mirror of
https://github.com/kmc7468/arkvault.git
synced 2026-02-04 16:16:55 +00:00
Compare commits
4 Commits
f059f0d7c4
...
3fc29cf8db
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
3fc29cf8db | ||
|
|
b92b4a0b1b | ||
|
|
6d95059450 | ||
|
|
a08ddf2c09 |
43
package.json
43
package.json
@@ -17,51 +17,52 @@
|
|||||||
},
|
},
|
||||||
"devDependencies": {
|
"devDependencies": {
|
||||||
"@eslint/compat": "^1.4.1",
|
"@eslint/compat": "^1.4.1",
|
||||||
"@iconify-json/material-symbols": "^1.2.44",
|
"@iconify-json/material-symbols": "^1.2.50",
|
||||||
"@sveltejs/adapter-node": "^5.4.0",
|
"@sveltejs/adapter-node": "^5.4.0",
|
||||||
"@sveltejs/kit": "^2.48.4",
|
"@sveltejs/kit": "^2.49.2",
|
||||||
"@sveltejs/vite-plugin-svelte": "^6.2.1",
|
"@sveltejs/vite-plugin-svelte": "^6.2.1",
|
||||||
"@trpc/client": "^11.7.1",
|
"@trpc/client": "^11.8.1",
|
||||||
"@types/file-saver": "^2.0.7",
|
"@types/file-saver": "^2.0.7",
|
||||||
"@types/ms": "^0.7.34",
|
"@types/ms": "^0.7.34",
|
||||||
"@types/node-schedule": "^2.1.8",
|
"@types/node-schedule": "^2.1.8",
|
||||||
"@types/pg": "^8.15.6",
|
"@types/pg": "^8.16.0",
|
||||||
"autoprefixer": "^10.4.21",
|
"autoprefixer": "^10.4.23",
|
||||||
"axios": "^1.13.1",
|
"axios": "^1.13.2",
|
||||||
"dexie": "^4.2.1",
|
"dexie": "^4.2.1",
|
||||||
"eslint": "^9.39.0",
|
"eslint": "^9.39.2",
|
||||||
"eslint-config-prettier": "^10.1.8",
|
"eslint-config-prettier": "^10.1.8",
|
||||||
"eslint-plugin-svelte": "^3.13.0",
|
"eslint-plugin-svelte": "^3.13.1",
|
||||||
"eslint-plugin-tailwindcss": "^3.18.2",
|
"eslint-plugin-tailwindcss": "^3.18.2",
|
||||||
"exifreader": "^4.32.0",
|
"exifreader": "^4.33.1",
|
||||||
"file-saver": "^2.0.5",
|
"file-saver": "^2.0.5",
|
||||||
"globals": "^16.5.0",
|
"globals": "^16.5.0",
|
||||||
"heic2any": "^0.0.4",
|
"heic2any": "^0.0.4",
|
||||||
"kysely-ctl": "^0.19.0",
|
"kysely-ctl": "^0.19.0",
|
||||||
"lru-cache": "^11.2.2",
|
"lru-cache": "^11.2.4",
|
||||||
"mime": "^4.1.0",
|
"mime": "^4.1.0",
|
||||||
"p-limit": "^7.2.0",
|
"p-limit": "^7.2.0",
|
||||||
"prettier": "^3.6.2",
|
"prettier": "^3.7.4",
|
||||||
"prettier-plugin-svelte": "^3.4.0",
|
"prettier-plugin-svelte": "^3.4.1",
|
||||||
"prettier-plugin-tailwindcss": "^0.7.1",
|
"prettier-plugin-tailwindcss": "^0.7.2",
|
||||||
"svelte": "^5.43.2",
|
"svelte": "^5.46.1",
|
||||||
"svelte-check": "^4.3.3",
|
"svelte-check": "^4.3.5",
|
||||||
"tailwindcss": "^3.4.18",
|
"tailwindcss": "^3.4.19",
|
||||||
"typescript": "^5.9.3",
|
"typescript": "^5.9.3",
|
||||||
"typescript-eslint": "^8.46.2",
|
"typescript-eslint": "^8.50.1",
|
||||||
"unplugin-icons": "^22.5.0",
|
"unplugin-icons": "^22.5.0",
|
||||||
"vite": "^7.1.12"
|
"vite": "^7.3.0"
|
||||||
},
|
},
|
||||||
"dependencies": {
|
"dependencies": {
|
||||||
"@fastify/busboy": "^3.2.0",
|
"@fastify/busboy": "^3.2.0",
|
||||||
"@trpc/server": "^11.7.1",
|
"@trpc/server": "^11.8.1",
|
||||||
"argon2": "^0.44.0",
|
"argon2": "^0.44.0",
|
||||||
"kysely": "^0.28.8",
|
"kysely": "^0.28.9",
|
||||||
"ms": "^2.1.3",
|
"ms": "^2.1.3",
|
||||||
"node-schedule": "^2.1.1",
|
"node-schedule": "^2.1.1",
|
||||||
"pg": "^8.16.3",
|
"pg": "^8.16.3",
|
||||||
|
"superjson": "^2.2.6",
|
||||||
"uuid": "^13.0.0",
|
"uuid": "^13.0.0",
|
||||||
"zod": "^3.25.76"
|
"zod": "^4.2.1"
|
||||||
},
|
},
|
||||||
"engines": {
|
"engines": {
|
||||||
"node": "^22.0.0",
|
"node": "^22.0.0",
|
||||||
|
|||||||
1359
pnpm-lock.yaml
generated
1359
pnpm-lock.yaml
generated
File diff suppressed because it is too large
Load Diff
@@ -13,8 +13,6 @@ import {
|
|||||||
} from "$lib/modules/crypto";
|
} from "$lib/modules/crypto";
|
||||||
import { generateThumbnail } from "$lib/modules/thumbnail";
|
import { generateThumbnail } from "$lib/modules/thumbnail";
|
||||||
import type {
|
import type {
|
||||||
DuplicateFileScanRequest,
|
|
||||||
DuplicateFileScanResponse,
|
|
||||||
FileThumbnailUploadRequest,
|
FileThumbnailUploadRequest,
|
||||||
FileUploadRequest,
|
FileUploadRequest,
|
||||||
FileUploadResponse,
|
FileUploadResponse,
|
||||||
@@ -25,18 +23,18 @@ import {
|
|||||||
type HmacSecret,
|
type HmacSecret,
|
||||||
type FileUploadStatus,
|
type FileUploadStatus,
|
||||||
} from "$lib/stores";
|
} from "$lib/stores";
|
||||||
|
import { useTRPC } from "$trpc/client";
|
||||||
|
|
||||||
const requestDuplicateFileScan = limitFunction(
|
const requestDuplicateFileScan = limitFunction(
|
||||||
async (file: File, hmacSecret: HmacSecret, onDuplicate: () => Promise<boolean>) => {
|
async (file: File, hmacSecret: HmacSecret, onDuplicate: () => Promise<boolean>) => {
|
||||||
|
const trpc = useTRPC();
|
||||||
const fileBuffer = await file.arrayBuffer();
|
const fileBuffer = await file.arrayBuffer();
|
||||||
const fileSigned = encodeToBase64(await signMessageHmac(fileBuffer, hmacSecret.secret));
|
const fileSigned = encodeToBase64(await signMessageHmac(fileBuffer, hmacSecret.secret));
|
||||||
|
|
||||||
const res = await axios.post("/api/file/scanDuplicates", {
|
const files = await trpc.file.listByHash.query({
|
||||||
hskVersion: hmacSecret.version,
|
hskVersion: hmacSecret.version,
|
||||||
contentHmac: fileSigned,
|
contentHmac: fileSigned,
|
||||||
} satisfies DuplicateFileScanRequest);
|
});
|
||||||
const { files }: DuplicateFileScanResponse = res.data;
|
|
||||||
|
|
||||||
if (files.length === 0 || (await onDuplicate())) {
|
if (files.length === 0 || (await onDuplicate())) {
|
||||||
return { fileBuffer, fileSigned };
|
return { fileBuffer, fileSigned };
|
||||||
} else {
|
} else {
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
|
import { TRPCClientError } from "@trpc/client";
|
||||||
import { get, writable, type Writable } from "svelte/store";
|
import { get, writable, type Writable } from "svelte/store";
|
||||||
import { callGetApi } from "$lib/hooks";
|
|
||||||
import {
|
import {
|
||||||
getDirectoryInfos as getDirectoryInfosFromIndexedDB,
|
getDirectoryInfos as getDirectoryInfosFromIndexedDB,
|
||||||
getDirectoryInfo as getDirectoryInfoFromIndexedDB,
|
getDirectoryInfo as getDirectoryInfoFromIndexedDB,
|
||||||
@@ -18,12 +18,7 @@ import {
|
|||||||
type CategoryId,
|
type CategoryId,
|
||||||
} from "$lib/indexedDB";
|
} from "$lib/indexedDB";
|
||||||
import { unwrapDataKey, decryptString } from "$lib/modules/crypto";
|
import { unwrapDataKey, decryptString } from "$lib/modules/crypto";
|
||||||
import type {
|
import { useTRPC } from "$trpc/client";
|
||||||
CategoryInfoResponse,
|
|
||||||
CategoryFileListResponse,
|
|
||||||
DirectoryInfoResponse,
|
|
||||||
FileInfoResponse,
|
|
||||||
} from "$lib/server/schemas";
|
|
||||||
|
|
||||||
export type DirectoryInfo =
|
export type DirectoryInfo =
|
||||||
| {
|
| {
|
||||||
@@ -106,20 +101,20 @@ const fetchDirectoryInfoFromServer = async (
|
|||||||
info: Writable<DirectoryInfo | null>,
|
info: Writable<DirectoryInfo | null>,
|
||||||
masterKey: CryptoKey,
|
masterKey: CryptoKey,
|
||||||
) => {
|
) => {
|
||||||
const res = await callGetApi(`/api/directory/${id}`);
|
const trpc = useTRPC();
|
||||||
if (res.status === 404) {
|
let data;
|
||||||
|
try {
|
||||||
|
data = await trpc.directory.get.query({ id });
|
||||||
|
} catch (e) {
|
||||||
|
if (e instanceof TRPCClientError && e.data?.code === "NOT_FOUND") {
|
||||||
info.set(null);
|
info.set(null);
|
||||||
await deleteDirectoryInfo(id as number);
|
await deleteDirectoryInfo(id as number);
|
||||||
return;
|
return;
|
||||||
} else if (!res.ok) {
|
}
|
||||||
throw new Error("Failed to fetch directory information");
|
throw new Error("Failed to fetch directory information");
|
||||||
}
|
}
|
||||||
|
|
||||||
const {
|
const { metadata, subDirectories: subDirectoryIds, files: fileIds } = data;
|
||||||
metadata,
|
|
||||||
subDirectories: subDirectoryIds,
|
|
||||||
files: fileIds,
|
|
||||||
}: DirectoryInfoResponse = await res.json();
|
|
||||||
|
|
||||||
if (id === "root") {
|
if (id === "root") {
|
||||||
info.set({ id, subDirectoryIds, fileIds });
|
info.set({ id, subDirectoryIds, fileIds });
|
||||||
@@ -179,16 +174,18 @@ const fetchFileInfoFromServer = async (
|
|||||||
info: Writable<FileInfo | null>,
|
info: Writable<FileInfo | null>,
|
||||||
masterKey: CryptoKey,
|
masterKey: CryptoKey,
|
||||||
) => {
|
) => {
|
||||||
const res = await callGetApi(`/api/file/${id}`);
|
const trpc = useTRPC();
|
||||||
if (res.status === 404) {
|
let metadata;
|
||||||
|
try {
|
||||||
|
metadata = await trpc.file.get.query({ id });
|
||||||
|
} catch (e) {
|
||||||
|
if (e instanceof TRPCClientError && e.data?.code === "NOT_FOUND") {
|
