mirror of
https://github.com/kmc7468/arkvault.git
synced 2026-02-04 16:16:55 +00:00
Compare commits
54 Commits
add-tansta
...
1efcdd68f1
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
1efcdd68f1 | ||
|
|
0c295a2ffa | ||
|
|
4b783a36e9 | ||
|
|
b9e6f17b0c | ||
|
|
5d130204a6 | ||
|
|
4997b1f38c | ||
|
|
1d3704bfad | ||
|
|
ae1d34fc6b | ||
|
|
f10a0a2da3 | ||
|
|
0eb1d29259 | ||
|
|
cf0f8fe0b9 | ||
|
|
30c56e0926 | ||
|
|
83d595636b | ||
|
|
008c8ad6ba | ||
|
|
5729af380d | ||
|
|
c0e71993e9 | ||
|
|
280d46b48d | ||
|
|
d1f9018213 | ||
|
|
2e3cd4f8a2 | ||
|
|
d98be331ad | ||
|
|
841c57e8fc | ||
|
|
182ec18a2b | ||
|
|
7b666cf692 | ||
|
|
26323c2d4d | ||
|
|
e4413ddbf6 | ||
|
|
b5522a4c6d | ||
|
|
1e57941f4c | ||
|
|
409ae09f4f | ||
|
|
cdb652cacf | ||
|
|
15b6a53710 | ||
|
|
174305ca1b | ||
|
|
0d13d3baef | ||
|
|
576d41da7f | ||
|
|
9eb67d5877 | ||
|
|
a9da8435cb | ||
|
|
3e98e3d591 | ||
|
|
27a46bcc2e | ||
|
|
a1f30ee154 | ||
|
|
6d02178c69 | ||
|
|
ed21a9cd31 | ||
|
|
b7a7536461 | ||
|
|
3eb7411438 | ||
|
|
c9d4b10356 | ||
|
|
d94d14cf83 | ||
|
|
3fc29cf8db | ||
|
|
b92b4a0b1b | ||
|
|
6d95059450 | ||
|
|
a08ddf2c09 | ||
|
|
208252f6b2 | ||
|
|
aa4a1a74ea | ||
|
|
640e12d2c3 | ||
|
|
7779910949 | ||
|
|
328baba395 | ||
|
|
4e91cdad95 |
@@ -12,6 +12,7 @@ node_modules
|
|||||||
/data
|
/data
|
||||||
/library
|
/library
|
||||||
/thumbnails
|
/thumbnails
|
||||||
|
/uploads
|
||||||
|
|
||||||
# OS
|
# OS
|
||||||
.DS_Store
|
.DS_Store
|
||||||
|
|||||||
@@ -12,3 +12,4 @@ USER_CLIENT_CHALLENGE_EXPIRES=
|
|||||||
SESSION_UPGRADE_CHALLENGE_EXPIRES=
|
SESSION_UPGRADE_CHALLENGE_EXPIRES=
|
||||||
LIBRARY_PATH=
|
LIBRARY_PATH=
|
||||||
THUMBNAILS_PATH=
|
THUMBNAILS_PATH=
|
||||||
|
UPLOADS_PATH=
|
||||||
|
|||||||
1
.gitignore
vendored
1
.gitignore
vendored
@@ -10,6 +10,7 @@ node_modules
|
|||||||
/data
|
/data
|
||||||
/library
|
/library
|
||||||
/thumbnails
|
/thumbnails
|
||||||
|
/uploads
|
||||||
|
|
||||||
# OS
|
# OS
|
||||||
.DS_Store
|
.DS_Store
|
||||||
|
|||||||
@@ -2,11 +2,7 @@
|
|||||||
FROM node:22-alpine AS base
|
FROM node:22-alpine AS base
|
||||||
WORKDIR /app
|
WORKDIR /app
|
||||||
|
|
||||||
RUN apk add --no-cache bash curl && \
|
RUN npm install -g pnpm@10
|
||||||
curl -o /usr/local/bin/wait-for-it https://raw.githubusercontent.com/vishnubob/wait-for-it/master/wait-for-it.sh && \
|
|
||||||
chmod +x /usr/local/bin/wait-for-it
|
|
||||||
|
|
||||||
RUN npm install -g pnpm@9
|
|
||||||
COPY pnpm-lock.yaml .
|
COPY pnpm-lock.yaml .
|
||||||
|
|
||||||
# Build Stage
|
# Build Stage
|
||||||
@@ -29,4 +25,4 @@ COPY --from=build /app/build ./build
|
|||||||
|
|
||||||
EXPOSE 3000
|
EXPOSE 3000
|
||||||
ENV BODY_SIZE_LIMIT=Infinity
|
ENV BODY_SIZE_LIMIT=Infinity
|
||||||
CMD ["bash", "-c", "wait-for-it ${DATABASE_HOST:-localhost}:${DATABASE_PORT:-5432} -- node ./build/index.js"]
|
CMD ["node", "./build/index.js"]
|
||||||
|
|||||||
@@ -3,7 +3,8 @@ services:
|
|||||||
build: .
|
build: .
|
||||||
restart: unless-stopped
|
restart: unless-stopped
|
||||||
depends_on:
|
depends_on:
|
||||||
- database
|
database:
|
||||||
|
condition: service_healthy
|
||||||
user: ${CONTAINER_UID:-0}:${CONTAINER_GID:-0}
|
user: ${CONTAINER_UID:-0}:${CONTAINER_GID:-0}
|
||||||
volumes:
|
volumes:
|
||||||
- ./data/library:/app/data/library
|
- ./data/library:/app/data/library
|
||||||
@@ -19,6 +20,7 @@ services:
|
|||||||
- SESSION_UPGRADE_CHALLENGE_EXPIRES
|
- SESSION_UPGRADE_CHALLENGE_EXPIRES
|
||||||
- LIBRARY_PATH=/app/data/library
|
- LIBRARY_PATH=/app/data/library
|
||||||
- THUMBNAILS_PATH=/app/data/thumbnails
|
- THUMBNAILS_PATH=/app/data/thumbnails
|
||||||
|
- UPLOADS_PATH=/app/data/uploads
|
||||||
# SvelteKit
|
# SvelteKit
|
||||||
- ADDRESS_HEADER=${TRUST_PROXY:+X-Forwarded-For}
|
- ADDRESS_HEADER=${TRUST_PROXY:+X-Forwarded-For}
|
||||||
- XFF_DEPTH=${TRUST_PROXY:-}
|
- XFF_DEPTH=${TRUST_PROXY:-}
|
||||||
@@ -35,3 +37,8 @@ services:
|
|||||||
environment:
|
environment:
|
||||||
- POSTGRES_USER=arkvault
|
- POSTGRES_USER=arkvault
|
||||||
- POSTGRES_PASSWORD=${DATABASE_PASSWORD:?}
|
- POSTGRES_PASSWORD=${DATABASE_PASSWORD:?}
|
||||||
|
healthcheck:
|
||||||
|
test: ["CMD-SHELL", "pg_isready -U $${POSTGRES_USER}"]
|
||||||
|
interval: 5s
|
||||||
|
timeout: 5s
|
||||||
|
retries: 5
|
||||||
|
|||||||
@@ -1,23 +1,24 @@
|
|||||||
import { includeIgnoreFile } from "@eslint/compat";
|
import { includeIgnoreFile } from "@eslint/compat";
|
||||||
import js from "@eslint/js";
|
import js from "@eslint/js";
|
||||||
import svelteQuery from "@tanstack/eslint-plugin-query";
|
import { defineConfig } from "eslint/config";
|
||||||
import prettier from "eslint-config-prettier";
|
import prettier from "eslint-config-prettier";
|
||||||
import svelte from "eslint-plugin-svelte";
|
import svelte from "eslint-plugin-svelte";
|
||||||
import tailwind from "eslint-plugin-tailwindcss";
|
import tailwind from "eslint-plugin-tailwindcss";
|
||||||
import globals from "globals";
|
import globals from "globals";
|
||||||
import ts from "typescript-eslint";
|
import ts from "typescript-eslint";
|
||||||
import { fileURLToPath } from "url";
|
import { fileURLToPath } from "url";
|
||||||
|
import svelteConfig from "./svelte.config.js";
|
||||||
|
|
||||||
const gitignorePath = fileURLToPath(new URL("./.gitignore", import.meta.url));
|
const gitignorePath = fileURLToPath(new URL("./.gitignore", import.meta.url));
|
||||||
|
|
||||||
export default ts.config(
|
export default defineConfig(
|
||||||
includeIgnoreFile(gitignorePath),
|
includeIgnoreFile(gitignorePath),
|
||||||
js.configs.recommended,
|
js.configs.recommended,
|
||||||
...ts.configs.recommended,
|
...ts.configs.recommended,
|
||||||
...svelte.configs["flat/recommended"],
|
...svelte.configs.recommended,
|
||||||
...tailwind.configs["flat/recommended"],
|
...tailwind.configs["flat/recommended"],
|
||||||
prettier,
|
prettier,
|
||||||
...svelte.configs["flat/prettier"],
|
...svelte.configs.prettier,
|
||||||
{
|
{
|
||||||
languageOptions: {
|
languageOptions: {
|
||||||
globals: {
|
globals: {
|
||||||
@@ -25,14 +26,19 @@ export default ts.config(
|
|||||||
...globals.node,
|
...globals.node,
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
|
rules: {
|
||||||
|
"no-undef": "off",
|
||||||
|
},
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
files: ["**/*.svelte"],
|
files: ["**/*.svelte", "**/*.svelte.ts", "**/*.svelte.js"],
|
||||||
languageOptions: {
|
languageOptions: {
|
||||||
parserOptions: {
|
parserOptions: {
|
||||||
|
projectService: true,
|
||||||
|
extraFileExtensions: [".svelte"],
|
||||||
parser: ts.parser,
|
parser: ts.parser,
|
||||||
|
svelteConfig,
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
...svelteQuery.configs["flat/recommended"],
|
|
||||||
);
|
);
|
||||||
|
|||||||
79
package.json
79
package.json
@@ -1,7 +1,7 @@
|
|||||||
{
|
{
|
||||||
"name": "arkvault",
|
"name": "arkvault",
|
||||||
"private": true,
|
"private": true,
|
||||||
"version": "0.5.1",
|
"version": "0.7.0",
|
||||||
"type": "module",
|
"type": "module",
|
||||||
"scripts": {
|
"scripts": {
|
||||||
"dev": "vite dev",
|
"dev": "vite dev",
|
||||||
@@ -16,55 +16,58 @@
|
|||||||
"db:migrate": "kysely migrate"
|
"db:migrate": "kysely migrate"
|
||||||
},
|
},
|
||||||
"devDependencies": {
|
"devDependencies": {
|
||||||
"@eslint/compat": "^1.3.1",
|
"@eslint/compat": "^2.0.0",
|
||||||
"@iconify-json/material-symbols": "^1.2.29",
|
"@eslint/js": "^9.39.2",
|
||||||
"@sveltejs/adapter-node": "^5.2.13",
|
"@iconify-json/material-symbols": "^1.2.50",
|
||||||
"@sveltejs/kit": "^2.22.5",
|
"@sveltejs/adapter-node": "^5.4.0",
|
||||||
"@sveltejs/vite-plugin-svelte": "^4.0.4",
|
"@sveltejs/kit": "^2.49.2",
|
||||||
"@tanstack/eslint-plugin-query": "^5.81.2",
|
"@sveltejs/vite-plugin-svelte": "^6.2.1",
|
||||||
"@tanstack/svelte-query": "^5.83.0",
|
"@tanstack/svelte-virtual": "^3.13.16",
|
||||||
|
"@trpc/client": "^11.8.1",
|
||||||
"@types/file-saver": "^2.0.7",
|
"@types/file-saver": "^2.0.7",
|
||||||
"@types/ms": "^0.7.34",
|
"@types/ms": "^0.7.34",
|
||||||
"@types/node-schedule": "^2.1.8",
|
"@types/node-schedule": "^2.1.8",
|
||||||
"@types/pg": "^8.15.4",
|
"@types/pg": "^8.16.0",
|
||||||
"autoprefixer": "^10.4.21",
|
"autoprefixer": "^10.4.23",
|
||||||
"axios": "^1.10.0",
|
"axios": "^1.13.2",
|
||||||
"dexie": "^4.0.11",
|
"dexie": "^4.2.1",
|
||||||
"eslint": "^9.30.1",
|
"eslint": "^9.39.2",
|
||||||
"eslint-config-prettier": "^10.1.5",
|
"eslint-config-prettier": "^10.1.8",
|
||||||
"eslint-plugin-svelte": "^3.10.1",
|
"eslint-plugin-svelte": "^3.13.1",
|
||||||
"eslint-plugin-tailwindcss": "^3.18.0",
|
"eslint-plugin-tailwindcss": "^3.18.2",
|
||||||
"exifreader": "^4.31.1",
|
"exifreader": "^4.33.1",
|
||||||
"file-saver": "^2.0.5",
|
"file-saver": "^2.0.5",
|
||||||
"globals": "^16.3.0",
|
"globals": "^16.5.0",
|
||||||
"heic2any": "^0.0.4",
|
"heic2any": "^0.0.4",
|
||||||
"kysely-ctl": "^0.13.1",
|
"kysely-ctl": "^0.19.0",
|
||||||
"lru-cache": "^11.1.0",
|
"lru-cache": "^11.2.4",
|
||||||
"mime": "^4.0.7",
|
"mime": "^4.1.0",
|
||||||
"p-limit": "^6.2.0",
|
"p-limit": "^7.2.0",
|
||||||
"prettier": "^3.6.2",
|
"prettier": "^3.7.4",
|
||||||
"prettier-plugin-svelte": "^3.4.0",
|
"prettier-plugin-svelte": "^3.4.1",
|
||||||
"prettier-plugin-tailwindcss": "^0.6.14",
|
"prettier-plugin-tailwindcss": "^0.7.2",
|
||||||
"svelte": "^5.35.6",
|
"svelte": "^5.46.1",
|
||||||
"svelte-check": "^4.2.2",
|
"svelte-check": "^4.3.5",
|
||||||
"tailwindcss": "^3.4.17",
|
"tailwindcss": "^3.4.19",
|
||||||
"typescript": "^5.8.3",
|
"typescript": "^5.9.3",
|
||||||
"typescript-eslint": "^8.36.0",
|
"typescript-eslint": "^8.51.0",
|
||||||
"unplugin-icons": "^22.1.0",
|
"unplugin-icons": "^22.5.0",
|
||||||
"vite": "^5.4.19"
|
"vite": "^7.3.0"
|
||||||
},
|
},
|
||||||
"dependencies": {
|
"dependencies": {
|
||||||
"@fastify/busboy": "^3.1.1",
|
"@fastify/busboy": "^3.2.0",
|
||||||
"argon2": "^0.43.0",
|
"@trpc/server": "^11.8.1",
|
||||||
"kysely": "^0.28.2",
|
"argon2": "^0.44.0",
|
||||||
|
"kysely": "^0.28.9",
|
||||||
"ms": "^2.1.3",
|
"ms": "^2.1.3",
|
||||||
"node-schedule": "^2.1.1",
|
"node-schedule": "^2.1.1",
|
||||||
"pg": "^8.16.3",
|
"pg": "^8.16.3",
|
||||||
"uuid": "^11.1.0",
|
"superjson": "^2.2.6",
|
||||||
"zod": "^3.25.76"
|
"uuid": "^13.0.0",
|
||||||
|
"zod": "^4.3.5"
|
||||||
},
|
},
|
||||||
"engines": {
|
"engines": {
|
||||||
"node": "^22.0.0",
|
"node": "^22.0.0",
|
||||||
"pnpm": "^9.0.0"
|
"pnpm": "^10.0.0"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
2190
pnpm-lock.yaml
generated
2190
pnpm-lock.yaml
generated
File diff suppressed because it is too large
Load Diff
@@ -1,7 +1,6 @@
|
|||||||
import type { ClientInit } from "@sveltejs/kit";
|
import type { ClientInit } from "@sveltejs/kit";
|
||||||
import { cleanupDanglingInfos, getClientKey, getMasterKeys, getHmacSecrets } from "$lib/indexedDB";
|
import { cleanupDanglingInfos, getClientKey, getMasterKeys, getHmacSecrets } from "$lib/indexedDB";
|
||||||
import { prepareFileCache } from "$lib/modules/file";
|
import { prepareFileCache } from "$lib/modules/file";
|
||||||
import { prepareOpfs } from "$lib/modules/opfs";
|
|
||||||
import { clientKeyStore, masterKeyStore, hmacSecretStore } from "$lib/stores";
|
import { clientKeyStore, masterKeyStore, hmacSecretStore } from "$lib/stores";
|
||||||
|
|
||||||
const requestPersistentStorage = async () => {
|
const requestPersistentStorage = async () => {
|
||||||
@@ -46,7 +45,6 @@ export const init: ClientInit = async () => {
|
|||||||
prepareClientKeyStore(),
|
prepareClientKeyStore(),
|
||||||
prepareMasterKeyStore(),
|
prepareMasterKeyStore(),
|
||||||
prepareHmacSecretStore(),
|
prepareHmacSecretStore(),
|
||||||
prepareOpfs(),
|
|
||||||
]);
|
]);
|
||||||
|
|
||||||
cleanupDanglingInfos(); // Intended
|
cleanupDanglingInfos(); // Intended
|
||||||
|
|||||||
@@ -7,6 +7,7 @@ import {
|
|||||||
cleanupExpiredSessions,
|
cleanupExpiredSessions,
|
||||||
cleanupExpiredSessionUpgradeChallenges,
|
cleanupExpiredSessionUpgradeChallenges,
|
||||||
} from "$lib/server/db/session";
|
} from "$lib/server/db/session";
|
||||||
|
import { cleanupExpiredUploadSessions } from "$lib/server/db/upload";
|
||||||
import { authenticate, setAgentInfo } from "$lib/server/middlewares";
|
import { authenticate, setAgentInfo } from "$lib/server/middlewares";
|
||||||
|
|
||||||
export const init: ServerInit = async () => {
|
export const init: ServerInit = async () => {
|
||||||
@@ -16,6 +17,7 @@ export const init: ServerInit = async () => {
|
|||||||
cleanupExpiredUserClientChallenges();
|
cleanupExpiredUserClientChallenges();
|
||||||
cleanupExpiredSessions();
|
cleanupExpiredSessions();
|
||||||
cleanupExpiredSessionUpgradeChallenges();
|
cleanupExpiredSessionUpgradeChallenges();
|
||||||
|
cleanupExpiredUploadSessions();
|
||||||
});
|
});
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|||||||
60
src/lib/components/atoms/RowVirtualizer.svelte
Normal file
60
src/lib/components/atoms/RowVirtualizer.svelte
Normal file
@@ -0,0 +1,60 @@
|
|||||||
|
<script lang="ts">
|
||||||
|
import { createWindowVirtualizer } from "@tanstack/svelte-virtual";
|
||||||
|
import type { Snippet } from "svelte";
|
||||||
|
import type { ClassValue } from "svelte/elements";
|
||||||
|
|
||||||
|
interface Props {
|
||||||
|
class?: ClassValue;
|
||||||
|
count: number;
|
||||||
|
item: Snippet<[index: number]>;
|
||||||
|
itemHeight: (index: number) => number;
|
||||||
|
itemGap?: number;
|
||||||
|
placeholder?: Snippet;
|
||||||
|
}
|
||||||
|
|
||||||
|
let { class: className, count, item, itemHeight, itemGap, placeholder }: Props = $props();
|
||||||
|
|
||||||
|
let element: HTMLElement | undefined = $state();
|
||||||
|
let scrollMargin = $state(0);
|
||||||
|
|
||||||
|
let virtualizer = $derived(
|
||||||
|
createWindowVirtualizer({
|
||||||
|
count,
|
||||||
|
estimateSize: itemHeight,
|
||||||
|
gap: itemGap,
|
||||||
|
scrollMargin,
|
||||||
|
}),
|
||||||
|
);
|
||||||
|
|
||||||
|
const measureItem = (node: HTMLElement) => {
|
||||||
|
$effect(() => $virtualizer.measureElement(node));
|
||||||
|
};
|
||||||
|
|
||||||
|
$effect(() => {
|
||||||
|
if (!element) return;
|
||||||
|
|
||||||
|
const observer = new ResizeObserver(() => {
|
||||||
|
scrollMargin = Math.round(element!.getBoundingClientRect().top + window.scrollY);
|
||||||
|
});
|
||||||
|
observer.observe(element.parentElement!);
|
||||||
|
return () => observer.disconnect();
|
||||||
|
});
|
||||||
|
</script>
|
||||||
|
|
||||||
|
<div bind:this={element} class={["relative", className]}>
|
||||||
|
<div style:height="{$virtualizer.getTotalSize()}px">
|
||||||
|
{#each $virtualizer.getVirtualItems() as virtualItem (virtualItem.key)}
|
||||||
|
<div
|
||||||
|
class="absolute left-0 top-0 w-full"
|
||||||
|
style:transform="translateY({virtualItem.start - scrollMargin}px)"
|
||||||
|
data-index={virtualItem.index}
|
||||||
|
use:measureItem
|
||||||
|
>
|
||||||
|
{@render item(virtualItem.index)}
|
||||||
|
</div>
|
||||||
|
{/each}
|
||||||
|
</div>
|
||||||
|
{#if placeholder && count === 0}
|
||||||
|
{@render placeholder()}
|
||||||
|
{/if}
|
||||||
|
</div>
|
||||||
24
src/lib/components/atoms/buttons/FileThumbnailButton.svelte
Normal file
24
src/lib/components/atoms/buttons/FileThumbnailButton.svelte
Normal file
@@ -0,0 +1,24 @@
|
|||||||
|
<script lang="ts">
|
||||||
|
import { getFileThumbnail } from "$lib/modules/file";
|
||||||
|
import type { SummarizedFileInfo } from "$lib/modules/filesystem";
|
||||||
|
|
||||||
|
interface Props {
|
||||||
|
info: SummarizedFileInfo;
|
||||||
|
onclick?: (file: SummarizedFileInfo) => void;
|
||||||
|
}
|
||||||
|
|
||||||
|
let { info, onclick }: Props = $props();
|
||||||
|
|
||||||
|
let thumbnail = $derived(getFileThumbnail(info));
|
||||||
|
</script>
|
||||||
|
|
||||||
|
<button
|
||||||
|
onclick={onclick && (() => setTimeout(() => onclick(info), 100))}
|
||||||
|
class="aspect-square overflow-hidden rounded transition active:scale-95 active:brightness-90"
|
||||||
|
>
|
||||||
|
{#if $thumbnail}
|
||||||
|
<img src={$thumbnail} alt={info.name} class="h-full w-full object-cover" />
|
||||||
|
{:else}
|
||||||
|
<div class="h-full w-full bg-gray-100"></div>
|
||||||
|
{/if}
|
||||||
|
</button>
|
||||||
@@ -1,5 +1,6 @@
|
|||||||
export { default as ActionEntryButton } from "./ActionEntryButton.svelte";
|
export { default as ActionEntryButton } from "./ActionEntryButton.svelte";
|
||||||
export { default as Button } from "./Button.svelte";
|
export { default as Button } from "./Button.svelte";
|
||||||
export { default as EntryButton } from "./EntryButton.svelte";
|
export { default as EntryButton } from "./EntryButton.svelte";
|
||||||
|
export { default as FileThumbnailButton } from "./FileThumbnailButton.svelte";
|
||||||
export { default as FloatingButton } from "./FloatingButton.svelte";
|
export { default as FloatingButton } from "./FloatingButton.svelte";
|
||||||
export { default as TextButton } from "./TextButton.svelte";
|
export { default as TextButton } from "./TextButton.svelte";
|
||||||
|
|||||||
@@ -3,3 +3,4 @@ export * from "./buttons";
|
|||||||
export * from "./divs";
|
export * from "./divs";
|
||||||
export * from "./inputs";
|
export * from "./inputs";
|
||||||
export { default as Modal } from "./Modal.svelte";
|
export { default as Modal } from "./Modal.svelte";
|
||||||
|
export { default as RowVirtualizer } from "./RowVirtualizer.svelte";
|
||||||
|
|||||||
44
src/lib/components/molecules/Categories.svelte
Normal file
44
src/lib/components/molecules/Categories.svelte
Normal file
@@ -0,0 +1,44 @@
|
|||||||
|
<script module lang="ts">
|
||||||
|
import type { DataKey } from "$lib/modules/filesystem";
|
||||||
|
|
||||||
|
export interface SelectedCategory {
|
||||||
|
id: number;
|
||||||
|
dataKey?: DataKey;
|
||||||
|
name: string;
|
||||||
|
}
|
||||||
|
</script>
|
||||||
|
|
||||||
|
<script lang="ts">
|
||||||
|
import type { Component } from "svelte";
|
||||||
|
import type { SvelteHTMLElements } from "svelte/elements";
|
||||||
|
import { ActionEntryButton } from "$lib/components/atoms";
|
||||||
|
import { CategoryLabel } from "$lib/components/molecules";
|
||||||
|
import type { SubCategoryInfo } from "$lib/modules/filesystem";
|
||||||
|
import { sortEntries } from "$lib/utils";
|
||||||
|
|
||||||
|
interface Props {
|
||||||
|
categories: SubCategoryInfo[];
|
||||||
|
categoryMenuIcon?: Component<SvelteHTMLElements["svg"]>;
|
||||||
|
onCategoryClick: (category: SelectedCategory) => void;
|
||||||
|
onCategoryMenuClick?: (category: SelectedCategory) => void;
|
||||||
|
}
|
||||||
|
|
||||||
|
let { categories, categoryMenuIcon, onCategoryClick, onCategoryMenuClick }: Props = $props();
|
||||||
|
|
||||||
|
let categoriesWithName = $derived(sortEntries([...categories]));
|
||||||
|
</script>
|
||||||
|
|
||||||
|
{#if categoriesWithName.length > 0}
|
||||||
|
<div class="space-y-1">
|
||||||
|
{#each categoriesWithName as category (category.id)}
|
||||||
|
<ActionEntryButton
|
||||||
|
class="h-12"
|
||||||
|
onclick={() => onCategoryClick(category)}
|
||||||
|
actionButtonIcon={categoryMenuIcon}
|
||||||
|
onActionButtonClick={() => onCategoryMenuClick?.(category)}
|
||||||
|
>
|
||||||
|
<CategoryLabel name={category.name} />
|
||||||
|
</ActionEntryButton>
|
||||||
|
{/each}
|
||||||
|
</div>
|
||||||
|
{/if}
|
||||||
@@ -1,56 +0,0 @@
|
|||||||
<script lang="ts">
|
|
||||||
import type { Component } from "svelte";
|
|
||||||
import type { SvelteHTMLElements } from "svelte/elements";
|
|
||||||
import { derived } from "svelte/store";
|
|
||||||
import type { CategoryId } from "$lib/indexedDB";
|
|
||||||
import { getCategoryInfo, type SubCategoryInfo } from "$lib/modules/filesystem2";
|
|
||||||
import { SortBy, sortEntries } from "$lib/modules/util";
|
|
||||||
import { masterKeyStore } from "$lib/stores";
|
|
||||||
import Category from "./Category.svelte";
|
|
||||||
import type { SelectedCategory } from "./service";
|
|
||||||
|
|
||||||
interface Props {
|
|
||||||
categoryIds: CategoryId[];
|
|
||||||
categoryMenuIcon?: Component<SvelteHTMLElements["svg"]>;
|
|
||||||
onCategoryClick: (category: SelectedCategory) => void;
|
|
||||||
onCategoryMenuClick?: (category: SelectedCategory) => void;
|
|
||||||
sortBy?: SortBy;
|
|
||||||
}
|
|
||||||
|
|
||||||
let {
|
|
||||||
categoryIds,
|
|
||||||
categoryMenuIcon,
|
|
||||||
onCategoryClick,
|
|
||||||
onCategoryMenuClick,
|
|
||||||
sortBy = SortBy.NAME_ASC,
|
|
||||||
}: Props = $props();
|
|
||||||
|
|
||||||
let categories = $derived(
|
|
||||||
derived(
|
|
||||||
categoryIds.map((id) => getCategoryInfo(id, $masterKeyStore?.get(1)?.key!)),
|
|
||||||
(infos) => {
|
|
||||||
const categories = infos
|
|
||||||
.filter(($info) => $info.status === "success")
|
|
||||||
.map(($info) => ({
|
|
||||||
name: $info.data.name,
|
|
||||||
info: $info.data as SubCategoryInfo,
|
|
||||||
}));
|
|
||||||
sortEntries(categories, sortBy);
|
|
||||||
return categories;
|
|
||||||
},
|
|
||||||
),
|
|
||||||
);
|
|
||||||
</script>
|
|
||||||
|
|
||||||
{#if $categories.length > 0}
|
|
||||||
<div class="space-y-1">
|
|
||||||
{#each $categories as { info }}
|
|
||||||
<Category
|
|
||||||
{info}
|
|
||||||
menuIcon={categoryMenuIcon}
|
|
||||||
onclick={onCategoryClick}
|
|
||||||
onMenuClick={onCategoryMenuClick}
|
|
||||||
/>
|
|
||||||
{/each}
|
|
||||||
</div>
|
|
||||||
{/if}
|
|
||||||
@@ -1,40 +0,0 @@
|
|||||||
<script lang="ts">
|
|
||||||
import type { Component } from "svelte";
|
|
||||||
import type { SvelteHTMLElements } from "svelte/elements";
|
|
||||||
import { ActionEntryButton } from "$lib/components/atoms";
|
|
||||||
import { CategoryLabel } from "$lib/components/molecules";
|
|
||||||
import type { SubCategoryInfo } from "$lib/modules/filesystem2";
|
|
||||||
import type { SelectedCategory } from "./service";
|
|
||||||
|
|
||||||
interface Props {
|
|
||||||
info: SubCategoryInfo;
|
|
||||||
menuIcon?: Component<SvelteHTMLElements["svg"]>;
|
|
||||||
onclick: (category: SelectedCategory) => void;
|
|
||||||
onMenuClick?: (category: SelectedCategory) => void;
|
|
||||||
}
|
|
||||||
|
|
||||||
let { info, menuIcon, onclick, onMenuClick }: Props = $props();
|
|
||||||
|
|
||||||
const openCategory = () => {
|
|
||||||
const { id, dataKey, dataKeyVersion, name } = info;
|
|
||||||
if (!dataKey || !dataKeyVersion) return; // TODO: Error handling
|
|
||||||
|
|
||||||
onclick({ id, dataKey, dataKeyVersion, name });
|
|
||||||
};
|
|
||||||
|
|
||||||
const openMenu = () => {
|
|
||||||
const { id, dataKey, dataKeyVersion, name } = info;
|
|
||||||
if (!dataKey || !dataKeyVersion) return; // TODO: Error handling
|
|
||||||
|
|
||||||
onMenuClick!({ id, dataKey, dataKeyVersion, name });
|
|
||||||
};
|
|
||||||
</script>
|
|
||||||
|
|
||||||
<ActionEntryButton
|
|
||||||
class="h-12"
|
|
||||||
onclick={openCategory}
|
|
||||||
actionButtonIcon={menuIcon}
|
|
||||||
onActionButtonClick={openMenu}
|
|
||||||
>
|
|
||||||
<CategoryLabel name={info.name} />
|
|
||||||
</ActionEntryButton>
|
|
||||||
@@ -1,2 +0,0 @@
|
|||||||
export { default } from "./Categories.svelte";
|
|
||||||
export * from "./service";
|
|
||||||
@@ -1,6 +0,0 @@
|
|||||||
export interface SelectedCategory {
|
|
||||||
id: number;
|
|
||||||
dataKey: CryptoKey;
|
|
||||||
dataKeyVersion: Date;
|
|
||||||
name: string;
|
|
||||||
}
|
|
||||||
@@ -2,7 +2,7 @@
|
|||||||
import type { Component } from "svelte";
|
import type { Component } from "svelte";
|
||||||
import type { ClassValue, SvelteHTMLElements } from "svelte/elements";
|
import type { ClassValue, SvelteHTMLElements } from "svelte/elements";
|
||||||
import { Categories, IconEntryButton, type SelectedCategory } from "$lib/components/molecules";
|
import { Categories, IconEntryButton, type SelectedCategory } from "$lib/components/molecules";
|
||||||
import type { CategoryInfo } from "$lib/modules/filesystem2";
|
import type { CategoryInfo } from "$lib/modules/filesystem";
|
||||||
|
|
||||||
import IconAddCircle from "~icons/material-symbols/add-circle";
|
import IconAddCircle from "~icons/material-symbols/add-circle";
|
||||||
|
|
||||||
@@ -43,14 +43,12 @@
|
|||||||
{#if subCategoryCreatePosition === "top"}
|
{#if subCategoryCreatePosition === "top"}
|
||||||
{@render subCategoryCreate()}
|
{@render subCategoryCreate()}
|
||||||
{/if}
|
{/if}
|
||||||
{#key info}
|
<Categories
|
||||||
<Categories
|
categories={info.subCategories}
|
||||||
categoryIds={info.subCategoryIds}
|
categoryMenuIcon={subCategoryMenuIcon}
|
||||||
categoryMenuIcon={subCategoryMenuIcon}
|
onCategoryClick={onSubCategoryClick}
|
||||||
onCategoryClick={onSubCategoryClick}
|
onCategoryMenuClick={onSubCategoryMenuClick}
|
||||||
onCategoryMenuClick={onSubCategoryMenuClick}
|
/>
|
||||||
/>
|
|
||||||
{/key}
|
|
||||||
{#if subCategoryCreatePosition === "bottom"}
|
{#if subCategoryCreatePosition === "bottom"}
|
||||||
{@render subCategoryCreate()}
|
{@render subCategoryCreate()}
|
||||||
{/if}
|
{/if}
|
||||||
|
|||||||
@@ -1,7 +1,7 @@
|
|||||||
export * from "./ActionModal.svelte";
|
export * from "./ActionModal.svelte";
|
||||||
export { default as ActionModal } from "./ActionModal.svelte";
|
export { default as ActionModal } from "./ActionModal.svelte";
|
||||||
export * from "./Categories";
|
export * from "./Categories.svelte";
|
||||||
export { default as Categories } from "./Categories";
|
export { default as Categories } from "./Categories.svelte";
|
||||||
export { default as IconEntryButton } from "./IconEntryButton.svelte";
|
export { default as IconEntryButton } from "./IconEntryButton.svelte";
|
||||||
export * from "./labels";
|
export * from "./labels";
|
||||||
export { default as SubCategories } from "./SubCategories.svelte";
|
export { default as SubCategories } from "./SubCategories.svelte";
|
||||||
|
|||||||
@@ -3,6 +3,7 @@
|
|||||||
import { IconLabel } from "$lib/components/molecules";
|
import { IconLabel } from "$lib/components/molecules";
|
||||||
|
|
||||||
import IconFolder from "~icons/material-symbols/folder";
|
import IconFolder from "~icons/material-symbols/folder";
|
||||||
|
import IconDriveFolderUpload from "~icons/material-symbols/drive-folder-upload";
|
||||||
import IconDraft from "~icons/material-symbols/draft";
|
import IconDraft from "~icons/material-symbols/draft";
|
||||||
|
|
||||||
interface Props {
|
interface Props {
|
||||||
@@ -11,7 +12,7 @@
|
|||||||
subtext?: string;
|
subtext?: string;
|
||||||
textClass?: ClassValue;
|
textClass?: ClassValue;
|
||||||
thumbnail?: string;
|
thumbnail?: string;
|
||||||
type: "directory" | "file";
|
type: "directory" | "parent-directory" | "file";
|
||||||
}
|
}
|
||||||
|
|
||||||
let {
|
let {
|
||||||
@@ -30,6 +31,8 @@
|
|||||||
<img src={thumbnail} alt={name} loading="lazy" class="aspect-square rounded object-cover" />
|
<img src={thumbnail} alt={name} loading="lazy" class="aspect-square rounded object-cover" />
|
||||||
{:else if type === "directory"}
|
{:else if type === "directory"}
|
||||||
<IconFolder />
|
<IconFolder />
|
||||||
|
{:else if type === "parent-directory"}
|
||||||
|
<IconDriveFolderUpload class="text-yellow-500" />
|
||||||
{:else}
|
{:else}
|
||||||
<IconDraft class="text-blue-400" />
|
<IconDraft class="text-blue-400" />
|
||||||
{/if}
|
{/if}
|
||||||
|
|||||||
@@ -1,104 +0,0 @@
|
|||||||
<script lang="ts">
|
|
||||||
import { derived } from "svelte/store";
|
|
||||||
import { CheckBox } from "$lib/components/atoms";
|
|
||||||
import { SubCategories, type SelectedCategory } from "$lib/components/molecules";
|
|
||||||
import { getFileInfo, type CategoryInfo } from "$lib/modules/filesystem2";
|
|
||||||
import { SortBy, sortEntries } from "$lib/modules/util";
|
|
||||||
import { masterKeyStore } from "$lib/stores";
|
|
||||||
import File from "./File.svelte";
|
|
||||||
import type { SelectedFile } from "./service";
|
|
||||||
|
|
||||||
import IconMoreVert from "~icons/material-symbols/more-vert";
|
|
||||||
|
|
||||||
interface Props {
|
|
||||||
info: CategoryInfo;
|
|
||||||
onFileClick: (file: SelectedFile) => void;
|
|
||||||
onFileRemoveClick: (file: SelectedFile) => void;
|
|
||||||
onSubCategoryClick: (subCategory: SelectedCategory) => void;
|
|
||||||
onSubCategoryCreateClick: () => void;
|
|
||||||
onSubCategoryMenuClick: (subCategory: SelectedCategory) => void;
|
|
||||||
sortBy?: SortBy;
|
|
||||||
isFileRecursive?: boolean;
|
|
||||||
}
|
|
||||||
|
|
||||||
let {
|
|
||||||
info,
|
|
||||||
onFileClick,
|
|
||||||
onFileRemoveClick,
|
|
||||||
onSubCategoryClick,
|
|
||||||
onSubCategoryCreateClick,
|
|
||||||
onSubCategoryMenuClick,
|
|
||||||
sortBy = SortBy.NAME_ASC,
|
|
||||||
isFileRecursive = $bindable(),
|
|
||||||
}: Props = $props();
|
|
||||||
|
|
||||||
let fileInfos = $derived(
|
|
||||||
info.files
|
|
||||||
?.filter(({ isRecursive }) => isFileRecursive || !isRecursive)
|
|
||||||
.map(({ id, isRecursive }) => ({
|
|
||||||
info: getFileInfo(id, $masterKeyStore?.get(1)?.key!),
|
|
||||||
isRecursive,
|
|
||||||
})) ?? [],
|
|
||||||
);
|
|
||||||
let files = $derived(
|
|
||||||
derived(
|
|
||||||
fileInfos.map(({ info }) => info),
|
|
||||||
(infos) => {
|
|
||||||
const files = infos
|
|
||||||
.map(($info, i) => {
|
|
||||||
if ($info.status === "success") {
|
|
||||||
return {
|
|
||||||
name: $info.data.name,
|
|
||||||
isRecursive: fileInfos[i]!.isRecursive,
|
|
||||||
info: $info.data,
|
|
||||||
};
|
|
||||||
}
|
|
||||||
return undefined;
|
|
||||||
})
|
|
||||||
.filter((info) => info !== undefined);
|
|
||||||
sortEntries(files, sortBy);
|
|
||||||
return files;
|
|
||||||
},
|
|
||||||
),
|
|
||||||
);
|
|
||||||
</script>
|
|
||||||
|
|
||||||
<div class="space-y-4">
|
|
||||||
<div class="space-y-4 bg-white p-4">
|
|
||||||
{#if info.id !== "root"}
|
|
||||||
<p class="text-lg font-bold text-gray-800">하위 카테고리</p>
|
|
||||||
{/if}
|
|
||||||
<SubCategories
|
|
||||||
{info}
|
|
||||||
{onSubCategoryClick}
|
|
||||||
{onSubCategoryCreateClick}
|
|
||||||
{onSubCategoryMenuClick}
|
|
||||||
subCategoryMenuIcon={IconMoreVert}
|
|
||||||
/>
|
|
||||||
</div>
|
|
||||||
{#if info.id !== "root"}
|
|
||||||
<div class="space-y-4 bg-white p-4">
|
|
||||||
<div class="flex items-center justify-between">
|
|
||||||
<p class="text-lg font-bold text-gray-800">파일</p>
|
|
||||||
{#if isFileRecursive !== undefined}
|
|
||||||
<CheckBox bind:checked={isFileRecursive}>
|
|
||||||
<p class="font-medium">하위 카테고리의 파일</p>
|
|
||||||
</CheckBox>
|
|
||||||
{/if}
|
|
||||||
</div>
|
|
||||||
<div class="space-y-1">
|
|
||||||
{#key info}
|
|
||||||
{#each $files as { info, isRecursive }}
|
|
||||||
<File
|
|
||||||
{info}
|
|
||||||
onclick={onFileClick}
|
|
||||||
onRemoveClick={!isRecursive ? onFileRemoveClick : undefined}
|
|
||||||
/>
|
|
||||||
{:else}
|
|
||||||
<p class="text-gray-500 text-center">이 카테고리에 추가된 파일이 없어요.</p>
|
|
||||||
{/each}
|
|
||||||
{/key}
|
|
||||||
</div>
|
|
||||||
</div>
|
|
||||||
{/if}
|
|
||||||
</div>
|
|
||||||
@@ -1,56 +0,0 @@
|
|||||||
<script lang="ts">
|
|
||||||
import { ActionEntryButton } from "$lib/components/atoms";
|
|
||||||
import { DirectoryEntryLabel } from "$lib/components/molecules";
|
|
||||||
import type { FileInfo } from "$lib/modules/filesystem2";
|
|
||||||
import { requestFileThumbnailDownload, type SelectedFile } from "./service";
|
|
||||||
|
|
||||||
import IconClose from "~icons/material-symbols/close";
|
|
||||||
|
|
||||||
interface Props {
|
|
||||||
info: FileInfo;
|
|
||||||
onclick: (selectedFile: SelectedFile) => void;
|
|
||||||
onRemoveClick?: (selectedFile: SelectedFile) => void;
|
|
||||||
}
|
|
||||||
|
|
||||||
let { info, onclick, onRemoveClick }: Props = $props();
|
|
||||||
|
|
||||||
let thumbnail: string | undefined = $state();
|
|
||||||
|
|
||||||
const openFile = () => {
|
|
||||||
const { id, dataKey, dataKeyVersion, name } = info;
|
|
||||||
if (!dataKey || !dataKeyVersion) return; // TODO: Error handling
|
|
||||||
|
|
||||||
onclick({ id, dataKey, dataKeyVersion, name });
|
|
||||||
};
|
|
||||||
|
|
||||||
const removeFile = () => {
|
|
||||||
const { id, dataKey, dataKeyVersion, name } = info;
|
|
||||||
if (!dataKey || !dataKeyVersion) return; // TODO: Error handling
|
|
||||||
|
|
||||||
onRemoveClick!({ id, dataKey, dataKeyVersion, name });
|
|
||||||
};
|
|
||||||
|
|
||||||
$effect(() => {
|
|
||||||
if (info.dataKey) {
|
|
||||||
requestFileThumbnailDownload(info.id, info.dataKey)
|
|
||||||
.then((thumbnailUrl) => {
|
|
||||||
thumbnail = thumbnailUrl ?? undefined;
|
|
||||||
})
|
|
||||||
.catch(() => {
|
|
||||||
// TODO: Error Handling
|
|
||||||
thumbnail = undefined;
|
|
||||||
});
|
|
||||||
} else {
|
|
||||||
thumbnail = undefined;
|
|
||||||
}
|
|
||||||
});
|
|
||||||
</script>
|
|
||||||
|
|
||||||
<ActionEntryButton
|
|
||||||
class="h-12"
|
|
||||||
onclick={openFile}
|
|
||||||
actionButtonIcon={onRemoveClick && IconClose}
|
|
||||||
