITE_URL=http://my-overleaf-instance.com
-OVERLEAF_NAV_TITLE=Our Overleaf Instance
-# OVERLEAF_HEADER_IMAGE_URL=http://somewhere.com/mylogo.png
-OVERLEAF_ADMIN_EMAIL=support@example.com
-
-OVERLEAF_LEFT_FOOTER=[{"text": "Contact your support team", "url": "mailto:support@example.com"}]
-OVERLEAF_RIGHT_FOOTER=[{"text":"Hello, I am on the Right", "url":"https://github.com/yu-i-i/overleaf-cep"}]
-
-OVERLEAF_EMAIL_FROM_ADDRESS=team@example.com
-OVERLEAF_EMAIL_SMTP_HOST=smtp.example.com
-OVERLEAF_EMAIL_SMTP_PORT=587
-OVERLEAF_EMAIL_SMTP_SECURE=false
-# OVERLEAF_EMAIL_SMTP_USER=
-# OVERLEAF_EMAIL_SMTP_PASS=
-# OVERLEAF_EMAIL_SMTP_NAME=
-OVERLEAF_EMAIL_SMTP_LOGGER=false
-OVERLEAF_EMAIL_SMTP_TLS_REJECT_UNAUTH=true
-OVERLEAF_EMAIL_SMTP_IGNORE_TLS=false
-OVERLEAF_CUSTOM_EMAIL_FOOTER=This system is run by department x
-
-OVERLEAF_PROXY_LEARN=true
-NAV_HIDE_POWERED_BY=true
-
-#################
-## LDAP for CE ##
-#################
-
-EXTERNAL_AUTH=ldap
-OVERLEAF_LDAP_URL=ldap://ldap.example.com:389
-OVERLEAF_LDAP_STARTTLS=true
-OVERLEAF_LDAP_TLS_OPTS_CA_PATH=/overleaf/certs/ldap_ca_cert.pem
-OVERLEAF_LDAP_SEARCH_BASE=ou=people,dc=example,dc=com
-OVERLEAF_LDAP_SEARCH_FILTER=(|(uid={{username}})(mail={{username}}))
-OVERLEAF_LDAP_BIND_DN=cn=ldap_reader,dc=example,dc=com
-OVERLEAF_LDAP_BIND_CREDENTIALS=GoodNewsEveryone
-OVERLEAF_LDAP_EMAIL_ATT=mail
-OVERLEAF_LDAP_FIRST_NAME_ATT=givenName
-OVERLEAF_LDAP_LAST_NAME_ATT=sn
-# OVERLEAF_LDAP_NAME_ATT=cn
-OVERLEAF_LDAP_SEARCH_ATTRIBUTES=["uid", "sn", "givenName", "mail"]
-
-OVERLEAF_LDAP_UPDATE_USER_DETAILS_ON_LOGIN=true
-
-OVERLEAF_LDAP_PLACEHOLDER='Username or email address'
-
-OVERLEAF_LDAP_IS_ADMIN_ATT=mail
-OVERLEAF_LDAP_IS_ADMIN_ATT_VALUE=admin@example.com
-
-OVERLEAF_LDAP_CONTACTS_FILTER=(gidNumber={{userProperty}})
-OVERLEAF_LDAP_CONTACTS_PROPERTY=gidNumber
-OVERLEAF_LDAP_CONTACTS_NON_LDAP_VALUE='*'
-```
-
-
-
-Deprecated variables
-
-**These variables will be removed soon**, use `OVERLEAF_LDAP_IS_ADMIN_ATT` and `OVERLEAF_LDAP_IS_ADMIN_ATT_VALUE` instead.
-
-The following variables are used to determine if the user has admin rights.
-Please note: the user gains admin status if the search result is not empty, not when the user is explicitly included in the search results.
-
-- `OVERLEAF_LDAP_ADMIN_SEARCH_BASE`
- * Specifies the base DN from which to start searching for the admin group. If this variable is defined,
- `OVERLEAF_LDAP_ADMIN_SEARCH_FILTER` must also be defined for the search to function properly.
-
-- `OVERLEAF_LDAP_ADMIN_SEARCH_FILTER`
- * Defines the LDAP search filter used to identify the admin group. The placeholder `{{dn}}` within the filter
- is replaced with the value of the property specified by `OVERLEAF_LDAP_ADMIN_DN_PROPERTY`. The placeholder `{{username}}` is also supported.
-
-- `OVERLEAF_LDAP_ADMIN_DN_PROPERTY`
- * Specifies the property of the user object that will replace the '{{dn}}' placeholder
- in the `OVERLEAF_LDAP_ADMIN_SEARCH_FILTER`, defaults to `dn`.
-
-- `OVERLEAF_LDAP_ADMIN_SEARCH_SCOPE`
- * The scope of the LDAP search can be `base`, `one`, or `sub` (default)
-
-
-
Example
-
-In the following example admins are members of a group `admins`, the objectClass of the entry `admins` is `groupOfNames`:
-
- OVERLEAF_LDAP_ADMIN_SEARCH_BASE='cn=admins,ou=group,dc=example,dc=com'
- OVERLEAF_LDAP_ADMIN_SEARCH_FILTER='(member={{dn}})'
-
-In the following example admins are members of a group 'admins', the objectClass of the entry `admins` is `posixGroup`:
-
- OVERLEAF_LDAP_ADMIN_SEARCH_BASE='cn=admins,ou=group,dc=example,dc=com'
- OVERLEAF_LDAP_ADMIN_SEARCH_FILTER='(memberUid={{username}})'
-
-In the following example admins are users with UNIX gid=1234:
-
- OVERLEAF_LDAP_ADMIN_SEARCH_BASE='ou=people,dc=example,dc=com'
- OVERLEAF_LDAP_ADMIN_SEARCH_FILTER='(&(gidNumber=1234)(uid={{username}}))'
-
-In the following example admin is the user with `uid=someuser`:
-
- OVERLEAF_LDAP_ADMIN_SEARCH_BASE='ou=people,dc=example,dc=com'
- OVERLEAF_LDAP_ADMIN_SEARCH_FILTER='(&(uid=someuser)(uid={{username}}))'
-
-The filter
-
- OVERLEAF_LDAP_ADMIN_SEARCH_FILTER='(uid=someuser)'
-
-where `someuser` is the uid of an existing user, will always produce a non-empty search result.