||||||
info.set(null);
|
info.set(null);
|
||||||
await deleteFileInfo(id);
|
await deleteFileInfo(id);
|
||||||
return;
|
return;
|
||||||
} else if (!res.ok) {
|
}
|
||||||
throw new Error("Failed to fetch file information");
|
throw new Error("Failed to fetch file information");
|
||||||
}
|
}
|
||||||
|
|
||||||
const metadata: FileInfoResponse = await res.json();
|
|
||||||
const { dataKey } = await unwrapDataKey(metadata.dek, masterKey);
|
const { dataKey } = await unwrapDataKey(metadata.dek, masterKey);
|
||||||
|
|
||||||
const name = await decryptString(metadata.name, metadata.nameIv, dataKey);
|
const name = await decryptString(metadata.name, metadata.nameIv, dataKey);
|
||||||
@@ -273,16 +270,20 @@ const fetchCategoryInfoFromServer = async (
|
|||||||
info: Writable<CategoryInfo | null>,
|
info: Writable<CategoryInfo | null>,
|
||||||
masterKey: CryptoKey,
|
masterKey: CryptoKey,
|
||||||
) => {
|
) => {
|
||||||
let res = await callGetApi(`/api/category/${id}`);
|
const trpc = useTRPC();
|
||||||
if (res.status === 404) {
|
let data;
|
||||||
|
try {
|
||||||
|
data = await trpc.category.get.query({ id });
|
||||||
|
} catch (e) {
|
||||||
|
if (e instanceof TRPCClientError && e.data?.code === "NOT_FOUND") {
|
||||||
info.set(null);
|
info.set(null);
|
||||||
await deleteCategoryInfo(id as number);
|
await deleteCategoryInfo(id as number);
|
||||||
return;
|
return;
|
||||||
} else if (!res.ok) {
|
}
|
||||||
throw new Error("Failed to fetch category information");
|
throw new Error("Failed to fetch category information");
|
||||||
}
|
}
|
||||||
|
|
||||||
const { metadata, subCategories }: CategoryInfoResponse = await res.json();
|
const { metadata, subCategories } = data;
|
||||||
|
|
||||||
if (id === "root") {
|
if (id === "root") {
|
||||||
info.set({ id, subCategoryIds: subCategories });
|
info.set({ id, subCategoryIds: subCategories });
|
||||||
@@ -290,12 +291,13 @@ const fetchCategoryInfoFromServer = async (
|
|||||||
const { dataKey } = await unwrapDataKey(metadata!.dek, masterKey);
|
const { dataKey } = await unwrapDataKey(metadata!.dek, masterKey);
|
||||||
const name = await decryptString(metadata!.name, metadata!.nameIv, dataKey);
|
const name = await decryptString(metadata!.name, metadata!.nameIv, dataKey);
|
||||||
|
|
||||||
res = await callGetApi(`/api/category/${id}/file/list?recurse=true`);
|
let files;
|
||||||
if (!res.ok) {
|
try {
|
||||||
|
files = await trpc.category.files.query({ id, recurse: true });
|
||||||
|
} catch {
|
||||||
throw new Error("Failed to fetch category files");
|
throw new Error("Failed to fetch category files");
|
||||||
}
|
}
|
||||||
|
|
||||||
const { files }: CategoryFileListResponse = await res.json();
|
|
||||||
const filesMapped = files.map(({ file, isRecursive }) => ({ id: file, isRecursive }));
|
const filesMapped = files.map(({ file, isRecursive }) => ({ id: file, isRecursive }));
|
||||||
let isFileRecursive: boolean | undefined = undefined;
|
let isFileRecursive: boolean | undefined = undefined;
|
||||||
|
|
||||||
|
|||||||
@@ -5,14 +5,14 @@ import type { ClientKeys } from "$lib/stores";
|
|||||||
const serializedClientKeysSchema = z.intersection(
|
const serializedClientKeysSchema = z.intersection(
|
||||||
z.object({
|
z.object({
|
||||||
generator: z.literal("ArkVault"),
|
generator: z.literal("ArkVault"),
|
||||||
exportedAt: z.string().datetime(),
|
exportedAt: z.iso.datetime(),
|
||||||
}),
|
}),
|
||||||
z.object({
|
z.object({
|
||||||
version: z.literal(1),
|
version: z.literal(1),
|
||||||
encryptKey: z.string().base64().nonempty(),
|
encryptKey: z.base64().nonempty(),
|
||||||
decryptKey: z.string().base64().nonempty(),
|
decryptKey: z.base64().nonempty(),
|
||||||
signKey: z.string().base64().nonempty(),
|
signKey: z.base64().nonempty(),
|
||||||
verifyKey: z.string().base64().nonempty(),
|
verifyKey: z.base64().nonempty(),
|
||||||
}),
|
}),
|
||||||
);
|
);
|
||||||
|
|
||||||
|
|||||||
@@ -27,10 +27,6 @@ export const getUserByEmail = async (email: string) => {
|
|||||||
return user ? (user satisfies User) : null;
|
return user ? (user satisfies User) : null;
|
||||||
};
|
};
|
||||||
|
|
||||||
export const setUserNickname = async (userId: number, nickname: string) => {
|
|
||||||
await db.updateTable("user").set({ nickname }).where("id", "=", userId).execute();
|
|
||||||
};
|
|
||||||
|
|
||||||
export const setUserPassword = async (userId: number, password: string) => {
|
export const setUserPassword = async (userId: number, password: string) => {
|
||||||
await db.updateTable("user").set({ password }).where("id", "=", userId).execute();
|
await db.updateTable("user").set({ password }).where("id", "=", userId).execute();
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -3,11 +3,6 @@ import env from "$lib/server/loadenv";
|
|||||||
import { authenticate, AuthenticationError } from "$lib/server/modules/auth";
|
import { authenticate, AuthenticationError } from "$lib/server/modules/auth";
|
||||||
|
|
||||||
export const authenticateMiddleware: Handle = async ({ event, resolve }) => {
|
export const authenticateMiddleware: Handle = async ({ event, resolve }) => {
|
||||||
const { pathname, search } = event.url;
|
|
||||||
if (pathname === "/api/auth/login" || pathname.startsWith("/api/trpc")) {
|
|
||||||
return await resolve(event);
|
|
||||||
}
|
|
||||||
|
|
||||||
try {
|
try {
|
||||||
const sessionIdSigned = event.cookies.get("sessionId");
|
const sessionIdSigned = event.cookies.get("sessionId");
|
||||||
if (!sessionIdSigned) {
|
if (!sessionIdSigned) {
|
||||||
@@ -24,7 +19,8 @@ export const authenticateMiddleware: Handle = async ({ event, resolve }) => {
|
|||||||
});
|
});
|
||||||
} catch (e) {
|
} catch (e) {
|
||||||
if (e instanceof AuthenticationError) {
|
if (e instanceof AuthenticationError) {
|
||||||
if (pathname === "/auth/login") {
|
const { pathname, search } = event.url;
|
||||||
|
if (pathname === "/auth/login" || pathname.startsWith("/api/trpc")) {
|
||||||
return await resolve(event);
|
return await resolve(event);
|
||||||
} else if (pathname.startsWith("/api")) {
|
} else if (pathname.startsWith("/api")) {
|
||||||
error(e.status, e.message);
|
error(e.status, e.message);
|
||||||
|
|||||||
7
src/lib/server/modules/filesystem.ts
Normal file
7
src/lib/server/modules/filesystem.ts
Normal file
@@ -0,0 +1,7 @@
|
|||||||
|
import { unlink } from "fs/promises";
|
||||||
|
|
||||||
|
export const safeUnlink = async (path: string | null | undefined) => {
|
||||||
|
if (path) {
|
||||||
|
await unlink(path).catch(console.error);
|
||||||
|
}
|
||||||
|
};
|
||||||
@@ -1,32 +0,0 @@
|
|||||||
import { z } from "zod";
|
|
||||||
|
|
||||||
export const passwordChangeRequest = z.object({
|
|
||||||
oldPassword: z.string().trim().nonempty(),
|
|
||||||
newPassword: z.string().trim().nonempty(),
|
|
||||||
});
|
|
||||||
export type PasswordChangeRequest = z.input<typeof passwordChangeRequest>;
|
|
||||||
|
|
||||||
export const loginRequest = z.object({
|
|
||||||
email: z.string().email(),
|
|
||||||
password: z.string().trim().nonempty(),
|
|
||||||
});
|
|
||||||
export type LoginRequest = z.input<typeof loginRequest>;
|
|
||||||
|
|
||||||
export const sessionUpgradeRequest = z.object({
|
|
||||||
encPubKey: z.string().base64().nonempty(),
|
|
||||||
sigPubKey: z.string().base64().nonempty(),
|
|
||||||
});
|
|
||||||
export type SessionUpgradeRequest = z.input<typeof sessionUpgradeRequest>;
|
|
||||||
|
|
||||||
export const sessionUpgradeResponse = z.object({
|
|
||||||
id: z.number().int().positive(),
|
|
||||||
challenge: z.string().base64().nonempty(),
|
|
||||||
});
|
|
||||||
export type SessionUpgradeResponse = z.output<typeof sessionUpgradeResponse>;
|
|
||||||
|
|
||||||
export const sessionUpgradeVerifyRequest = z.object({
|
|
||||||
id: z.number().int().positive(),
|
|
||||||
answerSig: z.string().base64().nonempty(),
|
|
||||||
force: z.boolean().default(false),
|
|
||||||
});
|
|
||||||
export type SessionUpgradeVerifyRequest = z.input<typeof sessionUpgradeVerifyRequest>;
|
|
||||||
@@ -1,55 +1,3 @@
|
|||||||
import { z } from "zod";
|
import { z } from "zod";
|
||||||
|
|
||||||
export const categoryIdSchema = z.union([z.literal("root"), z.number().int().positive()]);
|
export const categoryIdSchema = z.union([z.literal("root"), z.int().positive()]);
|
||||||
|
|
||||||
export const categoryInfoResponse = z.object({
|
|
||||||
metadata: z
|
|
||||||
.object({
|
|
||||||
parent: categoryIdSchema,
|
|
||||||
mekVersion: z.number().int().positive(),
|
|
||||||
dek: z.string().base64().nonempty(),
|