onActionButtonClick={removeFile}
|
|
||||||
>
|
|
||||||
<DirectoryEntryLabel type="file" {thumbnail} name={info.name} />
|
|
||||||
</ActionEntryButton>
|
|
||||||
@@ -1,2 +0,0 @@
|
|||||||
export { default } from "./Category.svelte";
|
|
||||||
export * from "./service";
|
|
||||||
@@ -1,8 +0,0 @@
|
|||||||
export { requestFileThumbnailDownload } from "$lib/services/file";
|
|
||||||
|
|
||||||
export interface SelectedFile {
|
|
||||||
id: number;
|
|
||||||
dataKey: CryptoKey;
|
|
||||||
dataKeyVersion: Date;
|
|
||||||
name: string;
|
|
||||||
}
|
|
||||||
@@ -1,3 +1 @@
|
|||||||
export * from "./Category";
|
|
||||||
export { default as Category } from "./Category";
|
|
||||||
export * from "./modals";
|
export * from "./modals";
|
||||||
|
|||||||
2
src/lib/constants/index.ts
Normal file
2
src/lib/constants/index.ts
Normal file
@@ -0,0 +1,2 @@
|
|||||||
|
export * from "./serviceWorker";
|
||||||
|
export * from "./upload";
|
||||||
1
src/lib/constants/serviceWorker.ts
Normal file
1
src/lib/constants/serviceWorker.ts
Normal file
@@ -0,0 +1 @@
|
|||||||
|
export const DECRYPTED_FILE_URL_PREFIX = "/_internal/decrypted-file/";
|
||||||
6
src/lib/constants/upload.ts
Normal file
6
src/lib/constants/upload.ts
Normal file
@@ -0,0 +1,6 @@
|
|||||||
|
export const AES_GCM_IV_SIZE = 12;
|
||||||
|
export const AES_GCM_TAG_SIZE = 16;
|
||||||
|
export const ENCRYPTION_OVERHEAD = AES_GCM_IV_SIZE + AES_GCM_TAG_SIZE;
|
||||||
|
|
||||||
|
export const CHUNK_SIZE = 4 * 1024 * 1024;
|
||||||
|
export const ENCRYPTED_CHUNK_SIZE = CHUNK_SIZE + ENCRYPTION_OVERHEAD;
|
||||||
@@ -1,24 +0,0 @@
|
|||||||
interface FetchOptions {
|
|
||||||
fetch?: typeof fetch;
|
|
||||||
signal?: AbortSignal;
|
|
||||||
}
|
|
||||||
|
|
||||||
export const callGetApi = async (
|
|
||||||
input: RequestInfo,
|
|
||||||
{ fetch = globalThis.fetch, signal }: FetchOptions = {},
|
|
||||||
) => {
|
|
||||||
return await fetch(input, { method: "GET", signal });
|
|
||||||
};
|
|
||||||
|
|
||||||
export const callPostApi = async <T>(
|
|
||||||
input: RequestInfo,
|
|
||||||
payload?: T,
|
|
||||||
{ fetch = globalThis.fetch, signal }: FetchOptions = {},
|
|
||||||
) => {
|
|
||||||
return await fetch(input, {
|
|
||||||
method: "POST",
|
|
||||||
headers: { "Content-Type": "application/json" },
|
|
||||||
body: payload ? JSON.stringify(payload) : undefined,
|
|
||||||
signal,
|
|
||||||
});
|
|
||||||
};
|
|
||||||
@@ -1,2 +0,0 @@
|
|||||||
export * from "./callApi";
|
|
||||||
export * from "./gotoStateful";
|
|
||||||
@@ -1,7 +1,5 @@
|
|||||||
import { Dexie, type EntityTable } from "dexie";
|
import { Dexie, type EntityTable } from "dexie";
|
||||||
|
|
||||||
export type DirectoryId = "root" | number;
|
|
||||||
|
|
||||||
interface DirectoryInfo {
|
interface DirectoryInfo {
|
||||||
id: number;
|
id: number;
|
||||||
parentId: DirectoryId;
|
parentId: DirectoryId;
|
||||||
@@ -15,17 +13,15 @@ interface FileInfo {
|
|||||||
contentType: string;
|
contentType: string;
|
||||||
createdAt?: Date;
|
createdAt?: Date;
|
||||||
lastModifiedAt: Date;
|
lastModifiedAt: Date;
|
||||||
categoryIds: number[];
|
categoryIds?: number[];
|
||||||
}
|
}
|
||||||
|
|
||||||
export type CategoryId = "root" | number;
|
|
||||||
|
|
||||||
interface CategoryInfo {
|
interface CategoryInfo {
|
||||||
id: number;
|
id: number;
|
||||||
parentId: CategoryId;
|
parentId: CategoryId;
|
||||||
name: string;
|
name: string;
|
||||||
files: { id: number; isRecursive: boolean }[];
|
files?: { id: number; isRecursive: boolean }[];
|
||||||
isFileRecursive: boolean;
|
isFileRecursive?: boolean;
|
||||||
}
|
}
|
||||||
|
|
||||||
const filesystem = new Dexie("filesystem") as Dexie & {
|
const filesystem = new Dexie("filesystem") as Dexie & {
|
||||||
@@ -59,17 +55,23 @@ export const getDirectoryInfo = async (id: number) => {
|
|||||||
};
|
};
|
||||||
|
|
||||||
export const storeDirectoryInfo = async (directoryInfo: DirectoryInfo) => {
|
export const storeDirectoryInfo = async (directoryInfo: DirectoryInfo) => {
|
||||||
await filesystem.directory.put(directoryInfo);
|
await filesystem.directory.upsert(directoryInfo.id, { ...directoryInfo });
|
||||||
};
|
|
||||||
|
|
||||||
export const updateDirectoryInfo = async (id: number, changes: { name?: string }) => {
|
|
||||||
await filesystem.directory.update(id, changes);
|
|
||||||
};
|
};
|
||||||
|
|
||||||
export const deleteDirectoryInfo = async (id: number) => {
|
export const deleteDirectoryInfo = async (id: number) => {
|
||||||
await filesystem.directory.delete(id);
|
await filesystem.directory.delete(id);
|
||||||
};
|
};
|
||||||
|
|
||||||
|
export const deleteDanglingDirectoryInfos = async (
|
||||||
|
parentId: DirectoryId,
|
||||||
|
validIds: Set<number>,
|
||||||
|
) => {
|
||||||
|
await filesystem.directory
|
||||||
|
.where({ parentId })
|
||||||
|
.and((directory) => !validIds.has(directory.id))
|
||||||
|
.delete();
|
||||||
|
};
|
||||||
|
|
||||||
export const getAllFileInfos = async () => {
|
export const getAllFileInfos = async () => {
|
||||||
return await filesystem.file.toArray();
|
return await filesystem.file.toArray();
|
||||||
};
|
};
|
||||||
@@ -82,18 +84,29 @@ export const getFileInfo = async (id: number) => {
|
|||||||
return await filesystem.file.get(id);
|
return await filesystem.file.get(id);
|
||||||
};
|
};
|
||||||
|
|
||||||
export const storeFileInfo = async (fileInfo: FileInfo) => {
|
export const bulkGetFileInfos = async (ids: number[]) => {
|
||||||
await filesystem.file.put(fileInfo);
|
return await filesystem.file.bulkGet(ids);
|
||||||
};
|
};
|
||||||
|
|
||||||
export const updateFileInfo = async (id: number, changes: { name?: string }) => {
|
export const storeFileInfo = async (fileInfo: FileInfo) => {
|
||||||
await filesystem.file.update(id, changes);
|
await filesystem.file.upsert(fileInfo.id, { ...fileInfo });
|
||||||
};
|
};
|
||||||
|
|
||||||
export const deleteFileInfo = async (id: number) => {
|
export const deleteFileInfo = async (id: number) => {
|
||||||
await filesystem.file.delete(id);
|
await filesystem.file.delete(id);
|
||||||
};
|
};
|
||||||
|
|
||||||
|
export const bulkDeleteFileInfos = async (ids: number[]) => {
|
||||||
|
await filesystem.file.bulkDelete(ids);
|
||||||
|
};
|
||||||
|
|
||||||
|
export const deleteDanglingFileInfos = async (parentId: DirectoryId, validIds: Set<number>) => {
|
||||||
|
await filesystem.file
|
||||||
|
.where({ parentId })
|
||||||
|
.and((file) => !validIds.has(file.id))
|
||||||
|
.delete();
|
||||||
|
};
|
||||||
|
|
||||||
export const getCategoryInfos = async (parentId: CategoryId) => {
|
export const getCategoryInfos = async (parentId: CategoryId) => {
|
||||||
return await filesystem.category.where({ parentId }).toArray();
|
return await filesystem.category.where({ parentId }).toArray();
|
||||||
};
|
};
|
||||||
@@ -103,13 +116,10 @@ export const getCategoryInfo = async (id: number) => {
|
|||||||
};
|
};
|
||||||
|
|
||||||
export const storeCategoryInfo = async (categoryInfo: CategoryInfo) => {
|
export const storeCategoryInfo = async (categoryInfo: CategoryInfo) => {
|
||||||
await filesystem.category.put(categoryInfo);
|
await filesystem.category.upsert(categoryInfo.id, { ...categoryInfo });
|
||||||
};
|
};
|
||||||
|
|
||||||
export const updateCategoryInfo = async (
|
export const updateCategoryInfo = async (id: number, changes: { isFileRecursive?: boolean }) => {
|
||||||
id: number,
|
|
||||||
changes: { name?: string; isFileRecursive?: boolean },
|
|
||||||
) => {
|
|
||||||
await filesystem.category.update(id, changes);
|
await filesystem.category.update(id, changes);
|
||||||
};
|
};
|
||||||
|
|
||||||
@@ -117,6 +127,13 @@ export const deleteCategoryInfo = async (id: number) => {
|
|||||||
await filesystem.category.delete(id);
|
await filesystem.category.delete(id);
|
||||||
};
|
};
|
||||||
|
|
||||||
|
export const deleteDanglingCategoryInfos = async (parentId: CategoryId, validIds: Set<number>) => {
|
||||||
|
await filesystem.category
|
||||||
|
.where({ parentId })
|
||||||
|
.and((category) => !validIds.has(category.id))
|
||||||
|
.delete();
|
||||||
|
};
|
||||||
|
|
||||||
export const cleanupDanglingInfos = async () => {
|
export const cleanupDanglingInfos = async () => {
|
||||||
const validDirectoryIds: number[] = [];
|
const validDirectoryIds: number[] = [];
|
||||||
const validFileIds: number[] = [];
|
const validFileIds: number[] = [];
|
||||||
|
|||||||
@@ -1,8 +1,15 @@
|
|||||||
import { encodeString, decodeString, encodeToBase64, decodeFromBase64 } from "./util";
|
import { AES_GCM_IV_SIZE } from "$lib/constants";
|
||||||
|
import {
|
||||||
|
encodeString,
|
||||||
|
decodeString,
|
||||||
|
encodeToBase64,
|
||||||
|
decodeFromBase64,
|
||||||
|
concatenateBuffers,
|
||||||
|
} from "./util";
|
||||||
|
|
||||||
export const generateMasterKey = async () => {
|
export const generateMasterKey = async () => {
|
||||||
return {
|
return {
|
||||||
masterKey: await window.crypto.subtle.generateKey(
|
masterKey: await crypto.subtle.generateKey(
|
||||||
{
|
{
|
||||||
name: "AES-KW",
|
name: "AES-KW",
|
||||||
length: 256,
|
length: 256,
|
||||||
@@ -15,7 +22,7 @@ export const generateMasterKey = async () => {
|
|||||||
|
|
||||||
export const generateDataKey = async () => {
|
export const generateDataKey = async () => {
|
||||||
return {
|
return {
|
||||||
dataKey: await window.crypto.subtle.generateKey(
|
dataKey: await crypto.subtle.generateKey(
|
||||||
{
|
{
|
||||||
name: "AES-GCM",
|
name: "AES-GCM",
|
||||||
length: 256,
|
length: 256,
|
||||||
@@ -28,9 +35,9 @@ export const generateDataKey = async () => {
|
|||||||
};
|
};
|
||||||
|
|
||||||
export const makeAESKeyNonextractable = async (key: CryptoKey) => {
|
export const makeAESKeyNonextractable = async (key: CryptoKey) => {
|
||||||
return await window.crypto.subtle.importKey(
|
return await crypto.subtle.importKey(
|
||||||
"raw",
|
"raw",
|
||||||
await window.crypto.subtle.exportKey("raw", key),
|
await crypto.subtle.exportKey("raw", key),
|
||||||
key.algorithm,
|
key.algorithm,
|
||||||
false,
|
false,
|
||||||
key.usages,
|
key.usages,
|
||||||
@@ -38,12 +45,12 @@ export const makeAESKeyNonextractable = async (key: CryptoKey) => {
|
|||||||
};
|
};
|
||||||
|
|
||||||
export const wrapDataKey = async (dataKey: CryptoKey, masterKey: CryptoKey) => {
|
export const wrapDataKey = async (dataKey: CryptoKey, masterKey: CryptoKey) => {
|
||||||
return encodeToBase64(await window.crypto.subtle.wrapKey("raw", dataKey, masterKey, "AES-KW"));
|
return encodeToBase64(await crypto.subtle.wrapKey("raw", dataKey, masterKey, "AES-KW"));
|
||||||
};
|
};
|
||||||
|
|
||||||
export const unwrapDataKey = async (dataKeyWrapped: string, masterKey: CryptoKey) => {
|
export const unwrapDataKey = async (dataKeyWrapped: string, masterKey: CryptoKey) => {
|
||||||
return {
|
return {
|
||||||
dataKey: await window.crypto.subtle.unwrapKey(
|
dataKey: await crypto.subtle.unwrapKey(
|
||||||
"raw",
|
"raw",
|
||||||
decodeFromBase64(dataKeyWrapped),
|
decodeFromBase64(dataKeyWrapped),
|
||||||
masterKey,
|
masterKey,
|
||||||
@@ -56,12 +63,12 @@ export const unwrapDataKey = async (dataKeyWrapped: string, masterKey: CryptoKey
|
|||||||
};
|
};
|
||||||
|
|
||||||
export const wrapHmacSecret = async (hmacSecret: CryptoKey, masterKey: CryptoKey) => {
|
export const wrapHmacSecret = async (hmacSecret: CryptoKey, masterKey: CryptoKey) => {
|
||||||
return encodeToBase64(await window.crypto.subtle.wrapKey("raw", hmacSecret, masterKey, "AES-KW"));
|
return encodeToBase64(await crypto.subtle.wrapKey("raw", hmacSecret, masterKey, "AES-KW"));
|
||||||
};
|
};
|
||||||
|
|
||||||
export const unwrapHmacSecret = async (hmacSecretWrapped: string, masterKey: CryptoKey) => {
|
export const unwrapHmacSecret = async (hmacSecretWrapped: string, masterKey: CryptoKey) => {
|
||||||
return {
|
return {
|
||||||
hmacSecret: await window.crypto.subtle.unwrapKey(
|
hmacSecret: await crypto.subtle.unwrapKey(
|
||||||
"raw",
|
"raw",
|
||||||
decodeFromBase64(hmacSecretWrapped),
|
decodeFromBase64(hmacSecretWrapped),
|
||||||
masterKey,
|
masterKey,
|
||||||
@@ -77,8 +84,8 @@ export const unwrapHmacSecret = async (hmacSecretWrapped: string, masterKey: Cry
|
|||||||
};
|
};
|
||||||
|
|
||||||
export const encryptData = async (data: BufferSource, dataKey: CryptoKey) => {
|
export const encryptData = async (data: BufferSource, dataKey: CryptoKey) => {
|
||||||
const iv = window.crypto.getRandomValues(new Uint8Array(12));
|
const iv = crypto.getRandomValues(new Uint8Array(12));
|
||||||
const ciphertext = await window.crypto.subtle.encrypt(
|
const ciphertext = await crypto.subtle.encrypt(
|
||||||
{
|
{
|
||||||
name: "AES-GCM",
|
name: "AES-GCM",
|
||||||
iv,
|
iv,
|
||||||
@@ -86,14 +93,18 @@ export const encryptData = async (data: BufferSource, dataKey: CryptoKey) => {
|
|||||||
dataKey,
|
dataKey,
|
||||||
data,
|
data,
|
||||||
);
|
);
|
||||||
return { ciphertext, iv: encodeToBase64(iv.buffer) };
|
return { ciphertext, iv: iv.buffer };
|
||||||
};
|
};
|
||||||
|
|
||||||
export const decryptData = async (ciphertext: BufferSource, iv: string, dataKey: CryptoKey) => {
|
export const decryptData = async (
|
||||||
return await window.crypto.subtle.decrypt(
|
ciphertext: BufferSource,
|
||||||
|
iv: string | BufferSource,
|
||||||
|
dataKey: CryptoKey,
|
||||||
|
) => {
|
||||||
|
return await crypto.subtle.decrypt(
|
||||||
{
|
{
|
||||||
name: "AES-GCM",
|
name: "AES-GCM",
|
||||||
iv: decodeFromBase64(iv),
|
iv: typeof iv === "string" ? decodeFromBase64(iv) : iv,
|
||||||
} satisfies AesGcmParams,
|
} satisfies AesGcmParams,
|
||||||
dataKey,
|
dataKey,
|
||||||
ciphertext,
|
ciphertext,
|
||||||
@@ -102,9 +113,22 @@ export const decryptData = async (ciphertext: BufferSource, iv: string, dataKey:
|
|||||||
|
|
||||||
export const encryptString = async (plaintext: string, dataKey: CryptoKey) => {
|
export const encryptString = async (plaintext: string, dataKey: CryptoKey) => {
|
||||||
const { ciphertext, iv } = await encryptData(encodeString(plaintext), dataKey);
|
const { ciphertext, iv } = await encryptData(encodeString(plaintext), dataKey);
|
||||||
return { ciphertext: encodeToBase64(ciphertext), iv };
|
return { ciphertext: encodeToBase64(ciphertext), iv: encodeToBase64(iv) };
|
||||||
};
|
};
|
||||||
|
|
||||||
export const decryptString = async (ciphertext: string, iv: string, dataKey: CryptoKey) => {
|
export const decryptString = async (ciphertext: string, iv: string, dataKey: CryptoKey) => {
|
||||||
return decodeString(await decryptData(decodeFromBase64(ciphertext), iv, dataKey));
|
return decodeString(await decryptData(decodeFromBase64(ciphertext), iv, dataKey));
|
||||||
};
|
};
|
||||||
|
|
||||||
|
export const encryptChunk = async (chunk: ArrayBuffer, dataKey: CryptoKey) => {
|
||||||
|
const { ciphertext, iv } = await encryptData(chunk, dataKey);
|
||||||
|
return concatenateBuffers(iv, ciphertext).buffer;
|
||||||
|
};
|
||||||
|
|
||||||
|
export const decryptChunk = async (encryptedChunk: ArrayBuffer, dataKey: CryptoKey) => {
|
||||||
|
return await decryptData(
|
||||||
|
encryptedChunk.slice(AES_GCM_IV_SIZE),
|
||||||
|
encryptedChunk.slice(0, AES_GCM_IV_SIZE),
|
||||||
|
dataKey,
|
||||||
|
);
|
||||||
|
};
|
||||||
|
|||||||
@@ -1,7 +1,7 @@
|
|||||||
import { encodeString, encodeToBase64, decodeFromBase64 } from "./util";
|
import { encodeString, encodeToBase64, decodeFromBase64 } from "./util";
|
||||||
|
|
||||||
export const generateEncryptionKeyPair = async () => {
|
export const generateEncryptionKeyPair = async () => {
|
||||||
const keyPair = await window.crypto.subtle.generateKey(
|
const keyPair = await crypto.subtle.generateKey(
|
||||||
{
|
{
|
||||||
name: "RSA-OAEP",
|
name: "RSA-OAEP",
|
||||||
modulusLength: 4096,
|
modulusLength: 4096,
|
||||||
@@ -18,7 +18,7 @@ export const generateEncryptionKeyPair = async () => {
|
|||||||
};
|
};
|
||||||
|
|
||||||
export const generateSigningKeyPair = async () => {
|
export const generateSigningKeyPair = async () => {
|
||||||
const keyPair = await window.crypto.subtle.generateKey(
|
const keyPair = await crypto.subtle.generateKey(
|
||||||
{
|
{
|
||||||
name: "RSA-PSS",
|
name: "RSA-PSS",
|
||||||
modulusLength: 4096,
|
modulusLength: 4096,
|
||||||
@@ -37,7 +37,7 @@ export const generateSigningKeyPair = async () => {
|
|||||||
export const exportRSAKey = async (key: CryptoKey) => {
|
export const exportRSAKey = async (key: CryptoKey) => {
|
||||||
const format = key.type === "public" ? ("spki" as const) : ("pkcs8" as const);
|
const format = key.type === "public" ? ("spki" as const) : ("pkcs8" as const);
|
||||||
return {
|
return {
|
||||||
key: await window.crypto.subtle.exportKey(format, key),
|
key: await crypto.subtle.exportKey(format, key),
|
||||||
format,
|
format,
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
@@ -54,14 +54,14 @@ export const importEncryptionKeyPairFromBase64 = async (
|
|||||||
name: "RSA-OAEP",
|
name: "RSA-OAEP",
|
||||||
hash: "SHA-256",
|
hash: "SHA-256",
|
||||||
};
|
};
|
||||||
const encryptKey = await window.crypto.subtle.importKey(
|
const encryptKey = await crypto.subtle.importKey(
|
||||||
"spki",
|
"spki",
|
||||||
decodeFromBase64(encryptKeyBase64),
|
decodeFromBase64(encryptKeyBase64),
|
||||||
algorithm,
|
algorithm,
|
||||||
true,
|
true,
|
||||||
["encrypt", "wrapKey"],
|
["encrypt", "wrapKey"],
|
||||||
);
|
);
|
||||||
const decryptKey = await window.crypto.subtle.importKey(
|
const decryptKey = await crypto.subtle.importKey(
|
||||||
"pkcs8",
|
"pkcs8",
|
||||||
decodeFromBase64(decryptKeyBase64),
|
decodeFromBase64(decryptKeyBase64),
|
||||||
algorithm,
|
algorithm,
|
||||||
@@ -79,14 +79,14 @@ export const importSigningKeyPairFromBase64 = async (
|
|||||||
name: "RSA-PSS",
|
name: "RSA-PSS",
|
||||||
hash: "SHA-256",
|
hash: "SHA-256",
|
||||||
};
|
};
|
||||||
const signKey = await window.crypto.subtle.importKey(
|
const signKey = await crypto.subtle.importKey(
|
||||||
"pkcs8",
|
"pkcs8",
|
||||||
decodeFromBase64(signKeyBase64),
|
decodeFromBase64(signKeyBase64),
|
||||||
algorithm,
|
algorithm,
|
||||||
true,
|
true,
|
||||||
["sign"],
|
["sign"],
|
||||||
);
|
);
|
||||||
const verifyKey = await window.crypto.subtle.importKey(
|
const verifyKey = await crypto.subtle.importKey(
|
||||||
"spki",
|
"spki",
|
||||||
decodeFromBase64(verifyKeyBase64),
|
decodeFromBase64(verifyKeyBase64),
|
||||||
algorithm,
|
algorithm,
|
||||||
@@ -98,17 +98,11 @@ export const importSigningKeyPairFromBase64 = async (
|
|||||||
|
|
||||||
export const makeRSAKeyNonextractable = async (key: CryptoKey) => {
|
export const makeRSAKeyNonextractable = async (key: CryptoKey) => {
|
||||||
const { key: exportedKey, format } = await exportRSAKey(key);
|
const { key: exportedKey, format } = await exportRSAKey(key);
|
||||||
return await window.crypto.subtle.importKey(
|
return await crypto.subtle.importKey(format, exportedKey, key.algorithm, false, key.usages);
|
||||||
format,
|
|
||||||
exportedKey,
|
|
||||||
key.algorithm,
|
|
||||||
false,
|
|
||||||
key.usages,
|
|
||||||
);
|
|
||||||
};
|
};
|
||||||
|
|
||||||
export const decryptChallenge = async (challenge: string, decryptKey: CryptoKey) => {
|
export const decryptChallenge = async (challenge: string, decryptKey: CryptoKey) => {
|
||||||
return await window.crypto.subtle.decrypt(
|
return await crypto.subtle.decrypt(
|
||||||
{
|
{
|
||||||
name: "RSA-OAEP",
|
name: "RSA-OAEP",
|
||||||
} satisfies RsaOaepParams,
|
} satisfies RsaOaepParams,
|
||||||
@@ -119,7 +113,7 @@ export const decryptChallenge = async (challenge: string, decryptKey: CryptoKey)
|
|||||||
|
|
||||||
export const wrapMasterKey = async (masterKey: CryptoKey, encryptKey: CryptoKey) => {
|
export const wrapMasterKey = async (masterKey: CryptoKey, encryptKey: CryptoKey) => {
|
||||||
return encodeToBase64(
|
return encodeToBase64(
|
||||||
await window.crypto.subtle.wrapKey("raw", masterKey, encryptKey, {
|
await crypto.subtle.wrapKey("raw", masterKey, encryptKey, {
|
||||||
name: "RSA-OAEP",
|
name: "RSA-OAEP",
|
||||||
} satisfies RsaOaepParams),
|
} satisfies RsaOaepParams),
|
||||||
);
|
);
|
||||||
@@ -131,7 +125,7 @@ export const unwrapMasterKey = async (
|
|||||||
extractable = false,
|
extractable = false,
|
||||||
) => {
|
) => {
|
||||||
return {
|
return {
|
||||||
masterKey: await window.crypto.subtle.unwrapKey(
|
masterKey: await crypto.subtle.unwrapKey(
|
||||||
"raw",
|
"raw",
|
||||||
decodeFromBase64(masterKeyWrapped),
|
decodeFromBase64(masterKeyWrapped),
|
||||||
decryptKey,
|
decryptKey,
|
||||||
@@ -146,7 +140,7 @@ export const unwrapMasterKey = async (
|
|||||||
};
|
};
|
||||||
|
|
||||||
export const signMessageRSA = async (message: BufferSource, signKey: CryptoKey) => {
|
export const signMessageRSA = async (message: BufferSource, signKey: CryptoKey) => {
|
||||||
return await window.crypto.subtle.sign(
|
return await crypto.subtle.sign(
|
||||||
{
|
{
|
||||||
name: "RSA-PSS",
|
name: "RSA-PSS",
|
||||||
saltLength: 32, // SHA-256
|
saltLength: 32, // SHA-256
|
||||||
@@ -161,7 +155,7 @@ export const verifySignatureRSA = async (
|
|||||||
signature: BufferSource,
|
signature: BufferSource,
|
||||||
verifyKey: CryptoKey,
|
verifyKey: CryptoKey,
|
||||||
) => {
|
) => {
|
||||||
return await window.crypto.subtle.verify(
|
return await crypto.subtle.verify(
|
||||||
{
|
{
|
||||||
name: "RSA-PSS",
|
name: "RSA-PSS",
|
||||||
saltLength: 32, // SHA-256
|
saltLength: 32, // SHA-256
|
||||||
|
|||||||
@@ -1,10 +1,10 @@
|
|||||||
export const digestMessage = async (message: BufferSource) => {
|
export const digestMessage = async (message: BufferSource) => {
|
||||||
return await window.crypto.subtle.digest("SHA-256", message);
|
return await crypto.subtle.digest("SHA-256", message);
|
||||||
};
|
};
|
||||||
|
|
||||||
export const generateHmacSecret = async () => {
|
export const generateHmacSecret = async () => {
|
||||||
return {
|
return {
|
||||||
hmacSecret: await window.crypto.subtle.generateKey(
|
hmacSecret: await crypto.subtle.generateKey(
|
||||||
{
|
{
|
||||||
name: "HMAC",
|
name: "HMAC",
|
||||||
hash: "SHA-256",
|
hash: "SHA-256",
|
||||||
@@ -16,5 +16,5 @@ export const generateHmacSecret = async () => {
|
|||||||
};
|
};
|
||||||
|
|
||||||
export const signMessageHmac = async (message: BufferSource, hmacSecret: CryptoKey) => {
|
export const signMessageHmac = async (message: BufferSource, hmacSecret: CryptoKey) => {
|
||||||
return await window.crypto.subtle.sign("HMAC", hmacSecret, message);
|
return await crypto.subtle.sign("HMAC", hmacSecret, message);
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -1,15 +1,12 @@
|
|||||||
import { LRUCache } from "lru-cache";
|
|
||||||
import {
|
import {
|
||||||
getFileCacheIndex as getFileCacheIndexFromIndexedDB,
|
getFileCacheIndex as getFileCacheIndexFromIndexedDB,
|
||||||
storeFileCacheIndex,
|
storeFileCacheIndex,
|
||||||
deleteFileCacheIndex,
|
deleteFileCacheIndex,
|
||||||
type FileCacheIndex,
|
type FileCacheIndex,
|
||||||
} from "$lib/indexedDB";
|
} from "$lib/indexedDB";
|
||||||
import { readFile, writeFile, deleteFile, deleteDirectory } from "$lib/modules/opfs";
|
import { readFile, writeFile, deleteFile } from "$lib/modules/opfs";
|
||||||
import { getThumbnailUrl } from "$lib/modules/thumbnail";
|
|
||||||
|
|
||||||
const fileCacheIndex = new Map<number, FileCacheIndex>();
|
const fileCacheIndex = new Map<number, FileCacheIndex>();
|
||||||
const loadedThumbnails = new LRUCache<number, string>({ max: 100 });
|
|
||||||
|
|
||||||
export const prepareFileCache = async () => {
|
export const prepareFileCache = async () => {
|
||||||
for (const cache of await getFileCacheIndexFromIndexedDB()) {
|
for (const cache of await getFileCacheIndexFromIndexedDB()) {
|
||||||
@@ -51,30 +48,3 @@ export const deleteFileCache = async (fileId: number) => {
|
|||||||
await deleteFile(`/cache/${fileId}`);
|
await deleteFile(`/cache/${fileId}`);
|
||||||
await deleteFileCacheIndex(fileId);
|
await deleteFileCacheIndex(fileId);
|
||||||
};
|
};
|
||||||
|
|
||||||
export const getFileThumbnailCache = async (fileId: number) => {
|
|
||||||
const thumbnail = loadedThumbnails.get(fileId);
|
|
||||||
if (thumbnail) return thumbnail;
|
|
||||||
|
|
||||||
const thumbnailBuffer = await readFile(`/thumbnail/file/${fileId}`);
|
|
||||||
if (!thumbnailBuffer) return null;
|
|
||||||
|
|
||||||
const thumbnailUrl = getThumbnailUrl(thumbnailBuffer);
|
|
||||||
loadedThumbnails.set(fileId, thumbnailUrl);
|
|
||||||
return thumbnailUrl;
|
|
||||||
};
|
|
||||||
|
|
||||||
export const storeFileThumbnailCache = async (fileId: number, thumbnailBuffer: ArrayBuffer) => {
|
|
||||||
await writeFile(`/thumbnail/file/${fileId}`, thumbnailBuffer);
|
|
||||||
loadedThumbnails.set(fileId, getThumbnailUrl(thumbnailBuffer));
|
|
||||||
};
|
|
||||||
|
|
||||||
export const deleteFileThumbnailCache = async (fileId: number) => {
|
|
||||||
loadedThumbnails.delete(fileId);
|
|
||||||
await deleteFile(`/thumbnail/file/${fileId}`);
|
|
||||||
};
|
|
||||||
|
|
||||||
export const deleteAllFileThumbnailCaches = async () => {
|
|
||||||
loadedThumbnails.clear();
|
|
||||||
await deleteDirectory("/thumbnail/file");
|
|
||||||
};
|
|
||||||
|
|||||||
110
src/lib/modules/file/download.svelte.ts
Normal file
110
src/lib/modules/file/download.svelte.ts
Normal file
@@ -0,0 +1,110 @@
|
|||||||
|
import axios from "axios";
|
||||||
|
import { limitFunction } from "p-limit";
|
||||||
|
import { CHUNK_SIZE, ENCRYPTION_OVERHEAD } from "$lib/constants";
|
||||||
|
import { decryptChunk, concatenateBuffers } from "$lib/modules/crypto";
|
||||||
|
|
||||||
|
export interface FileDownloadState {
|
||||||
|
id: number;
|
||||||
|
status:
|
||||||
|
| "download-pending"
|
||||||
|
| "downloading"
|
||||||
|
| "decryption-pending"
|
||||||
|
| "decrypting"
|
||||||
|
| "decrypted"
|
||||||
|
| "canceled"
|
||||||
|
| "error";
|
||||||
|
progress?: number;
|
||||||
|
rate?: number;
|
||||||
|
estimated?: number;
|
||||||
|
result?: ArrayBuffer;
|
||||||
|
}
|
||||||
|
|
||||||
|
type LiveFileDownloadState = FileDownloadState & {
|
||||||
|
status: "download-pending" | "downloading" | "decryption-pending" | "decrypting";
|
||||||
|
};
|
||||||
|
|
||||||
|
let downloadingFiles: FileDownloadState[] = $state([]);
|
||||||
|
|
||||||
|
export const isFileDownloading = (
|
||||||
|
status: FileDownloadState["status"],
|
||||||
|
): status is LiveFileDownloadState["status"] =>
|
||||||
|
["download-pending", "downloading", "decryption-pending", "decrypting"].includes(status);
|
||||||
|
|
||||||
|
export const getFileDownloadState = (fileId: number) => {
|
||||||
|
return downloadingFiles.find((file) => file.id === fileId && isFileDownloading(file.status));
|
||||||
|
};
|
||||||
|
|
||||||
|
export const getDownloadingFiles = () => {
|
||||||
|
return downloadingFiles.filter((file) => isFileDownloading(file.status));
|
||||||
|
};
|
||||||
|
|
||||||
|
export const clearDownloadedFiles = () => {
|
||||||
|
downloadingFiles = downloadingFiles.filter((file) => isFileDownloading(file.status));
|
||||||
|
};
|
||||||
|
|
||||||
|
const requestFileDownload = limitFunction(
|
||||||
|
async (state: FileDownloadState, id: number) => {
|
||||||
|
state.status = "downloading";
|
||||||
|
|
||||||
|
const res = await axios.get(`/api/file/${id}/download`, {
|
||||||
|
responseType: "arraybuffer",
|
||||||
|
onDownloadProgress: ({ progress, rate, estimated }) => {
|
||||||
|
state.progress = progress;
|
||||||
|
state.rate = rate;
|
||||||
|
state.estimated = estimated;
|
||||||
|
},
|
||||||
|
});
|
||||||
|
const fileEncrypted: ArrayBuffer = res.data;
|
||||||
|
|
||||||
|
state.status = "decryption-pending";
|
||||||
|
return fileEncrypted;
|
||||||
|
},
|
||||||
|
{ concurrency: 1 },
|
||||||
|
);
|
||||||
|
|
||||||
|
const decryptFile = limitFunction(
|
||||||
|
async (
|
||||||
|
state: FileDownloadState,
|
||||||
|
fileEncrypted: ArrayBuffer,
|
||||||
|
encryptedChunkSize: number,
|
||||||
|
dataKey: CryptoKey,
|
||||||
|
) => {
|
||||||
|
state.status = "decrypting";
|
||||||
|
|
||||||
|
const chunks: ArrayBuffer[] = [];
|
||||||
|
let offset = 0;
|
||||||
|
|
||||||
|
while (offset < fileEncrypted.byteLength) {
|
||||||
|
const nextOffset = Math.min(offset + encryptedChunkSize, fileEncrypted.byteLength);
|
||||||
|
chunks.push(await decryptChunk(fileEncrypted.slice(offset, nextOffset), dataKey));
|
||||||
|
offset = nextOffset;
|
||||||
|
}
|
||||||
|
|
||||||
|
const fileBuffer = concatenateBuffers(...chunks).buffer;
|
||||||
|
state.status = "decrypted";
|
||||||
|
state.result = fileBuffer;
|
||||||
|
return fileBuffer;
|
||||||
|
},
|
||||||
|
{ concurrency: 4 },
|
||||||
|
);
|
||||||
|
|
||||||
|
export const downloadFile = async (id: number, dataKey: CryptoKey, isLegacy: boolean) => {
|
||||||
|
downloadingFiles.push({
|
||||||
|
id,
|
||||||
|
status: "download-pending",
|
||||||
|
});
|
||||||
|
const state = downloadingFiles.at(-1)!;
|
||||||
|
|
||||||
|
try {
|
||||||
|
const fileEncrypted = await requestFileDownload(state, id);
|
||||||
|
return await decryptFile(
|
||||||
|
state,
|
||||||
|
fileEncrypted,
|
||||||
|
isLegacy ? fileEncrypted.byteLength : CHUNK_SIZE + ENCRYPTION_OVERHEAD,
|
||||||
|
dataKey,
|
||||||
|
);
|
||||||
|
} catch (e) {
|
||||||
|
state.status = "error";
|
||||||
|
throw e;
|
||||||
|
}
|
||||||
|
};
|
||||||
@@ -1,84 +0,0 @@
|
|||||||
import axios from "axios";
|
|
||||||
import { limitFunction } from "p-limit";
|
|
||||||
import { writable, type Writable } from "svelte/store";
|
|
||||||
import { decryptData } from "$lib/modules/crypto";
|
|
||||||
import { fileDownloadStatusStore, type FileDownloadStatus } from "$lib/stores";
|
|
||||||
|
|
||||||
const requestFileDownload = limitFunction(
|
|
||||||
async (status: Writable<FileDownloadStatus>, id: number) => {
|
|
||||||
status.update((value) => {
|
|
||||||
value.status = "downloading";
|
|
||||||
return value;
|
|
||||||
});
|
|
||||||
|
|
||||||
const res = await axios.get(`/api/file/${id}/download`, {
|
|
||||||
responseType: "arraybuffer",
|
|
||||||
onDownloadProgress: ({ progress, rate, estimated }) => {
|
|
||||||
status.update((value) => {
|
|
||||||
value.progress = progress;
|
|
||||||
value.rate = rate;
|
|
||||||
value.estimated = estimated;
|
|
||||||
return value;
|
|
||||||
});
|
|
||||||
},
|
|
||||||
});
|
|
||||||
const fileEncrypted: ArrayBuffer = res.data;
|
|
||||||
|
|
||||||
status.update((value) => {
|
|
||||||
value.status = "decryption-pending";
|
|
||||||
return value;
|
|
||||||
});
|
|
||||||
return fileEncrypted;
|
|
||||||
},
|
|
||||||
{ concurrency: 1 },
|
|
||||||
);
|
|
||||||
|
|
||||||
const decryptFile = limitFunction(
|
|
||||||
async (
|
|
||||||
status: Writable<FileDownloadStatus>,
|
|
||||||
fileEncrypted: ArrayBuffer,
|
|
||||||
fileEncryptedIv: string,
|
|
||||||
dataKey: CryptoKey,
|
|
||||||
) => {
|
|
||||||
status.update((value) => {
|
|
||||||
value.status = "decrypting";
|
|
||||||
return value;
|
|
||||||
});
|
|
||||||
|
|
||||||
const fileBuffer = await decryptData(fileEncrypted, fileEncryptedIv, dataKey);
|
|
||||||
|
|
||||||
status.update((value) => {
|
|
||||||
value.status = "decrypted";
|
|
||||||
value.result = fileBuffer;
|
|
||||||
return value;
|
|
||||||
});
|
|
||||||
return fileBuffer;
|
|
||||||
},
|
|
||||||
{ concurrency: 4 },
|
|
||||||
);
|
|
||||||
|
|
||||||
export const downloadFile = async (id: number, fileEncryptedIv: string, dataKey: CryptoKey) => {
|
|
||||||
const status = writable<FileDownloadStatus>({
|
|
||||||
id,
|
|
||||||
status: "download-pending",
|
|
||||||
});
|
|
||||||
fileDownloadStatusStore.update((value) => {
|
|
||||||
value.push(status);
|
|
||||||
return value;
|
|
||||||
});
|
|
||||||
|
|
||||||
try {
|
|
||||||
return await decryptFile(
|
|
||||||
status,
|
|
||||||
await requestFileDownload(status, id),
|
|
||||||
fileEncryptedIv,
|
|
||||||
dataKey,
|
|
||||||
);
|
|
||||||
} catch (e) {
|
|
||||||
status.update((value) => {
|
|
||||||
value.status = "error";
|
|
||||||
return value;
|
|
||||||
});
|
|
||||||
throw e;
|
|
||||||
}
|
|
||||||
};
|
|
||||||
@@ -1,3 +1,4 @@
|
|||||||
export * from "./cache";
|
export * from "./cache";
|
||||||
export * from "./download";
|
export * from "./download.svelte";
|
||||||
export * from "./upload";
|
export * from "./thumbnail";
|
||||||
|
export * from "./upload.svelte";
|
||||||
|
|||||||
82
src/lib/modules/file/thumbnail.ts
Normal file
82
src/lib/modules/file/thumbnail.ts
Normal file
@@ -0,0 +1,82 @@
|
|||||||
|
import { LRUCache } from "lru-cache";
|
||||||
|
import { writable, type Writable } from "svelte/store";
|
||||||
|
import { browser } from "$app/environment";
|
||||||
|
import { decryptData } from "$lib/modules/crypto";
|
||||||
|
import type { SummarizedFileInfo } from "$lib/modules/filesystem";
|
||||||
|
import { readFile, writeFile, deleteFile, deleteDirectory } from "$lib/modules/opfs";