-As a result, **every user will be granted admin rights**, not just `someuser`, as one might expect.
-
-
-
-
-
-
-
SAML Authentication
-
-Internally, Overleaf SAML module uses the [passport-saml](https://github.com/node-saml/passport-saml) library, most of the following
-configuration options are passed through to `passport-saml`. If you are having issues configuring SAML, it is worth reading the README
-for `passport-saml` to get a feel for the configuration it expects.
-
-When using the SAML authentication method, a user is redirected to the Identity Provider (IdP) authentication site.
-If the IdP successfully authenticates the user, the Overleaf users database is checked for a record containing a `samlIdentifiers` field structured as follows:
-
-```
-samlIdentifiers: [
- {
- externalUserId: "...",
- providerId: "1",
- userIdAttribute: "..."
- }
-]
-```
-The `externalUserId` must match the value of the property specified by `userIdAttribute` in the user profile returned by the IdP server.
-
-If no matching record is found, the database is searched for a user with the primary email address matching the email in the IdP user profile:
-
-- If such a user is found, the `hashedPassword` field is deleted to disable local authentication, and the `samlIdentifiers` field is added.
-- If no matching user is found, a new user is created with the email address and `samlIdentifiers` from the IdP profile.
-
-**Note:** Currently, only one SAML IdP is supported. The `providerId` field in `samlIdentifiers` is fixed to `'1'`.
-
-#### Environment Variables
-
-- `OVERLEAF_SAML_IDENTITY_SERVICE_NAME`
- * Display name for the identity service, used on the login page (default: `Log in with SAML IdP`).
-
-- `OVERLEAF_SAML_USER_ID_FIELD`
- * The value of this attribute will be used by Overleaf as the external user ID, defaults to `nameID`.
-
-- `OVERLEAF_SAML_EMAIL_FIELD`
- * Name of the Email field in user profile, defaults to `nameID`.
-
-- `OVERLEAF_SAML_FIRST_NAME_FIELD`
- * Name of the firstName field in user profile, defaults to `givenName`.
-
-- `OVERLEAF_SAML_LAST_NAME_FIELD`
- * Name of the lastName field in user profile, defaults to `lastName`
-
-- `OVERLEAF_SAML_UPDATE_USER_DETAILS_ON_LOGIN`
- * If set to `true`, updates the user `first_name` and `last_name` field on login,
- and turn off the user details form on `/user/settings` page.
-
-- `OVERLEAF_SAML_ENTRYPOINT` **(required)**
- * Entrypoint URL for the SAML identity service.
-
- - Example: `https://idp.example.com/simplesaml/saml2/idp/SSOService.php`
- - Azure Example: `https://login.microsoftonline.com/8b26b46a-6dd3-45c7-a104-f883f4db1f6b/saml2`
-
-- `OVERLEAF_SAML_ISSUER` **(required)**
- * The Issuer name.
-
-- `OVERLEAF_SAML_AUDIENCE`
- * Expected saml response Audience, defaults to value of `OVERLEAF_SAML_ISSUER`.
-
-- `OVERLEAF_SAML_IDP_CERT` **(required)**
- * Path to a file containing the Identity Provider's public certificate, used to validate the signatures of incoming SAML responses. If the Identity Provider has multiple valid signing certificates, then
- it can be a JSON array of paths to the certificates.
-
- - Example (one certificate): `/overleaf/certs/idp_cert.pem`
- - Example (multiple certificates): `["/overleaf/certs/idp_cert.pem", "/overleaf/certs/idp_cert_old.pem"]`
-
-- `OVERLEAF_SAML_PUBLIC_CERT`
- * Path to a file containing public signing certificate used to embed in auth requests in order for the IdP to validate the signatures of the incoming SAML Request. It's required when setting up the [metadata endpoint](#metadata-for-the-identity-provider)
- when the strategy is configured with a `OVERLEAF_SAML_PRIVATE_KEY`. A JSON array of paths to certificates can be provided to support certificate rotation. When supplying an array of certificates, the first entry in the array should match the
- current `OVERLEAF_SAML_PRIVATE_KEY`. Additional entries in the array can be used to publish upcoming certificates to IdPs before changing the `OVERLEAF_SAML_PRIVATE_KEY`.
-
-- `OVERLEAF_SAML_PRIVATE_KEY`
- * Path to a file containing a PEM-formatted private key matching the `OVERLEAF_SAML_PUBLIC_CERT` used to sign auth requests sent by passport-saml.
-
-- `OVERLEAF_SAML_DECRYPTION_CERT`
- * Path to a file containing public certificate, used for the [metadata endpoint](#metadata-for-the-identity-provider).
-
-- `OVERLEAF_SAML_DECRYPTION_PVK`
- * Path to a file containing private key matching the `OVERLEAF_SAML_DECRYPTION_CERT` that will be used to attempt to decrypt any encrypted assertions that are received.
-
-- `OVERLEAF_SAML_SIGNATURE_ALGORITHM`
- * Optionally set the signature algorithm for signing requests,
- valid values are 'sha1' (default), 'sha256' (prefered), 'sha512' (most secure, check if your IdP supports it).
-
-- `OVERLEAF_SAML_ADDITIONAL_PARAMS`
- * JSON dictionary of additional query params to add to all requests.