|
||||||
dekVersion: z.string().datetime(),
|
|
||||||
name: z.string().base64().nonempty(),
|
|
||||||
nameIv: z.string().base64().nonempty(),
|
|
||||||
})
|
|
||||||
.optional(),
|
|
||||||
subCategories: z.number().int().positive().array(),
|
|
||||||
});
|
|
||||||
export type CategoryInfoResponse = z.output<typeof categoryInfoResponse>;
|
|
||||||
|
|
||||||
export const categoryFileAddRequest = z.object({
|
|
||||||
file: z.number().int().positive(),
|
|
||||||
});
|
|
||||||
export type CategoryFileAddRequest = z.input<typeof categoryFileAddRequest>;
|
|
||||||
|
|
||||||
export const categoryFileListResponse = z.object({
|
|
||||||
files: z.array(
|
|
||||||
z.object({
|
|
||||||
file: z.number().int().positive(),
|
|
||||||
isRecursive: z.boolean(),
|
|
||||||
}),
|
|
||||||
),
|
|
||||||
});
|
|
||||||
export type CategoryFileListResponse = z.output<typeof categoryFileListResponse>;
|
|
||||||
|
|
||||||
export const categoryFileRemoveRequest = z.object({
|
|
||||||
file: z.number().int().positive(),
|
|
||||||
});
|
|
||||||
export type CategoryFileRemoveRequest = z.input<typeof categoryFileRemoveRequest>;
|
|
||||||
|
|
||||||
export const categoryRenameRequest = z.object({
|
|
||||||
dekVersion: z.string().datetime(),
|
|
||||||
name: z.string().base64().nonempty(),
|
|
||||||
nameIv: z.string().base64().nonempty(),
|
|
||||||
});
|
|
||||||
export type CategoryRenameRequest = z.input<typeof categoryRenameRequest>;
|
|
||||||
|
|
||||||
export const categoryCreateRequest = z.object({
|
|
||||||
parent: categoryIdSchema,
|
|
||||||
mekVersion: z.number().int().positive(),
|
|
||||||
dek: z.string().base64().nonempty(),
|
|
||||||
dekVersion: z.string().datetime(),
|
|
||||||
name: z.string().base64().nonempty(),
|
|
||||||
nameIv: z.string().base64().nonempty(),
|
|
||||||
});
|
|
||||||
export type CategoryCreateRequest = z.input<typeof categoryCreateRequest>;
|
|
||||||
|
|||||||
@@ -1,41 +1,3 @@
|
|||||||
import { z } from "zod";
|
import { z } from "zod";
|
||||||
|
|
||||||
export const directoryIdSchema = z.union([z.literal("root"), z.number().int().positive()]);
|
export const directoryIdSchema = z.union([z.literal("root"), z.int().positive()]);
|
||||||
|
|
||||||
export const directoryInfoResponse = z.object({
|
|
||||||
metadata: z
|
|
||||||
.object({
|
|
||||||
parent: directoryIdSchema,
|
|
||||||
mekVersion: z.number().int().positive(),
|
|
||||||
dek: z.string().base64().nonempty(),
|
|
||||||
dekVersion: z.string().datetime(),
|
|
||||||
name: z.string().base64().nonempty(),
|
|
||||||
nameIv: z.string().base64().nonempty(),
|
|
||||||
})
|
|
||||||
.optional(),
|
|
||||||
subDirectories: z.number().int().positive().array(),
|
|
||||||
files: z.number().int().positive().array(),
|
|
||||||
});
|
|
||||||
export type DirectoryInfoResponse = z.output<typeof directoryInfoResponse>;
|
|
||||||
|
|
||||||
export const directoryDeleteResponse = z.object({
|
|
||||||
deletedFiles: z.number().int().positive().array(),
|
|
||||||
});
|
|
||||||
export type DirectoryDeleteResponse = z.output<typeof directoryDeleteResponse>;
|
|
||||||
|
|
||||||
export const directoryRenameRequest = z.object({
|
|
||||||
dekVersion: z.string().datetime(),
|
|
||||||
name: z.string().base64().nonempty(),
|
|
||||||
nameIv: z.string().base64().nonempty(),
|
|
||||||
});
|
|
||||||
export type DirectoryRenameRequest = z.input<typeof directoryRenameRequest>;
|
|
||||||
|
|
||||||
export const directoryCreateRequest = z.object({
|
|
||||||
parent: directoryIdSchema,
|
|
||||||
mekVersion: z.number().int().positive(),
|
|
||||||
dek: z.string().base64().nonempty(),
|
|
||||||
dekVersion: z.string().datetime(),
|
|
||||||
name: z.string().base64().nonempty(),
|
|
||||||
nameIv: z.string().base64().nonempty(),
|
|
||||||
});
|
|
||||||
export type DirectoryCreateRequest = z.input<typeof directoryCreateRequest>;
|
|
||||||
|
|||||||
@@ -2,90 +2,35 @@ import mime from "mime";
|
|||||||
import { z } from "zod";
|
import { z } from "zod";
|
||||||
import { directoryIdSchema } from "./directory";
|
import { directoryIdSchema } from "./directory";
|
||||||
|
|
||||||
export const fileInfoResponse = z.object({
|
|
||||||
parent: directoryIdSchema,
|
|
||||||
mekVersion: z.number().int().positive(),
|
|
||||||
dek: z.string().base64().nonempty(),
|
|
||||||
dekVersion: z.string().datetime(),
|
|
||||||
contentType: z
|
|
||||||
.string()
|
|
||||||
.trim()
|
|
||||||
.nonempty()
|
|
||||||
.refine((value) => mime.getExtension(value) !== null), // MIME type
|
|
||||||
contentIv: z.string().base64().nonempty(),
|
|
||||||
name: z.string().base64().nonempty(),
|
|
||||||
nameIv: z.string().base64().nonempty(),
|
|
||||||
createdAt: z.string().base64().nonempty().optional(),
|
|
||||||
createdAtIv: z.string().base64().nonempty().optional(),
|
|
||||||
lastModifiedAt: z.string().base64().nonempty(),
|
|
||||||
lastModifiedAtIv: z.string().base64().nonempty(),
|
|
||||||
categories: z.number().int().positive().array(),
|
|
||||||
});
|
|
||||||
export type FileInfoResponse = z.output<typeof fileInfoResponse>;
|
|
||||||
|
|
||||||
export const fileRenameRequest = z.object({
|
|
||||||
dekVersion: z.string().datetime(),
|
|
||||||
name: z.string().base64().nonempty(),
|
|
||||||
nameIv: z.string().base64().nonempty(),
|
|
||||||
});
|
|
||||||
export type FileRenameRequest = z.input<typeof fileRenameRequest>;
|
|
||||||
|
|
||||||
export const fileThumbnailInfoResponse = z.object({
|
|
||||||
updatedAt: z.string().datetime(),
|
|
||||||
contentIv: z.string().base64().nonempty(),
|
|
||||||
});
|
|
||||||
export type FileThumbnailInfoResponse = z.output<typeof fileThumbnailInfoResponse>;
|
|
||||||
|
|
||||||
export const fileThumbnailUploadRequest = z.object({
|
export const fileThumbnailUploadRequest = z.object({
|
||||||
dekVersion: z.string().datetime(),
|
dekVersion: z.iso.datetime(),
|
||||||
contentIv: z.string().base64().nonempty(),
|
contentIv: z.base64().nonempty(),
|
||||||
});
|
});
|
||||||
export type FileThumbnailUploadRequest = z.input<typeof fileThumbnailUploadRequest>;
|
export type FileThumbnailUploadRequest = z.input<typeof fileThumbnailUploadRequest>;
|
||||||
|
|
||||||
export const fileListResponse = z.object({
|
|
||||||
files: z.number().int().positive().array(),
|
|
||||||
});
|
|
||||||
export type FileListResponse = z.output<typeof fileListResponse>;
|
|
||||||
|
|
||||||
export const duplicateFileScanRequest = z.object({
|
|
||||||
hskVersion: z.number().int().positive(),
|
|
||||||
contentHmac: z.string().base64().nonempty(),
|
|
||||||
});
|
|
||||||
export type DuplicateFileScanRequest = z.input<typeof duplicateFileScanRequest>;
|
|
||||||
|
|
||||||
export const duplicateFileScanResponse = z.object({
|
|
||||||
files: z.number().int().positive().array(),
|
|
||||||
});
|
|
||||||
export type DuplicateFileScanResponse = z.output<typeof duplicateFileScanResponse>;
|
|
||||||
|
|
||||||
export const missingThumbnailFileScanResponse = z.object({
|
|
||||||
files: z.number().int().positive().array(),
|
|
||||||
});
|
|
||||||
export type MissingThumbnailFileScanResponse = z.output<typeof missingThumbnailFileScanResponse>;
|
|
||||||
|
|
||||||
export const fileUploadRequest = z.object({
|
export const fileUploadRequest = z.object({
|
||||||
parent: directoryIdSchema,
|
parent: directoryIdSchema,
|
||||||
mekVersion: z.number().int().positive(),
|
mekVersion: z.int().positive(),
|
||||||
dek: z.string().base64().nonempty(),
|
dek: z.base64().nonempty(),
|
||||||
dekVersion: z.string().datetime(),
|
dekVersion: z.iso.datetime(),
|
||||||
hskVersion: z.number().int().positive(),
|
hskVersion: z.int().positive(),
|
||||||
contentHmac: z.string().base64().nonempty(),
|
contentHmac: z.base64().nonempty(),
|
||||||
contentType: z
|
contentType: z
|
||||||
.string()
|
.string()
|
||||||
.trim()
|
.trim()
|
||||||
.nonempty()
|
.nonempty()
|
||||||
.refine((value) => mime.getExtension(value) !== null), // MIME type
|
.refine((value) => mime.getExtension(value) !== null), // MIME type
|
||||||
contentIv: z.string().base64().nonempty(),
|
contentIv: z.base64().nonempty(),
|
||||||
name: z.string().base64().nonempty(),
|
name: z.base64().nonempty(),
|
||||||
nameIv: z.string().base64().nonempty(),
|
nameIv: z.base64().nonempty(),
|
||||||
createdAt: z.string().base64().nonempty().optional(),
|
createdAt: z.base64().nonempty().optional(),
|
||||||
createdAtIv: z.string().base64().nonempty().optional(),
|
createdAtIv: z.base64().nonempty().optional(),
|
||||||
lastModifiedAt: z.string().base64().nonempty(),
|