|
||||||
|
import { getThumbnailUrl } from "$lib/modules/thumbnail";
|
||||||
|
|
||||||
|
const loadedThumbnails = new LRUCache<number, Writable<string>>({ max: 100 });
|
||||||
|
const loadingThumbnails = new Map<number, Writable<string | undefined>>();
|
||||||
|
|
||||||
|
const fetchFromOpfs = async (fileId: number) => {
|
||||||
|
const thumbnailBuffer = await readFile(`/thumbnail/file/${fileId}`);
|
||||||
|
if (thumbnailBuffer) {
|
||||||
|
return getThumbnailUrl(thumbnailBuffer);
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
const fetchFromServer = async (fileId: number, dataKey: CryptoKey) => {
|
||||||
|
const res = await fetch(`/api/file/${fileId}/thumbnail/download`);
|
||||||
|
if (!res.ok) return null;
|
||||||
|
|
||||||
|
const thumbnailEncrypted = await res.arrayBuffer();
|
||||||
|
const thumbnailBuffer = await decryptData(
|
||||||
|
thumbnailEncrypted.slice(12),
|
||||||
|
thumbnailEncrypted.slice(0, 12),
|
||||||
|
dataKey,
|
||||||
|
);
|
||||||
|
|
||||||
|
void writeFile(`/thumbnail/file/${fileId}`, thumbnailBuffer);
|
||||||
|
return getThumbnailUrl(thumbnailBuffer);
|
||||||
|
};
|
||||||
|
|
||||||
|
export const getFileThumbnail = (file: SummarizedFileInfo) => {
|
||||||
|
if (
|
||||||
|
!browser ||
|
||||||
|
!(file.contentType.startsWith("image/") || file.contentType.startsWith("video/"))
|
||||||
|
) {
|
||||||
|
return undefined;
|
||||||
|
}
|
||||||
|
|
||||||
|
const thumbnail = loadedThumbnails.get(file.id);
|
||||||
|
if (thumbnail) return thumbnail;
|
||||||
|
|
||||||
|
let loadingThumbnail = loadingThumbnails.get(file.id);
|
||||||
|
if (loadingThumbnail) return loadingThumbnail;
|
||||||
|
|
||||||
|
loadingThumbnail = writable(undefined);
|
||||||
|
loadingThumbnails.set(file.id, loadingThumbnail);
|
||||||
|
|
||||||
|
fetchFromOpfs(file.id)
|
||||||
|
.then((thumbnail) => thumbnail ?? (file.dataKey && fetchFromServer(file.id, file.dataKey.key)))
|
||||||
|
.then((thumbnail) => {
|
||||||
|
if (thumbnail) {
|
||||||
|
loadingThumbnail.set(thumbnail);
|
||||||
|
loadedThumbnails.set(file.id, loadingThumbnail as Writable<string>);
|
||||||
|
}
|
||||||
|
loadingThumbnails.delete(file.id);
|
||||||
|
});
|
||||||
|
return loadingThumbnail;
|
||||||
|
};
|
||||||
|
|
||||||
|
export const storeFileThumbnailCache = async (fileId: number, thumbnailBuffer: ArrayBuffer) => {
|
||||||
|
await writeFile(`/thumbnail/file/${fileId}`, thumbnailBuffer);
|
||||||
|
|
||||||
|
const oldThumbnail = loadedThumbnails.get(fileId);
|
||||||
|
if (oldThumbnail) {
|
||||||
|
oldThumbnail.set(getThumbnailUrl(thumbnailBuffer));
|
||||||
|
} else {
|
||||||
|
loadedThumbnails.set(fileId, writable(getThumbnailUrl(thumbnailBuffer)));
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
export const deleteFileThumbnailCache = async (fileId: number) => {
|
||||||
|
loadedThumbnails.delete(fileId);
|
||||||
|
await deleteFile(`/thumbnail/file/${fileId}`);
|
||||||
|
};
|
||||||
|
|
||||||
|
export const deleteAllFileThumbnailCaches = async () => {
|
||||||
|
loadedThumbnails.clear();
|
||||||
|
await deleteDirectory(`/thumbnail/file`);
|
||||||
|
};
|
||||||
320
src/lib/modules/file/upload.svelte.ts
Normal file
320
src/lib/modules/file/upload.svelte.ts
Normal file
@@ -0,0 +1,320 @@
|
|||||||
|
import axios from "axios";
|
||||||
|
import ExifReader from "exifreader";
|
||||||
|
import { limitFunction } from "p-limit";
|
||||||
|
import { CHUNK_SIZE } from "$lib/constants";
|
||||||
|
import {
|
||||||
|
encodeToBase64,
|
||||||
|
generateDataKey,
|
||||||
|
wrapDataKey,
|
||||||
|
encryptData,
|
||||||
|
encryptString,
|
||||||
|
encryptChunk,
|
||||||
|
digestMessage,
|
||||||
|
signMessageHmac,
|
||||||
|
} from "$lib/modules/crypto";
|
||||||
|
import { Scheduler } from "$lib/modules/scheduler";
|
||||||
|
import { generateThumbnail } from "$lib/modules/thumbnail";
|
||||||
|
import type { FileThumbnailUploadRequest } from "$lib/server/schemas";
|
||||||
|
import type { MasterKey, HmacSecret } from "$lib/stores";
|
||||||
|
import { trpc } from "$trpc/client";
|
||||||
|
import type { RouterInputs } from "$trpc/router.server";
|
||||||
|
|
||||||
|
export interface FileUploadState {
|
||||||
|
name: string;
|
||||||
|
parentId: DirectoryId;
|
||||||
|
status:
|
||||||
|
| "queued"
|
||||||
|
| "encryption-pending"
|
||||||
|
| "encrypting"
|
||||||
|
| "upload-pending"
|
||||||
|
| "uploading"
|
||||||
|
| "uploaded"
|
||||||
|
| "canceled"
|
||||||
|
| "error";
|
||||||
|
progress?: number;
|
||||||
|
rate?: number;
|
||||||
|
estimated?: number;
|
||||||
|
}
|
||||||
|
|
||||||
|
export type LiveFileUploadState = FileUploadState & {
|
||||||
|
status: "queued" | "encryption-pending" | "encrypting" | "upload-pending" | "uploading";
|
||||||
|
};
|
||||||
|
|
||||||
|
const scheduler = new Scheduler<
|
||||||
|
{ fileId: number; fileBuffer: ArrayBuffer; thumbnailBuffer?: ArrayBuffer } | undefined
|
||||||
|
>();
|
||||||
|
let uploadingFiles: FileUploadState[] = $state([]);
|
||||||
|
|
||||||
|
const isFileUploading = (status: FileUploadState["status"]) =>
|
||||||
|
["queued", "encryption-pending", "encrypting", "upload-pending", "uploading"].includes(status);
|
||||||
|
|
||||||
|
export const getUploadingFiles = (parentId?: DirectoryId) => {
|
||||||
|
return uploadingFiles.filter(
|
||||||
|
(file) =>
|
||||||
|
(parentId === undefined || file.parentId === parentId) && isFileUploading(file.status),
|
||||||
|
);
|
||||||
|
};
|
||||||
|
|
||||||
|
export const clearUploadedFiles = () => {
|
||||||
|
uploadingFiles = uploadingFiles.filter((file) => isFileUploading(file.status));
|
||||||
|
};
|
||||||
|
|
||||||
|
const requestDuplicateFileScan = limitFunction(
|
||||||
|
async (file: File, hmacSecret: HmacSecret, onDuplicate: () => Promise<boolean>) => {
|
||||||
|
const fileBuffer = await file.arrayBuffer();
|
||||||
|
const fileSigned = encodeToBase64(await signMessageHmac(fileBuffer, hmacSecret.secret));
|
||||||
|
|
||||||
|
const files = await trpc().file.listByHash.query({
|
||||||
|
hskVersion: hmacSecret.version,
|
||||||
|
contentHmac: fileSigned,
|
||||||
|
});
|
||||||
|
if (files.length === 0 || (await onDuplicate())) {
|
||||||
|
return { fileBuffer, fileSigned };
|
||||||
|
} else {
|
||||||
|
return {};
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{ concurrency: 1 },
|
||||||
|
);
|
||||||
|
|
||||||
|
const getFileType = (file: File) => {
|
||||||
|
if (file.type) return file.type;
|
||||||
|
if (file.name.endsWith(".heic")) return "image/heic";
|
||||||
|
throw new Error("Unknown file type");
|
||||||
|
};
|
||||||
|
|
||||||
|
const extractExifDateTime = (fileBuffer: ArrayBuffer) => {
|
||||||
|
const exif = ExifReader.load(fileBuffer);
|
||||||
|
const dateTimeOriginal = exif["DateTimeOriginal"]?.description;
|
||||||
|
const offsetTimeOriginal = exif["OffsetTimeOriginal"]?.description;
|
||||||
|
if (!dateTimeOriginal) return undefined;
|
||||||
|
|
||||||
|
const [date, time] = dateTimeOriginal.split(" ");
|
||||||
|
if (!date || !time) return undefined;
|
||||||
|
|
||||||
|
const [year, month, day] = date.split(":").map(Number);
|
||||||
|
const [hour, minute, second] = time.split(":").map(Number);
|
||||||
|
if (!year || !month || !day || !hour || !minute || !second) return undefined;
|
||||||
|
|
||||||
|
if (!offsetTimeOriginal) {
|
||||||
|
// No timezone information.. Assume local timezone
|
||||||
|
return new Date(year, month - 1, day, hour, minute, second);
|
||||||
|
}
|
||||||
|
|
||||||
|
const offsetSign = offsetTimeOriginal[0] === "+" ? 1 : -1;
|
||||||
|
const [offsetHour, offsetMinute] = offsetTimeOriginal.slice(1).split(":").map(Number);
|
||||||
|
|
||||||
|
const utcDate = Date.UTC(year, month - 1, day, hour, minute, second);
|
||||||
|
const offsetMs = offsetSign * ((offsetHour ?? 0) * 60 + (offsetMinute ?? 0)) * 60 * 1000;
|
||||||
|
return new Date(utcDate - offsetMs);
|
||||||
|
};
|
||||||
|
|
||||||
|
const encryptChunks = async (fileBuffer: ArrayBuffer, dataKey: CryptoKey) => {
|
||||||
|
const chunksEncrypted: { chunkEncrypted: ArrayBuffer; chunkEncryptedHash: string }[] = [];
|
||||||
|
let offset = 0;
|
||||||
|
|
||||||
|
while (offset < fileBuffer.byteLength) {
|
||||||
|
const nextOffset = Math.min(offset + CHUNK_SIZE, fileBuffer.byteLength);
|
||||||
|
const chunkEncrypted = await encryptChunk(fileBuffer.slice(offset, nextOffset), dataKey);
|
||||||
|
chunksEncrypted.push({
|
||||||
|
chunkEncrypted: chunkEncrypted,
|
||||||
|
chunkEncryptedHash: encodeToBase64(await digestMessage(chunkEncrypted)),
|
||||||
|
});
|
||||||
|
offset = nextOffset;
|
||||||
|
}
|
||||||
|
|
||||||
|
return chunksEncrypted;
|
||||||
|
};
|
||||||
|
|
||||||
|
const encryptFile = limitFunction(
|
||||||
|
async (state: FileUploadState, file: File, fileBuffer: ArrayBuffer, masterKey: MasterKey) => {
|
||||||
|
state.status = "encrypting";
|
||||||
|
|
||||||
|
const fileType = getFileType(file);
|
||||||
|
|
||||||
|
let createdAt;
|
||||||
|
if (fileType.startsWith("image/")) {
|
||||||
|
createdAt = extractExifDateTime(fileBuffer);
|
||||||
|
}
|
||||||
|
|
||||||
|
const { dataKey, dataKeyVersion } = await generateDataKey();
|
||||||
|
const dataKeyWrapped = await wrapDataKey(dataKey, masterKey.key);
|
||||||
|
const chunksEncrypted = await encryptChunks(fileBuffer, dataKey);
|
||||||
|
|
||||||
|
const nameEncrypted = await encryptString(file.name, dataKey);
|
||||||
|
const createdAtEncrypted =
|
||||||
|
createdAt && (await encryptString(createdAt.getTime().toString(), dataKey));
|
||||||
|
const lastModifiedAtEncrypted = await encryptString(file.lastModified.toString(), dataKey);
|
||||||
|
|
||||||
|
const thumbnail = await generateThumbnail(fileBuffer, fileType);
|
||||||
|
const thumbnailBuffer = await thumbnail?.arrayBuffer();
|
||||||
|
const thumbnailEncrypted = thumbnailBuffer && (await encryptData(thumbnailBuffer, dataKey));
|
||||||
|
|
||||||
|
state.status = "upload-pending";
|
||||||
|
|
||||||
|
return {
|
||||||
|
dataKeyWrapped,
|
||||||
|
dataKeyVersion,
|
||||||
|
fileType,
|
||||||
|
chunksEncrypted,
|
||||||
|
nameEncrypted,
|
||||||
|
createdAtEncrypted,
|
||||||
|
lastModifiedAtEncrypted,
|
||||||
|
thumbnail: thumbnailEncrypted && { plaintext: thumbnailBuffer, ...thumbnailEncrypted },
|
||||||
|
};
|
||||||
|
},
|
||||||
|
{ concurrency: 4 },
|
||||||
|
);
|
||||||
|
|
||||||
|
const requestFileUpload = limitFunction(
|
||||||
|
async (
|
||||||
|
state: FileUploadState,
|
||||||
|
metadata: RouterInputs["file"]["startUpload"],
|
||||||
|
chunksEncrypted: { chunkEncrypted: ArrayBuffer; chunkEncryptedHash: string }[],
|
||||||
|
fileSigned: string | undefined,
|
||||||
|
thumbnailForm: FormData | null,
|
||||||
|
) => {
|
||||||
|
state.status = "uploading";
|
||||||
|
|
||||||
|
const { uploadId } = await trpc().file.startUpload.mutate(metadata);
|
||||||
|
|
||||||
|
// Upload chunks with progress tracking
|
||||||
|
const totalBytes = chunksEncrypted.reduce((sum, c) => sum + c.chunkEncrypted.byteLength, 0);
|
||||||
|
let uploadedBytes = 0;
|
||||||
|
const startTime = Date.now();
|
||||||
|
|
||||||
|
for (let i = 0; i < chunksEncrypted.length; i++) {
|
||||||
|
const { chunkEncrypted, chunkEncryptedHash } = chunksEncrypted[i]!;
|
||||||
|
|
||||||
|
const response = await fetch(`/api/file/upload/${uploadId}/chunks/${i}`, {
|
||||||
|
method: "POST",
|
||||||
|
headers: {
|
||||||
|
"Content-Type": "application/octet-stream",
|
||||||
|
"Content-Digest": `sha-256=:${chunkEncryptedHash}:`,
|
||||||
|
},
|
||||||
|
body: chunkEncrypted,
|
||||||
|
});
|
||||||
|
|
||||||
|
if (!response.ok) {
|
||||||
|
throw new Error(`Chunk upload failed: ${response.status} ${response.statusText}`);
|
||||||
|
}
|
||||||
|
|
||||||
|
uploadedBytes += chunkEncrypted.byteLength;
|
||||||
|
|
||||||
|
// Calculate progress, rate, estimated
|
||||||
|
const elapsed = (Date.now() - startTime) / 1000; // seconds
|
||||||
|
const rate = uploadedBytes / elapsed; // bytes per second
|
||||||
|
const remaining = totalBytes - uploadedBytes;
|
||||||
|
const estimated = rate > 0 ? remaining / rate : undefined;
|
||||||
|
|
||||||
|
state.progress = uploadedBytes / totalBytes;
|
||||||
|
state.rate = rate;
|
||||||
|
state.estimated = estimated;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Complete upload
|
||||||
|
const { file: fileId } = await trpc().file.completeUpload.mutate({
|
||||||
|
uploadId,
|
||||||
|
contentHmac: fileSigned,
|
||||||
|
});
|
||||||
|
|
||||||
|
// Upload thumbnail if exists
|
||||||
|
if (thumbnailForm) {
|
||||||
|
try {
|
||||||
|
await axios.post(`/api/file/${fileId}/thumbnail/upload`, thumbnailForm);
|
||||||
|
} catch (e) {
|
||||||
|
// TODO: Error handling for thumbnail upload
|
||||||
|
console.error(e);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
state.status = "uploaded";
|
||||||
|
|
||||||
|
return { fileId };
|
||||||
|
},
|
||||||
|
{ concurrency: 1 },
|
||||||
|
);
|
||||||
|
|
||||||
|
export const uploadFile = async (
|
||||||
|
file: File,
|
||||||
|
parentId: "root" | number,
|
||||||
|
hmacSecret: HmacSecret,
|
||||||
|
masterKey: MasterKey,
|
||||||
|
onDuplicate: () => Promise<boolean>,
|
||||||
|
) => {
|
||||||
|
uploadingFiles.push({
|
||||||
|
name: file.name,
|
||||||
|
parentId,
|
||||||
|
status: "queued",
|
||||||
|
});
|
||||||
|
const state = uploadingFiles.at(-1)!;
|
||||||
|
|
||||||
|
return await scheduler.schedule(file.size, async () => {
|
||||||
|
state.status = "encryption-pending";
|
||||||
|
|
||||||
|
try {
|
||||||
|
const { fileBuffer, fileSigned } = await requestDuplicateFileScan(
|
||||||
|
file,
|
||||||
|
hmacSecret,
|
||||||
|
onDuplicate,
|
||||||
|
);
|
||||||
|
if (!fileBuffer || !fileSigned) {
|
||||||
|
state.status = "canceled";
|
||||||
|
uploadingFiles = uploadingFiles.filter((file) => file !== state);
|
||||||
|
return undefined;
|
||||||
|
}
|
||||||
|
|
||||||
|
const {
|
||||||
|
dataKeyWrapped,
|
||||||
|
dataKeyVersion,
|
||||||
|
fileType,
|
||||||
|
chunksEncrypted,
|
||||||
|
nameEncrypted,
|
||||||
|
createdAtEncrypted,
|
||||||
|
lastModifiedAtEncrypted,
|
||||||
|
thumbnail,
|
||||||
|
} = await encryptFile(state, file, fileBuffer, masterKey);
|
||||||
|
|
||||||
|
const metadata = {
|
||||||
|
chunks: chunksEncrypted.length,
|
||||||
|
parent: parentId,
|
||||||
|
mekVersion: masterKey.version,
|
||||||
|
dek: dataKeyWrapped,
|
||||||
|
dekVersion: dataKeyVersion,
|
||||||
|
hskVersion: hmacSecret.version,
|
||||||
|
contentType: fileType,
|
||||||
|
name: nameEncrypted.ciphertext,
|
||||||
|
nameIv: nameEncrypted.iv,
|
||||||
|
createdAt: createdAtEncrypted?.ciphertext,
|
||||||
|
createdAtIv: createdAtEncrypted?.iv,
|
||||||
|
lastModifiedAt: lastModifiedAtEncrypted.ciphertext,
|
||||||
|
lastModifiedAtIv: lastModifiedAtEncrypted.iv,
|
||||||
|
};
|
||||||
|
|
||||||
|
let thumbnailForm = null;
|
||||||
|
if (thumbnail) {
|
||||||
|
thumbnailForm = new FormData();
|
||||||
|
thumbnailForm.set(
|
||||||
|
"metadata",
|
||||||
|
JSON.stringify({
|
||||||
|
dekVersion: dataKeyVersion.toISOString(),
|
||||||
|
contentIv: encodeToBase64(thumbnail.iv),
|
||||||
|
} satisfies FileThumbnailUploadRequest),
|
||||||
|
);
|
||||||
|
thumbnailForm.set("content", new Blob([thumbnail.ciphertext]));
|
||||||
|
}
|
||||||
|
|
||||||
|
const { fileId } = await requestFileUpload(
|
||||||
|
state,
|
||||||
|
metadata,
|
||||||
|
chunksEncrypted,
|
||||||
|
fileSigned,
|
||||||
|
thumbnailForm,
|
||||||
|
);
|
||||||
|
return { fileId, fileBuffer, thumbnailBuffer: thumbnail?.plaintext };
|
||||||
|
} catch (e) {
|
||||||
|
state.status = "error";
|
||||||
|
throw e;
|
||||||
|
}
|
||||||
|
});
|
||||||
|
};
|
||||||
@@ -1,279 +0,0 @@
|
|||||||
import axios from "axios";
|
|
||||||
import ExifReader from "exifreader";
|
|
||||||
import { limitFunction } from "p-limit";
|
|
||||||
import { writable, type Writable } from "svelte/store";
|
|
||||||
import {
|
|
||||||
encodeToBase64,
|
|
||||||
generateDataKey,
|
|
||||||
makeAESKeyNonextractable,
|
|
||||||
wrapDataKey,
|
|
||||||
encryptData,
|
|
||||||
encryptString,
|
|
||||||
digestMessage,
|
|
||||||
signMessageHmac,
|
|
||||||
} from "$lib/modules/crypto";
|
|
||||||
import { generateThumbnail } from "$lib/modules/thumbnail";
|
|
||||||
import type {
|
|
||||||
DuplicateFileScanRequest,
|
|
||||||
DuplicateFileScanResponse,
|
|
||||||
FileThumbnailUploadRequest,
|
|
||||||
FileUploadRequest,
|
|
||||||
FileUploadResponse,
|
|
||||||
} from "$lib/server/schemas";
|
|
||||||
import {
|
|
||||||
fileUploadStatusStore,
|
|
||||||
type MasterKey,
|
|
||||||
type HmacSecret,
|
|
||||||
type FileUploadStatus,
|
|
||||||
} from "$lib/stores";
|
|
||||||
|
|
||||||
const requestDuplicateFileScan = limitFunction(
|
|
||||||
async (file: File, hmacSecret: HmacSecret, onDuplicate: () => Promise<boolean>) => {
|
|
||||||
const fileBuffer = await file.arrayBuffer();
|
|
||||||
const fileSigned = encodeToBase64(await signMessageHmac(fileBuffer, hmacSecret.secret));
|
|
||||||
|
|
||||||
const res = await axios.post("/api/file/scanDuplicates", {
|
|
||||||
hskVersion: hmacSecret.version,
|
|
||||||
contentHmac: fileSigned,
|
|
||||||
} satisfies DuplicateFileScanRequest);
|
|
||||||
const { files }: DuplicateFileScanResponse = res.data;
|
|
||||||
|
|
||||||
if (files.length === 0 || (await onDuplicate())) {
|
|
||||||
return { fileBuffer, fileSigned };
|
|
||||||
} else {
|
|
||||||
return {};
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{ concurrency: 1 },
|
|
||||||
);
|
|
||||||
|
|
||||||
const getFileType = (file: File) => {
|
|
||||||
if (file.type) return file.type;
|
|
||||||
if (file.name.endsWith(".heic")) return "image/heic";
|
|
||||||
throw new Error("Unknown file type");
|
|
||||||
};
|
|
||||||
|
|
||||||
const extractExifDateTime = (fileBuffer: ArrayBuffer) => {
|
|
||||||
const exif = ExifReader.load(fileBuffer);
|
|
||||||
const dateTimeOriginal = exif["DateTimeOriginal"]?.description;
|
|
||||||
const offsetTimeOriginal = exif["OffsetTimeOriginal"]?.description;
|
|
||||||
if (!dateTimeOriginal) return undefined;
|
|
||||||
|
|
||||||
const [date, time] = dateTimeOriginal.split(" ");
|
|
||||||
if (!date || !time) return undefined;
|
|
||||||
|
|
||||||
const [year, month, day] = date.split(":").map(Number);
|
|
||||||
const [hour, minute, second] = time.split(":").map(Number);
|
|
||||||
if (!year || !month || !day || !hour || !minute || !second) return undefined;
|
|
||||||
|
|
||||||
if (!offsetTimeOriginal) {
|
|
||||||
// No timezone information.. Assume local timezone
|
|
||||||
return new Date(year, month - 1, day, hour, minute, second);
|
|
||||||
}
|
|
||||||
|
|
||||||
const offsetSign = offsetTimeOriginal[0] === "+" ? 1 : -1;
|
|
||||||
const [offsetHour, offsetMinute] = offsetTimeOriginal.slice(1).split(":").map(Number);
|
|
||||||
|
|
||||||
const utcDate = Date.UTC(year, month - 1, day, hour, minute, second);
|
|
||||||
const offsetMs = offsetSign * ((offsetHour ?? 0) * 60 + (offsetMinute ?? 0)) * 60 * 1000;
|
|
||||||
return new Date(utcDate - offsetMs);
|
|
||||||
};
|
|
||||||
|
|
||||||
const encryptFile = limitFunction(
|
|
||||||
async (
|
|
||||||
status: Writable<FileUploadStatus>,
|
|
||||||
file: File,
|
|
||||||
fileBuffer: ArrayBuffer,
|
|
||||||
masterKey: MasterKey,
|
|
||||||
) => {
|
|
||||||
status.update((value) => {
|
|
||||||
value.status = "encrypting";
|
|
||||||
return value;
|
|
||||||
});
|
|
||||||
|
|
||||||
const fileType = getFileType(file);
|
|
||||||
|
|
||||||
let createdAt;
|
|
||||||
if (fileType.startsWith("image/")) {
|
|
||||||
createdAt = extractExifDateTime(fileBuffer);
|
|
||||||
}
|
|
||||||
|
|
||||||
const { dataKey, dataKeyVersion } = await generateDataKey();
|
|
||||||
const dataKeyWrapped = await wrapDataKey(dataKey, masterKey.key);
|
|
||||||
|
|
||||||
const fileEncrypted = await encryptData(fileBuffer, dataKey);
|
|
||||||
const fileEncryptedHash = encodeToBase64(await digestMessage(fileEncrypted.ciphertext));
|
|
||||||
|
|
||||||
const nameEncrypted = await encryptString(file.name, dataKey);
|
|
||||||
const createdAtEncrypted =
|
|
||||||
createdAt && (await encryptString(createdAt.getTime().toString(), dataKey));
|
|
||||||
const lastModifiedAtEncrypted = await encryptString(file.lastModified.toString(), dataKey);
|
|
||||||
|
|
||||||
const thumbnail = await generateThumbnail(fileBuffer, fileType);
|
|
||||||
const thumbnailBuffer = await thumbnail?.arrayBuffer();
|
|
||||||
const thumbnailEncrypted = thumbnailBuffer && (await encryptData(thumbnailBuffer, dataKey));
|
|
||||||
|
|
||||||
status.update((value) => {
|
|
||||||
value.status = "upload-pending";
|
|
||||||
return value;
|
|
||||||
});
|
|
||||||
|
|
||||||
return {
|
|
||||||
dataKey: await makeAESKeyNonextractable(dataKey),
|
|
||||||
dataKeyWrapped,
|
|
||||||
dataKeyVersion,
|
|
||||||
fileType,
|
|
||||||
fileEncrypted,
|
|
||||||
fileEncryptedHash,
|
|
||||||
nameEncrypted,
|
|
||||||
createdAt,
|
|
||||||
createdAtEncrypted,
|
|
||||||
lastModifiedAtEncrypted,
|
|
||||||
thumbnail: thumbnailEncrypted && { plaintext: thumbnailBuffer, ...thumbnailEncrypted },
|
|
||||||
};
|
|
||||||
},
|
|
||||||
{ concurrency: 4 },
|
|
||||||
);
|
|
||||||
|
|
||||||
const requestFileUpload = limitFunction(
|
|
||||||
async (status: Writable<FileUploadStatus>, form: FormData, thumbnailForm: FormData | null) => {
|
|
||||||
status.update((value) => {
|
|
||||||
value.status = "uploading";
|
|
||||||
return value;
|
|
||||||
});
|
|
||||||
|
|
||||||
const res = await axios.post("/api/file/upload", form, {
|
|
||||||
onUploadProgress: ({ progress, rate, estimated }) => {
|
|
||||||
status.update((value) => {
|
|
||||||
value.progress = progress;
|
|
||||||
value.rate = rate;
|
|
||||||
value.estimated = estimated;
|
|
||||||
return value;
|
|
||||||
});
|
|
||||||
},
|
|
||||||
});
|
|
||||||
const { file }: FileUploadResponse = res.data;
|
|
||||||
|
|
||||||
if (thumbnailForm) {
|
|
||||||
try {
|
|
||||||
await axios.post(`/api/file/${file}/thumbnail/upload`, thumbnailForm);
|
|
||||||
} catch (e) {
|
|
||||||
// TODO
|
|
||||||
console.error(e);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
status.update((value) => {
|
|
||||||
value.status = "uploaded";
|
|
||||||
return value;
|
|
||||||
});
|
|
||||||
|
|
||||||
return { fileId: file };
|
|
||||||
},
|
|
||||||
{ concurrency: 1 },
|
|
||||||
);
|
|
||||||
|
|
||||||
export const uploadFile = async (
|
|
||||||
file: File,
|
|
||||||
parentId: "root" | number,
|
|
||||||
hmacSecret: HmacSecret,
|
|
||||||
masterKey: MasterKey,
|
|
||||||
onDuplicate: () => Promise<boolean>,
|
|
||||||
) => {
|
|
||||||
const status = writable<FileUploadStatus>({
|
|
||||||
name: file.name,
|
|
||||||
parentId,
|
|
||||||
status: "encryption-pending",
|
|
||||||
});
|
|
||||||
fileUploadStatusStore.update((value) => {
|
|
||||||
value.push(status);
|
|
||||||
return value;
|
|
||||||
});
|
|
||||||
|
|
||||||
try {
|
|
||||||
const { fileBuffer, fileSigned } = await requestDuplicateFileScan(
|
|
||||||
file,
|
|
||||||
hmacSecret,
|
|
||||||
onDuplicate,
|
|
||||||
);
|
|
||||||
if (!fileBuffer || !fileSigned) {
|
|
||||||
status.update((value) => {
|
|
||||||
value.status = "canceled";
|
|
||||||
return value;
|
|
||||||
});
|
|
||||||
fileUploadStatusStore.update((value) => {
|
|
||||||
value = value.filter((v) => v !== status);
|
|
||||||
return value;
|
|
||||||
});
|
|
||||||
return undefined;
|
|
||||||
}
|
|
||||||
|
|
||||||
const {
|
|
||||||
dataKey,
|
|
||||||
dataKeyWrapped,
|
|
||||||
dataKeyVersion,
|
|
||||||
fileType,
|
|
||||||
fileEncrypted,
|
|
||||||
fileEncryptedHash,
|
|
||||||
nameEncrypted,
|
|
||||||
createdAt,
|
|
||||||
createdAtEncrypted,
|
|
||||||
lastModifiedAtEncrypted,
|
|
||||||
thumbnail,
|
|
||||||
} = await encryptFile(status, file, fileBuffer, masterKey);
|
|
||||||
|
|
||||||
const form = new FormData();
|
|
||||||
form.set(
|
|
||||||
"metadata",
|
|
||||||
JSON.stringify({
|
|
||||||
parent: parentId,
|
|
||||||
mekVersion: masterKey.version,
|
|
||||||
dek: dataKeyWrapped,
|
|
||||||
dekVersion: dataKeyVersion.toISOString(),
|
|
||||||
hskVersion: hmacSecret.version,
|
|
||||||
contentHmac: fileSigned,
|
|
||||||
contentType: fileType,
|
|
||||||
contentIv: fileEncrypted.iv,
|
|
||||||
name: nameEncrypted.ciphertext,
|
|
||||||
nameIv: nameEncrypted.iv,
|
|
||||||
createdAt: createdAtEncrypted?.ciphertext,
|
|
||||||
createdAtIv: createdAtEncrypted?.iv,
|
|
||||||
lastModifiedAt: lastModifiedAtEncrypted.ciphertext,
|
|
||||||
lastModifiedAtIv: lastModifiedAtEncrypted.iv,
|
|
||||||
} satisfies FileUploadRequest),
|
|
||||||
);
|
|
||||||
form.set("content", new Blob([fileEncrypted.ciphertext]));
|
|
||||||
form.set("checksum", fileEncryptedHash);
|
|
||||||
|
|
||||||
let thumbnailForm = null;
|
|
||||||
if (thumbnail) {
|
|
||||||
thumbnailForm = new FormData();
|
|
||||||
thumbnailForm.set(
|
|
||||||
"metadata",
|
|
||||||
JSON.stringify({
|
|
||||||
dekVersion: dataKeyVersion.toISOString(),
|
|
||||||
contentIv: thumbnail.iv,
|
|
||||||
} satisfies FileThumbnailUploadRequest),
|
|
||||||
);
|
|
||||||
thumbnailForm.set("content", new Blob([thumbnail.ciphertext]));
|
|
||||||
}
|
|
||||||
|
|
||||||
const { fileId } = await requestFileUpload(status, form, thumbnailForm);
|
|
||||||
return {
|
|
||||||
fileId,
|
|
||||||
fileDataKey: dataKey,
|
|
||||||
fileDataKeyVersion: dataKeyVersion,
|
|
||||||
fileType,
|
|
||||||
fileEncryptedIv: fileEncrypted.iv,
|
|
||||||
fileCreatedAt: createdAt,
|
|
||||||
fileBuffer,
|
|
||||||
thumbnailBuffer: thumbnail?.plaintext,
|
|
||||||
};
|
|
||||||
} catch (e) {
|
|
||||||
status.update((value) => {
|
|
||||||
value.status = "error";
|
|
||||||
return value;
|
|
||||||
});
|
|
||||||
throw e;
|
|
||||||
}
|
|
||||||
};
|
|
||||||
121
src/lib/modules/filesystem/category.ts
Normal file
121
src/lib/modules/filesystem/category.ts
Normal file
@@ -0,0 +1,121 @@
|
|||||||
|
import * as IndexedDB from "$lib/indexedDB";
|
||||||
|
import { trpc, isTRPCClientError } from "$trpc/client";
|
||||||
|
import { FilesystemCache, decryptFileMetadata, decryptCategoryMetadata } from "./internal.svelte";
|
||||||
|
import type { CategoryInfo, MaybeCategoryInfo } from "./types";
|
||||||
|
|
||||||
|
const cache = new FilesystemCache<CategoryId, MaybeCategoryInfo>({
|
||||||
|
async fetchFromIndexedDB(id) {
|
||||||
|
const [category, subCategories] = await Promise.all([
|
||||||
|
id !== "root" ? IndexedDB.getCategoryInfo(id) : undefined,
|
||||||
|
IndexedDB.getCategoryInfos(id),
|
||||||
|
]);
|
||||||
|
const files = category?.files
|
||||||
|
? await Promise.all(
|
||||||
|
category.files.map(async (file) => {
|
||||||
|
const fileInfo = await IndexedDB.getFileInfo(file.id);
|
||||||
|
return fileInfo
|
||||||
|
? {
|
||||||
|
id: file.id,
|
||||||
|
parentId: fileInfo.parentId,
|
||||||
|
contentType: fileInfo.contentType,
|
||||||
|
name: fileInfo.name,
|
||||||
|
createdAt: fileInfo.createdAt,
|
||||||
|
lastModifiedAt: fileInfo.lastModifiedAt,
|
||||||
|
isRecursive: file.isRecursive,
|
||||||
|
}
|
||||||
|
: undefined;
|
||||||
|
}),
|
||||||
|
)
|
||||||
|
: undefined;
|
||||||
|
|
||||||
|
if (id === "root") {
|
||||||
|
return {
|
||||||
|
id,
|
||||||
|
exists: true,
|
||||||
|
subCategories,
|
||||||
|
};
|
||||||
|
} else if (category) {
|
||||||
|
return {
|
||||||
|
id,
|
||||||
|
exists: true,
|
||||||
|
parentId: category.parentId,
|
||||||
|
name: category.name,
|
||||||
|
subCategories,
|
||||||
|
files: files?.filter((file) => !!file) ?? [],
|
||||||
|
isFileRecursive: category.isFileRecursive ?? false,
|
||||||
|
};
|
||||||
|
}
|
||||||
|
},
|
||||||
|
|
||||||
|
async fetchFromServer(id, cachedInfo, masterKey) {
|
||||||
|
try {
|
||||||
|
const category = await trpc().category.get.query({ id, recurse: true });
|
||||||
|
const [subCategories, files, metadata] = await Promise.all([
|
||||||
|
Promise.all(
|
||||||
|
category.subCategories.map(async (category) => ({
|
||||||
|
id: category.id,
|
||||||
|
parentId: id,
|
||||||
|
...(await decryptCategoryMetadata(category, masterKey)),
|
||||||
|
})),
|
||||||
|
),
|
||||||
|
category.files &&
|
||||||
|
Promise.all(
|
||||||
|
category.files.map(async (file) => ({
|
||||||
|
id: file.id,
|
||||||
|
parentId: file.parent,
|
||||||
|
contentType: file.contentType,
|
||||||
|
isRecursive: file.isRecursive,
|
||||||
|
...(await decryptFileMetadata(file, masterKey)),
|
||||||
|
})),
|
||||||
|
),
|
||||||
|
category.metadata && decryptCategoryMetadata(category.metadata, masterKey),
|
||||||
|
]);
|
||||||
|
|
||||||
|
return storeToIndexedDB(
|
||||||
|
id !== "root"
|
||||||
|
? {
|
||||||
|
id,
|
||||||
|
parentId: category.metadata!.parent,
|
||||||
|
subCategories,
|
||||||
|
files: files!,
|
||||||
|
isFileRecursive: cachedInfo?.isFileRecursive ?? false,
|
||||||
|
...metadata!,
|
||||||
|
}
|
||||||
|
: { id, subCategories },
|
||||||
|
);
|
||||||
|
} catch (e) {
|
||||||
|
if (isTRPCClientError(e) && e.data?.code === "NOT_FOUND") {
|
||||||
|
await IndexedDB.deleteCategoryInfo(id as number);
|
||||||
|
return { id, exists: false };
|
||||||
|
}
|
||||||
|
throw e;
|
||||||
|
}
|
||||||
|
},
|
||||||
|
});
|
||||||
|
|
||||||
|
const storeToIndexedDB = (info: CategoryInfo) => {
|
||||||
|
if (info.id !== "root") {
|
||||||
|
void IndexedDB.storeCategoryInfo(info);
|
||||||
|
|
||||||
|
// TODO: Bulk Upsert
|
||||||
|
new Map(info.files.map((file) => [file.id, file])).forEach((file) => {
|
||||||
|
void IndexedDB.storeFileInfo(file);
|
||||||
|
});
|
||||||
|
}
|
||||||
|
|
||||||
|
// TODO: Bulk Upsert
|
||||||
|
info.subCategories.forEach((category) => {
|
||||||
|
void IndexedDB.storeCategoryInfo(category);
|
||||||
|
});
|
||||||
|
|
||||||
|
void IndexedDB.deleteDanglingCategoryInfos(
|
||||||
|
info.id,
|
||||||
|
new Set(info.subCategories.map(({ id }) => id)),
|
||||||
|
);
|
||||||
|
|
||||||
|
return { ...info, exists: true as const };
|
||||||
|
};
|
||||||
|
|
||||||
|
export const getCategoryInfo = (id: CategoryId, masterKey: CryptoKey) => {
|
||||||
|
return cache.get(id, masterKey);
|
||||||
|
};
|
||||||
102
src/lib/modules/filesystem/directory.ts
Normal file
102
src/lib/modules/filesystem/directory.ts
Normal file
@@ -0,0 +1,102 @@
|
|||||||
|
import * as IndexedDB from "$lib/indexedDB";
|
||||||
|
import { trpc, isTRPCClientError } from "$trpc/client";
|
||||||
|
import { FilesystemCache, decryptDirectoryMetadata, decryptFileMetadata } from "./internal.svelte";
|
||||||
|
import type { DirectoryInfo, MaybeDirectoryInfo } from "./types";
|
||||||
|
|
||||||
|
const cache = new FilesystemCache<DirectoryId, MaybeDirectoryInfo>({
|
||||||
|
async fetchFromIndexedDB(id) {
|
||||||
|
const [directory, subDirectories, files] = await Promise.all([
|
||||||
|
id !== "root" ? IndexedDB.getDirectoryInfo(id) : undefined,
|
||||||
|
IndexedDB.getDirectoryInfos(id),
|
||||||
|
IndexedDB.getFileInfos(id),
|
||||||
|
]);
|
||||||
|
|
||||||
|
if (id === "root") {
|
||||||
|
return {
|
||||||
|
id,
|
||||||
|
exists: true,
|
||||||
|
subDirectories,
|
||||||
|
files,
|
||||||
|
};
|
||||||
|
} else if (directory) {
|
||||||
|
return {
|
||||||
|
id,
|
||||||
|
exists: true,
|
||||||
|
parentId: directory.parentId,
|
||||||
|
name: directory.name,
|
||||||
|
subDirectories,
|
||||||
|
files,
|
||||||
|
};
|
||||||
|
}
|
||||||
|
},
|
||||||
|
|
||||||
|
async fetchFromServer(id, _cachedInfo, masterKey) {
|
||||||
|
try {
|
||||||
|
const directory = await trpc().directory.get.query({ id });
|
||||||
|
const [subDirectories, files, metadata] = await Promise.all([
|
||||||
|
Promise.all(
|
||||||
|
directory.subDirectories.map(async (directory) => ({
|
||||||
|
id: directory.id,
|
||||||
|
parentId: id,
|
||||||
|
...(await decryptDirectoryMetadata(directory, masterKey)),
|
||||||
|
})),
|
||||||
|
),
|
||||||
|
Promise.all(
|
||||||
|
directory.files.map(async (file) => ({
|
||||||
|
id: file.id,
|
||||||
|
parentId: id,
|
||||||
|
contentType: file.contentType,
|
||||||
|
...(await decryptFileMetadata(file, masterKey)),
|
||||||
|
})),
|
||||||
|
),
|
||||||
|
directory.metadata && decryptDirectoryMetadata(directory.metadata, masterKey),
|
||||||
|
]);
|
||||||
|
|
||||||
|
return storeToIndexedDB(
|
||||||
|
id !== "root"
|
||||||
|
? {
|
||||||
|
id,
|
||||||
|
parentId: directory.metadata!.parent,
|
||||||
|
subDirectories,
|
||||||
|
files,
|
||||||
|
...metadata!,
|
||||||
|
}
|
||||||
|
: { id, subDirectories, files },
|
||||||
|
);
|
||||||
|
} catch (e) {
|
||||||
|
if (isTRPCClientError(e) && e.data?.code === "NOT_FOUND") {
|
||||||
|
await IndexedDB.deleteDirectoryInfo(id as number);
|
||||||
|
return { id, exists: false as const };
|
||||||
|
}
|
||||||
|
throw e;
|
||||||
|
}
|
||||||
|
},
|
||||||
|
});
|
||||||
|
|
||||||
|
const storeToIndexedDB = (info: DirectoryInfo) => {
|
||||||
|
if (info.id !== "root") {
|
||||||
|
void IndexedDB.storeDirectoryInfo(info);
|