-
-- `OVERLEAF_SAML_ADDITIONAL_AUTHORIZE_PARAMS`
- * JSON dictionary of additional query params to add to 'authorize' requests.
-
- - Example: `{"some_key": "some_value"}`
-
-- `OVERLEAF_SAML_IDENTIFIER_FORMAT`
- * Name identifier format to request from the identity provider (default: `urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress`).
- If using `urn:oasis:names:tc:SAML:2.0:nameid-format:persistent`, ensure the `OVERLEAF_SAML_EMAIL_FIELD` envirionment variable is defined.
- If `urn:oasis:names:tc:SAML:2.0:nameid-format:transient` is required, you must also define the `OVERLEAF_SAML_ID_FIELD` environment variable,
- which can, for example, be set to the user's email address.
-
-- `OVERLEAF_SAML_ACCEPTED_CLOCK_SKEW_MS`
- * Time in milliseconds of skew that is acceptable between client and server when checking OnBefore and NotOnOrAfter assertion
- condition validity timestamps. Setting to -1 will disable checking these conditions entirely. Default is 0.
-
-- `OVERLEAF_SAML_ATTRIBUTE_CONSUMING_SERVICE_INDEX`
- * `AttributeConsumingServiceIndex` attribute to add to AuthnRequest to instruct the IdP which attribute set to attach
- to the response ([link](http://blog.aniljohn.com/2014/01/data-minimization-front-channel-saml-attribute-requests.html)).
-
-- `OVERLEAF_SAML_AUTHN_CONTEXT`
- * JSON array of name identifier format values to request auth context. Default: `["urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport"]`.
-
-- `OVERLEAF_SAML_FORCE_AUTHN`
- * If `true`, the initial SAML request from the service provider specifies that the IdP should force re-authentication of the user,
- even if they possess a valid session.
-
-- `OVERLEAF_SAML_DISABLE_REQUESTED_AUTHN_CONTEXT`
- * If `true`, do not request a specific auth context. For example, you can this this to `true` to allow additional contexts such as password-less logins (`urn:oasis:names:tc:SAML:2.0:ac:classes:X509`). Support for additional contexts is dependant on your IdP.
-
-- `OVERLEAF_SAML_AUTHN_REQUEST_BINDING`
- * If set to `HTTP-POST`, will request authentication from IdP via HTTP POST binding, otherwise defaults to HTTP-Redirect.
-
-- `OVERLEAF_SAML_VALIDATE_IN_RESPONSE_TO`
- * If `always`, then InResponseTo will be validated from incoming SAML responses.
- * If `never`, then InResponseTo won't be validated (default).
- * If `ifPresent`, then InResponseTo will only be validated if present in the incoming SAML response.
-
-- `OVERLEAF_SAML_WANT_ASSERTIONS_SIGNED` and `OVERLEAF_SAML_WANT_AUTHN_RESPONSE_SIGNED`
- * When set to `true` (default), Overleaf expects the SAML Assertions, respectively the entire SAML Authentication Response, to be signed by the IdP.
- When both options are `false`, at least one of the assertions or the response must be signed.
-
-- `OVERLEAF_SAML_REQUEST_ID_EXPIRATION_PERIOD_MS`
- * Defines the expiration time when a Request ID generated for a SAML request will not be valid if seen
- in a SAML response in the `InResponseTo` field. Default: 28800000 (8 hours).
-
-- `OVERLEAF_SAML_LOGOUT_URL`
- * base address to call with logout requests (default: `entryPoint`).
-
- - Example: `https://idp.example.com/simplesaml/saml2/idp/SingleLogoutService.php`
-
-- `OVERLEAF_SAML_ADDITIONAL_LOGOUT_PARAMS`
- * JSON dictionary of additional query params to add to 'logout' requests.
-
-- `OVERLEAF_SAML_IS_ADMIN_FIELD` and `OVERLEAF_SAML_IS_ADMIN_FIELD_VALUE`
- * When both environment variables are set, the login process updates `user.isAdmin = true` if the profile returned by the SAML IdP contains the attribute specified by
- `OVERLEAF_SAML_IS_ADMIN_FIELD` and its value either matches `OVERLEAF_SAML_IS_ADMIN_FIELD_VALUE` or is an array containing `OVERLEAF_SAML_IS_ADMIN_FIELD_VALUE`,
- otherwise `user.isAdmin` is set to `false`. If either of these variables is not set, then the admin status is only set to `true` during admin user
- creation in Launchpad.
-
-#### Metadata for the Identity Provider
-
-The current version of Overleaf CE includes and endpoint to retrieve Service Provider Metadata: `http://my-overleaf-instance.com/saml/meta`
-
-The Identity Provider will need to be configured to recognize the Overleaf server as a "Service Provider". Consult the documentation for your SAML server for instructions on how to do this.
-
-Below is an example of appropriate Service Provider metadata:
-
-
-
ol-meta.xml
-
-```
-
-
-
-
-
-
- MII...
-[skipped]
-
-
-
-
-
-
-
- MII...
-[skipped]
-
-
-
-
-
-
-
-
-
- urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
-
-
-
-
-```
-
-
-Note the certificates, `AssertionConsumerService.Location`, `SingleLogoutService.Location` and `EntityDescriptor.entityID`
-and set as appropriate in your IdP configuration, or send the metadata file to the IdP admin.