lastModifiedAt: z.base64().nonempty(),
|
||||||
lastModifiedAtIv: z.string().base64().nonempty(),
|
lastModifiedAtIv: z.base64().nonempty(),
|
||||||
});
|
});
|
||||||
export type FileUploadRequest = z.input<typeof fileUploadRequest>;
|
export type FileUploadRequest = z.input<typeof fileUploadRequest>;
|
||||||
|
|
||||||
export const fileUploadResponse = z.object({
|
export const fileUploadResponse = z.object({
|
||||||
file: z.number().int().positive(),
|
file: z.int().positive(),
|
||||||
});
|
});
|
||||||
export type FileUploadResponse = z.output<typeof fileUploadResponse>;
|
export type FileUploadResponse = z.output<typeof fileUploadResponse>;
|
||||||
|
|||||||
@@ -1,4 +1,3 @@
|
|||||||
export * from "./auth";
|
|
||||||
export * from "./category";
|
export * from "./category";
|
||||||
export * from "./directory";
|
export * from "./directory";
|
||||||
export * from "./file";
|
export * from "./file";
|
||||||
|
|||||||
@@ -1,122 +0,0 @@
|
|||||||
import { error } from "@sveltejs/kit";
|
|
||||||
import argon2 from "argon2";
|
|
||||||
import { getClient, getClientByPubKeys, getUserClient } from "$lib/server/db/client";
|
|
||||||
import { IntegrityError } from "$lib/server/db/error";
|
|
||||||
import {
|
|
||||||
upgradeSession,
|
|
||||||
deleteSession,
|
|
||||||
deleteAllOtherSessions,
|
|
||||||
registerSessionUpgradeChallenge,
|
|
||||||
consumeSessionUpgradeChallenge,
|
|
||||||
} from "$lib/server/db/session";
|
|
||||||
import { getUser, getUserByEmail, setUserPassword } from "$lib/server/db/user";
|
|
||||||
import env from "$lib/server/loadenv";
|
|
||||||
import { startSession } from "$lib/server/modules/auth";
|
|
||||||
import { verifySignature, generateChallenge } from "$lib/server/modules/crypto";
|
|
||||||
|
|
||||||
const hashPassword = async (password: string) => {
|
|
||||||
return await argon2.hash(password);
|
|
||||||
};
|
|
||||||
|
|
||||||
const verifyPassword = async (hash: string, password: string) => {
|
|
||||||
return await argon2.verify(hash, password);
|
|
||||||
};
|
|
||||||
|
|
||||||
export const changePassword = async (
|
|
||||||
userId: number,
|
|
||||||
sessionId: string,
|
|
||||||
oldPassword: string,
|
|
||||||
newPassword: string,
|
|
||||||
) => {
|
|
||||||
if (oldPassword === newPassword) {
|
|
||||||
error(400, "Same passwords");
|
|
||||||
} else if (newPassword.length < 8) {
|
|
||||||
error(400, "Too short password");
|
|
||||||
}
|
|
||||||
|
|
||||||
const user = await getUser(userId);
|
|
||||||
if (!user) {
|
|
||||||
error(500, "Invalid session id");
|
|
||||||
} else if (!(await verifyPassword(user.password, oldPassword))) {
|
|
||||||
error(403, "Invalid password");
|
|
||||||
}
|
|
||||||
|
|
||||||
await setUserPassword(userId, await hashPassword(newPassword));
|
|
||||||
await deleteAllOtherSessions(userId, sessionId);
|
|
||||||
};
|
|
||||||
|
|
||||||
export const login = async (email: string, password: string, ip: string, userAgent: string) => {
|
|
||||||
const user = await getUserByEmail(email);
|
|
||||||
if (!user || !(await verifyPassword(user.password, password))) {
|
|
||||||
error(401, "Invalid email or password");
|
|
||||||
}
|
|
||||||
|
|
||||||
return { sessionIdSigned: await startSession(user.id, ip, userAgent) };
|
|
||||||
};
|
|
||||||
|
|
||||||
export const logout = async (sessionId: string) => {
|
|
||||||
await deleteSession(sessionId);
|
|
||||||
};
|
|
||||||
|
|
||||||
export const createSessionUpgradeChallenge = async (
|
|
||||||
sessionId: string,
|
|
||||||
userId: number,
|
|
||||||
ip: string,
|
|
||||||
encPubKey: string,
|
|
||||||
sigPubKey: string,
|
|
||||||
) => {
|
|
||||||
const client = await getClientByPubKeys(encPubKey, sigPubKey);
|
|
||||||
const userClient = client ? await getUserClient(userId, client.id) : undefined;
|
|
||||||
if (!client) {
|
|
||||||
error(401, "Invalid public key(s)");
|
|
||||||
} else if (!userClient || userClient.state === "challenging") {
|
|
||||||
error(403, "Unregistered client");
|
|
||||||
}
|
|
||||||
|
|
||||||
const { answer, challenge } = await generateChallenge(32, encPubKey);
|
|
||||||
const { id } = await registerSessionUpgradeChallenge(
|
|
||||||
sessionId,
|
|
||||||
client.id,
|
|
||||||
answer.toString("base64"),
|
|
||||||
ip,
|
|
||||||
new Date(Date.now() + env.challenge.sessionUpgradeExp),
|
|
||||||
);
|
|
||||||
|
|
||||||
return { id, challenge: challenge.toString("base64") };
|
|
||||||
};
|
|
||||||
|
|
||||||
export const verifySessionUpgradeChallenge = async (
|
|
||||||
sessionId: string,
|
|
||||||
userId: number,
|
|
||||||
ip: string,
|
|
||||||
challengeId: number,
|
|
||||||
answerSig: string,
|
|
||||||
force: boolean,
|
|
||||||
) => {
|
|
||||||
const challenge = await consumeSessionUpgradeChallenge(challengeId, sessionId, ip);
|
|
||||||
if (!challenge) {
|
|
||||||
error(403, "Invalid challenge answer");
|
|
||||||
}
|
|
||||||
|
|
||||||
const client = await getClient(challenge.clientId);
|
|
||||||
if (!client) {
|
|
||||||
error(500, "Invalid challenge answer");
|
|
||||||
} else if (
|
|
||||||
!verifySignature(Buffer.from(challenge.answer, "base64"), answerSig, client.sigPubKey)
|
|
||||||
) {
|
|
||||||
error(403, "Invalid challenge answer signature");
|
|
||||||
}
|
|
||||||
|
|
||||||
try {
|
|
||||||
await upgradeSession(userId, sessionId, client.id, force);
|
|
||||||
} catch (e) {
|
|
||||||
if (e instanceof IntegrityError) {
|
|
||||||
if (e.message === "Session not found") {
|
|
||||||
error(500, "Invalid challenge answer");
|
|
||||||
} else if (!force && e.message === "Session already exists") {
|
|
||||||
error(409, "Already logged in");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
throw e;
|
|
||||||
}
|
|
||||||
};
|
|
||||||
@@ -1,133 +0,0 @@
|
|||||||
import { error } from "@sveltejs/kit";
|
|
||||||
import {
|
|
||||||
registerCategory,
|
|
||||||
getAllCategoriesByParent,
|
|
||||||
getCategory,
|
|
||||||
setCategoryEncName,
|
|
||||||
unregisterCategory,
|
|
||||||
type CategoryId,
|
|
||||||
type NewCategory,
|
|
||||||
} from "$lib/server/db/category";
|
|
||||||
import { IntegrityError } from "$lib/server/db/error";
|
|
||||||
import {
|
|
||||||
getAllFilesByCategory,
|
|
||||||
getFile,
|
|
||||||
addFileToCategory,
|
|
||||||
removeFileFromCategory,
|
|
||||||
} from "$lib/server/db/file";
|
|
||||||
import type { Ciphertext } from "$lib/server/db/schema";
|
|
||||||
|
|
||||||
export const getCategoryInformation = async (userId: number, categoryId: CategoryId) => {
|
|
||||||
const category = categoryId !== "root" ? await getCategory(userId, categoryId) : undefined;
|
|
||||||
if (category === null) {
|
|
||||||
error(404, "Invalid category id");
|
|
||||||
}
|
|
||||||
|
|
||||||
const categories = await getAllCategoriesByParent(userId, categoryId);
|
|
||||||
return {
|
|
||||||
metadata: category && {
|
|
||||||
parentId: category.parentId ?? ("root" as const),
|
|
||||||
mekVersion: category.mekVersion,
|
|
||||||
encDek: category.encDek,
|
|
||||||
dekVersion: category.dekVersion,
|
|
||||||
encName: category.encName,
|
|
||||||
},
|
|
||||||
categories: categories.map(({ id }) => id),
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
export const deleteCategory = async (userId: number, categoryId: number) => {
|
|
||||||
try {
|
|
||||||
await unregisterCategory(userId, categoryId);
|
|
||||||
} catch (e) {
|
|
||||||
if (e instanceof IntegrityError && e.message === "Category not found") {
|
|
||||||
error(404, "Invalid category id");
|
|
||||||
}
|
|
||||||
throw e;
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
export const addCategoryFile = async (userId: number, categoryId: number, fileId: number) => {
|
|
||||||
const category = await getCategory(userId, categoryId);
|
|
||||||
const file = await getFile(userId, fileId);
|
|
||||||
if (!category) {
|
|
||||||
error(404, "Invalid category id");
|
|
||||||
} else if (!file) {
|
|
||||||
error(404, "Invalid file id");
|
|
||||||
}
|
|
||||||
|
|
||||||
try {
|
|
||||||
await addFileToCategory(fileId, categoryId);
|
|
||||||
} catch (e) {
|
|
||||||
if (e instanceof IntegrityError && e.message === "File already added to category") {
|
|
||||||
error(400, "File already added");
|
|
||||||
}
|
|
||||||
throw e;
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
export const getCategoryFiles = async (userId: number, categoryId: number, recurse: boolean) => {
|
|
||||||
const category = await getCategory(userId, categoryId);
|
|
||||||
if (!category) {
|
|
||||||
error(404, "Invalid category id");
|
|
||||||
}
|
|
||||||
|
|
||||||