||||||
|
}
|
||||||
|
|
||||||
|
// TODO: Bulk Upsert
|
||||||
|
info.subDirectories.forEach((subDirectory) => {
|
||||||
|
void IndexedDB.storeDirectoryInfo(subDirectory);
|
||||||
|
});
|
||||||
|
|
||||||
|
// TODO: Bulk Upsert
|
||||||
|
info.files.forEach((file) => {
|
||||||
|
void IndexedDB.storeFileInfo(file);
|
||||||
|
});
|
||||||
|
|
||||||
|
void IndexedDB.deleteDanglingDirectoryInfos(
|
||||||
|
info.id,
|
||||||
|
new Set(info.subDirectories.map(({ id }) => id)),
|
||||||
|
);
|
||||||
|
void IndexedDB.deleteDanglingFileInfos(info.id, new Set(info.files.map(({ id }) => id)));
|
||||||
|
|
||||||
|
return { ...info, exists: true as const };
|
||||||
|
};
|
||||||
|
|
||||||
|
export const getDirectoryInfo = (id: DirectoryId, masterKey: CryptoKey) => {
|
||||||
|
return cache.get(id, masterKey);
|
||||||
|
};
|
||||||
177
src/lib/modules/filesystem/file.ts
Normal file
177
src/lib/modules/filesystem/file.ts
Normal file
@@ -0,0 +1,177 @@
|
|||||||
|
import * as IndexedDB from "$lib/indexedDB";
|
||||||
|
import { trpc, isTRPCClientError } from "$trpc/client";
|
||||||
|
import { FilesystemCache, decryptFileMetadata, decryptCategoryMetadata } from "./internal.svelte";
|
||||||
|
import type { FileInfo, MaybeFileInfo } from "./types";
|
||||||
|
|
||||||
|
const cache = new FilesystemCache<number, MaybeFileInfo>({
|
||||||
|
async fetchFromIndexedDB(id) {
|
||||||
|
const file = await IndexedDB.getFileInfo(id);
|
||||||
|
const categories = file?.categoryIds
|
||||||
|
? await Promise.all(
|
||||||
|
file.categoryIds.map(async (categoryId) => {
|
||||||
|
const category = await IndexedDB.getCategoryInfo(categoryId);
|
||||||
|
return category
|
||||||
|
? { id: category.id, parentId: category.parentId, name: category.name }
|
||||||
|
: undefined;
|
||||||
|
}),
|
||||||
|
)
|
||||||
|
: undefined;
|
||||||
|
|
||||||
|
if (file) {
|
||||||
|
return {
|
||||||
|
id,
|
||||||
|
exists: true,
|
||||||
|
parentId: file.parentId,
|
||||||
|
contentType: file.contentType,
|
||||||
|
name: file.name,
|
||||||
|
createdAt: file.createdAt,
|
||||||
|
lastModifiedAt: file.lastModifiedAt,
|
||||||
|
categories: categories?.filter((category) => !!category) ?? [],
|
||||||
|
};
|
||||||
|
}
|
||||||
|
},
|
||||||
|
|
||||||
|
async fetchFromServer(id, _cachedInfo, masterKey) {
|
||||||
|
try {
|
||||||
|
const file = await trpc().file.get.query({ id });
|
||||||
|
const [categories, metadata] = await Promise.all([
|
||||||
|
Promise.all(
|
||||||
|
file.categories.map(async (category) => ({
|
||||||
|
id: category.id,
|
||||||
|
parentId: category.parent,
|
||||||
|
...(await decryptCategoryMetadata(category, masterKey)),
|
||||||
|
})),
|
||||||
|
),
|
||||||
|
decryptFileMetadata(file, masterKey),
|
||||||
|
]);
|
||||||
|
|
||||||
|
return storeToIndexedDB({
|
||||||
|
id,
|
||||||
|
isLegacy: file.isLegacy,
|
||||||
|
parentId: file.parent,
|
||||||
|
dataKey: metadata.dataKey,
|
||||||
|
contentType: file.contentType,
|
||||||
|
name: metadata.name,
|
||||||
|
createdAt: metadata.createdAt,
|
||||||
|
lastModifiedAt: metadata.lastModifiedAt,
|
||||||
|
categories,
|
||||||
|
});
|
||||||
|
} catch (e) {
|
||||||
|
if (isTRPCClientError(e) && e.data?.code === "NOT_FOUND") {
|
||||||
|
await IndexedDB.deleteFileInfo(id);
|
||||||
|
return { id, exists: false as const };
|
||||||
|
}
|
||||||
|
throw e;
|
||||||
|
}
|
||||||
|
},
|
||||||
|
|
||||||
|
async bulkFetchFromIndexedDB(ids) {
|
||||||
|
const files = await IndexedDB.bulkGetFileInfos([...ids]);
|
||||||
|
const categories = await Promise.all(
|
||||||
|
files.map(async (file) =>
|
||||||
|
file?.categoryIds
|
||||||
|
? await Promise.all(
|
||||||
|
file.categoryIds.map(async (categoryId) => {
|
||||||
|
const category = await IndexedDB.getCategoryInfo(categoryId);
|
||||||
|
return category
|
||||||
|
? { id: category.id, parentId: category.parentId, name: category.name }
|
||||||
|
: undefined;
|
||||||
|
}),
|
||||||
|
)
|
||||||
|
: undefined,
|
||||||
|
),
|
||||||
|
);
|
||||||
|
|
||||||
|
return new Map(
|
||||||
|
files
|
||||||
|
.filter((file) => !!file)
|
||||||
|
.map((file, index) => [
|
||||||
|
file.id,
|
||||||
|
{
|
||||||
|
...file,
|
||||||
|
exists: true,
|
||||||
|
categories: categories[index]?.filter((category) => !!category) ?? [],
|
||||||
|
},
|
||||||
|
]),
|
||||||
|
);
|
||||||
|
},
|
||||||
|
|
||||||
|
async bulkFetchFromServer(ids, masterKey) {
|
||||||
|
const idsArray = [...ids.keys()];
|
||||||
|
|
||||||
|
const filesRaw = await trpc().file.bulkGet.query({ ids: idsArray });
|
||||||
|
const files = await Promise.all(
|
||||||
|
filesRaw.map(async ({ id, categories: categoriesRaw, ...metadataRaw }) => {
|
||||||
|
const [categories, metadata] = await Promise.all([
|
||||||
|
Promise.all(
|
||||||
|
categoriesRaw.map(async (category) => ({
|
||||||
|
id: category.id,
|
||||||
|
parentId: category.parent,
|
||||||
|
...(await decryptCategoryMetadata(category, masterKey)),
|
||||||
|
})),
|
||||||
|
),
|
||||||
|
decryptFileMetadata(metadataRaw, masterKey),
|
||||||
|
]);
|
||||||
|
|
||||||
|
return {
|
||||||
|
id,
|
||||||
|
exists: true as const,
|
||||||
|
isLegacy: metadataRaw.isLegacy,
|
||||||
|
parentId: metadataRaw.parent,
|
||||||
|
contentType: metadataRaw.contentType,
|
||||||
|
categories,
|
||||||
|
...metadata,
|
||||||
|
};
|
||||||
|
}),
|
||||||
|
);
|
||||||
|
|
||||||
|
const existingIds = new Set(filesRaw.map(({ id }) => id));
|
||||||
|
const deletedIds = idsArray.filter((id) => !existingIds.has(id));
|
||||||
|
|
||||||
|
void IndexedDB.bulkDeleteFileInfos(deletedIds);
|
||||||
|
return new Map<number, MaybeFileInfo>([
|
||||||
|
...bulkStoreToIndexedDB(files),
|
||||||
|
...deletedIds.map((id) => [id, { id, exists: false }] as const),
|
||||||
|
]);
|
||||||
|
},
|
||||||
|
});
|
||||||
|
|
||||||
|
const storeToIndexedDB = (info: FileInfo) => {
|
||||||
|
void IndexedDB.storeFileInfo({
|
||||||
|
...info,
|
||||||
|
categoryIds: info.categories.map(({ id }) => id),
|
||||||
|
});
|
||||||
|
|
||||||
|
info.categories.forEach((category) => {
|
||||||
|
void IndexedDB.storeCategoryInfo(category);
|
||||||
|
});
|
||||||
|
|
||||||
|
return { ...info, exists: true as const };
|
||||||
|
};
|
||||||
|
|
||||||
|
const bulkStoreToIndexedDB = (infos: FileInfo[]) => {
|
||||||
|
// TODO: Bulk Upsert
|
||||||
|
infos.forEach((info) => {
|
||||||
|
void IndexedDB.storeFileInfo({
|
||||||
|
...info,
|
||||||
|
categoryIds: info.categories.map(({ id }) => id),
|
||||||
|
});
|
||||||
|
});
|
||||||
|
|
||||||
|
// TODO: Bulk Upsert
|
||||||
|
new Map(
|
||||||
|
infos.flatMap(({ categories }) => categories).map((category) => [category.id, category]),
|
||||||
|
).forEach((category) => {
|
||||||
|
void IndexedDB.storeCategoryInfo(category);
|
||||||
|
});
|
||||||
|
|
||||||
|
return infos.map((info) => [info.id, { ...info, exists: true }] as const);
|
||||||
|
};
|
||||||
|
|
||||||
|
export const getFileInfo = (id: number, masterKey: CryptoKey) => {
|
||||||
|
return cache.get(id, masterKey);
|
||||||
|
};
|
||||||
|
|
||||||
|
export const bulkGetFileInfo = (ids: number[], masterKey: CryptoKey) => {
|
||||||
|
return cache.bulkGet(new Set(ids), masterKey);
|
||||||
|
};
|
||||||
@@ -1,3 +1,4 @@
|
|||||||
export * from "./category";
|
export * from "./category";
|
||||||
export * from "./directory";
|
export * from "./directory";
|
||||||
export * from "./file";
|
export * from "./file";
|
||||||
|
export * from "./types";
|
||||||
172
src/lib/modules/filesystem/internal.svelte.ts
Normal file
172
src/lib/modules/filesystem/internal.svelte.ts
Normal file
@@ -0,0 +1,172 @@
|
|||||||
|
import { untrack } from "svelte";
|
||||||
|
import { unwrapDataKey, decryptString } from "$lib/modules/crypto";
|
||||||
|
|
||||||
|
interface FilesystemCacheOptions<K, V> {
|
||||||
|
fetchFromIndexedDB: (key: K) => Promise<V | undefined>;
|
||||||
|
fetchFromServer: (key: K, cachedValue: V | undefined, masterKey: CryptoKey) => Promise<V>;
|
||||||
|
bulkFetchFromIndexedDB?: (keys: Set<K>) => Promise<Map<K, V>>;
|
||||||
|
bulkFetchFromServer?: (
|
||||||
|
keys: Map<K, { cachedValue: V | undefined }>,
|
||||||
|
masterKey: CryptoKey,
|
||||||
|
) => Promise<Map<K, V>>;
|
||||||
|
}
|
||||||
|
|
||||||
|
export class FilesystemCache<K, V extends object> {
|
||||||
|
private map = new Map<K, { value?: V; promise?: Promise<V> }>();
|
||||||
|
|
||||||
|
constructor(private readonly options: FilesystemCacheOptions<K, V>) {}
|
||||||
|
|
||||||
|
get(key: K, masterKey: CryptoKey) {
|
||||||
|
return untrack(() => {
|
||||||
|
let state = this.map.get(key);
|
||||||
|
if (state?.promise) return state.value ?? state.promise;
|
||||||
|
|
||||||
|
const { promise: newPromise, resolve } = Promise.withResolvers<V>();
|
||||||
|
|
||||||
|
if (!state) {
|
||||||
|
const newState = $state({});
|
||||||
|
state = newState;
|
||||||
|
this.map.set(key, newState);
|
||||||
|
}
|
||||||
|
|
||||||
|
(state.value
|
||||||
|
? Promise.resolve(state.value)
|
||||||
|
: this.options.fetchFromIndexedDB(key).then((loadedInfo) => {
|
||||||
|
if (loadedInfo) {
|
||||||
|
state.value = loadedInfo;
|
||||||
|
resolve(state.value);
|
||||||
|
}
|
||||||
|
return loadedInfo;
|
||||||
|
})
|
||||||
|
)
|
||||||
|
.then((cachedInfo) => this.options.fetchFromServer(key, cachedInfo, masterKey))
|
||||||
|
.then((loadedInfo) => {
|
||||||
|
if (state.value) {
|
||||||
|
Object.assign(state.value, loadedInfo);
|
||||||
|
} else {
|
||||||
|
state.value = loadedInfo;
|
||||||
|
}
|
||||||
|
resolve(state.value);
|
||||||
|
})
|
||||||
|
.finally(() => {
|
||||||
|
state.promise = undefined;
|
||||||
|
});
|
||||||
|
|
||||||
|
state.promise = newPromise;
|
||||||
|
return state.value ?? newPromise;
|
||||||
|
});
|
||||||
|
}
|
||||||
|
|
||||||
|
bulkGet(keys: Set<K>, masterKey: CryptoKey) {
|
||||||
|
return untrack(() => {
|
||||||
|
const newPromises = new Map(
|
||||||
|
keys
|
||||||
|
.keys()
|
||||||
|
.filter((key) => this.map.get(key)?.promise === undefined)
|
||||||
|
.map((key) => [key, Promise.withResolvers<V>()]),
|
||||||
|
);
|
||||||
|
newPromises.forEach(({ promise }, key) => {
|
||||||
|
const state = this.map.get(key);
|
||||||
|
if (state) {
|
||||||
|
state.promise = promise;
|
||||||
|
} else {
|
||||||
|
const newState = $state({ promise });
|
||||||
|
this.map.set(key, newState);
|
||||||
|
}
|
||||||
|
});
|
||||||
|
|
||||||
|
const resolve = (loadedInfos: Map<K, V>) => {
|
||||||
|
loadedInfos.forEach((loadedInfo, key) => {
|
||||||
|
const state = this.map.get(key)!;
|
||||||
|
if (state.value) {
|
||||||
|
Object.assign(state.value, loadedInfo);
|
||||||
|
} else {
|
||||||
|
state.value = loadedInfo;
|
||||||
|
}
|
||||||
|
newPromises.get(key)!.resolve(state.value);
|
||||||
|
});
|
||||||
|
return loadedInfos;
|
||||||
|
};
|
||||||
|
|
||||||
|
this.options.bulkFetchFromIndexedDB!(
|
||||||
|
new Set(newPromises.keys().filter((key) => this.map.get(key)!.value === undefined)),
|
||||||
|
)
|
||||||
|
.then(resolve)
|
||||||
|
.then(() =>
|
||||||
|
this.options.bulkFetchFromServer!(
|
||||||
|
new Map(
|
||||||
|
newPromises.keys().map((key) => [key, { cachedValue: this.map.get(key)!.value }]),
|
||||||
|
),
|
||||||
|
masterKey,
|
||||||
|
),
|
||||||
|
)
|
||||||
|
.then(resolve)
|
||||||
|
.finally(() => {
|
||||||
|
newPromises.forEach((_, key) => {
|
||||||
|
this.map.get(key)!.promise = undefined;
|
||||||
|
});
|
||||||
|
});
|
||||||
|
|
||||||
|
const bottleneckPromises = Array.from(
|
||||||
|
keys
|
||||||
|
.keys()
|
||||||
|
.filter((key) => this.map.get(key)!.value === undefined)
|
||||||
|
.map((key) => this.map.get(key)!.promise!),
|
||||||
|
);
|
||||||
|
const makeResult = () =>
|
||||||
|
new Map(keys.keys().map((key) => [key, this.map.get(key)!.value!] as const));
|
||||||
|
return bottleneckPromises.length > 0
|
||||||
|
? Promise.all(bottleneckPromises).then(makeResult)
|
||||||
|
: makeResult();
|
||||||
|
});
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
export const decryptDirectoryMetadata = async (
|
||||||
|
metadata: { dek: string; dekVersion: Date; name: string; nameIv: string },
|
||||||
|
masterKey: CryptoKey,
|
||||||
|
) => {
|
||||||
|
const { dataKey } = await unwrapDataKey(metadata.dek, masterKey);
|
||||||
|
const name = await decryptString(metadata.name, metadata.nameIv, dataKey);
|
||||||
|
|
||||||
|
return {
|
||||||
|
dataKey: { key: dataKey, version: metadata.dekVersion },
|
||||||
|
name,
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
const decryptDate = async (ciphertext: string, iv: string, dataKey: CryptoKey) => {
|
||||||
|
return new Date(parseInt(await decryptString(ciphertext, iv, dataKey), 10));
|
||||||
|
};
|
||||||
|
|
||||||
|
export const decryptFileMetadata = async (
|
||||||
|
metadata: {
|
||||||
|
dek: string;
|
||||||
|
dekVersion: Date;
|
||||||
|
name: string;
|
||||||
|
nameIv: string;
|
||||||
|
createdAt?: string;
|
||||||
|
createdAtIv?: string;
|
||||||
|
lastModifiedAt: string;
|
||||||
|
lastModifiedAtIv: string;
|
||||||
|
},
|
||||||
|
masterKey: CryptoKey,
|
||||||
|
) => {
|
||||||
|
const { dataKey } = await unwrapDataKey(metadata.dek, masterKey);
|
||||||
|
const [name, createdAt, lastModifiedAt] = await Promise.all([
|
||||||
|
decryptString(metadata.name, metadata.nameIv, dataKey),
|
||||||
|
metadata.createdAt
|
||||||
|
? decryptDate(metadata.createdAt, metadata.createdAtIv!, dataKey)
|
||||||
|
: undefined,
|
||||||
|
decryptDate(metadata.lastModifiedAt, metadata.lastModifiedAtIv, dataKey),
|
||||||
|
]);
|
||||||
|
|
||||||
|
return {
|
||||||
|
dataKey: { key: dataKey, version: metadata.dekVersion },
|
||||||
|
name,
|
||||||
|
createdAt,
|
||||||
|
lastModifiedAt,
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
export const decryptCategoryMetadata = decryptDirectoryMetadata;
|
||||||
77
src/lib/modules/filesystem/types.ts
Normal file
77
src/lib/modules/filesystem/types.ts
Normal file
@@ -0,0 +1,77 @@
|
|||||||
|
export type DataKey = { key: CryptoKey; version: Date };
|
||||||
|
type AllUndefined<T> = { [K in keyof T]?: undefined };
|
||||||
|
|
||||||
|
interface LocalDirectoryInfo {
|
||||||
|
id: number;
|
||||||
|
parentId: DirectoryId;
|
||||||
|
dataKey?: DataKey;
|
||||||
|
name: string;
|
||||||
|
subDirectories: SubDirectoryInfo[];
|
||||||
|
files: SummarizedFileInfo[];
|
||||||
|
}
|
||||||
|
|
||||||
|
interface RootDirectoryInfo {
|
||||||
|
id: "root";
|
||||||
|
parentId?: undefined;
|
||||||
|
dataKey?: undefined;
|
||||||
|
name?: undefined;
|
||||||
|
subDirectories: SubDirectoryInfo[];
|
||||||
|
files: SummarizedFileInfo[];
|
||||||
|
}
|
||||||
|
|
||||||
|
export type DirectoryInfo = LocalDirectoryInfo | RootDirectoryInfo;
|
||||||
|
export type MaybeDirectoryInfo =
|
||||||
|
| (DirectoryInfo & { exists: true })
|
||||||
|
| ({ id: DirectoryId; exists: false } & AllUndefined<Omit<DirectoryInfo, "id">>);
|
||||||
|
|
||||||
|
export type SubDirectoryInfo = Omit<LocalDirectoryInfo, "subDirectories" | "files">;
|
||||||
|
|
||||||
|
export interface FileInfo {
|
||||||
|
id: number;
|
||||||
|
isLegacy?: boolean;
|
||||||
|
parentId: DirectoryId;
|
||||||
|
dataKey?: DataKey;
|
||||||
|
contentType: string;
|
||||||
|
name: string;
|
||||||
|
createdAt?: Date;
|
||||||
|
lastModifiedAt: Date;
|
||||||
|
categories: FileCategoryInfo[];
|
||||||
|
}
|
||||||
|
|
||||||
|
export type MaybeFileInfo =
|
||||||
|
| (FileInfo & { exists: true })
|
||||||
|
| ({ id: number; exists: false } & AllUndefined<Omit<FileInfo, "id">>);
|
||||||
|
|
||||||
|
export type SummarizedFileInfo = Omit<FileInfo, "categories">;
|
||||||
|
export type CategoryFileInfo = SummarizedFileInfo & { isRecursive: boolean };
|
||||||
|
|
||||||
|
interface LocalCategoryInfo {
|
||||||
|
id: number;
|
||||||
|
parentId: DirectoryId;
|
||||||
|
dataKey?: DataKey;
|
||||||
|
name: string;
|
||||||
|
subCategories: SubCategoryInfo[];
|
||||||
|
files: CategoryFileInfo[];
|
||||||
|
isFileRecursive: boolean;
|
||||||
|
}
|
||||||
|
|
||||||
|
interface RootCategoryInfo {
|
||||||
|
id: "root";
|
||||||
|
parentId?: undefined;
|
||||||
|
dataKey?: undefined;
|
||||||
|
name?: undefined;
|
||||||
|
subCategories: SubCategoryInfo[];
|
||||||
|
files?: undefined;
|
||||||
|
isFileRecursive?: undefined;
|
||||||
|
}
|
||||||
|
|
||||||
|
export type CategoryInfo = LocalCategoryInfo | RootCategoryInfo;
|
||||||
|
export type MaybeCategoryInfo =
|
||||||
|
| (CategoryInfo & { exists: true })
|
||||||
|
| ({ id: CategoryId; exists: false } & AllUndefined<Omit<CategoryInfo, "id">>);
|
||||||
|
|
||||||
|
export type SubCategoryInfo = Omit<
|
||||||
|
LocalCategoryInfo,
|
||||||
|
"subCategories" | "files" | "isFileRecursive"
|
||||||
|
>;
|
||||||
|
export type FileCategoryInfo = Omit<SubCategoryInfo, "dataKey">;
|
||||||
@@ -1,294 +0,0 @@
|
|||||||
import { useQueryClient, createQuery, createMutation } from "@tanstack/svelte-query";
|
|
||||||
import { callGetApi, callPostApi } from "$lib/hooks";
|
|
||||||
import {
|
|
||||||
getCategoryInfos as getCategoryInfosFromIndexedDB,
|
|
||||||
getCategoryInfo as getCategoryInfoFromIndexedDB,
|
|
||||||
storeCategoryInfo,
|
|
||||||
updateCategoryInfo,
|
|
||||||
deleteCategoryInfo,
|
|
||||||
type CategoryId,
|
|
||||||
} from "$lib/indexedDB";
|
|
||||||
import {
|
|
||||||
generateDataKey,
|
|
||||||
wrapDataKey,
|
|
||||||
unwrapDataKey,
|
|
||||||
encryptString,
|
|
||||||
decryptString,
|
|
||||||
} from "$lib/modules/crypto";
|
|
||||||
import type {
|
|
||||||
CategoryInfoResponse,
|
|
||||||
CategoryFileListResponse,
|
|
||||||
CategoryRenameRequest,
|
|
||||||
CategoryCreateRequest,
|
|
||||||
CategoryCreateResponse,
|
|
||||||
} from "$lib/server/schemas";
|
|
||||||
import type { MasterKey } from "$lib/stores";
|
|
||||||
|
|
||||||
export type CategoryInfo =
|
|
||||||
| {
|
|
||||||
id: "root";
|
|
||||||
dataKey?: undefined;
|
|
||||||
dataKeyVersion?: undefined;
|
|
||||||
name?: undefined;
|
|
||||||
subCategoryIds: number[];
|
|
||||||
files?: undefined;
|
|
||||||
isFileRecursive?: undefined;
|
|
||||||
}
|
|
||||||
| {
|
|
||||||
id: number;
|
|
||||||
dataKey?: CryptoKey;
|
|
||||||
dataKeyVersion?: Date;
|
|
||||||
name: string;
|
|
||||||
subCategoryIds: number[];
|
|
||||||
files: { id: number; isRecursive: boolean }[];
|
|
||||||
isFileRecursive: boolean;
|
|
||||||
};
|
|
||||||
export type SubCategoryInfo = CategoryInfo & { id: number };
|
|
||||||
|
|
||||||
let temporaryIdCounter = -1;
|
|
||||||
|
|
||||||
const getInitialCategoryInfo = async (id: CategoryId) => {
|
|
||||||
const [category, subCategories] = await Promise.all([
|
|
||||||
id !== "root" ? getCategoryInfoFromIndexedDB(id) : undefined,
|
|
||||||
getCategoryInfosFromIndexedDB(id),
|
|
||||||
]);
|
|
||||||
const subCategoryIds = subCategories.map(({ id }) => id);
|
|
||||||
|
|
||||||
if (id === "root") {
|
|
||||||
return { id, subCategoryIds };
|
|
||||||
} else if (category) {
|
|
||||||
return {
|
|
||||||
id,
|
|
||||||
name: category.name,
|
|
||||||
subCategoryIds,
|
|
||||||
files: category.files,
|
|
||||||
isFileRecursive: category.isFileRecursive,
|
|
||||||
};
|
|
||||||
}
|
|
||||||
return undefined;
|
|
||||||
};
|
|
||||||
|
|
||||||
export const getCategoryInfo = (id: CategoryId, masterKey: CryptoKey) => {
|
|
||||||
return createQuery<CategoryInfo>({
|
|
||||||
queryKey: ["category", id],
|
|
||||||
queryFn: async ({ client, signal }) => {
|
|
||||||
if (!client.getQueryData<CategoryInfo>(["category", id])) {
|
|
||||||
const initialInfo = await getInitialCategoryInfo(id);
|
|
||||||
if (initialInfo) {
|
|
||||||
setTimeout(() => client.invalidateQueries({ queryKey: ["category", id] }), 0);
|
|
||||||
return initialInfo;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
const res = await callGetApi(`/api/category/${id}`, { signal }); // TODO: 404
|
|
||||||
const { metadata, subCategories }: CategoryInfoResponse = await res.json();
|
|
||||||
|
|
||||||
if (id === "root") {
|
|
||||||
return { id, subCategoryIds: subCategories };
|
|
||||||
} else {
|
|
||||||
const { dataKey } = await unwrapDataKey(metadata!.dek, masterKey);
|
|
||||||
const name = await decryptString(metadata!.name, metadata!.nameIv, dataKey);
|
|
||||||
|
|
||||||
const res = await callGetApi(`/api/category/${id}/file/list?recurse=true`); // TODO: Error Handling
|
|
||||||
const { files }: CategoryFileListResponse = await res.json();
|
|
||||||
const filesMapped = files.map(({ file, isRecursive }) => ({ id: file, isRecursive }));
|
|
||||||
|
|
||||||
const prevInfo = client.getQueryData<CategoryInfo>(["category", id]);
|
|
||||||
await storeCategoryInfo({
|
|
||||||
id,
|
|
||||||
parentId: metadata!.parent,
|
|
||||||
name,
|
|
||||||
files: filesMapped,
|
|
||||||
isFileRecursive: prevInfo?.isFileRecursive ?? false,
|
|
||||||
});
|
|
||||||
return {
|
|
||||||
id,
|
|
||||||
dataKey,
|
|
||||||
dataKeyVersion: new Date(metadata!.dekVersion),
|
|
||||||
name,
|
|
||||||
subCategoryIds: subCategories,
|
|
||||||
files: filesMapped,
|
|
||||||
isFileRecursive: prevInfo?.isFileRecursive ?? false,
|
|
||||||
};
|
|
||||||
}
|
|
||||||
},
|
|
||||||
staleTime: Infinity,
|
|
||||||
});
|
|
||||||
};
|
|
||||||
|
|
||||||
export type CategoryInfoStore = ReturnType<typeof getCategoryInfo>;
|
|
||||||
|
|
||||||
export const useCategoryCreation = (parentId: CategoryId, masterKey: MasterKey) => {
|
|
||||||
const queryClient = useQueryClient();
|
|
||||||
return createMutation<void, Error, { name: string }, { tempId: number }>({
|
|
||||||
mutationFn: async ({ name }) => {
|
|
||||||
const { dataKey, dataKeyVersion } = await generateDataKey();
|
|
||||||
const nameEncrypted = await encryptString(name, dataKey);
|
|
||||||
|
|
||||||
const res = await callPostApi<CategoryCreateRequest>("/api/category/create", {
|
|
||||||
parent: parentId,
|
|
||||||
mekVersion: masterKey.version,
|
|
||||||
dek: await wrapDataKey(dataKey, masterKey.key),
|
|
||||||
dekVersion: dataKeyVersion.toISOString(),
|
|
||||||
name: nameEncrypted.ciphertext,
|
|
||||||
nameIv: nameEncrypted.iv,
|
|
||||||
});
|
|
||||||
if (!res.ok) throw new Error("Failed to create category");
|
|
||||||
|
|
||||||
const { category: id }: CategoryCreateResponse = await res.json();
|
|
||||||
queryClient.setQueryData<CategoryInfo>(["category", id], {
|
|
||||||
id,
|
|
||||||
name,
|
|
||||||
dataKey,
|
|
||||||
dataKeyVersion,
|
|
||||||
subCategoryIds: [],
|
|
||||||
files: [],
|
|
||||||
isFileRecursive: false,
|
|
||||||
});
|
|
||||||
await storeCategoryInfo({ id, parentId, name, files: [], isFileRecursive: false });
|
|
||||||
},
|
|
||||||
onMutate: async ({ name }) => {
|
|
||||||
const tempId = temporaryIdCounter--;
|
|
||||||
queryClient.setQueryData<CategoryInfo>(["category", tempId], {
|
|
||||||
id: tempId,
|
|
||||||
name,
|
|
||||||
subCategoryIds: [],
|
|
||||||
files: [],
|
|
||||||
isFileRecursive: false,
|
|
||||||
});
|
|
||||||
|
|
||||||
await queryClient.cancelQueries({ queryKey: ["category", parentId] });
|
|
||||||
queryClient.setQueryData<CategoryInfo>(["category", parentId], (prevParentInfo) => {
|
|
||||||
if (!prevParentInfo) return;
|
|
||||||
return {
|
|
||||||
...prevParentInfo,
|
|
||||||
subCategoryIds: [...prevParentInfo.subCategoryIds, tempId],
|
|
||||||
};
|
|
||||||
});
|
|
||||||
|
|
||||||
return { tempId };
|
|
||||||
},
|
|
||||||
onError: (_error, _variables, context) => {
|
|
||||||
if (context) {
|
|
||||||
queryClient.setQueryData<CategoryInfo>(["category", parentId], (prevParentInfo) => {
|
|
||||||
if (!prevParentInfo) return;
|
|
||||||
return {
|
|
||||||
...prevParentInfo,
|
|
||||||
subCategoryIds: prevParentInfo.subCategoryIds.filter((id) => id !== context.tempId),
|
|
||||||
};
|
|
||||||
});
|
|
||||||
}
|
|
||||||
},
|
|
||||||
onSettled: () => {
|
|
||||||
queryClient.invalidateQueries({ queryKey: ["category", parentId] });
|
|
||||||
},
|
|
||||||
});
|
|
||||||
};
|
|
||||||
|
|
||||||
export const useCategoryRename = () => {
|
|
||||||
const queryClient = useQueryClient();
|
|
||||||
return createMutation<
|
|
||||||
void,
|
|
||||||
Error,
|
|
||||||
{
|
|
||||||
id: number;
|
|
||||||
dataKey: CryptoKey;
|
|
||||||
dataKeyVersion: Date;
|
|
||||||
newName: string;
|
|
||||||
},
|
|
||||||
{ oldName: string | undefined }
|
|
||||||
>({
|
|
||||||
mutationFn: async ({ id, dataKey, dataKeyVersion, newName }) => {
|
|
||||||
const newNameEncrypted = await encryptString(newName, dataKey);
|
|
||||||
const res = await callPostApi<CategoryRenameRequest>(`/api/category/${id}/rename`, {
|
|
||||||
dekVersion: dataKeyVersion.toISOString(),
|
|
||||||
name: newNameEncrypted.ciphertext,
|
|
||||||
nameIv: newNameEncrypted.iv,
|
|
||||||
});
|
|
||||||
if (!res.ok) throw new Error("Failed to rename category");
|
|
||||||
|
|
||||||
await updateCategoryInfo(id, { name: newName });
|
|
||||||
},
|
|
||||||
onMutate: async ({ id, newName }) => {
|
|
||||||
await queryClient.cancelQueries({ queryKey: ["category", id] });
|
|
||||||
|
|
||||||
const prevInfo = queryClient.getQueryData<SubCategoryInfo>(["category", id]);
|
|
||||||
if (prevInfo) {
|
|
||||||
queryClient.setQueryData<CategoryInfo>(["category", id], {
|
|
||||||
...prevInfo,
|
|
||||||
name: newName,
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
return { oldName: prevInfo?.name };
|
|
||||||
},
|
|
||||||
onError: (_error, { id }, context) => {
|
|
||||||
if (context?.oldName) {
|
|
||||||
queryClient.setQueryData<SubCategoryInfo>(["category", id], (prevInfo) => {
|
|
||||||
if (!prevInfo) return;
|
|
||||||
return { ...prevInfo, name: context.oldName! };
|
|
||||||
});
|
|
||||||
}
|
|
||||||
},
|
|
||||||
onSettled: (_data, _error, { id }) => {
|
|
||||||
queryClient.invalidateQueries({ queryKey: ["category", id] });
|
|
||||||
},
|
|
||||||
});
|
|
||||||
};
|
|
||||||
|
|
||||||
export const useCategoryDeletion = (parentId: CategoryId) => {
|
|
||||||
const queryClient = useQueryClient();
|
|
||||||
return createMutation<void, Error, { id: number }, {}>({
|
|
||||||
mutationFn: async ({ id }) => {
|
|
||||||
const res = await callPostApi(`/api/category/${id}/delete`);
|
|
||||||
if (!res.ok) throw new Error("Failed to delete category");
|
|
||||||
|
|
||||||
await deleteCategoryInfo(id);
|
|
||||||
|
|
||||||
// TODO: Update FileInfo
|
|
||||||
},
|
|
||||||
onMutate: async ({ id }) => {
|
|
||||||
await queryClient.cancelQueries({ queryKey: ["category", parentId] });
|
|
||||||
queryClient.setQueryData<CategoryInfo>(["category", parentId], (prevParentInfo) => {
|
|
||||||
if (!prevParentInfo) return;
|
|
||||||
return {
|
|
||||||
...prevParentInfo,
|
|
||||||
subCategoryIds: prevParentInfo.subCategoryIds.filter((categoryId) => categoryId !== id),
|
|
||||||
};
|
|
||||||
});
|
|
||||||
return {};
|
|
||||||
},
|
|
||||||
onError: (_error, { id }, context) => {
|
|
||||||
if (context) {
|
|
||||||
queryClient.setQueryData<CategoryInfo>(["category", parentId], (prevParentInfo) => {
|
|
||||||
if (!prevParentInfo) return;
|
|
||||||
return {
|
|
||||||
...prevParentInfo,
|
|
||||||
subCategoryIds: [...prevParentInfo.subCategoryIds, id],
|
|
||||||
};
|
|
||||||
});
|
|
||||||
}
|
|
||||||
},
|
|
||||||
onSettled: () => {
|
|
||||||
queryClient.invalidateQueries({ queryKey: ["category", parentId] });
|
|
||||||
},
|
|
||||||
});
|
|
||||||
};
|
|
||||||
|
|
||||||
export const useCategoryFileRecursionToggle = () => {
|
|
||||||
const queryClient = useQueryClient();
|
|
||||||
return createMutation<void, Error, { id: number; isFileRecursive: boolean }, {}>({
|
|
||||||
mutationFn: async ({ id, isFileRecursive }) => {
|
|
||||||
await updateCategoryInfo(id, { isFileRecursive });
|
|
||||||
},
|
|
||||||
onMutate: async ({ id, isFileRecursive }) => {
|
|
||||||
const prevInfo = queryClient.getQueryData<SubCategoryInfo>(["category", id]);
|
|
||||||
if (prevInfo) {
|
|
||||||
queryClient.setQueryData<CategoryInfo>(["category", id], {
|
|
||||||
...prevInfo,
|
|
||||||
isFileRecursive,
|
|
||||||
});
|
|
||||||
}
|
|
||||||
},
|
|
||||||
});
|
|
||||||
};
|
|
||||||
@@ -1,267 +0,0 @@
|
|||||||
import { useQueryClient, createQuery, createMutation } from "@tanstack/svelte-query";
|
|
||||||
import { callGetApi, callPostApi } from "$lib/hooks";
|
|
||||||
import {
|
|
||||||
getDirectoryInfos as getDirectoryInfosFromIndexedDB,
|
|
||||||
getDirectoryInfo as getDirectoryInfoFromIndexedDB,
|
|
||||||
storeDirectoryInfo,
|
|
||||||
updateDirectoryInfo,
|
|
||||||
deleteDirectoryInfo,
|
|
||||||
getFileInfos as getFileInfosFromIndexedDB,
|
|
||||||
deleteFileInfo,
|
|
||||||
type DirectoryId,
|
|
||||||
} from "$lib/indexedDB";
|
|
||||||
import {
|
|
||||||
generateDataKey,
|
|
||||||
wrapDataKey,
|
|
||||||
unwrapDataKey,
|
|
||||||
encryptString,
|
|
||||||
decryptString,
|
|
||||||
} from "$lib/modules/crypto";
|
|
||||||
import type {
|
|
||||||
DirectoryInfoResponse,
|
|
||||||
DirectoryDeleteResponse,
|
|
||||||
DirectoryRenameRequest,
|
|
||||||
DirectoryCreateRequest,
|
|
||||||
DirectoryCreateResponse,
|
|
||||||
} from "$lib/server/schemas";
|
|
||||||
import type { MasterKey } from "$lib/stores";
|
|
||||||
|
|
||||||
export type DirectoryInfo =
|
|
||||||
| {
|
|
||||||
id: "root";
|
|
||||||
dataKey?: undefined;
|
|
||||||
dataKeyVersion?: undefined;
|
|
||||||
name?: undefined;
|
|
||||||
subDirectoryIds: number[];
|
|
||||||
fileIds: number[];
|
|
||||||
}
|
|
||||||
| {
|
|
||||||
id: number;
|
|
||||||
dataKey?: CryptoKey;
|
|
||||||
dataKeyVersion?: Date;
|
|
||||||
name: string;
|
|
||||||
subDirectoryIds: number[];
|
|
||||||
fileIds: number[];
|
|
||||||
};
|
|
||||||
export type SubDirectoryInfo = DirectoryInfo & { id: number };
|
|
||||||
|
|
||||||
let temporaryIdCounter = -1;
|
|
||||||
|
|
||||||
const getInitialDirectoryInfo = async (id: DirectoryId) => {
|
|
||||||
const [directory, subDirectories, files] = await Promise.all([
|
|
||||||
id !== "root" ? getDirectoryInfoFromIndexedDB(id) : undefined,
|
|
||||||
getDirectoryInfosFromIndexedDB(id),
|
|
||||||
getFileInfosFromIndexedDB(id),
|
|
||||||
]);
|
|
||||||
const subDirectoryIds = subDirectories.map(({ id }) => id);
|
|
||||||
const fileIds = files.map(({ id }) => id);
|
|
||||||
|
|
||||||
if (id === "root") {
|
|
||||||
return { id, subDirectoryIds, fileIds };
|
|
||||||
} else if (directory) {
|
|
||||||
return { id, name: directory.name, subDirectoryIds, fileIds };
|
|
||||||
}
|
|
||||||
return undefined;
|
|
||||||
};
|
|
||||||
|
|
||||||
export const getDirectoryInfo = (id: DirectoryId, masterKey: CryptoKey) => {
|
|
||||||
return createQuery<DirectoryInfo>({
|
|
||||||
queryKey: ["directory", id],
|
|
||||||
queryFn: async ({ client, signal }) => {
|
|
||||||
if (!client.getQueryData(["directory", id])) {
|
|
||||||
const initialInfo = await getInitialDirectoryInfo(id);
|
|
||||||
if (initialInfo) {
|
|
||||||
setTimeout(() => client.invalidateQueries({ queryKey: ["directory", id] }), 0);
|
|
||||||
return initialInfo;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
const res = await callGetApi(`/api/directory/${id}`, { signal }); // TODO: 404
|
|
||||||
const {
|
|
||||||
metadata,
|
|
||||||
subDirectories: subDirectoryIds,
|
|
||||||
files: fileIds,
|
|
||||||
}: DirectoryInfoResponse = await res.json();
|
|
||||||
|
|
||||||
if (id === "root") {
|
|
||||||
return { id, subDirectoryIds, fileIds };
|
|
||||||
} else {
|
|
||||||
const { dataKey } = await unwrapDataKey(metadata!.dek, masterKey);
|
|
||||||
const name = await decryptString(metadata!.name, metadata!.nameIv, dataKey);
|
|
||||||
await storeDirectoryInfo({ id, parentId: metadata!.parent, name });
|
|
||||||
return {
|
|
||||||
id,
|
|
||||||
dataKey,
|
|
||||||
dataKeyVersion: new Date(metadata!.dekVersion),
|
|
||||||
name,
|
|
||||||
subDirectoryIds,
|
|
||||||
fileIds,
|
|
||||||
};
|
|
||||||
}
|
|
||||||
},
|
|
||||||
staleTime: Infinity,
|
|
||||||
});
|
|
||||||
};
|
|
||||||
|
|
||||||
export type DirectoryInfoStore = ReturnType<typeof getDirectoryInfo>;
|
|
||||||
|
|
||||||
export const useDirectoryCreation = (parentId: DirectoryId, masterKey: MasterKey) => {
|
|
||||||
const queryClient = useQueryClient();
|
|
||||||
return createMutation<void, Error, { name: string }, { tempId: number }>({
|
|
||||||
mutationFn: async ({ name }) => {
|
|
||||||
const { dataKey, dataKeyVersion } = await generateDataKey();
|
|
||||||
const nameEncrypted = await encryptString(name, dataKey);
|
|
||||||
|
|
||||||
const res = await callPostApi<DirectoryCreateRequest>(`/api/directory/create`, {
|
|
||||||
parent: parentId,
|
|
||||||
mekVersion: masterKey.version,
|
|
||||||
dek: await wrapDataKey(dataKey, masterKey.key),
|
|
||||||
dekVersion: dataKeyVersion.toISOString(),
|
|
||||||
name: nameEncrypted.ciphertext,
|
|
||||||
nameIv: nameEncrypted.iv,
|
|
||||||
});
|
|
||||||
if (!res.ok) throw new Error("Failed to create directory");
|
|
||||||
|
|
||||||
const { directory: id }: DirectoryCreateResponse = await res.json();
|
|