-
-
-
Sample variables.env file
-
-```
-OVERLEAF_APP_NAME="Our Overleaf Instance"
-
-ENABLED_LINKED_FILE_TYPES=project_file,project_output_file,url
-
-# Enables Thumbnail generation using ImageMagick
-ENABLE_CONVERSIONS=true
-
-# Disables email confirmation requirement
-EMAIL_CONFIRMATION_DISABLED=true
-
-## Nginx
-# NGINX_WORKER_PROCESSES=4
-# NGINX_WORKER_CONNECTIONS=768
-
-## Set for TLS via nginx-proxy
-# OVERLEAF_BEHIND_PROXY=true
-# OVERLEAF_SECURE_COOKIE=true
-
-OVERLEAF_SITE_URL=http://my-overleaf-instance.com
-OVERLEAF_NAV_TITLE=Our Overleaf Instance
-# OVERLEAF_HEADER_IMAGE_URL=http://somewhere.com/mylogo.png
-OVERLEAF_ADMIN_EMAIL=support@example.com
-
-OVERLEAF_LEFT_FOOTER=[{"text": "Contact your support team", "url": "mailto:support@example.com"}]
-OVERLEAF_RIGHT_FOOTER=[{"text":"Hello, I am on the Right", "url":"https://github.com/yu-i-i/overleaf-cep"}]
-
-OVERLEAF_EMAIL_FROM_ADDRESS=team@example.com
-OVERLEAF_EMAIL_SMTP_HOST=smtp.example.com
-OVERLEAF_EMAIL_SMTP_PORT=587
-OVERLEAF_EMAIL_SMTP_SECURE=false
-# OVERLEAF_EMAIL_SMTP_USER=
-# OVERLEAF_EMAIL_SMTP_PASS=
-# OVERLEAF_EMAIL_SMTP_NAME=
-OVERLEAF_EMAIL_SMTP_LOGGER=false
-OVERLEAF_EMAIL_SMTP_TLS_REJECT_UNAUTH=true
-OVERLEAF_EMAIL_SMTP_IGNORE_TLS=false
-OVERLEAF_CUSTOM_EMAIL_FOOTER=This system is run by department x
-
-OVERLEAF_PROXY_LEARN=true
-NAV_HIDE_POWERED_BY=true
-
-#################
-## SAML for CE ##
-#################
-
-EXTERNAL_AUTH=saml
-OVERLEAF_SAML_IDENTITY_SERVICE_NAME='Log in with My IdP'
-OVERLEAF_SAML_EMAIL_FIELD=mail
-OVERLEAF_SAML_FIRST_NAME_FIELD=givenName
-OVERLEAF_SAML_LAST_NAME_FIELD=sn
-OVERLEAF_SAML_ENTRYPOINT=https://idp.example.com/simplesamlphp/saml2/idp/SSOService.php
-OVERLEAF_SAML_CALLBACK_URL=https://my-overleaf-instance.com/saml/login/callback
-OVERLEAF_SAML_LOGOUT_URL=https://idp.example.com/simplesamlphp/saml2/idp/SingleLogoutService.php
-OVERLEAF_SAML_LOGOUT_CALLBACK_URL=https://my-overleaf-instance.com/saml/logout/callback
-OVERLEAF_SAML_ISSUER=MyOverleaf
-OVERLEAF_SAML_IDP_CERT=/overleaf/certs/idp_cert.pem
-OVERLEAF_SAML_PUBLIC_CERT=/overleaf/certs/myol_cert.pem
-OVERLEAF_SAML_PRIVATE_KEY=/overleaf/certs/myol_key.pem
-OVERLEAF_SAML_DECRYPTION_CERT=/overleaf/certs/myol_decr_cert.pem
-OVERLEAF_SAML_DECRYPTION_PVK=/overleaf/certs/myol_decr_key.pem
-OVERLEAF_SAML_IS_ADMIN_FIELD=mail
-OVERLEAF_SAML_IS_ADMIN_FIELD_VALUE=overleaf.admin@example.com
-```
-
-
-
-
-
OIDC Authentication
-
-Internally, Overleaf OIDC module uses the [passport-openidconnect](https://github.com/jaredhanson/passport-openidconnect) library.
-If you are having issues configuring OpenID Connect, it is worth reading the README for `passport-openidconnect` to get a feel for the configuration it expects.
-
-
-When using the OIDC authentication method, a user is redirected to the Identity Provider (IdP) authentication site.
-If the IdP successfully authenticates the user, the Overleaf users database is checked for a record containing a `thirdPartyIdentifiers` field structured as follows:
-
-```
-thirdPartyIdentifiers: [
- {
- externalUserId: "...",
- externalData: null,
- providerId: "..."
- }
-]
-```
-
-The `externalUserId` must match the user ID in the profile returned by the IdP server (see the `OVERLEAF_OIDC_USER_ID_FIELD` environment variable), and `providerId`
-must match the ID of the OIDC provider (see the `OVERLEAF_OIDC_PROVIDER_ID`).
-
-If no matching record is found, the database is searched for a user with the primary email address matching the email in the IdP user profile:
-- If such a user is found, the `thirdPartyIdentifiers` field is updated.
-- If no matching user is found, a new user is created with the email address and `thirdPartyIdentifiers` from the IdP profile.
-
-In both cases, the user is said to be 'linked' to the external OIDC user. The user can be unlinked from the OIDC provider on the `/user/settings` page.
-
-
-#### Environment Variables
-
-The values of the following five required variables can be found using `.well-known/openid-configuration` endpoint of your OpenID Provider (OP).
-
-- `OVERLEAF_OIDC_ISSUER` **(required)**
-
-- `OVERLEAF_OIDC_AUTHORIZATION_URL` **(required)**
-
-- `OVERLEAF_OIDC_TOKEN_URL` **(required)**
-
-- `OVERLEAF_OIDC_USER_INFO_URL` **(required)**
-
-- `OVERLEAF_OIDC_LOGOUT_URL` **(required)**
-
-The values of the following two required variables will be provided by the admin of your OP
-
-- `OVERLEAF_OIDC_CLIENT_ID` **(required)**
-
-- `OVERLEAF_OIDC_CLIENT_SECRET` **(required)**
-
-- `OVERLEAF_OIDC_SCOPE`
- * Default: `openid profile email`
-
-- `OVERLEAF_OIDC_PROVIDER_ID`
- * Arbitrary ID of the OP, defaults to `oidc`.