const files = await getAllFilesByCategory(userId, categoryId, recurse);
|
|
||||||
return { files };
|
|
||||||
};
|
|
||||||
|
|
||||||
export const removeCategoryFile = async (userId: number, categoryId: number, fileId: number) => {
|
|
||||||
const category = await getCategory(userId, categoryId);
|
|
||||||
const file = await getFile(userId, fileId);
|
|
||||||
if (!category) {
|
|
||||||
error(404, "Invalid category id");
|
|
||||||
} else if (!file) {
|
|
||||||
error(404, "Invalid file id");
|
|
||||||
}
|
|
||||||
|
|
||||||
try {
|
|
||||||
await removeFileFromCategory(fileId, categoryId);
|
|
||||||
} catch (e) {
|
|
||||||
if (e instanceof IntegrityError && e.message === "File not found in category") {
|
|
||||||
error(400, "File not added");
|
|
||||||
}
|
|
||||||
throw e;
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
export const renameCategory = async (
|
|
||||||
userId: number,
|
|
||||||
categoryId: number,
|
|
||||||
dekVersion: Date,
|
|
||||||
newEncName: Ciphertext,
|
|
||||||
) => {
|
|
||||||
try {
|
|
||||||
await setCategoryEncName(userId, categoryId, dekVersion, newEncName);
|
|
||||||
} catch (e) {
|
|
||||||
if (e instanceof IntegrityError) {
|
|
||||||
if (e.message === "Category not found") {
|
|
||||||
error(404, "Invalid category id");
|
|
||||||
} else if (e.message === "Invalid DEK version") {
|
|
||||||
error(400, "Invalid DEK version");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
throw e;
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
export const createCategory = async (params: NewCategory) => {
|
|
||||||
const oneMinuteAgo = new Date(Date.now() - 60 * 1000);
|
|
||||||
const oneMinuteLater = new Date(Date.now() + 60 * 1000);
|
|
||||||
if (params.dekVersion <= oneMinuteAgo || params.dekVersion >= oneMinuteLater) {
|
|
||||||
error(400, "Invalid DEK version");
|
|
||||||
}
|
|
||||||
|
|
||||||
try {
|
|
||||||
await registerCategory(params);
|
|
||||||
} catch (e) {
|
|
||||||
if (e instanceof IntegrityError && e.message === "Inactive MEK version") {
|
|
||||||
error(400, "Inactive MEK version");
|
|
||||||
}
|
|
||||||
throw e;
|
|
||||||
}
|
|
||||||
};
|
|
||||||
@@ -1,96 +0,0 @@
|
|||||||
import { error } from "@sveltejs/kit";
|
|
||||||
import { unlink } from "fs/promises";
|
|
||||||
import { IntegrityError } from "$lib/server/db/error";
|
|
||||||
import {
|
|
||||||
registerDirectory,
|
|
||||||
getAllDirectoriesByParent,
|
|
||||||
getDirectory,
|
|
||||||
setDirectoryEncName,
|
|
||||||
unregisterDirectory,
|
|
||||||
getAllFilesByParent,
|
|
||||||
type DirectoryId,
|
|
||||||
type NewDirectory,
|
|
||||||
} from "$lib/server/db/file";
|
|
||||||
import type { Ciphertext } from "$lib/server/db/schema";
|
|
||||||
|
|
||||||
export const getDirectoryInformation = async (userId: number, directoryId: DirectoryId) => {
|
|
||||||
const directory = directoryId !== "root" ? await getDirectory(userId, directoryId) : undefined;
|
|
||||||
if (directory === null) {
|
|
||||||
error(404, "Invalid directory id");
|
|
||||||
}
|
|
||||||
|
|
||||||
const directories = await getAllDirectoriesByParent(userId, directoryId);
|
|
||||||
const files = await getAllFilesByParent(userId, directoryId);
|
|
||||||
return {
|
|
||||||
metadata: directory && {
|
|
||||||
parentId: directory.parentId ?? ("root" as const),
|
|
||||||
mekVersion: directory.mekVersion,
|
|
||||||
encDek: directory.encDek,
|
|
||||||
dekVersion: directory.dekVersion,
|
|
||||||
encName: directory.encName,
|
|
||||||
},
|
|
||||||
directories: directories.map(({ id }) => id),
|
|
||||||
files: files.map(({ id }) => id),
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
const safeUnlink = async (path: string | null) => {
|
|
||||||
if (path) {
|
|
||||||
await unlink(path).catch(console.error);
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
export const deleteDirectory = async (userId: number, directoryId: number) => {
|
|
||||||
try {
|
|
||||||
const files = await unregisterDirectory(userId, directoryId);
|
|
||||||
return {
|
|
||||||
files: files.map(({ id, path, thumbnailPath }) => {
|
|
||||||
safeUnlink(path); // Intended
|
|
||||||
safeUnlink(thumbnailPath); // Intended
|
|
||||||
return id;
|
|
||||||
}),
|
|
||||||
};
|
|
||||||
} catch (e) {
|
|
||||||
if (e instanceof IntegrityError && e.message === "Directory not found") {
|
|
||||||
error(404, "Invalid directory id");
|
|
||||||
}
|
|
||||||
throw e;
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
export const renameDirectory = async (
|
|
||||||
userId: number,
|
|
||||||
directoryId: number,
|
|
||||||
dekVersion: Date,
|
|
||||||
newEncName: Ciphertext,
|
|
||||||
) => {
|
|
||||||
try {
|
|
||||||
await setDirectoryEncName(userId, directoryId, dekVersion, newEncName);
|
|
||||||
} catch (e) {
|
|
||||||
if (e instanceof IntegrityError) {
|
|
||||||
if (e.message === "Directory not found") {
|
|
||||||
error(404, "Invalid directory id");
|
|
||||||
} else if (e.message === "Invalid DEK version") {
|
|
||||||
error(400, "Invalid DEK version");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
throw e;
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
export const createDirectory = async (params: NewDirectory) => {
|
|
||||||
const oneMinuteAgo = new Date(Date.now() - 60 * 1000);
|
|
||||||
const oneMinuteLater = new Date(Date.now() + 60 * 1000);
|
|
||||||
if (params.dekVersion <= oneMinuteAgo || params.dekVersion >= oneMinuteLater) {
|
|
||||||
error(400, "Invalid DEK version");
|
|
||||||
}
|
|
||||||
|
|
||||||
try {
|
|
||||||
await registerDirectory(params);
|
|
||||||
} catch (e) {
|
|
||||||
if (e instanceof IntegrityError && e.message === "Inactive MEK version") {
|
|
||||||
error(400, "Invalid MEK version");
|
|
||||||
}
|
|
||||||
throw e;
|
|
||||||
}
|
|
||||||
};
|
|
||||||
@@ -1,72 +1,17 @@
|
|||||||
import { error } from "@sveltejs/kit";
|
import { error } from "@sveltejs/kit";
|
||||||
import { createHash } from "crypto";
|
import { createHash } from "crypto";
|
||||||
import { createReadStream, createWriteStream } from "fs";
|
import { createReadStream, createWriteStream } from "fs";
|
||||||
import { mkdir, stat, unlink } from "fs/promises";
|
import { mkdir, stat } from "fs/promises";
|
||||||
import { dirname } from "path";
|
import { dirname } from "path";
|
||||||
import { Readable } from "stream";
|
import { Readable } from "stream";
|
||||||
import { pipeline } from "stream/promises";
|
import { pipeline } from "stream/promises";
|
||||||
import { v4 as uuidv4 } from "uuid";
|
import { v4 as uuidv4 } from "uuid";
|
||||||
import { IntegrityError } from "$lib/server/db/error";
|
import { FileRepo, MediaRepo, IntegrityError } from "$lib/server/db";
|
||||||
import {
|
|
||||||
registerFile,
|
|
||||||
getAllFileIds,
|
|
||||||
getAllFileIdsByContentHmac,
|
|
||||||
getFile,
|
|
||||||
setFileEncName,
|
|
||||||
unregisterFile,
|
|
||||||
getAllFileCategories,
|
|
||||||
type NewFile,
|
|
||||||
} from "$lib/server/db/file";
|
|
||||||
import {
|
|
||||||
updateFileThumbnail,
|
|
||||||
getFileThumbnail,
|
|
||||||
getMissingFileThumbnails,
|
|
||||||
} from "$lib/server/db/media";
|
|
||||||
import type { Ciphertext } from "$lib/server/db/schema";
|
|
||||||
import env from "$lib/server/loadenv";
|
import env from "$lib/server/loadenv";
|
||||||
|
import { safeUnlink } from "$lib/server/modules/filesystem";
|
||||||
export const getFileInformation = async (userId: number, fileId: number) => {
|
|
||||||
const file = await getFile(userId, fileId);
|
|
||||||
if (!file) {
|
|
||||||
error(404, "Invalid file id");
|
|
||||||
}
|
|
||||||
|
|
||||||
const categories = await getAllFileCategories(fileId);
|
|
||||||
return {
|
|
||||||
parentId: file.parentId ?? ("root" as const),
|
|
||||||
mekVersion: file.mekVersion,
|
|
||||||
encDek: file.encDek,
|
|
||||||
dekVersion: file.dekVersion,
|
|
||||||
contentType: file.contentType,
|
|
||||||
encContentIv: file.encContentIv,
|
|
||||||
encName: file.encName,
|
|
||||||
encCreatedAt: file.encCreatedAt,
|
|
||||||
encLastModifiedAt: file.encLastModifiedAt,
|
|
||||||
categories: categories.map(({ id }) => id),
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
const safeUnlink = async (path: string | null) => {
|
|
||||||
if (path) {
|
|
||||||
await unlink(path).catch(console.error);
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
export const deleteFile = async (userId: number, fileId: number) => {
|
|
||||||
try {
|
|
||||||
const { path, thumbnailPath } = await unregisterFile(userId, fileId);
|
|
||||||
safeUnlink(path); // Intended
|
|