||||||
queryClient.setQueryData<DirectoryInfo>(["directory", id], {
|
|
||||||
id,
|
|
||||||
name,
|
|
||||||
dataKey,
|
|
||||||
dataKeyVersion,
|
|
||||||
subDirectoryIds: [],
|
|
||||||
fileIds: [],
|
|
||||||
});
|
|
||||||
await storeDirectoryInfo({ id, parentId, name });
|
|
||||||
},
|
|
||||||
onMutate: async ({ name }) => {
|
|
||||||
const tempId = temporaryIdCounter--;
|
|
||||||
queryClient.setQueryData<DirectoryInfo>(["directory", tempId], {
|
|
||||||
id: tempId,
|
|
||||||
name,
|
|
||||||
subDirectoryIds: [],
|
|
||||||
fileIds: [],
|
|
||||||
});
|
|
||||||
|
|
||||||
await queryClient.cancelQueries({ queryKey: ["directory", parentId] });
|
|
||||||
queryClient.setQueryData<DirectoryInfo>(["directory", parentId], (prevParentInfo) => {
|
|
||||||
if (!prevParentInfo) return undefined;
|
|
||||||
return {
|
|
||||||
...prevParentInfo,
|
|
||||||
subDirectoryIds: [...prevParentInfo.subDirectoryIds, tempId],
|
|
||||||
};
|
|
||||||
});
|
|
||||||
|
|
||||||
return { tempId };
|
|
||||||
},
|
|
||||||
onError: (_error, _variables, context) => {
|
|
||||||
if (context) {
|
|
||||||
queryClient.setQueryData<DirectoryInfo>(["directory", parentId], (prevParentInfo) => {
|
|
||||||
if (!prevParentInfo) return undefined;
|
|
||||||
return {
|
|
||||||
...prevParentInfo,
|
|
||||||
subDirectoryIds: prevParentInfo.subDirectoryIds.filter((id) => id !== context.tempId),
|
|
||||||
};
|
|
||||||
});
|
|
||||||
}
|
|
||||||
},
|
|
||||||
onSettled: () => {
|
|
||||||
queryClient.invalidateQueries({ queryKey: ["directory", parentId] });
|
|
||||||
},
|
|
||||||
});
|
|
||||||
};
|
|
||||||
|
|
||||||
export const useDirectoryRename = () => {
|
|
||||||
const queryClient = useQueryClient();
|
|
||||||
return createMutation<
|
|
||||||
void,
|
|
||||||
Error,
|
|
||||||
{
|
|
||||||
id: number;
|
|
||||||
dataKey: CryptoKey;
|
|
||||||
dataKeyVersion: Date;
|
|
||||||
newName: string;
|
|
||||||
},
|
|
||||||
{ oldName: string | undefined }
|
|
||||||
>({
|
|
||||||
mutationFn: async ({ id, dataKey, dataKeyVersion, newName }) => {
|
|
||||||
const newNameEncrypted = await encryptString(newName, dataKey);
|
|
||||||
const res = await callPostApi<DirectoryRenameRequest>(`/api/directory/${id}/rename`, {
|
|
||||||
dekVersion: dataKeyVersion.toISOString(),
|
|
||||||
name: newNameEncrypted.ciphertext,
|
|
||||||
nameIv: newNameEncrypted.iv,
|
|
||||||
});
|
|
||||||
if (!res.ok) throw new Error("Failed to rename directory");
|
|
||||||
|
|
||||||
await updateDirectoryInfo(id, { name: newName });
|
|
||||||
},
|
|
||||||
onMutate: async ({ id, newName }) => {
|
|
||||||
await queryClient.cancelQueries({ queryKey: ["directory", id] });
|
|
||||||
|
|
||||||
const prevInfo = queryClient.getQueryData<SubDirectoryInfo>(["directory", id]);
|
|
||||||
if (prevInfo) {
|
|
||||||
queryClient.setQueryData<DirectoryInfo>(["directory", id], {
|
|
||||||
...prevInfo,
|
|
||||||
name: newName,
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
return { oldName: prevInfo?.name };
|
|
||||||
},
|
|
||||||
onError: (_error, { id }, context) => {
|
|
||||||
if (context?.oldName) {
|
|
||||||
queryClient.setQueryData<SubDirectoryInfo>(["directory", id], (prevInfo) => {
|
|
||||||
if (!prevInfo) return undefined;
|
|
||||||
return { ...prevInfo, name: context.oldName! };
|
|
||||||
});
|
|
||||||
}
|
|
||||||
},
|
|
||||||
onSettled: (_data, _error, { id }) => {
|
|
||||||
queryClient.invalidateQueries({ queryKey: ["directory", id] });
|
|
||||||
},
|
|
||||||
});
|
|
||||||
};
|
|
||||||
|
|
||||||
export const useDirectoryDeletion = (parentId: DirectoryId) => {
|
|
||||||
const queryClient = useQueryClient();
|
|
||||||
return createMutation<{ deletedFiles: number[] }, Error, { id: number }, {}>({
|
|
||||||
mutationFn: async ({ id }) => {
|
|
||||||
const res = await callPostApi(`/api/directory/${id}/delete`);
|
|
||||||
if (!res.ok) throw new Error("Failed to delete directory");
|
|
||||||
|
|
||||||
const { deletedDirectories, deletedFiles }: DirectoryDeleteResponse = await res.json();
|
|
||||||
await Promise.all([
|
|
||||||
...deletedDirectories.map(deleteDirectoryInfo),
|
|
||||||
...deletedFiles.map(deleteFileInfo),
|
|
||||||
]);
|
|
||||||
|
|
||||||
return { deletedFiles };
|
|
||||||
},
|
|
||||||
onMutate: async ({ id }) => {
|
|
||||||
await queryClient.cancelQueries({ queryKey: ["directory", parentId] });
|
|
||||||
queryClient.setQueryData<DirectoryInfo>(["directory", parentId], (prevParentInfo) => {
|
|
||||||
if (!prevParentInfo) return undefined;
|
|
||||||
return {
|
|
||||||
...prevParentInfo,
|
|
||||||
subDirectoryIds: prevParentInfo.subDirectoryIds.filter(
|
|
||||||
(subDirectoryId) => subDirectoryId !== id,
|
|
||||||
),
|
|
||||||
};
|
|
||||||
});
|
|
||||||
return {};
|
|
||||||
},
|
|
||||||
onError: (_error, { id }, context) => {
|
|
||||||
if (context) {
|
|
||||||
queryClient.setQueryData<DirectoryInfo>(["directory", parentId], (prevParentInfo) => {
|
|
||||||
if (!prevParentInfo) return undefined;
|
|
||||||
return {
|
|
||||||
...prevParentInfo,
|
|
||||||
subDirectoryIds: [...prevParentInfo.subDirectoryIds, id],
|
|
||||||
};
|
|
||||||
});
|
|
||||||
}
|
|
||||||
},
|
|
||||||
onSettled: () => {
|
|
||||||
queryClient.invalidateQueries({ queryKey: ["directory", parentId] });
|
|
||||||
},
|
|
||||||
});
|
|
||||||
};
|
|
||||||
@@ -1,230 +0,0 @@
|
|||||||
import { useQueryClient, createQuery, createMutation } from "@tanstack/svelte-query";
|
|
||||||
import { callGetApi, callPostApi } from "$lib/hooks";
|
|
||||||
import {
|
|
||||||
getFileInfo as getFileInfoFromIndexedDB,
|
|
||||||
storeFileInfo,
|
|
||||||
updateFileInfo,
|
|
||||||
deleteFileInfo,
|
|
||||||
type DirectoryId,
|
|
||||||
} from "$lib/indexedDB";
|
|
||||||
import { unwrapDataKey, encryptString, decryptString } from "$lib/modules/crypto";
|
|
||||||
import { uploadFile } from "$lib/modules/file";
|
|
||||||
import type { FileInfoResponse, FileRenameRequest } from "$lib/server/schemas";
|
|
||||||
import type { MasterKey, HmacSecret } from "$lib/stores";
|
|
||||||
import type { DirectoryInfo } from "./directory";
|
|
||||||
|
|
||||||
export interface FileInfo {
|
|
||||||
id: number;
|
|
||||||
dataKey?: CryptoKey;
|
|
||||||
dataKeyVersion?: Date;
|
|
||||||
contentType: string;
|
|
||||||
contentIv?: string;
|
|
||||||
name: string;
|
|
||||||
createdAt?: Date;
|
|
||||||
lastModifiedAt: Date;
|
|
||||||
categoryIds: number[];
|
|
||||||
}
|
|
||||||
|
|
||||||
const decryptDate = async (ciphertext: string, iv: string, dataKey: CryptoKey) => {
|
|
||||||
return new Date(parseInt(await decryptString(ciphertext, iv, dataKey), 10));
|
|
||||||
};
|
|
||||||
|
|
||||||
export const getFileInfo = (id: number, masterKey: CryptoKey) => {
|
|
||||||
return createQuery<FileInfo>({
|
|
||||||
queryKey: ["file", id],
|
|
||||||
queryFn: async ({ client, signal }) => {
|
|
||||||
if (!client.getQueryData(["file", id])) {
|
|
||||||
const initialInfo = await getFileInfoFromIndexedDB(id);
|
|
||||||
if (initialInfo) {
|
|
||||||
setTimeout(() => client.invalidateQueries({ queryKey: ["file", id] }), 0);
|
|
||||||
return initialInfo;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
const res = await callGetApi(`/api/file/${id}`, { signal }); // TODO: 404
|
|
||||||
const metadata: FileInfoResponse = await res.json();
|
|
||||||
|
|
||||||
const { dataKey } = await unwrapDataKey(metadata.dek, masterKey);
|
|
||||||
const name = await decryptString(metadata.name, metadata.nameIv, dataKey);
|
|
||||||
const createdAt =
|
|
||||||
metadata.createdAt && metadata.createdAtIv
|
|
||||||
? await decryptDate(metadata.createdAt, metadata.createdAtIv, dataKey)
|
|
||||||
: undefined;
|
|
||||||
const lastModifiedAt = await decryptDate(
|
|
||||||
metadata.lastModifiedAt,
|
|
||||||
metadata.lastModifiedAtIv,
|
|
||||||
dataKey,
|
|
||||||
);
|
|
||||||
|
|
||||||
await storeFileInfo({
|
|
||||||
id,
|
|
||||||
parentId: metadata.parent,
|
|
||||||
name,
|
|
||||||
contentType: metadata.contentType,
|
|
||||||
createdAt,
|
|
||||||
lastModifiedAt,
|
|
||||||
categoryIds: metadata.categories,
|
|
||||||
});
|
|
||||||
return {
|
|
||||||
id,
|
|
||||||
dataKey,
|
|
||||||
dataKeyVersion: new Date(metadata.dekVersion),
|
|
||||||
contentType: metadata.contentType,
|
|
||||||
contentIv: metadata.contentIv,
|
|
||||||
name,
|
|
||||||
createdAt,
|
|
||||||
lastModifiedAt,
|
|
||||||
categoryIds: metadata.categories,
|
|
||||||
};
|
|
||||||
},
|
|
||||||
staleTime: Infinity,
|
|
||||||
});
|
|
||||||
};
|
|
||||||
|
|
||||||
export type FileInfoStore = ReturnType<typeof getFileInfo>;
|
|
||||||
|
|
||||||
export const useFileUpload = (
|
|
||||||
parentId: DirectoryId,
|
|
||||||
masterKey: MasterKey,
|
|
||||||
hmacSecret: HmacSecret,
|
|
||||||
) => {
|
|
||||||
const queryClient = useQueryClient();
|
|
||||||
return createMutation<
|
|
||||||
{ fileId: number; fileBuffer: ArrayBuffer; thumbnailBuffer?: ArrayBuffer },
|
|
||||||
Error,
|
|
||||||
{ file: File; onDuplicate: () => Promise<boolean> },
|
|
||||||
{ tempId: number }
|
|
||||||
>({
|
|
||||||
mutationFn: async ({ file, onDuplicate }) => {
|
|
||||||
const res = await uploadFile(file, parentId, hmacSecret, masterKey, onDuplicate);
|
|
||||||
if (!res) throw new Error("Failed to upload file");
|
|
||||||
|
|
||||||
queryClient.setQueryData<FileInfo>(["file", res.fileId], {
|
|
||||||
id: res.fileId,
|
|
||||||
dataKey: res.fileDataKey,
|
|
||||||
dataKeyVersion: res.fileDataKeyVersion,
|
|
||||||
contentType: res.fileType,
|
|
||||||
contentIv: res.fileEncryptedIv,
|
|
||||||
name: file.name,
|
|
||||||
createdAt: res.fileCreatedAt,
|
|
||||||
lastModifiedAt: new Date(file.lastModified),
|
|
||||||
categoryIds: [],
|
|
||||||
});
|
|
||||||
await storeFileInfo({
|
|
||||||
id: res.fileId,
|
|
||||||
parentId,
|
|
||||||
name: file.name,
|
|
||||||
contentType: res.fileType,
|
|
||||||
createdAt: res.fileCreatedAt,
|
|
||||||
lastModifiedAt: new Date(file.lastModified),
|
|
||||||
categoryIds: [],
|
|
||||||
});
|
|
||||||
return {
|
|
||||||
fileId: res.fileId,
|
|
||||||
fileBuffer: res.fileBuffer,
|
|
||||||
thumbnailBuffer: res.thumbnailBuffer,
|
|
||||||
};
|
|
||||||
},
|
|
||||||
onSuccess: async ({ fileId }) => {
|
|
||||||
await queryClient.cancelQueries({ queryKey: ["directory", parentId] });
|
|
||||||
queryClient.setQueryData<DirectoryInfo>(["directory", parentId], (prevParentInfo) => {
|
|
||||||
if (!prevParentInfo) return undefined;
|
|
||||||
return {
|
|
||||||
...prevParentInfo,
|
|
||||||
fileIds: [...prevParentInfo.fileIds, fileId],
|
|
||||||
};
|
|
||||||
});
|
|
||||||
},
|
|
||||||
onSettled: () => {
|
|
||||||
queryClient.invalidateQueries({ queryKey: ["directory", parentId] });
|
|
||||||
},
|
|
||||||
});
|
|
||||||
};
|
|
||||||
|
|
||||||
export const useFileRename = () => {
|
|
||||||
const queryClient = useQueryClient();
|
|
||||||
return createMutation<
|
|
||||||
void,
|
|
||||||
Error,
|
|
||||||
{
|
|
||||||
id: number;
|
|
||||||
dataKey: CryptoKey;
|
|
||||||
dataKeyVersion: Date;
|
|
||||||
newName: string;
|
|
||||||
},
|
|
||||||
{ oldName: string | undefined }
|
|
||||||
>({
|
|
||||||
mutationFn: async ({ id, dataKey, dataKeyVersion, newName }) => {
|
|
||||||
const newNameEncrypted = await encryptString(newName, dataKey);
|
|
||||||
const res = await callPostApi<FileRenameRequest>(`/api/file/${id}/rename`, {
|
|
||||||
dekVersion: dataKeyVersion.toISOString(),
|
|
||||||
name: newNameEncrypted.ciphertext,
|
|
||||||
nameIv: newNameEncrypted.iv,
|
|
||||||
});
|
|
||||||
if (!res.ok) throw new Error("Failed to rename file");
|
|
||||||
|
|
||||||
await updateFileInfo(id, { name: newName });
|
|
||||||
},
|
|
||||||
onMutate: async ({ id, newName }) => {
|
|
||||||
await queryClient.cancelQueries({ queryKey: ["file", id] });
|
|
||||||
|
|
||||||
const prevInfo = queryClient.getQueryData<FileInfo>(["file", id]);
|
|
||||||
if (prevInfo) {
|
|
||||||
queryClient.setQueryData<FileInfo>(["file", id], {
|
|
||||||
...prevInfo,
|
|
||||||
name: newName,
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
return { oldName: prevInfo?.name };
|
|
||||||
},
|
|
||||||
onError: (_error, { id }, context) => {
|
|
||||||
if (context?.oldName) {
|
|
||||||
queryClient.setQueryData<FileInfo>(["file", id], (prevInfo) => {
|
|
||||||
if (!prevInfo) return undefined;
|
|
||||||
return { ...prevInfo, name: context.oldName! };
|
|
||||||
});
|
|
||||||
}
|
|
||||||
},
|
|
||||||
onSettled: (_data, _error, { id }) => {
|
|
||||||
queryClient.invalidateQueries({ queryKey: ["file", id] });
|
|
||||||
},
|
|
||||||
});
|
|
||||||
};
|
|
||||||
|
|
||||||
export const useFileDeletion = (parentId: DirectoryId) => {
|
|
||||||
const queryClient = useQueryClient();
|
|
||||||
return createMutation<void, Error, { id: number }, {}>({
|
|
||||||
mutationFn: async ({ id }) => {
|
|
||||||
const res = await callPostApi(`/api/file/${id}/delete`);
|
|
||||||
if (!res.ok) throw new Error("Failed to delete file");
|
|
||||||
|
|
||||||
await deleteFileInfo(id);
|
|
||||||
},
|
|
||||||
onMutate: async ({ id }) => {
|
|
||||||
await queryClient.cancelQueries({ queryKey: ["directory", parentId] });
|
|
||||||
queryClient.setQueryData<DirectoryInfo>(["directory", parentId], (prevParentInfo) => {
|
|
||||||
if (!prevParentInfo) return undefined;
|
|
||||||
return {
|
|
||||||
...prevParentInfo,
|
|
||||||
fileIds: prevParentInfo.fileIds.filter((fileId) => fileId !== id),
|
|
||||||
};
|
|
||||||
});
|
|
||||||
return {};
|
|
||||||
},
|
|
||||||
onError: (_error, { id }, context) => {
|
|
||||||
if (context) {
|
|
||||||
queryClient.setQueryData<DirectoryInfo>(["directory", parentId], (prevParentInfo) => {
|
|
||||||
if (!prevParentInfo) return undefined;
|
|
||||||
return {
|
|
||||||
...prevParentInfo,
|
|
||||||
fileIds: [...prevParentInfo.fileIds, id],
|
|
||||||
};
|
|
||||||
});
|
|
||||||
}
|
|
||||||
},
|
|
||||||
onSettled: () => {
|
|
||||||
queryClient.invalidateQueries({ queryKey: ["directory", parentId] });
|
|
||||||
},
|
|
||||||
});
|
|
||||||
};
|
|
||||||
14
src/lib/modules/http.ts
Normal file
14
src/lib/modules/http.ts
Normal file
@@ -0,0 +1,14 @@
|
|||||||
|
export const parseRangeHeader = (rangeHeader: string | null) => {
|
||||||
|
if (!rangeHeader) return undefined;
|
||||||
|
|
||||||
|
const firstRange = rangeHeader.split(",")[0]!.trim();
|
||||||
|
const parts = firstRange.replace(/bytes=/, "").split("-");
|
||||||
|
return {
|
||||||
|
start: parts[0] ? parseInt(parts[0], 10) : undefined,
|
||||||
|
end: parts[1] ? parseInt(parts[1], 10) : undefined,
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
export const getContentRangeHeader = (range?: { start: number; end: number; total: number }) => {
|
||||||
|
return range && { "Content-Range": `bytes ${range.start}-${range.end}/${range.total}` };
|
||||||
|
};
|
||||||
@@ -5,14 +5,14 @@ import type { ClientKeys } from "$lib/stores";
|
|||||||
const serializedClientKeysSchema = z.intersection(
|
const serializedClientKeysSchema = z.intersection(
|
||||||
z.object({
|
z.object({
|
||||||
generator: z.literal("ArkVault"),
|
generator: z.literal("ArkVault"),
|
||||||
exportedAt: z.string().datetime(),
|
exportedAt: z.iso.datetime(),
|
||||||
}),
|
}),
|
||||||
z.object({
|
z.object({
|
||||||
version: z.literal(1),
|
version: z.literal(1),
|
||||||
encryptKey: z.string().base64().nonempty(),
|
encryptKey: z.base64().nonempty(),
|
||||||
decryptKey: z.string().base64().nonempty(),
|
decryptKey: z.base64().nonempty(),
|
||||||
signKey: z.string().base64().nonempty(),
|
signKey: z.base64().nonempty(),
|
||||||
verifyKey: z.string().base64().nonempty(),
|
verifyKey: z.base64().nonempty(),
|
||||||
}),
|
}),
|
||||||
);
|
);
|
||||||
|
|
||||||
|
|||||||
@@ -1,13 +1,5 @@
|
|||||||
let rootHandle: FileSystemDirectoryHandle | null = null;
|
|
||||||
|
|
||||||
export const prepareOpfs = async () => {
|
|
||||||
rootHandle = await navigator.storage.getDirectory();
|
|
||||||
};
|
|
||||||
|
|
||||||
const getFileHandle = async (path: string, create = true) => {
|
const getFileHandle = async (path: string, create = true) => {
|
||||||
if (!rootHandle) {
|
if (path[0] !== "/") {
|
||||||
throw new Error("OPFS not prepared");
|
|
||||||
} else if (path[0] !== "/") {
|
|
||||||
throw new Error("Path must be absolute");
|
throw new Error("Path must be absolute");
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -17,7 +9,7 @@ const getFileHandle = async (path: string, create = true) => {
|
|||||||
}
|
}
|
||||||
|
|
||||||
try {
|
try {
|
||||||
let directoryHandle = rootHandle;
|
let directoryHandle = await navigator.storage.getDirectory();
|
||||||
for (const part of parts.slice(0, -1)) {
|
for (const part of parts.slice(0, -1)) {
|
||||||
if (!part) continue;
|
if (!part) continue;
|
||||||
directoryHandle = await directoryHandle.getDirectoryHandle(part, { create });
|
directoryHandle = await directoryHandle.getDirectoryHandle(part, { create });
|
||||||
@@ -34,12 +26,15 @@ const getFileHandle = async (path: string, create = true) => {
|
|||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
export const readFile = async (path: string) => {
|
export const getFile = async (path: string) => {
|
||||||
const { fileHandle } = await getFileHandle(path, false);
|
const { fileHandle } = await getFileHandle(path, false);
|
||||||
if (!fileHandle) return null;
|
if (!fileHandle) return null;
|
||||||
|
|
||||||
const file = await fileHandle.getFile();
|
return await fileHandle.getFile();
|
||||||
return await file.arrayBuffer();
|
};
|
||||||
|
|
||||||
|
export const readFile = async (path: string) => {
|
||||||
|
return (await getFile(path))?.arrayBuffer() ?? null;
|
||||||
};
|
};
|
||||||
|
|
||||||
export const writeFile = async (path: string, data: ArrayBuffer) => {
|
export const writeFile = async (path: string, data: ArrayBuffer) => {
|
||||||
@@ -61,9 +56,7 @@ export const deleteFile = async (path: string) => {
|
|||||||
};
|
};
|
||||||
|
|
||||||
const getDirectoryHandle = async (path: string) => {
|
const getDirectoryHandle = async (path: string) => {
|
||||||
if (!rootHandle) {
|
if (path[0] !== "/") {
|
||||||
throw new Error("OPFS not prepared");
|
|
||||||
} else if (path[0] !== "/") {
|
|
||||||
throw new Error("Path must be absolute");
|
throw new Error("Path must be absolute");
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -73,7 +66,7 @@ const getDirectoryHandle = async (path: string) => {
|
|||||||
}
|
}
|
||||||
|
|
||||||
try {
|
try {
|
||||||
let directoryHandle = rootHandle;
|
let directoryHandle = await navigator.storage.getDirectory();
|
||||||
let parentHandle;
|
let parentHandle;
|
||||||
for (const part of parts.slice(1)) {
|
for (const part of parts.slice(1)) {
|
||||||
if (!part) continue;
|
if (!part) continue;
|
||||||
|
|||||||
48
src/lib/modules/scheduler.ts
Normal file
48
src/lib/modules/scheduler.ts
Normal file
@@ -0,0 +1,48 @@
|
|||||||
|
export class Scheduler<T = void> {
|
||||||
|
private isEstimating = false;
|
||||||
|
private memoryUsage = 0;
|
||||||
|
private queue: (() => void)[] = [];
|
||||||
|
|
||||||
|
constructor(public readonly memoryLimit = 100 * 1024 * 1024 /* 100 MiB */) {}
|
||||||
|
|
||||||
|
private next() {
|
||||||
|
if (!this.isEstimating && this.memoryUsage < this.memoryLimit) {
|
||||||
|
const resolve = this.queue.shift();
|
||||||
|
if (resolve) {
|
||||||
|
this.isEstimating = true;
|
||||||
|
resolve();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
async schedule(
|
||||||
|
estimateMemoryUsage: number | (() => number | Promise<number>),
|
||||||
|
task: () => Promise<T>,
|
||||||
|
) {
|
||||||
|
if (this.isEstimating || this.memoryUsage >= this.memoryLimit) {
|
||||||
|
await new Promise<void>((resolve) => {
|
||||||
|
this.queue.push(resolve);
|
||||||
|
});
|
||||||
|
} else {
|
||||||
|
this.isEstimating = true;
|
||||||
|
}
|
||||||
|
|
||||||
|
let taskMemoryUsage = 0;
|
||||||
|
|
||||||
|
try {
|
||||||
|
taskMemoryUsage =
|
||||||
|
typeof estimateMemoryUsage === "number" ? estimateMemoryUsage : await estimateMemoryUsage();
|
||||||
|
this.memoryUsage += taskMemoryUsage;
|
||||||
|
} finally {
|
||||||
|
this.isEstimating = false;
|
||||||
|
this.next();
|
||||||
|
}
|
||||||
|
|
||||||
|
try {
|
||||||
|
return await task();
|
||||||
|
} finally {
|
||||||
|
this.memoryUsage -= taskMemoryUsage;
|
||||||
|
this.next();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -2,8 +2,6 @@ import { IntegrityError } from "./error";
|
|||||||
import db from "./kysely";
|
import db from "./kysely";
|
||||||
import type { Ciphertext } from "./schema";
|
import type { Ciphertext } from "./schema";
|
||||||
|
|
||||||
export type CategoryId = "root" | number;
|
|
||||||
|
|
||||||
interface Category {
|
interface Category {
|
||||||
id: number;
|
id: number;
|
||||||
parentId: CategoryId;
|
parentId: CategoryId;
|
||||||
@@ -17,7 +15,7 @@ interface Category {
|
|||||||
export type NewCategory = Omit<Category, "id">;
|
export type NewCategory = Omit<Category, "id">;
|
||||||
|
|
||||||
export const registerCategory = async (params: NewCategory) => {
|
export const registerCategory = async (params: NewCategory) => {
|
||||||
return await db.transaction().execute(async (trx) => {
|
await db.transaction().execute(async (trx) => {
|
||||||
const mek = await trx
|
const mek = await trx
|
||||||
.selectFrom("master_encryption_key")
|
.selectFrom("master_encryption_key")
|
||||||
.select("version")
|
.select("version")
|
||||||
@@ -51,7 +49,6 @@ export const registerCategory = async (params: NewCategory) => {
|
|||||||
new_name: params.encName,
|
new_name: params.encName,
|
||||||
})
|
})
|
||||||
.execute();
|
.execute();
|
||||||
return { id: categoryId };
|
|
||||||
});
|
});
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|||||||
@@ -98,22 +98,6 @@ export const createUserClient = async (userId: number, clientId: number) => {
|
|||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
export const getAllUserClients = async (userId: number) => {
|
|
||||||
const userClients = await db
|
|
||||||
.selectFrom("user_client")
|
|
||||||
.selectAll()
|
|
||||||
.where("user_id", "=", userId)
|
|
||||||
.execute();
|
|
||||||
return userClients.map(
|
|
||||||
({ user_id, client_id, state }) =>
|
|
||||||
({
|
|
||||||
userId: user_id,
|
|
||||||
clientId: client_id,
|
|
||||||
state,
|
|
||||||
}) satisfies UserClient,
|
|
||||||
);
|
|
||||||
};
|
|
||||||
|
|
||||||
export const getUserClient = async (userId: number, clientId: number) => {
|
export const getUserClient = async (userId: number, clientId: number) => {
|
||||||
const userClient = await db
|
const userClient = await db
|
||||||
.selectFrom("user_client")
|
.selectFrom("user_client")
|
||||||
|
|||||||
@@ -1,11 +1,10 @@
|
|||||||
import { sql, type NotNull } from "kysely";
|
import { sql } from "kysely";
|
||||||
|
import { jsonArrayFrom } from "kysely/helpers/postgres";
|
||||||
import pg from "pg";
|
import pg from "pg";
|
||||||
import { IntegrityError } from "./error";
|
import { IntegrityError } from "./error";
|
||||||
import db from "./kysely";
|
import db from "./kysely";
|
||||||
import type { Ciphertext } from "./schema";
|
import type { Ciphertext } from "./schema";
|
||||||
|
|
||||||
export type DirectoryId = "root" | number;
|
|
||||||
|
|
||||||
interface Directory {
|
interface Directory {
|
||||||
id: number;
|
id: number;
|
||||||
parentId: DirectoryId;
|
parentId: DirectoryId;
|
||||||
@@ -16,8 +15,6 @@ interface Directory {
|
|||||||
encName: Ciphertext;
|
encName: Ciphertext;
|
||||||
}
|
}
|
||||||
|
|
||||||
export type NewDirectory = Omit<Directory, "id">;
|
|
||||||
|
|
||||||
interface File {
|
interface File {
|
||||||
id: number;
|
id: number;
|
||||||
parentId: DirectoryId;
|
parentId: DirectoryId;
|
||||||
@@ -29,17 +26,24 @@ interface File {
|
|||||||
hskVersion: number | null;
|
hskVersion: number | null;
|
||||||
contentHmac: string | null;
|
contentHmac: string | null;
|
||||||
contentType: string;
|
contentType: string;
|
||||||
encContentIv: string;
|
encContentIv: string | null;
|
||||||
encContentHash: string;
|
encContentHash: string;
|
||||||
encName: Ciphertext;
|
encName: Ciphertext;
|
||||||
encCreatedAt: Ciphertext | null;
|
encCreatedAt: Ciphertext | null;
|
||||||
encLastModifiedAt: Ciphertext;
|
encLastModifiedAt: Ciphertext;
|
||||||
}
|
}
|
||||||
|
|
||||||
export type NewFile = Omit<File, "id">;
|
interface FileCategory {
|
||||||
|
id: number;
|
||||||
|
parentId: CategoryId;
|
||||||
|
mekVersion: number;
|
||||||
|
encDek: string;
|
||||||
|
dekVersion: Date;
|
||||||
|
encName: Ciphertext;
|
||||||
|
}
|
||||||
|
|
||||||
export const registerDirectory = async (params: NewDirectory) => {
|
export const registerDirectory = async (params: Omit<Directory, "id">) => {
|
||||||
return await db.transaction().execute(async (trx) => {
|
await db.transaction().execute(async (trx) => {
|
||||||
const mek = await trx
|
const mek = await trx
|
||||||
.selectFrom("master_encryption_key")
|
.selectFrom("master_encryption_key")
|
||||||
.select("version")
|
.select("version")
|
||||||
@@ -73,7 +77,6 @@ export const registerDirectory = async (params: NewDirectory) => {
|
|||||||
new_name: params.encName,
|
new_name: params.encName,
|
||||||
})
|
})
|
||||||
.execute();
|
.execute();
|
||||||
return { id: directoryId };
|
|
||||||
});
|
});
|
||||||
};
|
};
|
||||||
|
|
||||||
@@ -181,10 +184,7 @@ export const unregisterDirectory = async (userId: number, directoryId: number) =
|
|||||||
};
|
};
|
||||||
const unregisterDirectoryRecursively = async (
|
const unregisterDirectoryRecursively = async (
|
||||||
directoryId: number,
|
directoryId: number,
|
||||||
): Promise<{
|
): Promise<{ id: number; path: string; thumbnailPath: string | null }[]> => {
|
||||||
subDirectories: { id: number }[];
|
|
||||||
files: { id: number; path: string; thumbnailPath: string | null }[];
|
|
||||||
}> => {
|
|
||||||
const files = await unregisterFiles(directoryId);
|
const files = await unregisterFiles(directoryId);
|
||||||
const subDirectories = await trx
|
const subDirectories = await trx
|
||||||
.selectFrom("directory")
|
.selectFrom("directory")
|
||||||
@@ -192,7 +192,7 @@ export const unregisterDirectory = async (userId: number, directoryId: number) =
|
|||||||
.where("parent_id", "=", directoryId)
|
.where("parent_id", "=", directoryId)
|
||||||
.where("user_id", "=", userId)
|
.where("user_id", "=", userId)
|
||||||
.execute();
|
.execute();
|
||||||
const subDirectoryEntries = await Promise.all(
|
const subDirectoryFilePaths = await Promise.all(
|
||||||
subDirectories.map(async ({ id }) => await unregisterDirectoryRecursively(id)),
|
subDirectories.map(async ({ id }) => await unregisterDirectoryRecursively(id)),
|
||||||
);
|
);
|
||||||
|
|
||||||
@@ -204,80 +204,47 @@ export const unregisterDirectory = async (userId: number, directoryId: number) =
|
|||||||
if (deleteRes.numDeletedRows === 0n) {
|
if (deleteRes.numDeletedRows === 0n) {
|
||||||
throw new IntegrityError("Directory not found");
|
throw new IntegrityError("Directory not found");
|
||||||
}
|
}
|
||||||
return {
|
return files.concat(...subDirectoryFilePaths);
|
||||||
subDirectories: subDirectoryEntries
|
|
||||||
.flatMap(({ subDirectories }) => subDirectories)
|
|
||||||
.concat(subDirectories),
|
|
||||||
files: subDirectoryEntries.flatMap(({ files }) => files).concat(files),
|
|
||||||
};
|
|
||||||
};
|
};
|
||||||
return await unregisterDirectoryRecursively(directoryId);
|
return await unregisterDirectoryRecursively(directoryId);
|
||||||
});
|
});
|
||||||
};
|
};
|
||||||
|
|
||||||
export const registerFile = async (params: NewFile) => {
|
export const registerFile = async (trx: typeof db, params: Omit<File, "id">) => {
|
||||||
if ((params.hskVersion && !params.contentHmac) || (!params.hskVersion && params.contentHmac)) {
|
if ((params.hskVersion && !params.contentHmac) || (!params.hskVersion && params.contentHmac)) {
|
||||||
throw new Error("Invalid arguments");
|
throw new Error("Invalid arguments");
|
||||||
}
|
}
|
||||||
|
|
||||||
return await db.transaction().execute(async (trx) => {
|
const { fileId } = await trx
|
||||||
const mek = await trx
|
.insertInto("file")
|
||||||
.selectFrom("master_encryption_key")
|
.values({
|
||||||
.select("version")
|
parent_id: params.parentId !== "root" ? params.parentId : null,
|
||||||
.where("user_id", "=", params.userId)
|
user_id: params.userId,
|
||||||
.where("state", "=", "active")
|
path: params.path,
|
||||||
.limit(1)
|
master_encryption_key_version: params.mekVersion,
|
||||||
.forUpdate()
|
encrypted_data_encryption_key: params.encDek,
|
||||||
.executeTakeFirst();
|
data_encryption_key_version: params.dekVersion,
|
||||||
if (mek?.version !== params.mekVersion) {
|
hmac_secret_key_version: params.hskVersion,
|
||||||
throw new IntegrityError("Inactive MEK version");
|
content_hmac: params.contentHmac,
|
||||||
}
|
content_type: params.contentType,
|
||||||
|
encrypted_content_iv: params.encContentIv,
|
||||||
if (params.hskVersion) {
|
encrypted_content_hash: params.encContentHash,
|
||||||
const hsk = await trx
|
encrypted_name: params.encName,
|
||||||
.selectFrom("hmac_secret_key")
|
encrypted_created_at: params.encCreatedAt,
|
||||||
.select("version")
|
encrypted_last_modified_at: params.encLastModifiedAt,
|
||||||
.where("user_id", "=", params.userId)
|
})
|
||||||
.where("state", "=", "active")
|
.returning("id as fileId")
|
||||||
.limit(1)
|
.executeTakeFirstOrThrow();
|
||||||
.forUpdate()
|
await trx
|
||||||
.executeTakeFirst();
|
.insertInto("file_log")
|
||||||
if (hsk?.version !== params.hskVersion) {
|
.values({
|
||||||
throw new IntegrityError("Inactive HSK version");
|
file_id: fileId,
|
||||||
}
|
timestamp: new Date(),
|
||||||
}
|
action: "create",
|
||||||
|
new_name: params.encName,
|
||||||
const { fileId } = await trx
|
})
|
||||||
.insertInto("file")
|
.execute();
|
||||||
.values({
|
return { id: fileId };
|
||||||
parent_id: params.parentId !== "root" ? params.parentId : null,
|
|
||||||
user_id: params.userId,
|
|
||||||
path: params.path,
|
|
||||||
master_encryption_key_version: params.mekVersion,
|
|
||||||
encrypted_data_encryption_key: params.encDek,
|
|
||||||
data_encryption_key_version: params.dekVersion,
|
|
||||||
hmac_secret_key_version: params.hskVersion,
|
|
||||||
content_hmac: params.contentHmac,
|
|
||||||
content_type: params.contentType,
|
|
||||||
encrypted_content_iv: params.encContentIv,
|
|
||||||
encrypted_content_hash: params.encContentHash,
|
|
||||||
encrypted_name: params.encName,
|
|
||||||
encrypted_created_at: params.encCreatedAt,
|
|
||||||
encrypted_last_modified_at: params.encLastModifiedAt,
|
|
||||||
})
|
|
||||||
.returning("id as fileId")
|
|
||||||
.executeTakeFirstOrThrow();
|
|
||||||
await trx
|
|
||||||
.insertInto("file_log")
|
|
||||||
.values({
|
|
||||||
file_id: fileId,
|
|
||||||
timestamp: new Date(),
|
|
||||||
action: "create",
|
|
||||||
new_name: params.encName,
|
|
||||||
})
|
|
||||||
.execute();
|
|
||||||
return { id: fileId };
|
|
||||||
});
|
|
||||||
};
|
};
|
||||||
|
|
||||||
export const getAllFilesByParent = async (userId: number, parentId: DirectoryId) => {
|
export const getAllFilesByParent = async (userId: number, parentId: DirectoryId) => {
|
||||||
@@ -315,39 +282,51 @@ export const getAllFilesByCategory = async (
|
|||||||
recurse: boolean,
|
recurse: boolean,
|
||||||
) => {
|
) => {
|
||||||
const files = await db
|
const files = await db
|
||||||
.withRecursive("cte", (db) =>
|
.withRecursive("category_tree", (db) =>
|
||||||
db
|
db
|
||||||
.selectFrom("category")
|
.selectFrom("category")
|
||||||
.leftJoin("file_category", "category.id", "file_category.category_id")
|
.select(["id", sql<number>`0`.as("depth")])
|
||||||
.select(["id", "parent_id", "user_id", "file_category.file_id"])
|
|
||||||
.select(sql<number>`0`.as("depth"))
|
|
||||||
.where("id", "=", categoryId)
|
.where("id", "=", categoryId)
|
||||||
|
.where("user_id", "=", userId)
|
||||||
.$if(recurse, (qb) =>
|
.$if(recurse, (qb) =>
|
||||||
qb.unionAll((db) =>
|
qb.unionAll((db) =>
|
||||||
db
|
db
|
||||||
.selectFrom("category")
|
.selectFrom("category")
|
||||||
.leftJoin("file_category", "category.id", "file_category.category_id")
|
.innerJoin("category_tree", "category.parent_id", "category_tree.id")
|
||||||
.innerJoin("cte", "category.parent_id", "cte.id")
|
.select(["category.id", sql<number>`depth + 1`.as("depth")]),
|
||||||
.select([
|
|
||||||
"category.id",
|
|
||||||
"category.parent_id",
|
|
||||||
"category.user_id",
|
|
||||||
"file_category.file_id",
|
|
||||||
])
|
|
||||||
.select(sql<number>`cte.depth + 1`.as("depth")),
|
|
||||||
),
|
),
|
||||||
),
|
),
|
||||||
)
|
)
|
||||||
.selectFrom("cte")
|
.selectFrom("category_tree")
|
||||||
|
.innerJoin("file_category", "category_tree.id", "file_category.category_id")
|
||||||
|
.innerJoin("file", "file_category.file_id", "file.id")
