Bumps [express](https://github.com/expressjs/express) from 4.17.1 to 4.17.3. - [Release notes](https://github.com/expressjs/express/releases) - [Changelog](https://github.com/expressjs/express/blob/master/History.md) - [Commits](https://github.com/expressjs/express/compare/4.17.1...4.17.3) --- updated-dependencies: - dependency-name: express dependency-type: direct:production ... Signed-off-by: dependabot[bot] <email@example.com>
|2 months ago|
|.github||1 year ago|
|assets||11 months ago|
|views||1 year ago|
|.dockerignore||1 year ago|
|.gitignore||5 years ago|
|.prettierignore||1 year ago|
|Dockerfile||1 year ago|
|LICENSE||4 years ago|
|README.md||1 year ago|
|index.js||11 months ago|
|package-lock.json||2 months ago|
|package.json||2 months ago|
A basic node.js file manager.
- Simple authentication
- Directory browsing
- Folder creation
- File uploads
- Bulk file uploads
- Large file uploads (sharded)
- File/folder renaming
- Previews for small image files
- Bulk file/folder selection
- Recursive directory delete
- Download archive
- Change permissions
- Remote commands
For users who prefer Docker:
docker run --rm -it -v $PWD:/data -p 8080:8080 serverwentdown/file-manager
Or if you have Node.js installed:
npm install -g https://github.com/serverwentdown/file-manager.git file-manager
These screenshots are not up-to-date.
The following environmental variables can be used to configure
Express session key, generate something random.
Enable the shell feature, which allows users to start a login shell (when set to
login) or the binary specified by this option (example:
/bin/bash). Be careful when enabling this feature as anyone with access to this portal can execute any command on your machine.
Set to something other than "false" to enable running single commands in the default shell, usually
/bin/sh. Be careful when enabling this feature as anyone with access to this portal can execute any command on your machine.
Listen on $PORT. Default: 8080
Setting this variable enables authentication using TOTP (RFC6238). $KEY is a base32 encoded shared secret. This key is only a weak means of protection as it is succeptable to brute-force. You can generate one from here or manually.