||||||
safeUnlink(thumbnailPath); // Intended
|
|
||||||
} catch (e) {
|
|
||||||
if (e instanceof IntegrityError && e.message === "File not found") {
|
|
||||||
error(404, "Invalid file id");
|
|
||||||
}
|
|
||||||
throw e;
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
export const getFileStream = async (userId: number, fileId: number) => {
|
export const getFileStream = async (userId: number, fileId: number) => {
|
||||||
const file = await getFile(userId, fileId);
|
const file = await FileRepo.getFile(userId, fileId);
|
||||||
if (!file) {
|
if (!file) {
|
||||||
error(404, "Invalid file id");
|
error(404, "Invalid file id");
|
||||||
}
|
}
|
||||||
@@ -78,37 +23,8 @@ export const getFileStream = async (userId: number, fileId: number) => {
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
export const renameFile = async (
|
|
||||||
userId: number,
|
|
||||||
fileId: number,
|
|
||||||
dekVersion: Date,
|
|
||||||
newEncName: Ciphertext,
|
|
||||||
) => {
|
|
||||||
try {
|
|
||||||
await setFileEncName(userId, fileId, dekVersion, newEncName);
|
|
||||||
} catch (e) {
|
|
||||||
if (e instanceof IntegrityError) {
|
|
||||||
if (e.message === "File not found") {
|
|
||||||
error(404, "Invalid file id");
|
|
||||||
} else if (e.message === "Invalid DEK version") {
|
|
||||||
error(400, "Invalid DEK version");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
throw e;
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
export const getFileThumbnailInformation = async (userId: number, fileId: number) => {
|
|
||||||
const thumbnail = await getFileThumbnail(userId, fileId);
|
|
||||||
if (!thumbnail) {
|
|
||||||
error(404, "File or its thumbnail not found");
|
|
||||||
}
|
|
||||||
|
|
||||||
return { updatedAt: thumbnail.updatedAt, encContentIv: thumbnail.encContentIv };
|
|
||||||
};
|
|
||||||
|
|
||||||
export const getFileThumbnailStream = async (userId: number, fileId: number) => {
|
export const getFileThumbnailStream = async (userId: number, fileId: number) => {
|
||||||
const thumbnail = await getFileThumbnail(userId, fileId);
|
const thumbnail = await MediaRepo.getFileThumbnail(userId, fileId);
|
||||||
if (!thumbnail) {
|
if (!thumbnail) {
|
||||||
error(404, "File or its thumbnail not found");
|
error(404, "File or its thumbnail not found");
|
||||||
}
|
}
|
||||||
@@ -133,7 +49,13 @@ export const uploadFileThumbnail = async (
|
|||||||
try {
|
try {
|
||||||
await pipeline(encContentStream, createWriteStream(path, { flags: "wx", mode: 0o600 }));
|
await pipeline(encContentStream, createWriteStream(path, { flags: "wx", mode: 0o600 }));
|
||||||
|
|
||||||
const oldPath = await updateFileThumbnail(userId, fileId, dekVersion, path, encContentIv);
|
const oldPath = await MediaRepo.updateFileThumbnail(
|
||||||
|
userId,
|
||||||
|
fileId,
|
||||||
|
dekVersion,
|
||||||
|
path,
|
||||||
|
encContentIv,
|
||||||
|
);
|
||||||
safeUnlink(oldPath); // Intended
|
safeUnlink(oldPath); // Intended
|
||||||
} catch (e) {
|
} catch (e) {
|
||||||
await safeUnlink(path);
|
await safeUnlink(path);
|
||||||
@@ -149,27 +71,8 @@ export const uploadFileThumbnail = async (
|
|||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
export const getFileList = async (userId: number) => {
|
|
||||||
const fileIds = await getAllFileIds(userId);
|
|
||||||
return { files: fileIds };
|
|
||||||
};
|
|
||||||
|
|
||||||
export const scanDuplicateFiles = async (
|
|
||||||
userId: number,
|
|
||||||
hskVersion: number,
|
|
||||||
contentHmac: string,
|
|
||||||
) => {
|
|
||||||
const fileIds = await getAllFileIdsByContentHmac(userId, hskVersion, contentHmac);
|
|
||||||
return { files: fileIds };
|
|
||||||
};
|
|
||||||
|
|
||||||
export const scanMissingFileThumbnails = async (userId: number) => {
|
|
||||||
const fileIds = await getMissingFileThumbnails(userId);
|
|
||||||
return { files: fileIds };
|
|
||||||
};
|
|
||||||
|
|
||||||
export const uploadFile = async (
|
export const uploadFile = async (
|
||||||
params: Omit<NewFile, "path" | "encContentHash">,
|
params: Omit<FileRepo.NewFile, "path" | "encContentHash">,
|
||||||
encContentStream: Readable,
|
encContentStream: Readable,
|
||||||
encContentHash: Promise<string>,
|
encContentHash: Promise<string>,
|
||||||
) => {
|
) => {
|
||||||
@@ -201,7 +104,7 @@ export const uploadFile = async (
|
|||||||
throw new Error("Invalid checksum");
|
throw new Error("Invalid checksum");
|
||||||
}
|
}
|
||||||
|
|
||||||
const { id: fileId } = await registerFile({
|
const { id: fileId } = await FileRepo.registerFile({
|
||||||
...params,
|
...params,
|
||||||
path,
|
path,
|
||||||
encContentHash: hash,
|
encContentHash: hash,
|
||||||
|
|||||||
@@ -1,10 +1,6 @@
|
|||||||
import { callPostApi } from "$lib/hooks";
|
import { TRPCClientError } from "@trpc/client";
|
||||||
import { encodeToBase64, decryptChallenge, signMessageRSA } from "$lib/modules/crypto";
|
import { encodeToBase64, decryptChallenge, signMessageRSA } from "$lib/modules/crypto";
|
||||||
import type {
|
import { useTRPC } from "$trpc/client";
|
||||||
SessionUpgradeRequest,
|
|
||||||
SessionUpgradeResponse,
|
|
||||||
SessionUpgradeVerifyRequest,
|
|
||||||
} from "$lib/server/schemas";
|
|
||||||
|
|
||||||
export const requestSessionUpgrade = async (
|
export const requestSessionUpgrade = async (
|
||||||
encryptKeyBase64: string,
|
encryptKeyBase64: string,
|
||||||
@@ -13,27 +9,45 @@ export const requestSessionUpgrade = async (
|
|||||||
signKey: CryptoKey,
|
signKey: CryptoKey,
|
||||||
force = false,
|
force = false,
|
||||||
) => {
|
) => {
|
||||||
let res = await callPostApi<SessionUpgradeRequest>("/api/auth/upgradeSession", {
|
const trpc = useTRPC();
|
||||||
|
let id, challenge;
|
||||||
|
try {
|
||||||
|
({ id, challenge } = await trpc.auth.upgradeSession.mutate({
|
||||||
encPubKey: encryptKeyBase64,
|
encPubKey: encryptKeyBase64,
|
||||||
sigPubKey: verifyKeyBase64,
|
sigPubKey: verifyKeyBase64,
|
||||||
});
|
}));
|
||||||
if (res.status === 403) return [false, "Unregistered client"] as const;
|
} catch (e) {
|
||||||
else if (!res.ok) return [false] as const;
|
if (e instanceof TRPCClientError && e.data?.code === "FORBIDDEN") {
|
||||||
|
return [false, "Unregistered client"] as const;
|
||||||
const { id, challenge }: SessionUpgradeResponse = await res.json();
|
}
|
||||||
|
return [false] as const;
|
||||||
|
}
|
||||||
const answer = await decryptChallenge(challenge, decryptKey);
|
const answer = await decryptChallenge(challenge, decryptKey);
|
||||||
const answerSig = await signMessageRSA(answer, signKey);
|
const answerSig = await signMessageRSA(answer, signKey);
|
||||||
|
|
||||||
res = await callPostApi<SessionUpgradeVerifyRequest>("/api/auth/upgradeSession/verify", {
|
try {
|
||||||
|
await trpc.auth.verifySessionUpgrade.mutate({
|
||||||
id,
|
id,
|
||||||
answerSig: encodeToBase64(answerSig),
|
answerSig: encodeToBase64(answerSig),
|
||||||
force,
|
force,
|
||||||
});
|
});
|
||||||
if (res.status === 409) return [false, "Already logged in"] as const;
|
} catch (e) {
|
||||||
else return [res.ok] as const;
|
if (e instanceof TRPCClientError && e.data?.code === "CONFLICT") {
|
||||||
|
return [false, "Already logged in"] as const;
|
||||||
|
}
|
||||||
|
return [false] as const;
|
||||||
|
}
|
||||||
|
|
||||||
|
return [true] as const;
|
||||||
};
|
};
|
||||||
|
|
||||||
export const requestLogout = async () => {
|
export const requestLogout = async () => {
|
||||||
const res = await callPostApi("/api/auth/logout");
|
const trpc = useTRPC();
|
||||||
return res.ok;
|
try {
|
||||||
|
await trpc.auth.logout.mutate();
|
||||||
|
return true;
|
||||||
|
} catch {
|
||||||
|
// TODO: Error Handling
|
||||||
|
return false;
|
||||||
|
}
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -1,31 +1,40 @@
|
|||||||
import { callPostApi } from "$lib/hooks";
|
|
||||||
import { generateDataKey, wrapDataKey, encryptString } from "$lib/modules/crypto";
|
import { generateDataKey, wrapDataKey, encryptString } from "$lib/modules/crypto";
|
||||||
import type { CategoryCreateRequest, CategoryFileRemoveRequest } from "$lib/server/schemas";
|
|
||||||
import type { MasterKey } from "$lib/stores";
|
import type { MasterKey } from "$lib/stores";
|
||||||
|
import { useTRPC } from "$trpc/client";
|
||||||
|
|
||||||
export const requestCategoryCreation = async (
|
export const requestCategoryCreation = async (
|
||||||
name: string,
|
name: string,
|
||||||
parentId: "root" | number,
|
parentId: "root" | number,
|
||||||
masterKey: MasterKey,
|
masterKey: MasterKey,
|
||||||
) => {
|