|
||||||
.select(["file_id", "depth"])
|
.select(["file_id", "depth"])
|
||||||
|
.selectAll("file")
|
||||||
.distinctOn("file_id")
|
.distinctOn("file_id")
|
||||||
.where("user_id", "=", userId)
|
|
||||||
.where("file_id", "is not", null)
|
|
||||||
.$narrowType<{ file_id: NotNull }>()
|
|
||||||
.orderBy("file_id")
|
.orderBy("file_id")
|
||||||
.orderBy("depth")
|
.orderBy("depth")
|
||||||
.execute();
|
.execute();
|
||||||
return files.map(({ file_id, depth }) => ({ id: file_id, isRecursive: depth > 0 }));
|
return files.map(
|
||||||
|
(file) =>
|
||||||
|
({
|
||||||
|
id: file.file_id,
|
||||||
|
parentId: file.parent_id ?? "root",
|
||||||
|
userId: file.user_id,
|
||||||
|
path: file.path,
|
||||||
|
mekVersion: file.master_encryption_key_version,
|
||||||
|
encDek: file.encrypted_data_encryption_key,
|
||||||
|
dekVersion: file.data_encryption_key_version,
|
||||||
|
hskVersion: file.hmac_secret_key_version,
|
||||||
|
contentHmac: file.content_hmac,
|
||||||
|
contentType: file.content_type,
|
||||||
|
encContentIv: file.encrypted_content_iv,
|
||||||
|
encContentHash: file.encrypted_content_hash,
|
||||||
|
encName: file.encrypted_name,
|
||||||
|
encCreatedAt: file.encrypted_created_at,
|
||||||
|
encLastModifiedAt: file.encrypted_last_modified_at,
|
||||||
|
isRecursive: file.depth > 0,
|
||||||
|
}) satisfies File & { isRecursive: boolean },
|
||||||
|
);
|
||||||
};
|
};
|
||||||
|
|
||||||
export const getAllFileIds = async (userId: number) => {
|
export const getAllFileIds = async (userId: number) => {
|
||||||
@@ -399,6 +378,52 @@ export const getFile = async (userId: number, fileId: number) => {
|
|||||||
: null;
|
: null;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
export const getFilesWithCategories = async (userId: number, fileIds: number[]) => {
|
||||||
|
const files = await db
|
||||||
|
.selectFrom("file")
|
||||||
|
.selectAll()
|
||||||
|
.select((eb) =>
|
||||||
|
jsonArrayFrom(
|
||||||
|
eb
|
||||||
|
.selectFrom("file_category")
|
||||||
|
.innerJoin("category", "file_category.category_id", "category.id")
|
||||||
|
.where("file_category.file_id", "=", eb.ref("file.id"))
|
||||||
|
.selectAll("category"),
|
||||||
|
).as("categories"),
|
||||||
|
)
|
||||||
|
.where("id", "=", (eb) => eb.fn.any(eb.val(fileIds)))
|
||||||
|
.where("user_id", "=", userId)
|
||||||
|
.execute();
|
||||||
|
return files.map(
|
||||||
|
(file) =>
|
||||||
|
({
|
||||||
|
id: file.id,
|
||||||
|
parentId: file.parent_id ?? "root",
|
||||||
|
userId: file.user_id,
|
||||||
|
path: file.path,
|
||||||
|
mekVersion: file.master_encryption_key_version,
|
||||||
|
encDek: file.encrypted_data_encryption_key,
|
||||||
|
dekVersion: file.data_encryption_key_version,
|
||||||
|
hskVersion: file.hmac_secret_key_version,
|
||||||
|
contentHmac: file.content_hmac,
|
||||||
|
contentType: file.content_type,
|
||||||
|
encContentIv: file.encrypted_content_iv,
|
||||||
|
encContentHash: file.encrypted_content_hash,
|
||||||
|
encName: file.encrypted_name,
|
||||||
|
encCreatedAt: file.encrypted_created_at,
|
||||||
|
encLastModifiedAt: file.encrypted_last_modified_at,
|
||||||
|
categories: file.categories.map((category) => ({
|
||||||
|
id: category.id,
|
||||||
|
parentId: category.parent_id ?? "root",
|
||||||
|
mekVersion: category.master_encryption_key_version,
|
||||||
|
encDek: category.encrypted_data_encryption_key,
|
||||||
|
dekVersion: new Date(category.data_encryption_key_version),
|
||||||
|
encName: category.encrypted_name,
|
||||||
|
})),
|
||||||
|
}) satisfies File & { categories: FileCategory[] },
|
||||||
|
);
|
||||||
|
};
|
||||||
|
|
||||||
export const setFileEncName = async (
|
export const setFileEncName = async (
|
||||||
userId: number,
|
userId: number,
|
||||||
fileId: number,
|
fileId: number,
|
||||||
@@ -485,10 +510,21 @@ export const addFileToCategory = async (fileId: number, categoryId: number) => {
|
|||||||
export const getAllFileCategories = async (fileId: number) => {
|
export const getAllFileCategories = async (fileId: number) => {
|
||||||
const categories = await db
|
const categories = await db
|
||||||
.selectFrom("file_category")
|
.selectFrom("file_category")
|
||||||
.select("category_id")
|
.innerJoin("category", "file_category.category_id", "category.id")
|
||||||
|
.selectAll("category")
|
||||||
.where("file_id", "=", fileId)
|
.where("file_id", "=", fileId)
|
||||||
.execute();
|
.execute();
|
||||||
return categories.map(({ category_id }) => ({ id: category_id }));
|
return categories.map(
|
||||||
|
(category) =>
|
||||||
|
({
|
||||||
|
id: category.id,
|
||||||
|
parentId: category.parent_id ?? "root",
|
||||||
|
mekVersion: category.master_encryption_key_version,
|
||||||
|
encDek: category.encrypted_data_encryption_key,
|
||||||
|
dekVersion: category.data_encryption_key_version,
|
||||||
|
encName: category.encrypted_name,
|
||||||
|
}) satisfies FileCategory,
|
||||||
|
);
|
||||||
};
|
};
|
||||||
|
|
||||||
export const removeFileFromCategory = async (fileId: number, categoryId: number) => {
|
export const removeFileFromCategory = async (fileId: number, categoryId: number) => {
|
||||||
|
|||||||
11
src/lib/server/db/index.ts
Normal file
11
src/lib/server/db/index.ts
Normal file
@@ -0,0 +1,11 @@
|
|||||||
|
export * as CategoryRepo from "./category";
|
||||||
|
export * as ClientRepo from "./client";
|
||||||
|
export * as FileRepo from "./file";
|
||||||
|
export * as HskRepo from "./hsk";
|
||||||
|
export * as MediaRepo from "./media";
|
||||||
|
export * as MekRepo from "./mek";
|
||||||
|
export * as SessionRepo from "./session";
|
||||||
|
export * as UploadRepo from "./upload";
|
||||||
|
export * as UserRepo from "./user";
|
||||||
|
|
||||||
|
export * from "./error";
|
||||||
@@ -60,19 +60,6 @@ export const registerInitialMek = async (
|
|||||||
});
|
});
|
||||||
};
|
};
|
||||||
|
|
||||||
export const getInitialMek = async (userId: number) => {
|
|
||||||
const mek = await db
|
|
||||||
.selectFrom("master_encryption_key")
|
|
||||||
.selectAll()
|
|
||||||
.where("user_id", "=", userId)
|
|
||||||
.where("version", "=", 1)
|
|
||||||
.limit(1)
|
|
||||||
.executeTakeFirst();
|
|
||||||
return mek
|
|
||||||
? ({ userId: mek.user_id, version: mek.version, state: mek.state } satisfies Mek)
|
|
||||||
: null;
|
|
||||||
};
|
|
||||||
|
|
||||||
export const getAllValidClientMeks = async (userId: number, clientId: number) => {
|
export const getAllValidClientMeks = async (userId: number, clientId: number) => {
|
||||||
const clientMeks = await db
|
const clientMeks = await db
|
||||||
.selectFrom("client_master_encryption_key")
|
.selectFrom("client_master_encryption_key")
|
||||||
|
|||||||
50
src/lib/server/db/migrations/1768062380-AddChunkedUpload.ts
Normal file
50
src/lib/server/db/migrations/1768062380-AddChunkedUpload.ts
Normal file
@@ -0,0 +1,50 @@
|
|||||||
|
import { Kysely, sql } from "kysely";
|
||||||
|
|
||||||
|
// eslint-disable-next-line @typescript-eslint/no-explicit-any
|
||||||
|
export const up = async (db: Kysely<any>) => {
|
||||||
|
// file.ts
|
||||||
|
await db.schema
|
||||||
|
.alterTable("file")
|
||||||
|
.alterColumn("encrypted_content_iv", (col) => col.dropNotNull())
|
||||||
|
.execute();
|
||||||
|
|
||||||
|
// upload.ts
|
||||||
|
await db.schema
|
||||||
|
.createTable("upload_session")
|
||||||
|
.addColumn("id", "uuid", (col) => col.primaryKey().defaultTo(sql`gen_random_uuid()`))
|
||||||
|
.addColumn("user_id", "integer", (col) => col.references("user.id").notNull())
|
||||||
|
.addColumn("total_chunks", "integer", (col) => col.notNull())
|
||||||
|
.addColumn("uploaded_chunks", sql`integer[]`, (col) => col.notNull().defaultTo(sql`'{}'`))
|
||||||
|
.addColumn("expires_at", "timestamp(3)", (col) => col.notNull())
|
||||||
|
.addColumn("parent_id", "integer", (col) => col.references("directory.id"))
|
||||||
|
.addColumn("master_encryption_key_version", "integer", (col) => col.notNull())
|
||||||
|
.addColumn("encrypted_data_encryption_key", "text", (col) => col.notNull())
|
||||||
|
.addColumn("data_encryption_key_version", "timestamp(3)", (col) => col.notNull())
|
||||||
|
.addColumn("hmac_secret_key_version", "integer")
|
||||||
|
.addColumn("content_type", "text", (col) => col.notNull())
|
||||||
|
.addColumn("encrypted_name", "json", (col) => col.notNull())
|
||||||
|
.addColumn("encrypted_created_at", "json")
|
||||||
|
.addColumn("encrypted_last_modified_at", "json", (col) => col.notNull())
|
||||||
|
.addForeignKeyConstraint(
|
||||||
|
"upload_session_fk01",
|
||||||
|
["user_id", "master_encryption_key_version"],
|
||||||
|
"master_encryption_key",
|
||||||
|
["user_id", "version"],
|
||||||
|
)
|
||||||
|
.addForeignKeyConstraint(
|
||||||
|
"upload_session_fk02",
|
||||||
|
["user_id", "hmac_secret_key_version"],
|
||||||
|
"hmac_secret_key",
|
||||||
|
["user_id", "version"],
|
||||||
|
)
|
||||||
|
.execute();
|
||||||
|
};
|
||||||
|
|
||||||
|
// eslint-disable-next-line @typescript-eslint/no-explicit-any
|
||||||
|
export const down = async (db: Kysely<any>) => {
|
||||||
|
await db.schema.dropTable("upload_session").execute();
|
||||||
|
await db.schema
|
||||||
|
.alterTable("file")
|
||||||
|
.alterColumn("encrypted_content_iv", (col) => col.setNotNull())
|
||||||
|
.execute();
|
||||||
|
};
|
||||||
@@ -1,9 +1,11 @@
|
|||||||
import * as Initial1737357000 from "./1737357000-Initial";
|
import * as Initial1737357000 from "./1737357000-Initial";
|
||||||
import * as AddFileCategory1737422340 from "./1737422340-AddFileCategory";
|
import * as AddFileCategory1737422340 from "./1737422340-AddFileCategory";
|
||||||
import * as AddThumbnail1738409340 from "./1738409340-AddThumbnail";
|
import * as AddThumbnail1738409340 from "./1738409340-AddThumbnail";
|
||||||
|
import * as AddChunkedUpload1768062380 from "./1768062380-AddChunkedUpload";
|
||||||
|
|
||||||
export default {
|
export default {
|
||||||
"1737357000-Initial": Initial1737357000,
|
"1737357000-Initial": Initial1737357000,
|
||||||
"1737422340-AddFileCategory": AddFileCategory1737422340,
|
"1737422340-AddFileCategory": AddFileCategory1737422340,
|
||||||
"1738409340-AddThumbnail": AddThumbnail1738409340,
|
"1738409340-AddThumbnail": AddThumbnail1738409340,
|
||||||
|
"1768062380-AddChunkedUpload": AddChunkedUpload1768062380,
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -30,7 +30,7 @@ interface FileTable {
|
|||||||
hmac_secret_key_version: number | null;
|
hmac_secret_key_version: number | null;
|
||||||
content_hmac: string | null; // Base64
|
content_hmac: string | null; // Base64
|
||||||
content_type: string;
|
content_type: string;
|
||||||
encrypted_content_iv: string; // Base64
|
encrypted_content_iv: string | null; // Base64
|
||||||
encrypted_content_hash: string; // Base64
|
encrypted_content_hash: string; // Base64
|
||||||
encrypted_name: Ciphertext;
|
encrypted_name: Ciphertext;
|
||||||
encrypted_created_at: Ciphertext | null;
|
encrypted_created_at: Ciphertext | null;
|
||||||
|
|||||||
@@ -5,6 +5,7 @@ export * from "./hsk";
|
|||||||
export * from "./media";
|
export * from "./media";
|
||||||
export * from "./mek";
|
export * from "./mek";
|
||||||
export * from "./session";
|
export * from "./session";
|
||||||
|
export * from "./upload";
|
||||||
export * from "./user";
|
export * from "./user";
|
||||||
export * from "./util";
|
export * from "./util";
|
||||||
|
|
||||||
|
|||||||
26
src/lib/server/db/schema/upload.ts
Normal file
26
src/lib/server/db/schema/upload.ts
Normal file
@@ -0,0 +1,26 @@
|
|||||||
|
import type { Generated } from "kysely";
|
||||||
|
import type { Ciphertext } from "./util";
|
||||||
|
|
||||||
|
interface UploadSessionTable {
|
||||||
|
id: Generated<string>;
|
||||||
|
user_id: number;
|
||||||
|
total_chunks: number;
|
||||||
|
uploaded_chunks: Generated<number[]>;
|
||||||
|
expires_at: Date;
|
||||||
|
|
||||||
|
parent_id: number | null;
|
||||||
|
master_encryption_key_version: number;
|
||||||
|
encrypted_data_encryption_key: string; // Base64
|
||||||
|
data_encryption_key_version: Date;
|
||||||
|
hmac_secret_key_version: number | null;
|
||||||
|
content_type: string;
|
||||||
|
encrypted_name: Ciphertext;
|
||||||
|
encrypted_created_at: Ciphertext | null;
|
||||||
|
encrypted_last_modified_at: Ciphertext;
|
||||||
|
}
|
||||||
|
|
||||||
|
declare module "./index" {
|
||||||
|
interface Database {
|
||||||
|
upload_session: UploadSessionTable;
|
||||||
|
}
|
||||||
|
}
|
||||||
122
src/lib/server/db/upload.ts
Normal file
122
src/lib/server/db/upload.ts
Normal file
@@ -0,0 +1,122 @@
|
|||||||
|
import { sql } from "kysely";
|
||||||
|
import { IntegrityError } from "./error";
|
||||||
|
import db from "./kysely";
|
||||||
|
import type { Ciphertext } from "./schema";
|
||||||
|
|
||||||
|
interface UploadSession {
|
||||||
|
id: string;
|
||||||
|
userId: number;
|
||||||
|
totalChunks: number;
|
||||||
|
uploadedChunks: number[];
|
||||||
|
expiresAt: Date;
|
||||||
|
|
||||||
|
parentId: DirectoryId;
|
||||||
|
mekVersion: number;
|
||||||
|
encDek: string;
|
||||||
|
dekVersion: Date;
|
||||||
|
hskVersion: number | null;
|
||||||
|
contentType: string;
|
||||||
|
encName: Ciphertext;
|
||||||
|
encCreatedAt: Ciphertext | null;
|
||||||
|
encLastModifiedAt: Ciphertext;
|
||||||
|
}
|
||||||
|
|
||||||
|
export const createUploadSession = async (params: Omit<UploadSession, "id" | "uploadedChunks">) => {
|
||||||
|
return await db.transaction().execute(async (trx) => {
|
||||||
|
const mek = await trx
|
||||||
|
.selectFrom("master_encryption_key")
|
||||||
|
.select("version")
|
||||||
|
.where("user_id", "=", params.userId)
|
||||||
|
.where("state", "=", "active")
|
||||||
|
.limit(1)
|
||||||
|
.forUpdate()
|
||||||
|
.executeTakeFirst();
|
||||||
|
if (mek?.version !== params.mekVersion) {
|
||||||
|
throw new IntegrityError("Inactive MEK version");
|
||||||
|
}
|
||||||
|
|
||||||
|
if (params.hskVersion) {
|
||||||
|
const hsk = await trx
|
||||||
|
.selectFrom("hmac_secret_key")
|
||||||
|
.select("version")
|
||||||
|
.where("user_id", "=", params.userId)
|
||||||
|
.where("state", "=", "active")
|
||||||
|
.limit(1)
|
||||||
|
.forUpdate()
|
||||||
|
.executeTakeFirst();
|
||||||
|
if (hsk?.version !== params.hskVersion) {
|
||||||
|
throw new IntegrityError("Inactive HSK version");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
const { sessionId } = await trx
|
||||||
|
.insertInto("upload_session")
|
||||||
|
.values({
|
||||||
|
user_id: params.userId,
|
||||||
|
total_chunks: params.totalChunks,
|
||||||
|
expires_at: params.expiresAt,
|
||||||
|
parent_id: params.parentId !== "root" ? params.parentId : null,
|
||||||
|
master_encryption_key_version: params.mekVersion,
|
||||||
|
encrypted_data_encryption_key: params.encDek,
|
||||||
|
data_encryption_key_version: params.dekVersion,
|
||||||
|
hmac_secret_key_version: params.hskVersion,
|
||||||
|
content_type: params.contentType,
|
||||||
|
encrypted_name: params.encName,
|
||||||
|
encrypted_created_at: params.encCreatedAt,
|
||||||
|
encrypted_last_modified_at: params.encLastModifiedAt,
|
||||||
|
})
|
||||||
|
.returning("id as sessionId")
|
||||||
|
.executeTakeFirstOrThrow();
|
||||||
|
return { id: sessionId };
|
||||||
|
});
|
||||||
|
};
|
||||||
|
|
||||||
|
export const getUploadSession = async (sessionId: string, userId: number) => {
|
||||||
|
const session = await db
|
||||||
|
.selectFrom("upload_session")
|
||||||
|
.selectAll()
|
||||||
|
.where("id", "=", sessionId)
|
||||||
|
.where("user_id", "=", userId)
|
||||||
|
.where("expires_at", ">", new Date())
|
||||||
|
.limit(1)
|
||||||
|
.executeTakeFirst();
|
||||||
|
return session
|
||||||
|
? ({
|
||||||
|
id: session.id,
|
||||||
|
userId: session.user_id,
|
||||||
|
totalChunks: session.total_chunks,
|
||||||
|
uploadedChunks: session.uploaded_chunks,
|
||||||
|
expiresAt: session.expires_at,
|
||||||
|
parentId: session.parent_id ?? "root",
|
||||||
|
mekVersion: session.master_encryption_key_version,
|
||||||
|
encDek: session.encrypted_data_encryption_key,
|
||||||
|
dekVersion: session.data_encryption_key_version,
|
||||||
|
hskVersion: session.hmac_secret_key_version,
|
||||||
|
contentType: session.content_type,
|
||||||
|
encName: session.encrypted_name,
|
||||||
|
encCreatedAt: session.encrypted_created_at,
|
||||||
|
encLastModifiedAt: session.encrypted_last_modified_at,
|
||||||
|
} satisfies UploadSession)
|
||||||
|
: null;
|
||||||
|
};
|
||||||
|
|
||||||
|
export const markChunkAsUploaded = async (sessionId: string, chunkIndex: number) => {
|
||||||
|
await db
|
||||||
|
.updateTable("upload_session")
|
||||||
|
.set({ uploaded_chunks: sql`array_append(uploaded_chunks, ${chunkIndex})` })
|
||||||
|
.where("id", "=", sessionId)
|
||||||
|
.execute();
|
||||||
|
};
|
||||||
|
|
||||||
|
export const deleteUploadSession = async (trx: typeof db, sessionId: string) => {
|
||||||
|
await trx.deleteFrom("upload_session").where("id", "=", sessionId).execute();
|
||||||
|
};
|
||||||
|
|
||||||
|
export const cleanupExpiredUploadSessions = async () => {
|
||||||
|
const sessions = await db
|
||||||
|
.deleteFrom("upload_session")
|
||||||
|
.where("expires_at", "<", new Date())
|
||||||
|
.returning("id")
|
||||||
|
.execute();
|
||||||
|
return sessions.map(({ id }) => id);
|
||||||
|
};
|
||||||
@@ -27,10 +27,6 @@ export const getUserByEmail = async (email: string) => {
|
|||||||
return user ? (user satisfies User) : null;
|
return user ? (user satisfies User) : null;
|
||||||
};
|
};
|
||||||
|
|
||||||
export const setUserNickname = async (userId: number, nickname: string) => {
|
|
||||||
await db.updateTable("user").set({ nickname }).where("id", "=", userId).execute();
|
|
||||||
};
|
|
||||||
|
|
||||||
export const setUserPassword = async (userId: number, password: string) => {
|
export const setUserPassword = async (userId: number, password: string) => {
|
||||||
await db.updateTable("user").set({ password }).where("id", "=", userId).execute();
|
await db.updateTable("user").set({ password }).where("id", "=", userId).execute();
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -26,4 +26,5 @@ export default {
|
|||||||
},
|
},
|
||||||
libraryPath: env.LIBRARY_PATH || "library",
|
libraryPath: env.LIBRARY_PATH || "library",
|
||||||
thumbnailsPath: env.THUMBNAILS_PATH || "thumbnails",
|
thumbnailsPath: env.THUMBNAILS_PATH || "thumbnails",
|
||||||
|
uploadsPath: env.UPLOADS_PATH || "uploads",
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -1,13 +1,7 @@
|
|||||||
import { error, redirect, type Handle } from "@sveltejs/kit";
|
import { error, redirect, type Handle } from "@sveltejs/kit";
|
||||||
import env from "$lib/server/loadenv";
|
import { cookieOptions, authenticate, AuthenticationError } from "$lib/server/modules/auth";
|
||||||
import { authenticate, AuthenticationError } from "$lib/server/modules/auth";
|
|
||||||
|
|
||||||
export const authenticateMiddleware: Handle = async ({ event, resolve }) => {
|
export const authenticateMiddleware: Handle = async ({ event, resolve }) => {
|
||||||
const { pathname, search } = event.url;
|
|
||||||
if (pathname === "/api/auth/login") {
|
|
||||||
return await resolve(event);
|
|
||||||
}
|
|
||||||
|
|
||||||
try {
|
try {
|
||||||
const sessionIdSigned = event.cookies.get("sessionId");
|
const sessionIdSigned = event.cookies.get("sessionId");
|
||||||
if (!sessionIdSigned) {
|
if (!sessionIdSigned) {
|
||||||
@@ -16,15 +10,11 @@ export const authenticateMiddleware: Handle = async ({ event, resolve }) => {
|
|||||||
|
|
||||||
const { ip, userAgent } = event.locals;
|
const { ip, userAgent } = event.locals;
|
||||||
event.locals.session = await authenticate(sessionIdSigned, ip, userAgent);
|
event.locals.session = await authenticate(sessionIdSigned, ip, userAgent);
|
||||||
event.cookies.set("sessionId", sessionIdSigned, {
|
event.cookies.set("sessionId", sessionIdSigned, cookieOptions);
|
||||||
path: "/",
|
|
||||||
maxAge: env.session.exp / 1000,
|
|
||||||
secure: true,
|
|
||||||
sameSite: "strict",
|
|
||||||
});
|
|
||||||
} catch (e) {
|
} catch (e) {
|
||||||
if (e instanceof AuthenticationError) {
|
if (e instanceof AuthenticationError) {
|
||||||
if (pathname === "/auth/login") {
|
const { pathname, search } = event.url;
|
||||||
|
if (pathname === "/auth/login" || pathname.startsWith("/api/trpc")) {
|
||||||
return await resolve(event);
|
return await resolve(event);
|
||||||
} else if (pathname.startsWith("/api")) {
|
} else if (pathname.startsWith("/api")) {
|
||||||
error(e.status, e.message);
|
error(e.status, e.message);
|
||||||
|
|||||||
@@ -1,20 +1,25 @@
|
|||||||
import { error } from "@sveltejs/kit";
|
import { error } from "@sveltejs/kit";
|
||||||
import { getUserClient } from "$lib/server/db/client";
|
import { ClientRepo, SessionRepo, IntegrityError } from "$lib/server/db";
|
||||||
import { IntegrityError } from "$lib/server/db/error";
|
|
||||||
import { createSession, refreshSession } from "$lib/server/db/session";
|
|
||||||
import env from "$lib/server/loadenv";
|
import env from "$lib/server/loadenv";
|
||||||
import { issueSessionId, verifySessionId } from "$lib/server/modules/crypto";
|
import { verifySessionId } from "$lib/server/modules/crypto";
|
||||||
|
|
||||||
interface Session {
|
export interface Session {
|
||||||
sessionId: string;
|
sessionId: string;
|
||||||
userId: number;
|
userId: number;
|
||||||
clientId?: number;
|
clientId?: number;
|
||||||
}
|
}
|
||||||
|
|
||||||
interface ClientSession extends Session {
|
export interface ClientSession extends Session {
|
||||||
clientId: number;
|
clientId: number;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
export type SessionPermission =
|
||||||
|
| "any"
|
||||||
|
| "notClient"
|
||||||
|
| "anyClient"
|
||||||
|
| "pendingClient"
|
||||||
|
| "activeClient";
|
||||||
|
|
||||||
export class AuthenticationError extends Error {
|
export class AuthenticationError extends Error {
|
||||||
constructor(
|
constructor(
|
||||||
public status: 400 | 401,
|
public status: 400 | 401,
|
||||||
@@ -25,11 +30,22 @@ export class AuthenticationError extends Error {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
export const startSession = async (userId: number, ip: string, userAgent: string) => {
|
export class AuthorizationError extends Error {
|
||||||
const { sessionId, sessionIdSigned } = await issueSessionId(32, env.session.secret);
|
constructor(
|
||||||
await createSession(userId, sessionId, ip, userAgent);
|
public status: 403 | 500,
|
||||||
return sessionIdSigned;
|
message: string,
|
||||||
};
|
) {
|
||||||
|
super(message);
|
||||||
|
this.name = "AuthorizationError";
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
export const cookieOptions = {
|
||||||
|
path: "/",
|
||||||
|
maxAge: env.session.exp / 1000,
|
||||||
|
secure: true,
|
||||||
|
sameSite: "strict",
|
||||||
|
} as const;
|
||||||
|
|
||||||
export const authenticate = async (sessionIdSigned: string, ip: string, userAgent: string) => {
|
export const authenticate = async (sessionIdSigned: string, ip: string, userAgent: string) => {
|
||||||
const sessionId = verifySessionId(sessionIdSigned, env.session.secret);
|
const sessionId = verifySessionId(sessionIdSigned, env.session.secret);
|
||||||
@@ -38,7 +54,7 @@ export const authenticate = async (sessionIdSigned: string, ip: string, userAgen
|
|||||||
}
|
}
|
||||||
|
|
||||||
try {
|
try {
|
||||||
const { userId, clientId } = await refreshSession(sessionId, ip, userAgent);
|
const { userId, clientId } = await SessionRepo.refreshSession(sessionId, ip, userAgent);
|
||||||
return {
|
return {
|
||||||
id: sessionId,
|
id: sessionId,
|
||||||
userId,
|
userId,
|
||||||
@@ -52,34 +68,12 @@ export const authenticate = async (sessionIdSigned: string, ip: string, userAgen
|
|||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
export async function authorize(locals: App.Locals, requiredPermission: "any"): Promise<Session>;
|
export const authorizeInternal = async (
|
||||||
|
|
||||||
export async function authorize(
|
|
||||||
locals: App.Locals,
|
locals: App.Locals,
|
||||||
requiredPermission: "notClient",
|
requiredPermission: SessionPermission,
|
||||||
): Promise<Session>;
|
): Promise<Session> => {
|
||||||
|
|
||||||
export async function authorize(
|
|
||||||
locals: App.Locals,
|
|
||||||
requiredPermission: "anyClient",
|
|
||||||
): Promise<ClientSession>;
|
|
||||||
|
|
||||||
export async function authorize(
|
|
||||||
locals: App.Locals,
|
|
||||||
requiredPermission: "pendingClient",
|
|
||||||
): Promise<ClientSession>;
|
|
||||||
|
|
||||||
export async function authorize(
|
|
||||||
locals: App.Locals,
|
|
||||||
requiredPermission: "activeClient",
|
|
||||||
): Promise<ClientSession>;
|
|
||||||
|
|
||||||
export async function authorize(
|
|
||||||
locals: App.Locals,
|
|
||||||
requiredPermission: "any" | "notClient" | "anyClient" | "pendingClient" | "activeClient",
|
|
||||||
): Promise<Session> {
|
|
||||||
if (!locals.session) {
|
if (!locals.session) {
|
||||||
error(500, "Unauthenticated");
|
throw new AuthorizationError(500, "Unauthenticated");
|
||||||
}
|
}
|
||||||
|
|
||||||
const { id: sessionId, userId, clientId } = locals.session;
|
const { id: sessionId, userId, clientId } = locals.session;
|
||||||
@@ -89,39 +83,63 @@ export async function authorize(
|
|||||||
break;
|
break;
|
||||||
case "notClient":
|
case "notClient":
|
||||||
if (clientId) {
|
if (clientId) {
|
||||||
error(403, "Forbidden");
|
throw new AuthorizationError(403, "Forbidden");
|
||||||
}
|
}
|
||||||
break;
|
break;
|
||||||
case "anyClient":
|
case "anyClient":
|
||||||
if (!clientId) {
|
if (!clientId) {
|
||||||
error(403, "Forbidden");
|
throw new AuthorizationError(403, "Forbidden");
|
||||||
}
|
}
|
||||||
break;
|
break;
|
||||||
case "pendingClient": {
|
case "pendingClient": {
|
||||||
if (!clientId) {
|
if (!clientId) {
|
||||||
error(403, "Forbidden");
|
throw new AuthorizationError(403, "Forbidden");
|
||||||
}
|
}
|
||||||
const userClient = await getUserClient(userId, clientId);
|
const userClient = await ClientRepo.getUserClient(userId, clientId);
|
||||||
if (!userClient) {
|
if (!userClient) {
|
||||||
error(500, "Invalid session id");
|
throw new AuthorizationError(500, "Invalid session id");
|
||||||
} else if (userClient.state !== "pending") {
|
} else if (userClient.state !== "pending") {
|
||||||
error(403, "Forbidden");
|
throw new AuthorizationError(403, "Forbidden");
|
||||||
}
|
}
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
case "activeClient": {
|
case "activeClient": {
|
||||||
if (!clientId) {
|
if (!clientId) {
|
||||||
error(403, "Forbidden");
|
throw new AuthorizationError(403, "Forbidden");
|
||||||
}
|
}
|
||||||
const userClient = await getUserClient(userId, clientId);
|
const userClient = await ClientRepo.getUserClient(userId, clientId);
|
||||||
if (!userClient) {
|
if (!userClient) {
|
||||||
error(500, "Invalid session id");
|
throw new AuthorizationError(500, "Invalid session id");
|
||||||
} else if (userClient.state !== "active") {
|
} else if (userClient.state !== "active") {
|
||||||
error(403, "Forbidden");
|
throw new AuthorizationError(403, "Forbidden");
|
||||||
}
|
}
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
return { sessionId, userId, clientId };
|
return { sessionId, userId, clientId };
|
||||||
|
};
|
||||||
|
|
||||||
|
export async function authorize(
|
||||||
|
locals: App.Locals,
|
||||||
|
requiredPermission: "any" | "notClient",
|
||||||
|
): Promise<Session>;
|
||||||
|
|
||||||
|
export async function authorize(
|
||||||
|
locals: App.Locals,
|
||||||
|
requiredPermission: "anyClient" | "pendingClient" | "activeClient",
|
||||||
|
): Promise<ClientSession>;
|
||||||
|
|
||||||
|
export async function authorize(
|
||||||
|
locals: App.Locals,
|
||||||
|
requiredPermission: SessionPermission,
|
||||||
|
): Promise<Session> {
|
||||||
|
try {
|
||||||
|
return await authorizeInternal(locals, requiredPermission);
|
||||||
|
} catch (e) {
|
||||||
|
if (e instanceof AuthorizationError) {
|
||||||
|
error(e.status, e.message);
|
||||||
|
}
|
||||||
|
throw e;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
10
src/lib/server/modules/filesystem.ts
Normal file
10
src/lib/server/modules/filesystem.ts
Normal file
@@ -0,0 +1,10 @@
|
|||||||
|
import { unlink } from "fs/promises";
|
||||||
|
import env from "$lib/server/loadenv";
|
||||||
|
|
||||||
|
export const getChunkDirectoryPath = (sessionId: string) => `${env.uploadsPath}/${sessionId}`;
|
||||||
|
|
||||||
|
export const safeUnlink = async (path: string | null | undefined) => {
|
||||||
|
if (path) {
|
||||||
|
await unlink(path).catch(console.error);
|
||||||
|
}
|
||||||
|
};
|
||||||
@@ -1,25 +0,0 @@
|
|||||||
import { error } from "@sveltejs/kit";
|
|
||||||
import { getUserClientWithDetails } from "$lib/server/db/client";
|
|
||||||
import { getInitialMek } from "$lib/server/db/mek";
|
|
||||||
import { verifySignature } from "$lib/server/modules/crypto";
|
|
||||||
|
|
||||||
export const isInitialMekNeeded = async (userId: number) => {
|
|
||||||
const initialMek = await getInitialMek(userId);
|
|
||||||
return !initialMek;
|
|
||||||
};
|
|
||||||
|
|
||||||
export const verifyClientEncMekSig = async (
|
|
||||||
userId: number,
|
|
||||||
clientId: number,
|
|
||||||
version: number,
|
|
||||||
encMek: string,
|
|
||||||
encMekSig: string,
|
|
||||||
) => {
|
|
||||||
const userClient = await getUserClientWithDetails(userId, clientId);
|
|
||||||
if (!userClient) {
|
|
||||||
error(500, "Invalid session id");
|
|
||||||
}
|
|
||||||
|
|
||||||
const data = JSON.stringify({ version, key: encMek });
|
|
||||||
return verifySignature(Buffer.from(data), encMekSig, userClient.sigPubKey);
|
|
||||||
};
|
|
||||||
@@ -1,32 +0,0 @@
|
|||||||
import { z } from "zod";
|
|
||||||
|
|
||||||
export const passwordChangeRequest = z.object({
|
|
||||||
oldPassword: z.string().trim().nonempty(),
|
|
||||||
newPassword: z.string().trim().nonempty(),
|
|
||||||
});
|
|
||||||
export type PasswordChangeRequest = z.input<typeof passwordChangeRequest>;
|
|
||||||
|
|
||||||
export const loginRequest = z.object({
|
|
||||||
email: z.string().email(),
|
|
||||||
password: z.string().trim().nonempty(),
|
|
||||||
});
|
|
||||||
export type LoginRequest = z.input<typeof loginRequest>;
|
|
||||||
|
|
||||||
export const sessionUpgradeRequest = z.object({
|
|
||||||
encPubKey: z.string().base64().nonempty(),
|
|
||||||
sigPubKey: z.string().base64().nonempty(),
|
|
||||||
});
|
|
||||||
export type SessionUpgradeRequest = z.input<typeof sessionUpgradeRequest>;
|
|
||||||
|
|
||||||
export const sessionUpgradeResponse = z.object({
|
|
||||||
id: z.number().int().positive(),
|
|
||||||
challenge: z.string().base64().nonempty(),
|
|
||||||
});
|
|
||||||
export type SessionUpgradeResponse = z.output<typeof sessionUpgradeResponse>;
|
|
||||||
|
|
||||||
export const sessionUpgradeVerifyRequest = z.object({
|
|
||||||
id: z.number().int().positive(),
|
|
||||||
answerSig: z.string().base64().nonempty(),
|
|
||||||
force: z.boolean().default(false),
|
|
||||||
});
|
|
||||||
export type SessionUpgradeVerifyRequest = z.input<typeof sessionUpgradeVerifyRequest>;
|
|
||||||
@@ -1,60 +1,3 @@
|
|||||||
import { z } from "zod";
|
import { z } from "zod";
|
||||||
|
|
||||||
export const categoryIdSchema = z.union([z.literal("root"), z.number().int().positive()]);
|
export const categoryIdSchema = z.union([z.literal("root"), z.int().positive()]);
|
||||||
|
|
||||||
export const categoryInfoResponse = z.object({
|
|
||||||
metadata: z
|
|
||||||
.object({
|
|
||||||
parent: categoryIdSchema,
|
|
||||||
mekVersion: z.number().int().positive(),
|
|
||||||
dek: z.string().base64().nonempty(),
|
|
||||||
dekVersion: z.string().datetime(),
|
|
||||||
name: z.string().base64().nonempty(),
|
|
||||||
nameIv: z.string().base64().nonempty(),
|
|
||||||
})
|
|
||||||
.optional(),
|
|
||||||
subCategories: z.number().int().positive().array(),
|
|
||||||
});
|
|
||||||
export type CategoryInfoResponse = z.output<typeof categoryInfoResponse>;
|
|
||||||
|
|
||||||
export const categoryFileAddRequest = z.object({
|
|
||||||
file: z.number().int().positive(),
|
|
||||||
});
|
|
||||||
export type CategoryFileAddRequest = z.input<typeof categoryFileAddRequest>;
|
|
||||||
|
|
||||||
export const categoryFileListResponse = z.object({
|
|
||||||
files: z.array(
|
|
||||||
z.object({
|
|
||||||
file: z.number().int().positive(),
|
|
||||||
isRecursive: z.boolean(),
|
|
||||||
}),
|
|
||||||
),
|
|
||||||
});
|
|
||||||
export type CategoryFileListResponse = z.output<typeof categoryFileListResponse>;
|
|
||||||
|
|
||||||
export const categoryFileRemoveRequest = z.object({
|
|
||||||
file: z.number().int().positive(),
|
|
||||||
});
|
|
||||||
export type CategoryFileRemoveRequest = z.input<typeof categoryFileRemoveRequest>;