-
-- `OVERLEAF_OIDC_PROVIDER_NAME`
- * The name of the OP, used in the `Linked Accounts` section of the `/user/settings` page, defaults to `OIDC Provider`.
-
-- `OVERLEAF_OIDC_IDENTITY_SERVICE_NAME`
- * Display name for the identity service, used on the login page (default: `Log in with $OVERLEAF_OIDC_PROVIDER_NAME`).
-
-- `OVERLEAF_OIDC_PROVIDER_DESCRIPTION`
- * Description of OP, used in the `Linked Accounts` section (default: `Log in with $OVERLEAF_OIDC_PROVIDER_NAME`).
-
-- `OVERLEAF_OIDC_PROVIDER_INFO_LINK`
- * `Learn more` URL in the OP description, default: no `Learn more` link in the description.
-
-- `OVERLEAF_OIDC_PROVIDER_HIDE_NOT_LINKED`
- * Do not show OP on the `/user/settings` page, if the user's account is not linked with the OP, default `false`.
-
-- `OVERLEAF_OIDC_USER_ID_FIELD`
- * The value of this attribute will be used by Overleaf as the external user ID, defaults to `id`.
- Other possible reasonable values are `email` and `username` (corresponding to `preferred_username` OIDC claim).
-
-- `OVERLEAF_OIDC_UPDATE_USER_DETAILS_ON_LOGIN`
- * If set to `true`, updates the user `first_name` and `last_name` field on login,
- and disables the user details form on `/user/settings` page.
-
-- `OVERLEAF_OIDC_IS_ADMIN_FIELD` and `OVERLEAF_OIDC_IS_ADMIN_FIELD_VALUE`
- * When both environment variables are set, the login process updates `user.isAdmin = true` if the profile returned by the OP contains the attribute specified by
- `OVERLEAF_OIDC_IS_ADMIN_FIELD` and its value matches `OVERLEAF_OIDC_IS_ADMIN_FIELD_VALUE`, otherwise `user.isAdmin` is set to `false`.
- If `OVERLEAF_OIDC_IS_ADMIN_FIELD` is `email` then the value of the attribute `emails[0].value` is used for match checking.
-
-The redirect URL for your OpenID Provider is `https://my-overleaf-instance.com/oidc/login/callback`.
-
-
-
Sample variables.env file
-
-```
-OVERLEAF_APP_NAME="Our Overleaf Instance"
-
-ENABLED_LINKED_FILE_TYPES=project_file,project_output_file,url
-
-# Enables Thumbnail generation using ImageMagick
-ENABLE_CONVERSIONS=true
-
-# Disables email confirmation requirement
-EMAIL_CONFIRMATION_DISABLED=true
-
-## Nginx
-# NGINX_WORKER_PROCESSES=4
-# NGINX_WORKER_CONNECTIONS=768
-
-## Set for TLS via nginx-proxy
-# OVERLEAF_BEHIND_PROXY=true
-# OVERLEAF_SECURE_COOKIE=true
-
-OVERLEAF_SITE_URL=http://my-overleaf-instance.com
-OVERLEAF_NAV_TITLE=Our Overleaf Instance
-# OVERLEAF_HEADER_IMAGE_URL=http://somewhere.com/mylogo.png
-OVERLEAF_ADMIN_EMAIL=support@example.com
-
-OVERLEAF_LEFT_FOOTER=[{"text": "Contact your support team", "url": "mailto:support@example.com"}]
-OVERLEAF_RIGHT_FOOTER=[{"text":"Hello, I am on the Right", "url":"https://github.com/yu-i-i/overleaf-cep"}]
-
-OVERLEAF_EMAIL_FROM_ADDRESS=team@example.com
-OVERLEAF_EMAIL_SMTP_HOST=smtp.example.com
-OVERLEAF_EMAIL_SMTP_PORT=587
-OVERLEAF_EMAIL_SMTP_SECURE=false
-# OVERLEAF_EMAIL_SMTP_USER=
-# OVERLEAF_EMAIL_SMTP_PASS=
-# OVERLEAF_EMAIL_SMTP_NAME=
-OVERLEAF_EMAIL_SMTP_LOGGER=false
-OVERLEAF_EMAIL_SMTP_TLS_REJECT_UNAUTH=true
-OVERLEAF_EMAIL_SMTP_IGNORE_TLS=false
-OVERLEAF_CUSTOM_EMAIL_FOOTER=This system is run by department x
-
-OVERLEAF_PROXY_LEARN=true
-NAV_HIDE_POWERED_BY=true
-
-#################
-## OIDC for CE ##
-#################
-
-EXTERNAL_AUTH=oidc
-
-OVERLEAF_OIDC_PROVIDER_ID=oidc
-OVERLEAF_OIDC_ISSUER=https://keycloak.provider.com/realms/example
-OVERLEAF_OIDC_AUTHORIZATION_URL=https://keycloak.provider.com/realms/example/protocol/openid-connect/auth
-OVERLEAF_OIDC_TOKEN_URL=https://keycloak.provider.com/realms/example/protocol/openid-connect/token
-OVERLEAF_OIDC_USER_INFO_URL=https://keycloak.provider.com/realms/example/protocol/openid-connect/userinfo
-OVERLEAF_OIDC_LOGOUT_URL=https://keycloak.provider.com/realms/example/protocol/openid-connect/logout
-OVERLEAF_OIDC_CLIENT_ID=Overleaf-OIDC
-OVERLEAF_OIDC_CLIENT_SECRET=DoNotUseThisATGgaAcTgCcATgGATTACAagGtTCaGcGTAG
-OVERLEAF_OIDC_IDENTITY_SERVICE_NAME='Log in with Keycloak OIDC Provider'
-OVERLEAF_OIDC_PROVIDER_NAME=OIDC Keycloak Provider
-OVERLEAF_OIDC_PROVIDER_INFO_LINK=https://openid.net
-OVERLEAF_OIDC_IS_ADMIN_FIELD=email
-OVERLEAF_OIDC_IS_ADMIN_FIELD_VALUE=overleaf.admin@example.com
-OVERLEAF_OIDC_UPDATE_USER_DETAILS_ON_LOGIN=false
-```
-
-
+Configuration details and release history for the Extended Community Edition can be found on the [Extended CE Wiki Page](https://github.com/yu-i-i/overleaf-cep/wiki).