) => {
|
||||||
|
const trpc = useTRPC();
|
||||||
const { dataKey, dataKeyVersion } = await generateDataKey();
|
const { dataKey, dataKeyVersion } = await generateDataKey();
|
||||||
const nameEncrypted = await encryptString(name, dataKey);
|
const nameEncrypted = await encryptString(name, dataKey);
|
||||||
|
|
||||||
const res = await callPostApi<CategoryCreateRequest>("/api/category/create", {
|
try {
|
||||||
|
await trpc.category.create.mutate({
|
||||||
parent: parentId,
|
parent: parentId,
|
||||||
mekVersion: masterKey.version,
|
mekVersion: masterKey.version,
|
||||||
dek: await wrapDataKey(dataKey, masterKey.key),
|
dek: await wrapDataKey(dataKey, masterKey.key),
|
||||||
dekVersion: dataKeyVersion.toISOString(),
|
dekVersion: dataKeyVersion,
|
||||||
name: nameEncrypted.ciphertext,
|
name: nameEncrypted.ciphertext,
|
||||||
nameIv: nameEncrypted.iv,
|
nameIv: nameEncrypted.iv,
|
||||||
});
|
});
|
||||||
return res.ok;
|
return true;
|
||||||
|
} catch {
|
||||||
|
// TODO: Error Handling
|
||||||
|
return false;
|
||||||
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
export const requestFileRemovalFromCategory = async (fileId: number, categoryId: number) => {
|
export const requestFileRemovalFromCategory = async (fileId: number, categoryId: number) => {
|
||||||
const res = await callPostApi<CategoryFileRemoveRequest>(
|
const trpc = useTRPC();
|
||||||
`/api/category/${categoryId}/file/remove`,
|
|
||||||
{ file: fileId },
|
try {
|
||||||
);
|
await trpc.category.removeFile.mutate({ id: categoryId, file: fileId });
|
||||||
return res.ok;
|
return true;
|
||||||
|
} catch {
|
||||||
|
// TODO: Error Handling
|
||||||
|
return false;
|
||||||
|
}
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -11,11 +11,8 @@ import {
|
|||||||
downloadFile,
|
downloadFile,
|
||||||
} from "$lib/modules/file";
|
} from "$lib/modules/file";
|
||||||
import { getThumbnailUrl } from "$lib/modules/thumbnail";
|
import { getThumbnailUrl } from "$lib/modules/thumbnail";
|
||||||
import type {
|
import type { FileThumbnailUploadRequest } from "$lib/server/schemas";
|
||||||
FileThumbnailInfoResponse,
|
import { useTRPC } from "$trpc/client";
|
||||||
FileThumbnailUploadRequest,
|
|
||||||
FileListResponse,
|
|
||||||
} from "$lib/server/schemas";
|
|
||||||
|
|
||||||
export const requestFileDownload = async (
|
export const requestFileDownload = async (
|
||||||
fileId: number,
|
fileId: number,
|
||||||
@@ -52,12 +49,17 @@ export const requestFileThumbnailDownload = async (fileId: number, dataKey?: Cry
|
|||||||
const cache = await getFileThumbnailCache(fileId);
|
const cache = await getFileThumbnailCache(fileId);
|
||||||
if (cache || !dataKey) return cache;
|
if (cache || !dataKey) return cache;
|
||||||
|
|
||||||
let res = await callGetApi(`/api/file/${fileId}/thumbnail`);
|
const trpc = useTRPC();
|
||||||
if (!res.ok) return null;
|
let thumbnailInfo;
|
||||||
|
try {
|
||||||
|
thumbnailInfo = await trpc.file.thumbnail.query({ id: fileId });
|
||||||
|
} catch {
|
||||||
|
// TODO: Error Handling
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
const { contentIv: thumbnailEncryptedIv } = thumbnailInfo;
|
||||||
|
|
||||||
const { contentIv: thumbnailEncryptedIv }: FileThumbnailInfoResponse = await res.json();
|
const res = await callGetApi(`/api/file/${fileId}/thumbnail/download`);
|
||||||
|
|
||||||
res = await callGetApi(`/api/file/${fileId}/thumbnail/download`);
|
|
||||||
if (!res.ok) return null;
|
if (!res.ok) return null;
|
||||||
|
|
||||||
const thumbnailEncrypted = await res.arrayBuffer();
|
const thumbnailEncrypted = await res.arrayBuffer();
|
||||||
@@ -68,10 +70,15 @@ export const requestFileThumbnailDownload = async (fileId: number, dataKey?: Cry
|
|||||||
};
|
};
|
||||||
|
|
||||||
export const requestDeletedFilesCleanup = async () => {
|
export const requestDeletedFilesCleanup = async () => {
|
||||||
const res = await callGetApi("/api/file/list");
|
const trpc = useTRPC();
|
||||||
if (!res.ok) return;
|
let liveFiles;
|
||||||
|
try {
|
||||||
|
liveFiles = await trpc.file.list.query();
|
||||||
|
} catch {
|
||||||
|
// TODO: Error Handling
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
const { files: liveFiles }: FileListResponse = await res.json();
|
|
||||||
const liveFilesSet = new Set(liveFiles);
|
const liveFilesSet = new Set(liveFiles);
|
||||||
const maybeCachedFiles = await getAllFileInfos();
|
const maybeCachedFiles = await getAllFileInfos();
|
||||||
|
|
||||||
|
|||||||
@@ -1,10 +1,13 @@
|
|||||||
import { callPostApi } from "$lib/hooks";
|
import { useTRPC } from "$trpc/client";
|
||||||
import type { PasswordChangeRequest } from "$lib/server/schemas";
|
|
||||||
|
|
||||||
export const requestPasswordChange = async (oldPassword: string, newPassword: string) => {
|
export const requestPasswordChange = async (oldPassword: string, newPassword: string) => {
|
||||||
const res = await callPostApi<PasswordChangeRequest>("/api/auth/changePassword", {
|
const trpc = useTRPC();
|
||||||
oldPassword,
|
|
||||||
newPassword,
|
try {
|
||||||
});
|
await trpc.auth.changePassword.mutate({ oldPassword, newPassword });
|
||||||
return res.ok;
|
return true;
|
||||||
|
} catch {
|
||||||
|
// TODO: Error Handling
|
||||||
|
return false;
|
||||||
|
}
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -1,5 +1,4 @@
|
|||||||
import { callPostApi } from "$lib/hooks";
|
import { useTRPC } from "$trpc/client";
|
||||||
import type { LoginRequest } from "$lib/server/schemas";
|
|
||||||
|
|
||||||
export { requestLogout } from "$lib/services/auth";
|
export { requestLogout } from "$lib/services/auth";
|
||||||
export { requestDeletedFilesCleanup } from "$lib/services/file";
|
export { requestDeletedFilesCleanup } from "$lib/services/file";
|
||||||
@@ -9,6 +8,13 @@ export {
|
|||||||
} from "$lib/services/key";
|
} from "$lib/services/key";
|
||||||
|
|
||||||
export const requestLogin = async (email: string, password: string) => {
|
export const requestLogin = async (email: string, password: string) => {
|
||||||
const res = await callPostApi<LoginRequest>("/api/auth/login", { email, password });
|
const trpc = useTRPC();
|
||||||
return res.ok;
|
|
||||||
|
try {
|
||||||
|
await trpc.auth.login.mutate({ email, password });
|
||||||
|
return true;
|
||||||
|
} catch {
|
||||||
|
// TODO: Error Handling
|
||||||
|
return false;
|
||||||
|
}
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -1,8 +1,7 @@
|
|||||||
import { callPostApi } from "$lib/hooks";
|
|
||||||
import { encryptData } from "$lib/modules/crypto";
|
import { encryptData } from "$lib/modules/crypto";
|
||||||
import { storeFileThumbnailCache } from "$lib/modules/file";
|
import { storeFileThumbnailCache } from "$lib/modules/file";
|
||||||
import type { CategoryFileAddRequest } from "$lib/server/schemas";
|
|
||||||
import { requestFileThumbnailUpload } from "$lib/services/file";
|
import { requestFileThumbnailUpload } from "$lib/services/file";
|
||||||
|
import { useTRPC } from "$trpc/client";
|
||||||
|
|
||||||
export { requestCategoryCreation, requestFileRemovalFromCategory } from "$lib/services/category";
|
export { requestCategoryCreation, requestFileRemovalFromCategory } from "$lib/services/category";
|
||||||
export { requestFileDownload } from "$lib/services/file";
|
export { requestFileDownload } from "$lib/services/file";
|
||||||
@@ -23,8 +22,13 @@ export const requestThumbnailUpload = async (
|
|||||||
};
|
};
|
||||||
|
|
||||||
export const requestFileAdditionToCategory = async (fileId: number, categoryId: number) => {
|
export const requestFileAdditionToCategory = async (fileId: number, categoryId: number) => {
|
||||||
const res = await callPostApi<CategoryFileAddRequest>(`/api/category/${categoryId}/file/add`, {
|
const trpc = useTRPC();
|
||||||
file: fileId,
|
|
||||||
});
|
try {
|
||||||
return res.ok;
|
await trpc.category.addFile.mutate({ id: categoryId, file: fileId });
|
||||||
|
return true;
|
||||||
|
} catch {
|
||||||
|
// TODO: Error Handling
|
||||||
|
return false;
|
||||||
|
}
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -1,14 +1,14 @@
|
|||||||
import { error } from "@sveltejs/kit";
|
import { error } from "@sveltejs/kit";
|
||||||
import { callPostApi } from "$lib/hooks";
|
import { useTRPC } from "$trpc/client";
|
||||||
import type { MissingThumbnailFileScanResponse } from "$lib/server/schemas";
|
|
||||||
import type { PageLoad } from "./$types";
|
import type { PageLoad } from "./$types";
|
||||||
|
|
||||||
export const load: PageLoad = async ({ fetch }) => {
|