|
|
||||||
|
|
||||||
export const categoryRenameRequest = z.object({
|
|
||||||
dekVersion: z.string().datetime(),
|
|
||||||
name: z.string().base64().nonempty(),
|
|
||||||
nameIv: z.string().base64().nonempty(),
|
|
||||||
});
|
|
||||||
export type CategoryRenameRequest = z.input<typeof categoryRenameRequest>;
|
|
||||||
|
|
||||||
export const categoryCreateRequest = z.object({
|
|
||||||
parent: categoryIdSchema,
|
|
||||||
mekVersion: z.number().int().positive(),
|
|
||||||
dek: z.string().base64().nonempty(),
|
|
||||||
dekVersion: z.string().datetime(),
|
|
||||||
name: z.string().base64().nonempty(),
|
|
||||||
nameIv: z.string().base64().nonempty(),
|
|
||||||
});
|
|
||||||
export type CategoryCreateRequest = z.input<typeof categoryCreateRequest>;
|
|
||||||
|
|
||||||
export const categoryCreateResponse = z.object({
|
|
||||||
category: z.number().int().positive(),
|
|
||||||
});
|
|
||||||
export type CategoryCreateResponse = z.output<typeof categoryCreateResponse>;
|
|
||||||
|
|||||||
@@ -1,36 +0,0 @@
|
|||||||
import { z } from "zod";
|
|
||||||
|
|
||||||
export const clientListResponse = z.object({
|
|
||||||
clients: z.array(
|
|
||||||
z.object({
|
|
||||||
id: z.number().int().positive(),
|
|
||||||
state: z.enum(["pending", "active"]),
|
|
||||||
}),
|
|
||||||
),
|
|
||||||
});
|
|
||||||
export type ClientListResponse = z.output<typeof clientListResponse>;
|
|
||||||
|
|
||||||
export const clientRegisterRequest = z.object({
|
|
||||||
encPubKey: z.string().base64().nonempty(),
|
|
||||||
sigPubKey: z.string().base64().nonempty(),
|
|
||||||
});
|
|
||||||
export type ClientRegisterRequest = z.input<typeof clientRegisterRequest>;
|
|
||||||
|
|
||||||
export const clientRegisterResponse = z.object({
|
|
||||||
id: z.number().int().positive(),
|
|
||||||
challenge: z.string().base64().nonempty(),
|
|
||||||
});
|
|
||||||
export type ClientRegisterResponse = z.output<typeof clientRegisterResponse>;
|
|
||||||
|
|
||||||
export const clientRegisterVerifyRequest = z.object({
|
|
||||||
id: z.number().int().positive(),
|
|
||||||
answerSig: z.string().base64().nonempty(),
|
|
||||||
});
|
|
||||||
export type ClientRegisterVerifyRequest = z.input<typeof clientRegisterVerifyRequest>;
|
|
||||||
|
|
||||||
export const clientStatusResponse = z.object({
|
|
||||||
id: z.number().int().positive(),
|
|
||||||
state: z.enum(["pending", "active"]),
|
|
||||||
isInitialMekNeeded: z.boolean(),
|
|
||||||
});
|
|
||||||
export type ClientStatusResponse = z.output<typeof clientStatusResponse>;
|
|
||||||
@@ -1,47 +1,3 @@
|
|||||||
import { z } from "zod";
|
import { z } from "zod";
|
||||||
|
|
||||||
export const directoryIdSchema = z.union([z.literal("root"), z.number().int().positive()]);
|
export const directoryIdSchema = z.union([z.literal("root"), z.int().positive()]);
|
||||||
|
|
||||||
export const directoryInfoResponse = z.object({
|
|
||||||
metadata: z
|
|
||||||
.object({
|
|
||||||
parent: directoryIdSchema,
|
|
||||||
mekVersion: z.number().int().positive(),
|
|
||||||
dek: z.string().base64().nonempty(),
|
|
||||||
dekVersion: z.string().datetime(),
|
|
||||||
name: z.string().base64().nonempty(),
|
|
||||||
nameIv: z.string().base64().nonempty(),
|
|
||||||
})
|
|
||||||
.optional(),
|
|
||||||
subDirectories: z.number().int().positive().array(),
|
|
||||||
files: z.number().int().positive().array(),
|
|
||||||
});
|
|
||||||
export type DirectoryInfoResponse = z.output<typeof directoryInfoResponse>;
|
|
||||||
|
|
||||||
export const directoryDeleteResponse = z.object({
|
|
||||||
deletedDirectories: z.number().int().positive().array(),
|
|
||||||
deletedFiles: z.number().int().positive().array(),
|
|
||||||
});
|
|
||||||
export type DirectoryDeleteResponse = z.output<typeof directoryDeleteResponse>;
|
|
||||||
|
|
||||||
export const directoryRenameRequest = z.object({
|
|
||||||
dekVersion: z.string().datetime(),
|
|
||||||
name: z.string().base64().nonempty(),
|
|
||||||
nameIv: z.string().base64().nonempty(),
|
|
||||||
});
|
|
||||||
export type DirectoryRenameRequest = z.input<typeof directoryRenameRequest>;
|
|
||||||
|
|
||||||
export const directoryCreateRequest = z.object({
|
|
||||||
parent: directoryIdSchema,
|
|
||||||
mekVersion: z.number().int().positive(),
|
|
||||||
dek: z.string().base64().nonempty(),
|
|
||||||
dekVersion: z.string().datetime(),
|
|
||||||
name: z.string().base64().nonempty(),
|
|
||||||
nameIv: z.string().base64().nonempty(),
|
|
||||||
});
|
|
||||||
export type DirectoryCreateRequest = z.input<typeof directoryCreateRequest>;
|
|
||||||
|
|
||||||
export const directoryCreateResponse = z.object({
|
|
||||||
directory: z.number().int().positive(),
|
|
||||||
});
|
|
||||||
export type DirectoryCreateResponse = z.output<typeof directoryCreateResponse>;
|
|
||||||
|
|||||||
@@ -1,91 +1,7 @@
|
|||||||
import mime from "mime";
|
|
||||||
import { z } from "zod";
|
import { z } from "zod";
|
||||||
import { directoryIdSchema } from "./directory";
|
|
||||||
|
|
||||||
export const fileInfoResponse = z.object({
|
|
||||||
parent: directoryIdSchema,
|
|
||||||
mekVersion: z.number().int().positive(),
|
|
||||||
dek: z.string().base64().nonempty(),
|
|
||||||
dekVersion: z.string().datetime(),
|
|
||||||
contentType: z
|
|
||||||
.string()
|
|
||||||
.trim()
|
|
||||||
.nonempty()
|
|
||||||
.refine((value) => mime.getExtension(value) !== null), // MIME type
|
|
||||||
contentIv: z.string().base64().nonempty(),
|
|
||||||
name: z.string().base64().nonempty(),
|
|
||||||
nameIv: z.string().base64().nonempty(),
|
|
||||||
createdAt: z.string().base64().nonempty().optional(),
|
|
||||||
createdAtIv: z.string().base64().nonempty().optional(),
|
|
||||||
lastModifiedAt: z.string().base64().nonempty(),
|
|
||||||
lastModifiedAtIv: z.string().base64().nonempty(),
|
|
||||||
categories: z.number().int().positive().array(),
|
|
||||||
});
|
|
||||||
export type FileInfoResponse = z.output<typeof fileInfoResponse>;
|
|
||||||
|
|
||||||
export const fileRenameRequest = z.object({
|
|
||||||
dekVersion: z.string().datetime(),
|
|
||||||
name: z.string().base64().nonempty(),
|
|
||||||
nameIv: z.string().base64().nonempty(),
|
|
||||||
});
|
|
||||||
export type FileRenameRequest = z.input<typeof fileRenameRequest>;
|
|
||||||
|
|
||||||
export const fileThumbnailInfoResponse = z.object({
|
|
||||||
updatedAt: z.string().datetime(),
|
|
||||||
contentIv: z.string().base64().nonempty(),
|
|
||||||
});
|
|
||||||
export type FileThumbnailInfoResponse = z.output<typeof fileThumbnailInfoResponse>;
|
|
||||||
|
|
||||||
export const fileThumbnailUploadRequest = z.object({
|
export const fileThumbnailUploadRequest = z.object({
|
||||||
dekVersion: z.string().datetime(),
|
dekVersion: z.iso.datetime(),
|
||||||
contentIv: z.string().base64().nonempty(),
|
contentIv: z.base64().nonempty(),
|
||||||
});
|
});
|
||||||
export type FileThumbnailUploadRequest = z.input<typeof fileThumbnailUploadRequest>;
|
export type FileThumbnailUploadRequest = z.input<typeof fileThumbnailUploadRequest>;
|
||||||
|
|
||||||
export const fileListResponse = z.object({
|
|
||||||
files: z.number().int().positive().array(),
|
|
||||||
});
|
|
||||||
export type FileListResponse = z.output<typeof fileListResponse>;
|
|
||||||
|
|
||||||
export const duplicateFileScanRequest = z.object({
|
|
||||||
hskVersion: z.number().int().positive(),
|
|
||||||
contentHmac: z.string().base64().nonempty(),
|
|
||||||
});
|
|
||||||
export type DuplicateFileScanRequest = z.input<typeof duplicateFileScanRequest>;
|
|
||||||
|
|
||||||
export const duplicateFileScanResponse = z.object({
|
|
||||||
files: z.number().int().positive().array(),
|
|
||||||
});
|
|
||||||
export type DuplicateFileScanResponse = z.output<typeof duplicateFileScanResponse>;
|
|
||||||
|
|
||||||
export const missingThumbnailFileScanResponse = z.object({
|
|
||||||
files: z.number().int().positive().array(),
|
|
||||||
});
|
|
||||||
export type MissingThumbnailFileScanResponse = z.output<typeof missingThumbnailFileScanResponse>;
|
|
||||||
|
|
||||||
export const fileUploadRequest = z.object({
|
|
||||||
parent: directoryIdSchema,
|
|
||||||
mekVersion: z.number().int().positive(),
|
|
||||||
dek: z.string().base64().nonempty(),
|
|
||||||
dekVersion: z.string().datetime(),
|
|
||||||
hskVersion: z.number().int().positive(),
|
|
||||||
contentHmac: z.string().base64().nonempty(),
|
|
||||||
contentType: z
|
|
||||||
.string()
|
|
||||||
.trim()
|
|
||||||
.nonempty()
|
|
||||||
.refine((value) => mime.getExtension(value) !== null), // MIME type
|
|
||||||
contentIv: z.string().base64().nonempty(),
|
|
||||||
name: z.string().base64().nonempty(),
|
|
||||||
nameIv: z.string().base64().nonempty(),
|
|
||||||
createdAt: z.string().base64().nonempty().optional(),
|
|
||||||
createdAtIv: z.string().base64().nonempty().optional(),
|
|
||||||
lastModifiedAt: z.string().base64().nonempty(),
|
|
||||||
lastModifiedAtIv: z.string().base64().nonempty(),
|
|
||||||
});
|
|
||||||
export type FileUploadRequest = z.input<typeof fileUploadRequest>;
|
|
||||||
|
|
||||||
export const fileUploadResponse = z.object({
|
|
||||||
file: z.number().int().positive(),
|
|
||||||
});
|
|
||||||
export type FileUploadResponse = z.output<typeof fileUploadResponse>;
|
|
||||||
|
|||||||
@@ -1,19 +0,0 @@
|
|||||||
import { z } from "zod";
|
|
||||||
|
|
||||||
export const hmacSecretListResponse = z.object({
|
|
||||||
hsks: z.array(
|
|
||||||
z.object({
|
|
||||||
version: z.number().int().positive(),
|
|
||||||
state: z.enum(["active"]),
|
|
||||||
mekVersion: z.number().int().positive(),
|
|
||||||
hsk: z.string().base64().nonempty(),
|
|
||||||
}),
|
|
||||||
),
|
|
||||||
});
|
|
||||||
export type HmacSecretListResponse = z.output<typeof hmacSecretListResponse>;
|
|
||||||
|
|
||||||
export const initialHmacSecretRegisterRequest = z.object({
|
|
||||||
mekVersion: z.number().int().positive(),
|
|
||||||
hsk: z.string().base64().nonempty(),
|
|
||||||
});
|
|
||||||
export type InitialHmacSecretRegisterRequest = z.input<typeof initialHmacSecretRegisterRequest>;
|
|
||||||
@@ -1,8 +1,3 @@
|
|||||||
export * from "./auth";
|
|
||||||
export * from "./category";
|
export * from "./category";
|
||||||
export * from "./client";
|
|
||||||
export * from "./directory";
|
export * from "./directory";
|
||||||
export * from "./file";
|
export * from "./file";
|
||||||
export * from "./hsk";
|
|
||||||
export * from "./mek";
|
|
||||||
export * from "./user";
|
|
||||||
|
|||||||
@@ -1,19 +0,0 @@
|
|||||||
import { z } from "zod";
|
|
||||||
|
|
||||||
export const masterKeyListResponse = z.object({
|
|
||||||
meks: z.array(
|
|
||||||
z.object({
|
|
||||||
version: z.number().int().positive(),
|
|
||||||
state: z.enum(["active", "retired"]),
|
|
||||||
mek: z.string().base64().nonempty(),
|
|
||||||
mekSig: z.string().base64().nonempty(),
|
|
||||||
}),
|
|
||||||
),
|
|
||||||
});
|
|
||||||
export type MasterKeyListResponse = z.output<typeof masterKeyListResponse>;
|
|
||||||
|
|
||||||
export const initialMasterKeyRegisterRequest = z.object({
|
|
||||||
mek: z.string().base64().nonempty(),
|
|
||||||
mekSig: z.string().base64().nonempty(),
|
|
||||||
});
|
|
||||||
export type InitialMasterKeyRegisterRequest = z.input<typeof initialMasterKeyRegisterRequest>;
|
|
||||||
@@ -1,12 +0,0 @@
|
|||||||
import { z } from "zod";
|
|
||||||
|
|
||||||
export const userInfoResponse = z.object({
|
|
||||||
email: z.string().email(),
|
|
||||||
nickname: z.string().nonempty(),
|
|
||||||
});
|
|
||||||
export type UserInfoResponse = z.output<typeof userInfoResponse>;
|
|
||||||
|
|
||||||
export const nicknameChangeRequest = z.object({
|
|
||||||
newNickname: z.string().trim().min(2).max(8),
|
|
||||||
});
|
|
||||||
export type NicknameChangeRequest = z.input<typeof nicknameChangeRequest>;
|
|
||||||
@@ -1,122 +0,0 @@
|
|||||||
import { error } from "@sveltejs/kit";
|
|
||||||
import argon2 from "argon2";
|
|
||||||
import { getClient, getClientByPubKeys, getUserClient } from "$lib/server/db/client";
|
|
||||||
import { IntegrityError } from "$lib/server/db/error";
|
|
||||||
import {
|
|
||||||
upgradeSession,
|
|
||||||
deleteSession,
|
|
||||||
deleteAllOtherSessions,
|
|
||||||
registerSessionUpgradeChallenge,
|
|
||||||
consumeSessionUpgradeChallenge,
|
|
||||||
} from "$lib/server/db/session";
|
|
||||||
import { getUser, getUserByEmail, setUserPassword } from "$lib/server/db/user";
|
|
||||||
import env from "$lib/server/loadenv";
|
|
||||||
import { startSession } from "$lib/server/modules/auth";
|
|
||||||
import { verifySignature, generateChallenge } from "$lib/server/modules/crypto";
|
|
||||||
|
|
||||||
const hashPassword = async (password: string) => {
|
|
||||||
return await argon2.hash(password);
|
|
||||||
};
|
|
||||||
|
|
||||||
const verifyPassword = async (hash: string, password: string) => {
|
|
||||||
return await argon2.verify(hash, password);
|
|
||||||
};
|
|
||||||
|
|
||||||
export const changePassword = async (
|
|
||||||
userId: number,
|
|
||||||
sessionId: string,
|
|
||||||
oldPassword: string,
|
|
||||||
newPassword: string,
|
|
||||||
) => {
|
|
||||||
if (oldPassword === newPassword) {
|
|
||||||
error(400, "Same passwords");
|
|
||||||
} else if (newPassword.length < 8) {
|
|
||||||
error(400, "Too short password");
|
|
||||||
}
|
|
||||||
|
|
||||||
const user = await getUser(userId);
|
|
||||||
if (!user) {
|
|
||||||
error(500, "Invalid session id");
|
|
||||||
} else if (!(await verifyPassword(user.password, oldPassword))) {
|
|
||||||
error(403, "Invalid password");
|
|
||||||
}
|
|
||||||
|
|
||||||
await setUserPassword(userId, await hashPassword(newPassword));
|
|
||||||
await deleteAllOtherSessions(userId, sessionId);
|
|
||||||
};
|
|
||||||
|
|
||||||
export const login = async (email: string, password: string, ip: string, userAgent: string) => {
|
|
||||||
const user = await getUserByEmail(email);
|
|
||||||
if (!user || !(await verifyPassword(user.password, password))) {
|
|
||||||
error(401, "Invalid email or password");
|
|
||||||
}
|
|
||||||
|
|
||||||
return { sessionIdSigned: await startSession(user.id, ip, userAgent) };
|
|
||||||
};
|
|
||||||
|
|
||||||
export const logout = async (sessionId: string) => {
|
|
||||||
await deleteSession(sessionId);
|
|
||||||
};
|
|
||||||
|
|
||||||
export const createSessionUpgradeChallenge = async (
|
|
||||||
sessionId: string,
|
|
||||||
userId: number,
|
|
||||||
ip: string,
|
|
||||||
encPubKey: string,
|
|
||||||
sigPubKey: string,
|
|
||||||
) => {
|
|
||||||
const client = await getClientByPubKeys(encPubKey, sigPubKey);
|
|
||||||
const userClient = client ? await getUserClient(userId, client.id) : undefined;
|
|
||||||
if (!client) {
|
|
||||||
error(401, "Invalid public key(s)");
|
|
||||||
} else if (!userClient || userClient.state === "challenging") {
|
|
||||||
error(403, "Unregistered client");
|
|
||||||
}
|
|
||||||
|
|
||||||
const { answer, challenge } = await generateChallenge(32, encPubKey);
|
|
||||||
const { id } = await registerSessionUpgradeChallenge(
|
|
||||||
sessionId,
|
|
||||||
client.id,
|
|
||||||
answer.toString("base64"),
|
|
||||||
ip,
|
|
||||||
new Date(Date.now() + env.challenge.sessionUpgradeExp),
|
|
||||||
);
|
|
||||||
|
|
||||||
return { id, challenge: challenge.toString("base64") };
|
|
||||||
};
|
|
||||||
|
|
||||||
export const verifySessionUpgradeChallenge = async (
|
|
||||||
sessionId: string,
|
|
||||||
userId: number,
|
|
||||||
ip: string,
|
|
||||||
challengeId: number,
|
|
||||||
answerSig: string,
|
|
||||||
force: boolean,
|
|
||||||
) => {
|
|
||||||
const challenge = await consumeSessionUpgradeChallenge(challengeId, sessionId, ip);
|
|
||||||
if (!challenge) {
|
|
||||||
error(403, "Invalid challenge answer");
|
|
||||||
}
|
|
||||||
|
|
||||||
const client = await getClient(challenge.clientId);
|
|
||||||
if (!client) {
|
|
||||||
error(500, "Invalid challenge answer");
|
|
||||||
} else if (
|
|
||||||
!verifySignature(Buffer.from(challenge.answer, "base64"), answerSig, client.sigPubKey)
|
|
||||||
) {
|
|
||||||
error(403, "Invalid challenge answer signature");
|
|
||||||
}
|
|
||||||
|
|
||||||
try {
|
|
||||||
await upgradeSession(userId, sessionId, client.id, force);
|
|
||||||
} catch (e) {
|
|
||||||
if (e instanceof IntegrityError) {
|
|
||||||
if (e.message === "Session not found") {
|
|
||||||
error(500, "Invalid challenge answer");
|
|
||||||
} else if (!force && e.message === "Session already exists") {
|
|
||||||
error(409, "Already logged in");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
throw e;
|
|
||||||
}
|
|
||||||
};
|
|
||||||
@@ -1,134 +0,0 @@
|
|||||||
import { error } from "@sveltejs/kit";
|
|
||||||
import {
|
|
||||||
registerCategory,
|
|
||||||
getAllCategoriesByParent,
|
|
||||||
getCategory,
|
|
||||||
setCategoryEncName,
|
|
||||||
unregisterCategory,
|
|
||||||
type CategoryId,
|
|
||||||
type NewCategory,
|
|
||||||
} from "$lib/server/db/category";
|
|
||||||
import { IntegrityError } from "$lib/server/db/error";
|
|
||||||
import {
|
|
||||||
getAllFilesByCategory,
|
|
||||||
getFile,
|
|
||||||
addFileToCategory,
|
|
||||||
removeFileFromCategory,
|
|
||||||
} from "$lib/server/db/file";
|
|
||||||
import type { Ciphertext } from "$lib/server/db/schema";
|
|
||||||
|
|
||||||
export const getCategoryInformation = async (userId: number, categoryId: CategoryId) => {
|
|
||||||
const category = categoryId !== "root" ? await getCategory(userId, categoryId) : undefined;
|
|
||||||
if (category === null) {
|
|
||||||
error(404, "Invalid category id");
|
|
||||||
}
|
|
||||||
|
|
||||||
const categories = await getAllCategoriesByParent(userId, categoryId);
|
|
||||||
return {
|
|
||||||
metadata: category && {
|
|
||||||
parentId: category.parentId ?? ("root" as const),
|
|
||||||
mekVersion: category.mekVersion,
|
|
||||||
encDek: category.encDek,
|
|
||||||
dekVersion: category.dekVersion,
|
|
||||||
encName: category.encName,
|
|
||||||
},
|
|
||||||
categories: categories.map(({ id }) => id),
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
export const deleteCategory = async (userId: number, categoryId: number) => {
|
|
||||||
try {
|
|
||||||
await unregisterCategory(userId, categoryId);
|
|
||||||
} catch (e) {
|
|
||||||
if (e instanceof IntegrityError && e.message === "Category not found") {
|
|
||||||
error(404, "Invalid category id");
|
|
||||||
}
|
|
||||||
throw e;
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
export const addCategoryFile = async (userId: number, categoryId: number, fileId: number) => {
|
|
||||||
const category = await getCategory(userId, categoryId);
|
|
||||||
const file = await getFile(userId, fileId);
|
|
||||||
if (!category) {
|
|
||||||
error(404, "Invalid category id");
|
|
||||||
} else if (!file) {
|
|
||||||
error(404, "Invalid file id");
|
|
||||||
}
|
|
||||||
|
|
||||||
try {
|
|
||||||
await addFileToCategory(fileId, categoryId);
|
|
||||||
} catch (e) {
|
|
||||||
if (e instanceof IntegrityError && e.message === "File already added to category") {
|
|
||||||
error(400, "File already added");
|
|
||||||
}
|
|
||||||
throw e;
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
export const getCategoryFiles = async (userId: number, categoryId: number, recurse: boolean) => {
|
|
||||||
const category = await getCategory(userId, categoryId);
|
|
||||||
if (!category) {
|
|
||||||
error(404, "Invalid category id");
|
|
||||||
}
|
|
||||||
|
|
||||||
const files = await getAllFilesByCategory(userId, categoryId, recurse);
|
|
||||||
return { files };
|
|
||||||
};
|
|
||||||
|
|
||||||
export const removeCategoryFile = async (userId: number, categoryId: number, fileId: number) => {
|
|
||||||
const category = await getCategory(userId, categoryId);
|
|
||||||
const file = await getFile(userId, fileId);
|
|
||||||
if (!category) {
|
|
||||||
error(404, "Invalid category id");
|
|
||||||
} else if (!file) {
|
|
||||||
error(404, "Invalid file id");
|
|
||||||
}
|
|
||||||
|
|
||||||
try {
|
|
||||||
await removeFileFromCategory(fileId, categoryId);
|
|
||||||
} catch (e) {
|
|
||||||
if (e instanceof IntegrityError && e.message === "File not found in category") {
|
|
||||||
error(400, "File not added");
|
|
||||||
}
|
|
||||||
throw e;
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
export const renameCategory = async (
|
|
||||||
userId: number,
|
|
||||||
categoryId: number,
|
|
||||||
dekVersion: Date,
|
|
||||||
newEncName: Ciphertext,
|
|
||||||
) => {
|
|
||||||
try {
|
|
||||||
await setCategoryEncName(userId, categoryId, dekVersion, newEncName);
|
|
||||||
} catch (e) {
|
|
||||||
if (e instanceof IntegrityError) {
|
|
||||||
if (e.message === "Category not found") {
|
|
||||||
error(404, "Invalid category id");
|
|
||||||
} else if (e.message === "Invalid DEK version") {
|
|
||||||
error(400, "Invalid DEK version");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
throw e;
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
export const createCategory = async (params: NewCategory) => {
|
|
||||||
const oneMinuteAgo = new Date(Date.now() - 60 * 1000);
|
|
||||||
const oneMinuteLater = new Date(Date.now() + 60 * 1000);
|
|
||||||
if (params.dekVersion <= oneMinuteAgo || params.dekVersion >= oneMinuteLater) {
|
|
||||||
error(400, "Invalid DEK version");
|
|
||||||
}
|
|
||||||
|
|
||||||
try {
|
|
||||||
const { id } = await registerCategory(params);
|
|
||||||
return { id };
|
|
||||||
} catch (e) {
|
|
||||||
if (e instanceof IntegrityError && e.message === "Inactive MEK version") {
|
|
||||||
error(400, "Inactive MEK version");
|
|
||||||
}
|
|
||||||
throw e;
|
|
||||||
}
|
|
||||||
};
|
|
||||||
@@ -1,116 +0,0 @@
|
|||||||
import { error } from "@sveltejs/kit";
|
|
||||||
import {
|
|
||||||
createClient,
|
|
||||||
getClient,
|
|
||||||
getClientByPubKeys,
|
|
||||||
createUserClient,
|
|
||||||
getAllUserClients,
|
|
||||||
getUserClient,
|
|
||||||
setUserClientStateToPending,
|
|
||||||
registerUserClientChallenge,
|
|
||||||
consumeUserClientChallenge,
|
|
||||||
} from "$lib/server/db/client";
|
|
||||||
import { IntegrityError } from "$lib/server/db/error";
|
|
||||||
import { verifyPubKey, verifySignature, generateChallenge } from "$lib/server/modules/crypto";
|
|
||||||
import { isInitialMekNeeded } from "$lib/server/modules/mek";
|
|
||||||
import env from "$lib/server/loadenv";
|
|
||||||
|
|
||||||
export const getUserClientList = async (userId: number) => {
|
|
||||||
const userClients = await getAllUserClients(userId);
|
|
||||||
return {
|
|
||||||
userClients: userClients.map(({ clientId, state }) => ({
|
|
||||||
id: clientId,
|
|
||||||
state: state as "pending" | "active",
|
|
||||||
})),
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
const expiresAt = () => new Date(Date.now() + env.challenge.userClientExp);
|
|
||||||
|
|
||||||
const createUserClientChallenge = async (
|
|
||||||
ip: string,
|
|
||||||
userId: number,
|
|
||||||
clientId: number,
|
|
||||||
encPubKey: string,
|
|
||||||
) => {
|
|
||||||
const { answer, challenge } = await generateChallenge(32, encPubKey);
|
|
||||||
const { id } = await registerUserClientChallenge(
|
|
||||||
userId,
|
|
||||||
clientId,
|
|
||||||
answer.toString("base64"),
|
|
||||||
ip,
|
|
||||||
expiresAt(),
|
|
||||||
);
|
|
||||||
return { id, challenge: challenge.toString("base64") };
|
|
||||||
};
|
|
||||||
|
|
||||||
export const registerUserClient = async (
|
|
||||||
userId: number,
|
|
||||||
ip: string,
|
|
||||||
encPubKey: string,
|
|
||||||
sigPubKey: string,
|
|
||||||
) => {
|
|
||||||
const client = await getClientByPubKeys(encPubKey, sigPubKey);
|
|
||||||
if (client) {
|
|
||||||
try {
|
|
||||||
await createUserClient(userId, client.id);
|
|
||||||
return await createUserClientChallenge(ip, userId, client.id, encPubKey);
|
|
||||||
} catch (e) {
|
|
||||||
if (e instanceof IntegrityError && e.message === "User client already exists") {
|
|
||||||
error(409, "Client already registered");
|
|
||||||
}
|
|
||||||
throw e;
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
if (encPubKey === sigPubKey) {
|
|
||||||
error(400, "Same public keys");
|
|
||||||
} else if (!verifyPubKey(encPubKey) || !verifyPubKey(sigPubKey)) {
|
|
||||||
error(400, "Invalid public key(s)");
|
|
||||||
}
|
|
||||||
|
|
||||||
try {
|
|
||||||
const { id: clientId } = await createClient(encPubKey, sigPubKey, userId);
|
|
||||||
return await createUserClientChallenge(ip, userId, clientId, encPubKey);
|
|
||||||
} catch (e) {
|
|
||||||
if (e instanceof IntegrityError && e.message === "Public key(s) already registered") {
|
|
||||||
error(409, "Public key(s) already used");
|
|
||||||
}
|
|
||||||
throw e;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
export const verifyUserClient = async (
|
|
||||||
userId: number,
|
|
||||||
ip: string,
|
|
||||||
challengeId: number,
|
|
||||||
answerSig: string,
|
|
||||||
) => {
|
|
||||||
const challenge = await consumeUserClientChallenge(challengeId, userId, ip);
|
|
||||||
if (!challenge) {
|
|
||||||
error(403, "Invalid challenge answer");
|
|
||||||
}
|
|
||||||
|
|
||||||
const client = await getClient(challenge.clientId);
|
|
||||||
if (!client) {
|
|
||||||
error(500, "Invalid challenge answer");
|
|
||||||
} else if (
|
|
||||||
!verifySignature(Buffer.from(challenge.answer, "base64"), answerSig, client.sigPubKey)
|
|
||||||
) {
|
|
||||||
error(403, "Invalid challenge answer signature");
|
|
||||||
}
|
|
||||||
|
|
||||||
await setUserClientStateToPending(userId, client.id);
|
|
||||||
};
|
|
||||||
|
|
||||||
export const getUserClientStatus = async (userId: number, clientId: number) => {
|
|
||||||
const userClient = await getUserClient(userId, clientId);
|
|
||||||
if (!userClient) {
|
|
||||||
error(500, "Invalid session id");
|
|
||||||
}
|
|
||||||
|
|
||||||
return {
|
|
||||||
state: userClient.state as "pending" | "active",
|
|
||||||
isInitialMekNeeded: await isInitialMekNeeded(userId),
|
|
||||||
};
|
|
||||||
};
|
|
||||||
@@ -1,98 +0,0 @@
|
|||||||
import { error } from "@sveltejs/kit";
|
|
||||||
import { unlink } from "fs/promises";
|
|
||||||
import { IntegrityError } from "$lib/server/db/error";
|
|
||||||
import {
|
|
||||||
registerDirectory,
|
|
||||||
getAllDirectoriesByParent,
|
|
||||||
getDirectory,
|
|
||||||
setDirectoryEncName,
|
|
||||||
unregisterDirectory,
|
|
||||||
getAllFilesByParent,
|
|
||||||
type DirectoryId,
|
|
||||||
type NewDirectory,
|
|
||||||
} from "$lib/server/db/file";
|
|
||||||
import type { Ciphertext } from "$lib/server/db/schema";
|
|
||||||
|
|
||||||
export const getDirectoryInformation = async (userId: number, directoryId: DirectoryId) => {
|
|
||||||
const directory = directoryId !== "root" ? await getDirectory(userId, directoryId) : undefined;
|
|
||||||
if (directory === null) {
|
|
||||||
error(404, "Invalid directory id");
|
|
||||||
}
|
|
||||||
|
|
||||||
const directories = await getAllDirectoriesByParent(userId, directoryId);
|
|
||||||
const files = await getAllFilesByParent(userId, directoryId);
|
|
||||||
return {
|
|
||||||
metadata: directory && {
|
|
||||||
parentId: directory.parentId ?? ("root" as const),
|
|
||||||
mekVersion: directory.mekVersion,
|
|
||||||
encDek: directory.encDek,
|
|
||||||
dekVersion: directory.dekVersion,
|
|
||||||
encName: directory.encName,
|
|
||||||
},
|
|
||||||
directories: directories.map(({ id }) => id),
|
|
||||||
files: files.map(({ id }) => id),
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
const safeUnlink = async (path: string | null) => {
|
|
||||||
if (path) {
|
|
||||||
await unlink(path).catch(console.error);
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
export const deleteDirectory = async (userId: number, directoryId: number) => {
|
|
||||||
try {
|
|
||||||
const { subDirectories, files } = await unregisterDirectory(userId, directoryId);
|
|
||||||
return {
|
|
||||||
directories: [...subDirectories.map(({ id }) => id), directoryId],
|
|
||||||
files: files.map(({ id, path, thumbnailPath }) => {
|
|
||||||
safeUnlink(path); // Intended
|
|
||||||
safeUnlink(thumbnailPath); // Intended
|
|
||||||
return id;
|
|
||||||
}),
|
|
||||||
};
|
|
||||||
} catch (e) {
|
|
||||||
if (e instanceof IntegrityError && e.message === "Directory not found") {
|
|
||||||
error(404, "Invalid directory id");
|
|
||||||
}
|
|
||||||
throw e;
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
export const renameDirectory = async (
|
|
||||||
userId: number,
|
|
||||||
directoryId: number,
|
|
||||||
dekVersion: Date,
|
|
||||||
newEncName: Ciphertext,
|
|
||||||
) => {
|
|
||||||
try {
|
|
||||||
await setDirectoryEncName(userId, directoryId, dekVersion, newEncName);
|
|
||||||
} catch (e) {
|
|
||||||
if (e instanceof IntegrityError) {
|
|
||||||
if (e.message === "Directory not found") {
|
|
||||||
error(404, "Invalid directory id");
|
|
||||||
} else if (e.message === "Invalid DEK version") {
|
|
||||||
error(400, "Invalid DEK version");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
throw e;
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
export const createDirectory = async (params: NewDirectory) => {
|
|
||||||
const oneMinuteAgo = new Date(Date.now() - 60 * 1000);
|
|
||||||
const oneMinuteLater = new Date(Date.now() + 60 * 1000);
|
|
||||||
if (params.dekVersion <= oneMinuteAgo || params.dekVersion >= oneMinuteLater) {
|
|
||||||
error(400, "Invalid DEK version");
|
|
||||||
}
|
|
||||||
|
|
||||||
try {
|
|
||||||
const { id } = await registerDirectory(params);
|
|
||||||
return { id };
|
|
||||||
} catch (e) {
|
|
||||||
if (e instanceof IntegrityError && e.message === "Inactive MEK version") {
|
|
||||||
error(400, "Invalid MEK version");
|
|
||||||
}
|
|
||||||
throw e;
|
|
||||||
}
|
|
||||||
};
|
|
||||||
@@ -1,123 +1,85 @@
|
|||||||
import { error } from "@sveltejs/kit";
|
import { error } from "@sveltejs/kit";
|
||||||
import { createHash } from "crypto";
|
import { createHash } from "crypto";
|
||||||
import { createReadStream, createWriteStream } from "fs";
|
import { createReadStream, createWriteStream } from "fs";
|
||||||
import { mkdir, stat, unlink } from "fs/promises";
|
import { mkdir, stat } from "fs/promises";
|
||||||
import { dirname } from "path";
|
import { dirname } from "path";
|
||||||
import { Readable } from "stream";
|
import { Readable } from "stream";
|
||||||
import { pipeline } from "stream/promises";
|
import { pipeline } from "stream/promises";
|
||||||
import { v4 as uuidv4 } from "uuid";
|
import { v4 as uuidv4 } from "uuid";
|
||||||
import { IntegrityError } from "$lib/server/db/error";
|
import { CHUNK_SIZE, ENCRYPTION_OVERHEAD } from "$lib/constants";
|
||||||
import {
|
import { FileRepo, MediaRepo, UploadRepo, IntegrityError } from "$lib/server/db";
|
||||||
registerFile,
|
|
||||||
getAllFileIds,
|
|
||||||
getAllFileIdsByContentHmac,
|
|
||||||
getFile,
|
|
||||||
setFileEncName,
|
|
||||||
unregisterFile,
|
|
||||||
getAllFileCategories,
|
|
||||||
type NewFile,
|
|
||||||
} from "$lib/server/db/file";
|
|
||||||
import {
|
|
||||||
updateFileThumbnail,
|
|
||||||
getFileThumbnail,
|
|
||||||
getMissingFileThumbnails,
|
|
||||||
} from "$lib/server/db/media";
|
|
||||||
import type { Ciphertext } from "$lib/server/db/schema";
|
|
||||||
import env from "$lib/server/loadenv";
|
import env from "$lib/server/loadenv";
|
||||||
|
import { getChunkDirectoryPath, safeUnlink } from "$lib/server/modules/filesystem";
|
||||||
|
|
||||||
export const getFileInformation = async (userId: number, fileId: number) => {
|
const uploadLocks = new Set<string>();
|
||||||
const file = await getFile(userId, fileId);
|
|
||||||
if (!file) {
|
const createEncContentStream = async (
|
||||||
error(404, "Invalid file id");
|
path: string,
|
||||||
|
iv?: Buffer,
|
||||||
|
range?: { start?: number; end?: number },
|
||||||
|
) => {
|
||||||
|
const { size: fileSize } = await stat(path);
|
||||||
|
const ivSize = iv?.byteLength ?? 0;
|
||||||
|
const totalSize = fileSize + ivSize;
|
||||||
|
|
||||||
|
const start = range?.start ?? 0;
|
||||||
|
const end = range?.end ?? totalSize - 1;
|
||||||
|
if (start > end || start < 0 || end >= totalSize) {
|
||||||
|
error(416, "Invalid range");
|
||||||
}
|
}
|
||||||
|
|
||||||
const categories = await getAllFileCategories(fileId);
|
|
||||||
return {
|
return {
|
||||||
parentId: file.parentId ?? ("root" as const),
|
encContentStream: Readable.toWeb(
|
||||||
mekVersion: file.mekVersion,
|
Readable.from(
|
||||||
encDek: file.encDek,
|
(async function* () {
|
||||||
dekVersion: file.dekVersion,
|
if (start < ivSize) {
|
||||||
contentType: file.contentType,
|
yield iv!.subarray(start, Math.min(end + 1, ivSize));
|
||||||
encContentIv: file.encContentIv,
|
}
|
||||||
encName: file.encName,
|
if (end >= ivSize) {
|
||||||
encCreatedAt: file.encCreatedAt,
|
yield* createReadStream(path, {
|
||||||
encLastModifiedAt: file.encLastModifiedAt,