## Overleaf Docker Image
This repo contains two dockerfiles, [`Dockerfile-base`](server-ce/Dockerfile-base), which builds the
-`sharelatex/sharelatex-base` image, and [`Dockerfile`](server-ce/Dockerfile) which builds the
-`sharelatex/sharelatex` (or "community") image.
+`sharelatex/sharelatex-base:ext-ce` image, and [`Dockerfile`](server-ce/Dockerfile) which builds the
+`sharelatex/sharelatex:ext-ce` image.
The Base image generally contains the basic dependencies like `wget`, plus `texlive`.
-We split this out because it's a pretty heavy set of
+This is split out because it's a pretty heavy set of
dependencies, and it's nice to not have to rebuild all of that every time.
The `sharelatex/sharelatex` image extends the base image and adds the actual Overleaf code
@@ -1055,17 +67,16 @@ and services.
Use `make build-base` and `make build-community` from `server-ce/` to build these images.
-We use the [Phusion base-image](https://github.com/phusion/baseimage-docker)
-(which is extended by our `base` image) to provide us with a VM-like container
+The [Phusion base-image](https://github.com/phusion/baseimage-docker)
+(which is extended by the `base` image) provides a VM-like container
in which to run the Overleaf services. Baseimage uses the `runit` service
-manager to manage services, and we add our init-scripts from the `server-ce/runit`
-folder.
+manager to manage services, and init scripts from the `server-ce/runit`
+folder are added.
## Authors
-[The Overleaf Team](https://www.overleaf.com/about)
-
-Extensions for CE by: [yu-i-i](https://github.com/yu-i-i/overleaf-cep)
+[The Overleaf Team](https://www.overleaf.com/about)
+[yu-i-i](https://github.com/yu-i-i/overleaf-cep) — Extensions for CE unless otherwise noted
## License
diff --git a/develop/README.md b/develop/README.md
index 14f7354572..8e3f89862c 100644
--- a/develop/README.md
+++ b/develop/README.md
@@ -42,7 +42,7 @@ To do this, use the included `bin/dev` script:
bin/dev
```
-This will start all services using `nodemon`, which will automatically monitor the code and restart the services as necessary.
+This will start all services using `node --watch`, which will automatically monitor the code and restart the services as necessary.
To improve performance, you can start only a subset of the services in development mode by providing a space-separated list to the `bin/dev` script:
diff --git a/develop/dev.env b/develop/dev.env
index 2ccfef7052..b003e4e0eb 100644
--- a/develop/dev.env
+++ b/develop/dev.env
@@ -6,15 +6,18 @@ DOCUMENT_UPDATER_HOST=document-updater
FILESTORE_HOST=filestore
GRACEFUL_SHUTDOWN_DELAY_SECONDS=0
HISTORY_V1_HOST=history-v1
+HISTORY_REDIS_HOST=redis
LISTEN_ADDRESS=0.0.0.0
MONGO_HOST=mongo
MONGO_URL=mongodb://mongo/sharelatex?directConnection=true
NOTIFICATIONS_HOST=notifications
PROJECT_HISTORY_HOST=project-history
+QUEUES_REDIS_HOST=redis
REALTIME_HOST=real-time
REDIS_HOST=redis
REFERENCES_HOST=references
SESSION_SECRET=foo
+V1_HISTORY_HOST=history-v1
WEBPACK_HOST=webpack
WEB_API_PASSWORD=overleaf
WEB_API_USER=overleaf
diff --git a/develop/docker-compose.dev.yml b/develop/docker-compose.dev.yml
index 05844136a0..65e15ef07b 100644
--- a/develop/docker-compose.dev.yml
+++ b/develop/docker-compose.dev.yml
@@ -124,7 +124,7 @@ services:
- ../services/references/app.js:/overleaf/services/references/app.js
web:
- command: ["node", "--watch", "app.js", "--watch-locales"]
+ command: ["node", "--watch", "app.mjs", "--watch-locales"]
environment:
- NODE_OPTIONS=--inspect=0.0.0.0:9229
ports:
diff --git a/develop/docker-compose.yml b/develop/docker-compose.yml
index ab8184a5f8..e5b84c38b3 100644
--- a/develop/docker-compose.yml
+++ b/develop/docker-compose.yml
@@ -25,10 +25,10 @@ services:
env_file:
- dev.env
environment:
- - DOCKER_RUNNER=true
- TEXLIVE_IMAGE=texlive-full # docker build texlive -t texlive-full
- - COMPILES_HOST_DIR=${PWD}/compiles
- - OUTPUT_HOST_DIR=${PWD}/output
+ - SANDBOXED_COMPILES=true
+ - SANDBOXED_COMPILES_HOST_DIR_COMPILES=${PWD}/compiles
+ - SANDBOXED_COMPILES_HOST_DIR_OUTPUT=${PWD}/output
user: root
volumes:
- ${PWD}/compiles:/overleaf/services/clsi/compiles
diff --git a/doc/logo.png b/doc/logo.png
index 106926b095..f154ac0cca 100644
Binary files a/doc/logo.png and b/doc/logo.png differ
diff --git a/libraries/access-token-encryptor/.nvmrc b/libraries/access-token-encryptor/.nvmrc
index 8320a6d299..fc37597bcc 100644
--- a/libraries/access-token-encryptor/.nvmrc
+++ b/libraries/access-token-encryptor/.nvmrc
@@ -1 +1 @@
-22.15.1
+22.17.0
diff --git a/libraries/access-token-encryptor/buildscript.txt b/libraries/access-token-encryptor/buildscript.txt
index 74c3bbbd24..8f08720e7e 100644
--- a/libraries/access-token-encryptor/buildscript.txt
+++ b/libraries/access-token-encryptor/buildscript.txt
@@ -1,10 +1,10 @@
access-token-encryptor
--dependencies=None
---docker-repos=gcr.io/overleaf-ops
+--docker-repos=us-east1-docker.pkg.dev/overleaf-ops/ol-docker
--env-add=
--env-pass-through=
--esmock-loader=False
--is-library=True
---node-version=22.15.1
+--node-version=22.17.0
