Translate all user-facing output to English
- Scripts: start-webdav.cmd, stop-webdav.cmd (echo messages, REM comments) - Server: server.js (console.log, HTTP error messages) - Token tools: token-test.js, token-refresh.js - Other: auth-poc.js, debug-name-decrypt.js, internxt-client.js, upload.js - Docs: README, .env.example, docs/*.md Made-with: Cursor
This commit is contained in:
@@ -1,35 +1,35 @@
|
||||
# CRYPTO_SECRET aus drive.internxt.com ermitteln
|
||||
# Extract CRYPTO_SECRET from drive.internxt.com
|
||||
|
||||
Falls der Login mit "Wrong login credentials" fehlschlägt, ist vermutlich der `CRYPTO_SECRET` falsch. drive-web nutzt `REACT_APP_CRYPTO_SECRET`, der CLI-Wert (`6KYQBP847D4ATSFA`) kann abweichen.
|
||||
If login fails with "Wrong login credentials", `CRYPTO_SECRET` is likely incorrect. drive-web uses `REACT_APP_CRYPTO_SECRET`, which may differ from the CLI value (`6KYQBP847D4ATSFA`).
|
||||
|
||||
## Methode 1: DEBUG-Modus (Salt-Decryption prüfen)
|
||||
## Method 1: DEBUG mode (verify salt decryption)
|
||||
|
||||
```bash
|
||||
DEBUG=1 npm run auth-test
|
||||
```
|
||||
|
||||
- **"Salt-Decryption OK"** → CRYPTO_SECRET stimmt, Problem liegt woanders (Passwort, API)
|
||||
- **"Salt-Decryption fehlgeschlagen"** → CRYPTO_SECRET ist falsch
|
||||
- **"Salt decryption OK"** → CRYPTO_SECRET is correct, problem is elsewhere (password, API)
|
||||
- **"Salt decryption failed"** → CRYPTO_SECRET is wrong
|
||||
|
||||
## Methode 2: Secret im Browser suchen
|
||||
## Method 2: Search for secret in browser
|
||||
|
||||
1. https://drive.internxt.com öffnen
|
||||
1. Open https://drive.internxt.com
|
||||
2. DevTools (F12) → **Sources**
|
||||
3. **Strg+Shift+F** (Suche in allen Dateien)
|
||||
4. Suchen nach:
|
||||
- `6KYQBP847D4ATSFA` – falls gefunden, wird derselbe Wert wie beim CLI genutzt
|
||||
- `REACT_APP_CRYPTO_SECRET` oder `CRYPTO_SECRET`
|
||||
- Hex-Strings (z.B. 16 Zeichen wie `a1b2c3d4e5f6...`)
|
||||
3. **Ctrl+Shift+F** (search in all files)
|
||||
4. Search for:
|
||||
- `6KYQBP847D4ATSFA` – if found, same value as CLI is used
|
||||
- `REACT_APP_CRYPTO_SECRET` or `CRYPTO_SECRET`
|
||||
- Hex strings (e.g. 16 chars like `a1b2c3d4e5f6...`)
|
||||
|
||||
5. Gefundenen Wert in `.env` eintragen:
|
||||
5. Add found value to `.env`:
|
||||
```
|
||||
CRYPTO_SECRET=gefundener_wert
|
||||
CRYPTO_SECRET=found_value
|
||||
```
|
||||
|
||||
## Methode 3: drive-web lokal bauen (mit bekanntem Secret)
|
||||
## Method 3: Build drive-web locally (with known secret)
|
||||
|
||||
Falls Sie Zugriff auf drive-web haben und den korrekten Secret kennen:
|
||||
If you have access to drive-web and know the correct secret:
|
||||
|
||||
1. In `drive-web` eine `.env` mit `REACT_APP_CRYPTO_SECRET=...` anlegen
|
||||
2. `yarn build` ausführen
|
||||
3. In den Build-Artefakten nach dem eingebetteten Wert suchen
|
||||
1. Create `.env` in `drive-web` with `REACT_APP_CRYPTO_SECRET=...`
|
||||
2. Run `yarn build`
|
||||
3. Search build artifacts for the embedded value
|
||||
|
||||
Reference in New Issue
Block a user