|
start: Math.max(0, start - ivSize),
|
||||||
categories: categories.map(({ id }) => id),
|
end: end - ivSize,
|
||||||
|
});
|
||||||
|
}
|
||||||
|
})(),
|
||||||
|
),
|
||||||
|
),
|
||||||
|
range: { start, end, total: totalSize },
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
const safeUnlink = async (path: string | null) => {
|
export const getFileStream = async (
|
||||||
if (path) {
|
|
||||||
await unlink(path).catch(console.error);
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
export const deleteFile = async (userId: number, fileId: number) => {
|
|
||||||
try {
|
|
||||||
const { path, thumbnailPath } = await unregisterFile(userId, fileId);
|
|
||||||
safeUnlink(path); // Intended
|
|
||||||
safeUnlink(thumbnailPath); // Intended
|
|
||||||
} catch (e) {
|
|
||||||
if (e instanceof IntegrityError && e.message === "File not found") {
|
|
||||||
error(404, "Invalid file id");
|
|
||||||
}
|
|
||||||
throw e;
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
export const getFileStream = async (userId: number, fileId: number) => {
|
|
||||||
const file = await getFile(userId, fileId);
|
|
||||||
if (!file) {
|
|
||||||
error(404, "Invalid file id");
|
|
||||||
}
|
|
||||||
|
|
||||||
const { size } = await stat(file.path);
|
|
||||||
return {
|
|
||||||
encContentStream: Readable.toWeb(createReadStream(file.path)),
|
|
||||||
encContentSize: size,
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
export const renameFile = async (
|
|
||||||
userId: number,
|
userId: number,
|
||||||
fileId: number,
|
fileId: number,
|
||||||
dekVersion: Date,
|
range?: { start?: number; end?: number },
|
||||||
newEncName: Ciphertext,
|
|
||||||
) => {
|
) => {
|
||||||
try {
|
const file = await FileRepo.getFile(userId, fileId);
|
||||||
await setFileEncName(userId, fileId, dekVersion, newEncName);
|
if (!file) {
|
||||||
} catch (e) {
|
error(404, "Invalid file id");
|
||||||
if (e instanceof IntegrityError) {
|
|
||||||
if (e.message === "File not found") {
|
|
||||||
error(404, "Invalid file id");
|
|
||||||
} else if (e.message === "Invalid DEK version") {
|
|
||||||
error(400, "Invalid DEK version");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
throw e;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
return createEncContentStream(
|
||||||
|
file.path,
|
||||||
|
file.encContentIv ? Buffer.from(file.encContentIv, "base64") : undefined,
|
||||||
|
range,
|
||||||
|
);
|
||||||
};
|
};
|
||||||
|
|
||||||
export const getFileThumbnailInformation = async (userId: number, fileId: number) => {
|
export const getFileThumbnailStream = async (
|
||||||
const thumbnail = await getFileThumbnail(userId, fileId);
|
userId: number,
|
||||||
|
fileId: number,
|
||||||
|
range?: { start?: number; end?: number },
|
||||||
|
) => {
|
||||||
|
const thumbnail = await MediaRepo.getFileThumbnail(userId, fileId);
|
||||||
if (!thumbnail) {
|
if (!thumbnail) {
|
||||||
error(404, "File or its thumbnail not found");
|
error(404, "File or its thumbnail not found");
|
||||||
}
|
}
|
||||||
|
|
||||||
return { updatedAt: thumbnail.updatedAt, encContentIv: thumbnail.encContentIv };
|
return createEncContentStream(
|
||||||
};
|
thumbnail.path,
|
||||||
|
Buffer.from(thumbnail.encContentIv, "base64"),
|
||||||
export const getFileThumbnailStream = async (userId: number, fileId: number) => {
|
range,
|
||||||
const thumbnail = await getFileThumbnail(userId, fileId);
|
);
|
||||||
if (!thumbnail) {
|
|
||||||
error(404, "File or its thumbnail not found");
|
|
||||||
}
|
|
||||||
|
|
||||||
const { size } = await stat(thumbnail.path);
|
|
||||||
return {
|
|
||||||
encContentStream: Readable.toWeb(createReadStream(thumbnail.path)),
|
|
||||||
encContentSize: size,
|
|
||||||
};
|
|
||||||
};
|
};
|
||||||
|
|
||||||
export const uploadFileThumbnail = async (
|
export const uploadFileThumbnail = async (
|
||||||
@@ -133,7 +95,13 @@ export const uploadFileThumbnail = async (
|
|||||||
try {
|
try {
|
||||||
await pipeline(encContentStream, createWriteStream(path, { flags: "wx", mode: 0o600 }));
|
await pipeline(encContentStream, createWriteStream(path, { flags: "wx", mode: 0o600 }));
|
||||||
|
|
||||||
const oldPath = await updateFileThumbnail(userId, fileId, dekVersion, path, encContentIv);
|
const oldPath = await MediaRepo.updateFileThumbnail(
|
||||||
|
userId,
|
||||||
|
fileId,
|
||||||
|
dekVersion,
|
||||||
|
path,
|
||||||
|
encContentIv,
|
||||||
|
);
|
||||||
safeUnlink(oldPath); // Intended
|
safeUnlink(oldPath); // Intended
|
||||||
} catch (e) {
|
} catch (e) {
|
||||||
await safeUnlink(path);
|
await safeUnlink(path);
|
||||||
@@ -149,75 +117,70 @@ export const uploadFileThumbnail = async (
|
|||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
export const getFileList = async (userId: number) => {
|
export const uploadChunk = async (
|
||||||
const fileIds = await getAllFileIds(userId);
|
|
||||||
return { files: fileIds };
|
|
||||||
};
|
|
||||||
|
|
||||||
export const scanDuplicateFiles = async (
|
|
||||||
userId: number,
|
userId: number,
|
||||||
hskVersion: number,
|
sessionId: string,
|
||||||
contentHmac: string,
|
chunkIndex: number,
|
||||||
|
encChunkStream: Readable,
|
||||||
|
encChunkHash: string,
|
||||||
) => {
|
) => {
|
||||||
const fileIds = await getAllFileIdsByContentHmac(userId, hskVersion, contentHmac);
|
const lockKey = `${sessionId}/${chunkIndex}`;
|
||||||
return { files: fileIds };
|
if (uploadLocks.has(lockKey)) {
|
||||||
};
|
error(409, "Chunk already uploaded"); // TODO: Message
|
||||||
|
} else {
|
||||||
export const scanMissingFileThumbnails = async (userId: number) => {
|
uploadLocks.add(lockKey);
|
||||||
const fileIds = await getMissingFileThumbnails(userId);
|
|
||||||
return { files: fileIds };
|
|
||||||
};
|
|
||||||
|
|
||||||
export const uploadFile = async (
|
|
||||||
params: Omit<NewFile, "path" | "encContentHash">,
|
|
||||||
encContentStream: Readable,
|
|
||||||
encContentHash: Promise<string>,
|
|
||||||
) => {
|
|
||||||
const oneDayAgo = new Date(Date.now() - 24 * 60 * 60 * 1000);
|
|
||||||
const oneMinuteLater = new Date(Date.now() + 60 * 1000);
|
|
||||||
if (params.dekVersion <= oneDayAgo || params.dekVersion >= oneMinuteLater) {
|
|
||||||
error(400, "Invalid DEK version");
|
|
||||||
}
|
}
|
||||||
|
|
||||||
const path = `${env.libraryPath}/${params.userId}/${uuidv4()}`;
|
const filePath = `${getChunkDirectoryPath(sessionId)}/${chunkIndex}`;
|
||||||
await mkdir(dirname(path), { recursive: true });
|
|
||||||
|
|
||||||
try {
|
try {
|
||||||
const hashStream = createHash("sha256");
|
const session = await UploadRepo.getUploadSession(sessionId, userId);
|
||||||
const [, hash] = await Promise.all([
|
if (!session) {
|
||||||
pipeline(
|
error(404, "Invalid upload id");
|
||||||
encContentStream,
|
} else if (chunkIndex >= session.totalChunks) {
|
||||||
async function* (source) {
|
error(400, "Invalid chunk index");
|
||||||
for await (const chunk of source) {
|
} else if (session.uploadedChunks.includes(chunkIndex)) {
|
||||||
hashStream.update(chunk);
|
error(409, "Chunk already uploaded");
|
||||||
yield chunk;
|
|
||||||
}
|
|
||||||
},
|
|
||||||
createWriteStream(path, { flags: "wx", mode: 0o600 }),
|
|
||||||
),
|
|
||||||
encContentHash,
|
|
||||||
]);
|
|
||||||
if (hashStream.digest("base64") !== hash) {
|
|
||||||
throw new Error("Invalid checksum");
|
|
||||||
}
|
}
|
||||||
|
|
||||||
const { id: fileId } = await registerFile({
|
const isLastChunk = chunkIndex === session.totalChunks - 1;
|
||||||
...params,
|
|
||||||
path,
|
|
||||||
encContentHash: hash,
|
|
||||||
});
|
|
||||||
return { fileId };
|
|
||||||
} catch (e) {
|
|
||||||
await safeUnlink(path);
|
|
||||||
|
|
||||||
if (e instanceof IntegrityError && e.message === "Inactive MEK version") {
|
let writtenBytes = 0;
|
||||||
error(400, "Invalid MEK version");
|
const hashStream = createHash("sha256");
|
||||||
|
const writeStream = createWriteStream(filePath, { flags: "wx", mode: 0o600 });
|
||||||
|
|
||||||
|
for await (const chunk of encChunkStream) {
|
||||||
|
writtenBytes += chunk.length;
|
||||||
|
hashStream.update(chunk);
|
||||||
|
writeStream.write(chunk);
|
||||||
|
}
|
||||||
|
|
||||||
|
await new Promise<void>((resolve, reject) => {
|
||||||
|
writeStream.end((e: any) => (e ? reject(e) : resolve()));
|
||||||
|
});
|
||||||
|
|
||||||
|
if (hashStream.digest("base64") !== encChunkHash) {
|
||||||
|
throw new Error("Invalid checksum");
|
||||||
} else if (
|
} else if (
|
||||||
|
(!isLastChunk && writtenBytes !== CHUNK_SIZE + ENCRYPTION_OVERHEAD) ||
|
||||||
|
(isLastChunk &&
|
||||||
|
(writtenBytes <= ENCRYPTION_OVERHEAD || writtenBytes > CHUNK_SIZE + ENCRYPTION_OVERHEAD))
|
||||||
|
) {
|
||||||
|
throw new Error("Invalid chunk size");
|
||||||
|
}
|
||||||
|
|
||||||
|
await UploadRepo.markChunkAsUploaded(sessionId, chunkIndex);
|
||||||
|
} catch (e) {
|
||||||
|
await safeUnlink(filePath);
|
||||||
|
|
||||||
|
if (
|
||||||
e instanceof Error &&
|
e instanceof Error &&
|
||||||
(e.message === "Invalid request body" || e.message === "Invalid checksum")
|
(e.message === "Invalid checksum" || e.message === "Invalid chunk size")
|
||||||
) {
|
) {
|
||||||
error(400, "Invalid request body");
|
error(400, "Invalid request body");
|
||||||
}
|
}
|
||||||
throw e;
|
throw e;
|
||||||
|
} finally {
|
||||||
|
uploadLocks.delete(lockKey);
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -1,31 +0,0 @@
|
|||||||
import { error } from "@sveltejs/kit";
|
|
||||||
import { IntegrityError } from "$lib/server/db/error";
|
|
||||||
import { registerInitialHsk, getAllValidHsks } from "$lib/server/db/hsk";
|
|
||||||
|
|
||||||
export const getHskList = async (userId: number) => {
|
|
||||||
const hsks = await getAllValidHsks(userId);
|
|
||||||
return {
|
|
||||||
encHsks: hsks.map(({ version, state, mekVersion, encHsk }) => ({
|
|
||||||
version,
|
|
||||||
state,
|
|
||||||
mekVersion,
|
|
||||||
encHsk,
|
|
||||||
})),
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
export const registerInitialActiveHsk = async (
|
|
||||||
userId: number,
|
|
||||||
createdBy: number,
|
|
||||||
mekVersion: number,
|
|
||||||
encHsk: string,
|
|
||||||
) => {
|
|
||||||
try {
|
|
||||||
await registerInitialHsk(userId, createdBy, mekVersion, encHsk);
|
|
||||||
} catch (e) {
|
|
||||||
if (e instanceof IntegrityError && e.message === "HSK already registered") {
|
|
||||||
error(409, "Initial HSK already registered");
|
|
||||||
}
|
|
||||||
throw e;
|
|
||||||
}
|
|
||||||
};
|
|
||||||
@@ -1,38 +0,0 @@
|
|||||||
import { error } from "@sveltejs/kit";
|
|
||||||
import { setUserClientStateToActive } from "$lib/server/db/client";
|
|
||||||
import { IntegrityError } from "$lib/server/db/error";
|
|
||||||
import { registerInitialMek, getAllValidClientMeks } from "$lib/server/db/mek";
|
|
||||||
import { verifyClientEncMekSig } from "$lib/server/modules/mek";
|
|
||||||
|
|
||||||
export const getClientMekList = async (userId: number, clientId: number) => {
|
|
||||||
const clientMeks = await getAllValidClientMeks(userId, clientId);
|
|
||||||
return {
|
|
||||||
encMeks: clientMeks.map(({ version, state, encMek, encMekSig }) => ({
|
|
||||||
version,
|
|
||||||
state,
|
|
||||||
encMek,
|
|
||||||
encMekSig,
|
|
||||||
})),
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
export const registerInitialActiveMek = async (
|
|
||||||
userId: number,
|
|
||||||
createdBy: number,
|
|
||||||
encMek: string,
|
|
||||||
encMekSig: string,
|
|
||||||
) => {
|
|
||||||
if (!(await verifyClientEncMekSig(userId, createdBy, 1, encMek, encMekSig))) {
|
|
||||||
error(400, "Invalid signature");
|
|
||||||
}
|
|
||||||
|
|
||||||
try {
|
|
||||||
await registerInitialMek(userId, createdBy, encMek, encMekSig);
|
|
||||||
await setUserClientStateToActive(userId, createdBy);
|
|
||||||
} catch (e) {
|
|
||||||
if (e instanceof IntegrityError && e.message === "MEK already registered") {
|
|
||||||
error(409, "Initial MEK already registered");
|
|
||||||
}
|
|
||||||
throw e;
|
|
||||||
}
|
|
||||||
};
|
|
||||||
@@ -1,15 +0,0 @@
|
|||||||
import { error } from "@sveltejs/kit";
|
|
||||||
import { getUser, setUserNickname } from "$lib/server/db/user";
|
|
||||||
|
|
||||||
export const getUserInformation = async (userId: number) => {
|
|
||||||
const user = await getUser(userId);
|
|
||||||
if (!user) {
|
|
||||||
error(500, "Invalid session id");
|
|
||||||
}
|
|
||||||
|
|
||||||
return { email: user.email, nickname: user.nickname };
|
|
||||||
};
|
|
||||||
|
|
||||||
export const changeNickname = async (userId: number, nickname: string) => {
|
|
||||||
await setUserNickname(userId, nickname);
|
|
||||||
};
|
|
||||||
39
src/lib/serviceWorker/client.ts
Normal file
39
src/lib/serviceWorker/client.ts
Normal file
@@ -0,0 +1,39 @@
|
|||||||
|
import { DECRYPTED_FILE_URL_PREFIX } from "$lib/constants";
|
||||||
|
import type { FileMetadata, ServiceWorkerMessage, ServiceWorkerResponse } from "./types";
|
||||||
|
|
||||||
|
const PREPARE_TIMEOUT_MS = 5000;
|
||||||
|
|
||||||
|
const getServiceWorker = async () => {
|
||||||
|
const registration = await navigator.serviceWorker.ready;
|
||||||
|
const sw = registration.active;
|
||||||
|
if (!sw) {
|
||||||
|
throw new Error("Service worker not activated");
|
||||||
|
}
|
||||||
|
return sw;
|
||||||
|
};
|
||||||
|
|
||||||
|
export const prepareFileDecryption = async (id: number, metadata: FileMetadata) => {
|
||||||
|
const sw = await getServiceWorker();
|
||||||
|
return new Promise<void>((resolve, reject) => {
|
||||||
|
const timeout = setTimeout(
|
||||||
|
() => reject(new Error("Service worker timeout")),
|
||||||
|
PREPARE_TIMEOUT_MS,
|
||||||
|
);
|
||||||
|
const handler = (event: MessageEvent<ServiceWorkerResponse>) => {
|
||||||
|
if (event.data.type === "decryption-ready" && event.data.fileId === id) {
|
||||||
|
clearTimeout(timeout);
|
||||||
|
navigator.serviceWorker.removeEventListener("message", handler);
|
||||||
|
resolve();
|
||||||
|
}
|
||||||
|
};
|
||||||
|
navigator.serviceWorker.addEventListener("message", handler);
|
||||||
|
|
||||||
|
sw.postMessage({
|
||||||
|
type: "decryption-prepare",
|
||||||
|
fileId: id,
|
||||||
|
...metadata,
|
||||||
|
} satisfies ServiceWorkerMessage);
|
||||||
|
});
|
||||||
|
};
|
||||||
|
|
||||||
|
export const getDecryptedFileUrl = (id: number) => `${DECRYPTED_FILE_URL_PREFIX}${id}`;
|
||||||
2
src/lib/serviceWorker/index.ts
Normal file
2
src/lib/serviceWorker/index.ts
Normal file
@@ -0,0 +1,2 @@
|
|||||||
|
export * from "./client";
|
||||||
|
export * from "./types";
|
||||||
19
src/lib/serviceWorker/types.ts
Normal file
19
src/lib/serviceWorker/types.ts
Normal file
@@ -0,0 +1,19 @@
|
|||||||
|
export interface FileMetadata {
|
||||||
|
isLegacy: boolean;
|
||||||
|
dataKey: CryptoKey;
|
||||||
|
encContentSize: number;
|
||||||
|
contentType: string;
|
||||||
|
}
|
||||||
|
|
||||||
|
export interface DecryptionPrepareMessage extends FileMetadata {
|
||||||
|
type: "decryption-prepare";
|
||||||
|
fileId: number;
|
||||||
|
}
|
||||||
|
|
||||||
|
export interface DecryptionReadyMessage {
|
||||||
|
type: "decryption-ready";
|
||||||
|
fileId: number;
|
||||||
|
}
|
||||||
|
|
||||||
|
export type ServiceWorkerMessage = DecryptionPrepareMessage;
|
||||||
|
export type ServiceWorkerResponse = DecryptionReadyMessage;
|
||||||
@@ -1,10 +1,5 @@
|
|||||||
import { callPostApi } from "$lib/hooks";
|
|
||||||
import { encodeToBase64, decryptChallenge, signMessageRSA } from "$lib/modules/crypto";
|
import { encodeToBase64, decryptChallenge, signMessageRSA } from "$lib/modules/crypto";
|
||||||
import type {
|
import { trpc, isTRPCClientError } from "$trpc/client";
|
||||||
SessionUpgradeRequest,
|
|
||||||
SessionUpgradeResponse,
|
|
||||||
SessionUpgradeVerifyRequest,
|
|
||||||
} from "$lib/server/schemas";
|
|
||||||
|
|
||||||
export const requestSessionUpgrade = async (
|
export const requestSessionUpgrade = async (
|
||||||
encryptKeyBase64: string,
|
encryptKeyBase64: string,
|
||||||
@@ -13,27 +8,43 @@ export const requestSessionUpgrade = async (
|
|||||||
signKey: CryptoKey,
|
signKey: CryptoKey,
|
||||||
force = false,
|
force = false,
|
||||||
) => {
|
) => {
|
||||||
let res = await callPostApi<SessionUpgradeRequest>("/api/auth/upgradeSession", {
|
let id, challenge;
|
||||||
encPubKey: encryptKeyBase64,
|
try {
|
||||||
sigPubKey: verifyKeyBase64,
|
({ id, challenge } = await trpc().auth.upgrade.mutate({
|
||||||
});
|
encPubKey: encryptKeyBase64,
|
||||||
if (res.status === 403) return [false, "Unregistered client"] as const;
|
sigPubKey: verifyKeyBase64,
|
||||||
else if (!res.ok) return [false] as const;
|
}));
|
||||||
|
} catch (e) {
|
||||||
const { id, challenge }: SessionUpgradeResponse = await res.json();
|
if (isTRPCClientError(e) && e.data?.code === "FORBIDDEN") {
|
||||||
|
return [false, "Unregistered client"] as const;
|
||||||
|
}
|
||||||
|
return [false] as const;
|
||||||
|
}
|
||||||
const answer = await decryptChallenge(challenge, decryptKey);
|
const answer = await decryptChallenge(challenge, decryptKey);
|
||||||
const answerSig = await signMessageRSA(answer, signKey);
|
const answerSig = await signMessageRSA(answer, signKey);
|
||||||
|
|
||||||
res = await callPostApi<SessionUpgradeVerifyRequest>("/api/auth/upgradeSession/verify", {
|
try {
|
||||||
id,
|
await trpc().auth.verifyUpgrade.mutate({
|
||||||
answerSig: encodeToBase64(answerSig),
|
id,
|
||||||
force,
|
answerSig: encodeToBase64(answerSig),
|
||||||
});
|
force,
|
||||||
if (res.status === 409) return [false, "Already logged in"] as const;
|
});
|
||||||
else return [res.ok] as const;
|
} catch (e) {
|
||||||
|
if (isTRPCClientError(e) && e.data?.code === "CONFLICT") {
|
||||||
|
return [false, "Already logged in"] as const;
|
||||||
|
}
|
||||||
|
return [false] as const;
|
||||||
|
}
|
||||||
|
|
||||||
|
return [true] as const;
|
||||||
};
|
};
|
||||||
|
|
||||||
export const requestLogout = async () => {
|
export const requestLogout = async () => {
|
||||||
const res = await callPostApi("/api/auth/logout");
|
try {
|
||||||
return res.ok;
|
await trpc().auth.logout.mutate();
|
||||||
|
return true;
|
||||||
|
} catch {
|
||||||
|
// TODO: Error Handling
|
||||||
|
return false;
|
||||||
|
}
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
import { callPostApi } from "$lib/hooks";
|
|
||||||
import { generateDataKey, wrapDataKey, encryptString } from "$lib/modules/crypto";
|
import { generateDataKey, wrapDataKey, encryptString } from "$lib/modules/crypto";
|
||||||
import type { CategoryCreateRequest, CategoryFileRemoveRequest } from "$lib/server/schemas";
|
|
||||||
import type { MasterKey } from "$lib/stores";
|
import type { MasterKey } from "$lib/stores";
|
||||||
|
import { trpc } from "$trpc/client";
|
||||||
|
|
||||||
export const requestCategoryCreation = async (
|
export const requestCategoryCreation = async (
|
||||||
name: string,
|
name: string,
|
||||||
@@ -11,21 +10,28 @@ export const requestCategoryCreation = async (
|
|||||||
const { dataKey, dataKeyVersion } = await generateDataKey();
|
const { dataKey, dataKeyVersion } = await generateDataKey();
|
||||||
const nameEncrypted = await encryptString(name, dataKey);
|
const nameEncrypted = await encryptString(name, dataKey);
|
||||||
|
|
||||||
const res = await callPostApi<CategoryCreateRequest>("/api/category/create", {
|
try {
|
||||||
parent: parentId,
|
await trpc().category.create.mutate({
|
||||||
mekVersion: masterKey.version,
|
parent: parentId,
|
||||||
dek: await wrapDataKey(dataKey, masterKey.key),
|
mekVersion: masterKey.version,
|
||||||
dekVersion: dataKeyVersion.toISOString(),
|
dek: await wrapDataKey(dataKey, masterKey.key),
|
||||||
name: nameEncrypted.ciphertext,
|
dekVersion: dataKeyVersion,
|
||||||
nameIv: nameEncrypted.iv,
|
name: nameEncrypted.ciphertext,
|
||||||
});
|
nameIv: nameEncrypted.iv,
|
||||||
return res.ok;
|
});
|
||||||
|
return true;
|
||||||
|
} catch {
|
||||||
|
// TODO: Error Handling
|
||||||
|
return false;
|
||||||
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
export const requestFileRemovalFromCategory = async (fileId: number, categoryId: number) => {
|
export const requestFileRemovalFromCategory = async (fileId: number, categoryId: number) => {
|
||||||
const res = await callPostApi<CategoryFileRemoveRequest>(
|
try {
|
||||||
`/api/category/${categoryId}/file/remove`,
|
await trpc().category.removeFile.mutate({ id: categoryId, file: fileId });
|
||||||
{ file: fileId },
|
return true;
|
||||||
);
|
} catch {
|
||||||
return res.ok;
|
// TODO: Error Handling
|
||||||
|
return false;
|
||||||
|
}
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -1,31 +1,24 @@
|
|||||||
import { callGetApi } from "$lib/hooks";
|
|
||||||
import { getAllFileInfos } from "$lib/indexedDB/filesystem";
|
import { getAllFileInfos } from "$lib/indexedDB/filesystem";
|
||||||
import { decryptData } from "$lib/modules/crypto";
|
import { encodeToBase64 } from "$lib/modules/crypto";
|
||||||
import {
|
import {
|
||||||
getFileCache,
|
getFileCache,
|
||||||
storeFileCache,
|
storeFileCache,
|
||||||
deleteFileCache,
|
deleteFileCache,
|
||||||
getFileThumbnailCache,
|
|
||||||
storeFileThumbnailCache,
|
|
||||||
deleteFileThumbnailCache,
|
|
||||||
downloadFile,
|
downloadFile,
|
||||||
|
deleteFileThumbnailCache,
|
||||||
} from "$lib/modules/file";
|
} from "$lib/modules/file";
|
||||||
import { getThumbnailUrl } from "$lib/modules/thumbnail";
|
import type { FileThumbnailUploadRequest } from "$lib/server/schemas";
|
||||||
import type {
|
import { trpc } from "$trpc/client";
|
||||||
FileThumbnailInfoResponse,
|
|
||||||
FileThumbnailUploadRequest,
|
|
||||||
FileListResponse,
|
|
||||||
} from "$lib/server/schemas";
|
|
||||||
|
|
||||||
export const requestFileDownload = async (
|
export const requestFileDownload = async (
|
||||||
fileId: number,
|
fileId: number,
|
||||||
fileEncryptedIv: string,
|
|
||||||
dataKey: CryptoKey,
|
dataKey: CryptoKey,
|
||||||
|
isLegacy: boolean,
|
||||||
) => {
|
) => {
|
||||||
const cache = await getFileCache(fileId);
|
const cache = await getFileCache(fileId);
|
||||||
if (cache) return cache;
|
if (cache) return cache;
|
||||||
|
|
||||||
const fileBuffer = await downloadFile(fileId, fileEncryptedIv, dataKey);
|
const fileBuffer = await downloadFile(fileId, dataKey, isLegacy);
|
||||||
storeFileCache(fileId, fileBuffer); // Intended
|
storeFileCache(fileId, fileBuffer); // Intended
|
||||||
return fileBuffer;
|
return fileBuffer;
|
||||||
};
|
};
|
||||||
@@ -33,14 +26,14 @@ export const requestFileDownload = async (
|
|||||||
export const requestFileThumbnailUpload = async (
|
export const requestFileThumbnailUpload = async (
|
||||||
fileId: number,
|
fileId: number,
|
||||||
dataKeyVersion: Date,
|
dataKeyVersion: Date,
|
||||||
thumbnailEncrypted: { ciphertext: ArrayBuffer; iv: string },
|
thumbnailEncrypted: { ciphertext: ArrayBuffer; iv: ArrayBuffer },
|
||||||
) => {
|
) => {
|
||||||
const form = new FormData();
|
const form = new FormData();
|
||||||
form.set(
|
form.set(
|
||||||
"metadata",
|
"metadata",
|
||||||
JSON.stringify({
|
JSON.stringify({
|
||||||
dekVersion: dataKeyVersion.toISOString(),
|
dekVersion: dataKeyVersion.toISOString(),
|
||||||
contentIv: thumbnailEncrypted.iv,
|
contentIv: encodeToBase64(thumbnailEncrypted.iv),
|
||||||
} satisfies FileThumbnailUploadRequest),
|
} satisfies FileThumbnailUploadRequest),
|
||||||
);
|
);
|
||||||
form.set("content", new Blob([thumbnailEncrypted.ciphertext]));
|
form.set("content", new Blob([thumbnailEncrypted.ciphertext]));
|
||||||
@@ -48,30 +41,15 @@ export const requestFileThumbnailUpload = async (
|
|||||||
return await fetch(`/api/file/${fileId}/thumbnail/upload`, { method: "POST", body: form });
|
return await fetch(`/api/file/${fileId}/thumbnail/upload`, { method: "POST", body: form });
|
||||||
};
|
};
|
||||||
|
|
||||||
export const requestFileThumbnailDownload = async (fileId: number, dataKey: CryptoKey) => {
|
|
||||||
const cache = await getFileThumbnailCache(fileId);
|
|
||||||
if (cache) return cache;
|
|
||||||
|
|
||||||
let res = await callGetApi(`/api/file/${fileId}/thumbnail`);
|
|
||||||
if (!res.ok) return null;
|
|
||||||
|
|
||||||
const { contentIv: thumbnailEncryptedIv }: FileThumbnailInfoResponse = await res.json();
|
|
||||||
|
|
||||||
res = await callGetApi(`/api/file/${fileId}/thumbnail/download`);
|
|
||||||
if (!res.ok) return null;
|
|
||||||
|
|
||||||
const thumbnailEncrypted = await res.arrayBuffer();
|
|
||||||
const thumbnailBuffer = await decryptData(thumbnailEncrypted, thumbnailEncryptedIv, dataKey);
|
|
||||||
|
|
||||||
storeFileThumbnailCache(fileId, thumbnailBuffer); // Intended
|
|
||||||
return getThumbnailUrl(thumbnailBuffer);
|
|
||||||
};
|
|
||||||
|
|
||||||
export const requestDeletedFilesCleanup = async () => {
|
export const requestDeletedFilesCleanup = async () => {
|
||||||
const res = await callGetApi("/api/file/list");
|
let liveFiles;
|
||||||
if (!res.ok) return;
|
try {
|
||||||
|
liveFiles = await trpc().file.list.query();
|
||||||
|
} catch {
|
||||||
|
// TODO: Error Handling
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
const { files: liveFiles }: FileListResponse = await res.json();
|
|
||||||
const liveFilesSet = new Set(liveFiles);
|
const liveFilesSet = new Set(liveFiles);
|
||||||
const maybeCachedFiles = await getAllFileInfos();
|
const maybeCachedFiles = await getAllFileInfos();
|
||||||
|
|
||||||
|
|||||||
@@ -1,4 +1,3 @@
|
|||||||
import { callGetApi, callPostApi } from "$lib/hooks";
|
|
||||||
import { storeMasterKeys } from "$lib/indexedDB";
|
import { storeMasterKeys } from "$lib/indexedDB";
|
||||||
import {
|
import {
|
||||||
encodeToBase64,
|
encodeToBase64,
|
||||||
@@ -9,16 +8,9 @@ import {
|
|||||||
signMasterKeyWrapped,
|
signMasterKeyWrapped,
|
||||||
verifyMasterKeyWrapped,
|
verifyMasterKeyWrapped,
|
||||||
} from "$lib/modules/crypto";
|
} from "$lib/modules/crypto";
|
||||||
import type {
|
|
||||||
ClientRegisterRequest,
|
|
||||||
ClientRegisterResponse,
|
|
||||||
ClientRegisterVerifyRequest,
|
|
||||||
InitialHmacSecretRegisterRequest,
|
|
||||||
MasterKeyListResponse,
|
|
||||||
InitialMasterKeyRegisterRequest,
|
|
||||||
} from "$lib/server/schemas";
|
|
||||||
import { requestSessionUpgrade } from "$lib/services/auth";
|
import { requestSessionUpgrade } from "$lib/services/auth";
|
||||||
import { masterKeyStore, type ClientKeys } from "$lib/stores";
|
import { masterKeyStore, type ClientKeys } from "$lib/stores";
|
||||||
|
import { trpc, isTRPCClientError } from "$trpc/client";
|
||||||
|
|
||||||
export const requestClientRegistration = async (
|
export const requestClientRegistration = async (
|
||||||
encryptKeyBase64: string,
|
encryptKeyBase64: string,
|
||||||
@@ -26,21 +18,22 @@ export const requestClientRegistration = async (
|
|||||||
verifyKeyBase64: string,
|
verifyKeyBase64: string,
|
||||||
signKey: CryptoKey,
|
signKey: CryptoKey,
|
||||||
) => {
|
) => {
|
||||||
let res = await callPostApi<ClientRegisterRequest>("/api/client/register", {
|
try {
|
||||||
encPubKey: encryptKeyBase64,
|
const { id, challenge } = await trpc().client.register.mutate({
|
||||||
sigPubKey: verifyKeyBase64,
|
encPubKey: encryptKeyBase64,
|
||||||
});
|
sigPubKey: verifyKeyBase64,
|
||||||
if (!res.ok) return false;
|
});
|
||||||
|
const answer = await decryptChallenge(challenge, decryptKey);
|
||||||
const { id, challenge }: ClientRegisterResponse = await res.json();
|
const answerSig = await signMessageRSA(answer, signKey);
|
||||||
const answer = await decryptChallenge(challenge, decryptKey);
|
await trpc().client.verify.mutate({
|
||||||
const answerSig = await signMessageRSA(answer, signKey);
|
id,
|
||||||
|
answerSig: encodeToBase64(answerSig),
|
||||||
res = await callPostApi<ClientRegisterVerifyRequest>("/api/client/register/verify", {
|
});
|
||||||
id,
|
return true;
|
||||||
answerSig: encodeToBase64(answerSig),
|
} catch {
|
||||||
});
|
// TODO: Error Handling
|
||||||
return res.ok;
|
return false;
|
||||||
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
export const requestClientRegistrationAndSessionUpgrade = async (
|
export const requestClientRegistrationAndSessionUpgrade = async (
|
||||||
@@ -73,10 +66,14 @@ export const requestClientRegistrationAndSessionUpgrade = async (
|
|||||||
};
|
};
|
||||||
|
|
||||||
export const requestMasterKeyDownload = async (decryptKey: CryptoKey, verifyKey: CryptoKey) => {
|
export const requestMasterKeyDownload = async (decryptKey: CryptoKey, verifyKey: CryptoKey) => {
|
||||||
const res = await callGetApi("/api/mek/list");
|
let masterKeysWrapped;
|
||||||
if (!res.ok) return false;
|
try {
|
||||||
|
masterKeysWrapped = await trpc().mek.list.query();
|
||||||
|
} catch {
|
||||||
|
// TODO: Error Handling
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
const { meks: masterKeysWrapped }: MasterKeyListResponse = await res.json();
|
|
||||||
const masterKeys = await Promise.all(
|
const masterKeys = await Promise.all(
|
||||||
masterKeysWrapped.map(
|
masterKeysWrapped.map(
|
||||||
async ({ version, state, mek: masterKeyWrapped, mekSig: masterKeyWrappedSig }) => {
|
async ({ version, state, mek: masterKeyWrapped, mekSig: masterKeyWrappedSig }) => {
|
||||||
@@ -108,17 +105,27 @@ export const requestInitialMasterKeyAndHmacSecretRegistration = async (
|
|||||||
hmacSecretWrapped: string,
|
hmacSecretWrapped: string,
|
||||||
signKey: CryptoKey,
|
signKey: CryptoKey,
|
||||||
) => {
|
) => {
|
||||||
let res = await callPostApi<InitialMasterKeyRegisterRequest>("/api/mek/register/initial", {
|
try {
|
||||||
mek: masterKeyWrapped,
|
await trpc().mek.registerInitial.mutate({
|
||||||
mekSig: await signMasterKeyWrapped(masterKeyWrapped, 1, signKey),
|
mek: masterKeyWrapped,
|
||||||
});
|
mekSig: await signMasterKeyWrapped(masterKeyWrapped, 1, signKey),
|
||||||
if (!res.ok) {
|
});
|
||||||
return res.status === 403 || res.status === 409;
|
} catch (e) {
|
||||||
|
if (isTRPCClientError(e) && (e.data?.code === "FORBIDDEN" || e.data?.code === "CONFLICT")) {
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
// TODO: Error Handling
|
||||||
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
res = await callPostApi<InitialHmacSecretRegisterRequest>("/api/hsk/register/initial", {
|
try {
|
||||||
mekVersion: 1,
|
await trpc().hsk.registerInitial.mutate({
|
||||||
hsk: hmacSecretWrapped,
|
mekVersion: 1,
|
||||||
});
|
hsk: hmacSecretWrapped,
|
||||||
return res.ok;
|
});
|
||||||
|
return true;
|
||||||
|
} catch {
|
||||||
|
// TODO: Error Handling
|
||||||
|
return false;
|
||||||
|
}
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -1,49 +0,0 @@
|
|||||||
import { writable, type Writable } from "svelte/store";
|
|
||||||
|
|
||||||
export interface FileUploadStatus {
|
|
||||||
name: string;
|
|
||||||
parentId: "root" | number;
|
|
||||||
status:
|
|
||||||
| "encryption-pending"
|
|
||||||
| "encrypting"
|
|
||||||
| "upload-pending"
|
|
||||||
| "uploading"
|
|
||||||
| "uploaded"
|
|
||||||
| "canceled"
|
|
||||||
| "error";
|
|
||||||
progress?: number;
|
|
||||||
rate?: number;
|
|
||||||
estimated?: number;
|
|
||||||
}
|
|
||||||
|
|
||||||
export interface FileDownloadStatus {
|
|
||||||
id: number;
|
|
||||||
status:
|
|
||||||
| "download-pending"
|
|
||||||
| "downloading"
|
|
||||||
| "decryption-pending"
|
|
||||||
| "decrypting"
|
|
||||||
| "decrypted"
|
|
||||||
| "canceled"
|
|
||||||
| "error";
|
|
||||||
progress?: number;
|
|
||||||
rate?: number;
|
|
||||||
estimated?: number;
|
|
||||||
result?: ArrayBuffer;
|
|
||||||
}
|
|
||||||
|
|
||||||
export const fileUploadStatusStore = writable<Writable<FileUploadStatus>[]>([]);
|
|
||||||
|
|
||||||
export const fileDownloadStatusStore = writable<Writable<FileDownloadStatus>[]>([]);
|
|
||||||
|
|
||||||
export const isFileUploading = (
|
|
||||||
status: FileUploadStatus["status"],
|
|
||||||
): status is "encryption-pending" | "encrypting" | "upload-pending" | "uploading" => {
|
|
||||||
return ["encryption-pending", "encrypting", "upload-pending", "uploading"].includes(status);
|
|
||||||
};
|
|
||||||
|
|
||||||
export const isFileDownloading = (
|
|
||||||
status: FileDownloadStatus["status"],
|
|
||||||
): status is "download-pending" | "downloading" | "decryption-pending" | "decrypting" => {
|
|
||||||
return ["download-pending", "downloading", "decryption-pending", "decrypting"].includes(status);
|
|
||||||
};
|
|
||||||
@@ -1,2 +1 @@
|
|||||||
export * from "./file";
|
|
||||||
export * from "./key";
|
export * from "./key";
|
||||||
|
|||||||
2
src/lib/types/filesystem.d.ts
vendored
Normal file
2
src/lib/types/filesystem.d.ts
vendored
Normal file
@@ -0,0 +1,2 @@
|
|||||||
|
type DirectoryId = "root" | number;
|
||||||
|
type CategoryId = "root" | number;
|
||||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user