--public-repo=False
--script-version=4.7.0
diff --git a/libraries/fetch-utils/.nvmrc b/libraries/fetch-utils/.nvmrc
index 8320a6d299..fc37597bcc 100644
--- a/libraries/fetch-utils/.nvmrc
+++ b/libraries/fetch-utils/.nvmrc
@@ -1 +1 @@
-22.15.1
+22.17.0
diff --git a/libraries/fetch-utils/buildscript.txt b/libraries/fetch-utils/buildscript.txt
index 91548ff7c6..7008a533a6 100644
--- a/libraries/fetch-utils/buildscript.txt
+++ b/libraries/fetch-utils/buildscript.txt
@@ -1,10 +1,10 @@
fetch-utils
--dependencies=None
---docker-repos=gcr.io/overleaf-ops
+--docker-repos=us-east1-docker.pkg.dev/overleaf-ops/ol-docker
--env-add=
--env-pass-through=
--esmock-loader=False
--is-library=True
---node-version=22.15.1
+--node-version=22.17.0
--public-repo=False
--script-version=4.7.0
diff --git a/libraries/logger/.nvmrc b/libraries/logger/.nvmrc
index 8320a6d299..fc37597bcc 100644
--- a/libraries/logger/.nvmrc
+++ b/libraries/logger/.nvmrc
@@ -1 +1 @@
-22.15.1
+22.17.0
diff --git a/libraries/logger/buildscript.txt b/libraries/logger/buildscript.txt
index 9008707b0e..e2520c4800 100644
--- a/libraries/logger/buildscript.txt
+++ b/libraries/logger/buildscript.txt
@@ -1,10 +1,10 @@
logger
--dependencies=None
---docker-repos=gcr.io/overleaf-ops
+--docker-repos=us-east1-docker.pkg.dev/overleaf-ops/ol-docker
--env-add=
--env-pass-through=
--esmock-loader=False
--is-library=True
---node-version=22.15.1
+--node-version=22.17.0
--public-repo=False
--script-version=4.7.0
diff --git a/libraries/metrics/.nvmrc b/libraries/metrics/.nvmrc
index 8320a6d299..fc37597bcc 100644
--- a/libraries/metrics/.nvmrc
+++ b/libraries/metrics/.nvmrc
@@ -1 +1 @@
-22.15.1
+22.17.0
diff --git a/libraries/metrics/buildscript.txt b/libraries/metrics/buildscript.txt
index 2c2e5d7531..d1e272c356 100644
--- a/libraries/metrics/buildscript.txt
+++ b/libraries/metrics/buildscript.txt
@@ -1,10 +1,10 @@
metrics
--dependencies=None
---docker-repos=gcr.io/overleaf-ops
+--docker-repos=us-east1-docker.pkg.dev/overleaf-ops/ol-docker
--env-add=
--env-pass-through=
--esmock-loader=False
--is-library=True
---node-version=22.15.1
+--node-version=22.17.0
--public-repo=False
--script-version=4.7.0
diff --git a/libraries/mongo-utils/.nvmrc b/libraries/mongo-utils/.nvmrc
index 8320a6d299..fc37597bcc 100644
--- a/libraries/mongo-utils/.nvmrc
+++ b/libraries/mongo-utils/.nvmrc
@@ -1 +1 @@
-22.15.1
+22.17.0
diff --git a/libraries/mongo-utils/buildscript.txt b/libraries/mongo-utils/buildscript.txt
index bda8d4f734..ff07040970 100644
--- a/libraries/mongo-utils/buildscript.txt
+++ b/libraries/mongo-utils/buildscript.txt
@@ -1,10 +1,10 @@
mongo-utils
--dependencies=None
---docker-repos=gcr.io/overleaf-ops
+--docker-repos=us-east1-docker.pkg.dev/overleaf-ops/ol-docker
--env-add=
--env-pass-through=
--esmock-loader=False
--is-library=True
---node-version=22.15.1
+--node-version=22.17.0
--public-repo=False
--script-version=4.7.0
diff --git a/libraries/o-error/.nvmrc b/libraries/o-error/.nvmrc
index 8320a6d299..fc37597bcc 100644
--- a/libraries/o-error/.nvmrc
+++ b/libraries/o-error/.nvmrc
@@ -1 +1 @@
-22.15.1
+22.17.0
diff --git a/libraries/o-error/buildscript.txt b/libraries/o-error/buildscript.txt
index a4134b4b60..6a9334411a 100644
--- a/libraries/o-error/buildscript.txt
+++ b/libraries/o-error/buildscript.txt
@@ -1,10 +1,10 @@
o-error
--dependencies=None
---docker-repos=gcr.io/overleaf-ops
+--docker-repos=us-east1-docker.pkg.dev/overleaf-ops/ol-docker
--env-add=
--env-pass-through=
--esmock-loader=False
--is-library=True
---node-version=22.15.1
+--node-version=22.17.0
--public-repo=False
--script-version=4.7.0
diff --git a/libraries/object-persistor/.nvmrc b/libraries/object-persistor/.nvmrc
index 8320a6d299..fc37597bcc 100644
--- a/libraries/object-persistor/.nvmrc
+++ b/libraries/object-persistor/.nvmrc
@@ -1 +1 @@
-22.15.1
+22.17.0
diff --git a/libraries/object-persistor/buildscript.txt b/libraries/object-persistor/buildscript.txt
index 75d2e09382..897e789700 100644
--- a/libraries/object-persistor/buildscript.txt
+++ b/libraries/object-persistor/buildscript.txt
@@ -1,10 +1,10 @@
object-persistor
--dependencies=None
---docker-repos=gcr.io/overleaf-ops
+--docker-repos=us-east1-docker.pkg.dev/overleaf-ops/ol-docker
--env-add=
--env-pass-through=
--esmock-loader=False
--is-library=True
---node-version=22.15.1
+--node-version=22.17.0
--public-repo=False
--script-version=4.7.0
diff --git a/libraries/object-persistor/src/PerProjectEncryptedS3Persistor.js b/libraries/object-persistor/src/PerProjectEncryptedS3Persistor.js
index 7bd4bb93e5..a0230128fe 100644
--- a/libraries/object-persistor/src/PerProjectEncryptedS3Persistor.js
+++ b/libraries/object-persistor/src/PerProjectEncryptedS3Persistor.js
@@ -33,6 +33,10 @@ const AES256_KEY_LENGTH = 32
* @property {() => Promise>} getRootKeyEncryptionKeys
*/
+/**
+ * @typedef {import('./types').ListDirectoryResult} ListDirectoryResult
+ */
+
/**
* Helper function to make TS happy when accessing error properties
* AWSError is not an actual class, so we cannot use instanceof.
@@ -391,9 +395,9 @@ class PerProjectEncryptedS3Persistor extends S3Persistor {
* A general "cache" for project keys is another alternative. For now, use a helper class.
*/
class CachedPerProjectEncryptedS3Persistor {
- /** @type SSECOptions */
+ /** @type SSECOptions */
#projectKeyOptions
- /** @type PerProjectEncryptedS3Persistor */
+ /** @type PerProjectEncryptedS3Persistor */
#parent
/**
@@ -424,6 +428,16 @@ class CachedPerProjectEncryptedS3Persistor {
return await this.#parent.getObjectSize(bucketName, path)
}
+ /**
+ *
+ * @param {string} bucketName
+ * @param {string} path
+ * @return {Promise}
+ */
+ async listDirectory(bucketName, path) {
+ return await this.#parent.listDirectory(bucketName, path)
+ }
+
/**
* @param {string} bucketName
* @param {string} path
diff --git a/libraries/object-persistor/src/S3Persistor.js b/libraries/object-persistor/src/S3Persistor.js
index 2835a271ff..1849838ba4 100644
--- a/libraries/object-persistor/src/S3Persistor.js
+++ b/libraries/object-persistor/src/S3Persistor.js
@@ -20,6 +20,18 @@ const { URL } = require('node:url')
const { WriteError, ReadError, NotFoundError } = require('./Errors')
const zlib = require('node:zlib')
+/**
+ * @typedef {import('aws-sdk/clients/s3').ListObjectsV2Output} ListObjectsV2Output
+ */
+
+/**
+ * @typedef {import('aws-sdk/clients/s3').Object} S3Object
+ */
+
+/**
+ * @typedef {import('./types').ListDirectoryResult} ListDirectoryResult
+ */
+
/**
* Wrapper with private fields to avoid revealing them on console, JSON.stringify or similar.
*/
@@ -266,26 +278,12 @@ class S3Persistor extends AbstractPersistor {
* @return {Promise}
*/
async deleteDirectory(bucketName, key, continuationToken) {
- let response
- const options = { Bucket: bucketName, Prefix: key }
- if (continuationToken) {
- options.ContinuationToken = continuationToken
- }
-
- try {
- response = await this._getClientForBucket(bucketName)
- .listObjectsV2(options)
- .promise()
- } catch (err) {
- throw PersistorHelper.wrapError(
- err,
- 'failed to list objects in S3',
- { bucketName, key },
- ReadError
- )
- }
-
- const objects = response.Contents?.map(item => ({ Key: item.Key || '' }))
+ const { contents, response } = await this.listDirectory(
+ bucketName,
+ key,
+ continuationToken
+ )
+ const objects = contents.map(item => ({ Key: item.Key || '' }))
if (objects?.length) {
try {
await this._getClientForBucket(bucketName)
@@ -316,6 +314,36 @@ class S3Persistor extends AbstractPersistor {
}
}
+ /**
+ *
+ * @param {string} bucketName
+ * @param {string} key
+ * @param {string} [continuationToken]
+ * @return {Promise}
+ */
+ async listDirectory(bucketName, key, continuationToken) {
+ let response
+ const options = { Bucket: bucketName, Prefix: key }
+ if (continuationToken) {
+ options.ContinuationToken = continuationToken
+ }
+
+ try {
+ response = await this._getClientForBucket(bucketName)
+ .listObjectsV2(options)
+ .promise()
+ } catch (err) {
+ throw PersistorHelper.wrapError(
+ err,
+ 'failed to list objects in S3',
+ { bucketName, key },
+ ReadError
+ )
+ }
+
+ return { contents: response.Contents ?? [], response }
+ }
+
/**
* @param {string} bucketName
* @param {string} key
diff --git a/libraries/object-persistor/src/types.d.ts b/libraries/object-persistor/src/types.d.ts
new file mode 100644
index 0000000000..5640685a5f
--- /dev/null
+++ b/libraries/object-persistor/src/types.d.ts
@@ -0,0 +1,6 @@
+import type { ListObjectsV2Output, Object } from 'aws-sdk/clients/s3'
+
+export type ListDirectoryResult = {
+ contents: Array