export const load: PageLoad = async ({ fetch }) => {
|
||||||
const res = await callPostApi("/api/file/scanMissingThumbnails", undefined, fetch);
|
const trpc = useTRPC(fetch);
|
||||||
if (!res.ok) {
|
|
||||||
|
try {
|
||||||
|
const files = await trpc.file.listWithoutThumbnail.query();
|
||||||
|
return { files };
|
||||||
|
} catch {
|
||||||
error(500, "Internal server error");
|
error(500, "Internal server error");
|
||||||
}
|
}
|
||||||
|
|
||||||
const { files }: MissingThumbnailFileScanResponse = await res.json();
|
|
||||||
return { files };
|
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -1,8 +1,7 @@
|
|||||||
import { getContext, setContext } from "svelte";
|
import { getContext, setContext } from "svelte";
|
||||||
import { callPostApi } from "$lib/hooks";
|
|
||||||
import { encryptString } from "$lib/modules/crypto";
|
import { encryptString } from "$lib/modules/crypto";
|
||||||
import type { SelectedCategory } from "$lib/components/molecules";
|
import type { SelectedCategory } from "$lib/components/molecules";
|
||||||
import type { CategoryRenameRequest } from "$lib/server/schemas";
|
import { useTRPC } from "$trpc/client";
|
||||||
|
|
||||||
export { requestCategoryCreation, requestFileRemovalFromCategory } from "$lib/services/category";
|
export { requestCategoryCreation, requestFileRemovalFromCategory } from "$lib/services/category";
|
||||||
|
|
||||||
@@ -18,17 +17,31 @@ export const useContext = () => {
|
|||||||
};
|
};
|
||||||
|
|
||||||
export const requestCategoryRename = async (category: SelectedCategory, newName: string) => {
|
export const requestCategoryRename = async (category: SelectedCategory, newName: string) => {
|
||||||
|
const trpc = useTRPC();
|
||||||
const newNameEncrypted = await encryptString(newName, category.dataKey);
|
const newNameEncrypted = await encryptString(newName, category.dataKey);
|
||||||
|
|
||||||
const res = await callPostApi<CategoryRenameRequest>(`/api/category/${category.id}/rename`, {
|
try {
|
||||||
dekVersion: category.dataKeyVersion.toISOString(),
|
await trpc.category.rename.mutate({
|
||||||
|
id: category.id,
|
||||||
|
dekVersion: category.dataKeyVersion,
|
||||||
name: newNameEncrypted.ciphertext,
|
name: newNameEncrypted.ciphertext,
|
||||||
nameIv: newNameEncrypted.iv,
|
nameIv: newNameEncrypted.iv,
|
||||||
});
|
});
|
||||||
return res.ok;
|
return true;
|
||||||
|
} catch {
|
||||||
|
// TODO: Error Handling
|
||||||
|
return false;
|
||||||
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
export const requestCategoryDeletion = async (category: SelectedCategory) => {
|
export const requestCategoryDeletion = async (category: SelectedCategory) => {
|
||||||
const res = await callPostApi(`/api/category/${category.id}/delete`);
|
const trpc = useTRPC();
|
||||||
return res.ok;
|
|
||||||
|
try {
|
||||||
|
await trpc.category.delete.mutate({ id: category.id });
|
||||||
|
return true;
|
||||||
|
} catch {
|
||||||
|
// TODO: Error Handling
|
||||||
|
return false;
|
||||||
|
}
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -1,5 +1,4 @@
|
|||||||
import { getContext, setContext } from "svelte";
|
import { getContext, setContext } from "svelte";
|
||||||
import { callPostApi } from "$lib/hooks";
|
|
||||||
import { storeHmacSecrets } from "$lib/indexedDB";
|
import { storeHmacSecrets } from "$lib/indexedDB";
|
||||||
import { generateDataKey, wrapDataKey, unwrapHmacSecret, encryptString } from "$lib/modules/crypto";
|
import { generateDataKey, wrapDataKey, unwrapHmacSecret, encryptString } from "$lib/modules/crypto";
|
||||||
import {
|
import {
|
||||||
@@ -9,12 +8,6 @@ import {
|
|||||||
deleteFileThumbnailCache,
|
deleteFileThumbnailCache,
|
||||||
uploadFile,
|
uploadFile,
|
||||||
} from "$lib/modules/file";
|
} from "$lib/modules/file";
|
||||||
import type {
|
|
||||||
DirectoryRenameRequest,
|
|
||||||
DirectoryCreateRequest,
|
|
||||||
FileRenameRequest,
|
|
||||||
DirectoryDeleteResponse,
|
|
||||||
} from "$lib/server/schemas";
|
|
||||||
import { hmacSecretStore, type MasterKey, type HmacSecret } from "$lib/stores";
|
import { hmacSecretStore, type MasterKey, type HmacSecret } from "$lib/stores";
|
||||||
import { useTRPC } from "$trpc/client";
|
import { useTRPC } from "$trpc/client";
|
||||||
|
|
||||||
@@ -68,18 +61,24 @@ export const requestDirectoryCreation = async (
|
|||||||
parentId: "root" | number,
|
parentId: "root" | number,
|
||||||
masterKey: MasterKey,
|
masterKey: MasterKey,
|
||||||
) => {
|
) => {
|
||||||
|
const trpc = useTRPC();
|
||||||
const { dataKey, dataKeyVersion } = await generateDataKey();
|
const { dataKey, dataKeyVersion } = await generateDataKey();
|
||||||
const nameEncrypted = await encryptString(name, dataKey);
|
const nameEncrypted = await encryptString(name, dataKey);
|
||||||
|
|
||||||
const res = await callPostApi<DirectoryCreateRequest>("/api/directory/create", {
|
try {
|
||||||
|
await trpc.directory.create.mutate({
|
||||||
parent: parentId,
|
parent: parentId,
|
||||||
mekVersion: masterKey.version,
|
mekVersion: masterKey.version,
|
||||||
dek: await wrapDataKey(dataKey, masterKey.key),
|
dek: await wrapDataKey(dataKey, masterKey.key),
|
||||||
dekVersion: dataKeyVersion.toISOString(),
|
dekVersion: dataKeyVersion,
|
||||||
name: nameEncrypted.ciphertext,
|
name: nameEncrypted.ciphertext,
|
||||||
nameIv: nameEncrypted.iv,
|
nameIv: nameEncrypted.iv,
|
||||||
});
|
});
|
||||||
return res.ok;
|
return true;
|
||||||
|
} catch {
|
||||||
|
// TODO: Error Handling
|
||||||
|
return false;
|
||||||
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
export const requestFileUpload = async (
|
export const requestFileUpload = async (
|
||||||
@@ -101,37 +100,51 @@ export const requestFileUpload = async (
|
|||||||
};
|
};
|
||||||
|
|
||||||
export const requestEntryRename = async (entry: SelectedEntry, newName: string) => {
|
export const requestEntryRename = async (entry: SelectedEntry, newName: string) => {
|
||||||
|
const trpc = useTRPC();
|
||||||
const newNameEncrypted = await encryptString(newName, entry.dataKey);
|
const newNameEncrypted = await encryptString(newName, entry.dataKey);
|
||||||
|
|
||||||
let res;
|
try {
|
||||||
if (entry.type === "directory") {
|
if (entry.type === "directory") {
|
||||||
res = await callPostApi<DirectoryRenameRequest>(`/api/directory/${entry.id}/rename`, {
|
await trpc.directory.rename.mutate({
|
||||||
dekVersion: entry.dataKeyVersion.toISOString(),
|
id: entry.id,
|
||||||
|
dekVersion: entry.dataKeyVersion,
|
||||||
name: newNameEncrypted.ciphertext,
|
name: newNameEncrypted.ciphertext,
|
||||||
nameIv: newNameEncrypted.iv,
|
nameIv: newNameEncrypted.iv,
|
||||||
});
|
});
|
||||||
} else {
|
} else {
|
||||||
res = await callPostApi<FileRenameRequest>(`/api/file/${entry.id}/rename`, {
|
await trpc.file.rename.mutate({
|
||||||
dekVersion: entry.dataKeyVersion.toISOString(),
|
id: entry.id,
|
||||||
|
dekVersion: entry.dataKeyVersion,
|
||||||
name: newNameEncrypted.ciphertext,
|
name: newNameEncrypted.ciphertext,
|
||||||
nameIv: newNameEncrypted.iv,
|
nameIv: newNameEncrypted.iv,
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
return res.ok;
|
return true;
|
||||||
|
} catch {
|
||||||
|
// TODO: Error Handling
|
||||||
|
return false;
|
||||||
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
export const requestEntryDeletion = async (entry: SelectedEntry) => {
|
export const requestEntryDeletion = async (entry: SelectedEntry) => {
|
||||||
const res = await callPostApi(`/api/${entry.type}/${entry.id}/delete`);
|
const trpc = useTRPC();
|
||||||
if (!res.ok) return false;
|
|
||||||
|
|
||||||
|
try {
|
||||||
if (entry.type === "directory") {
|
if (entry.type === "directory") {
|
||||||
const { deletedFiles }: DirectoryDeleteResponse = await res.json();
|
const { deletedFiles } = await trpc.directory.delete.mutate({ id: entry.id });
|
||||||
await Promise.all(
|
await Promise.all(
|
||||||
deletedFiles.flatMap((fileId) => [deleteFileCache(fileId), deleteFileThumbnailCache(fileId)]),
|
deletedFiles.flatMap((fileId) => [
|
||||||
|
deleteFileCache(fileId),
|
||||||
|
deleteFileThumbnailCache(fileId),
|
||||||
|
]),
|
||||||
);
|
);
|
||||||
return true;
|
|
||||||
} else {
|
} else {
|
||||||
|
await trpc.file.delete.mutate({ id: entry.id });
|
||||||
await Promise.all([deleteFileCache(entry.id), deleteFileThumbnailCache(entry.id)]);
|
await Promise.all([deleteFileCache(entry.id), deleteFileThumbnailCache(entry.id)]);
|
||||||
|
}
|
||||||
return true;
|
return true;
|
||||||
|
} catch {
|
||||||
|
// TODO: Error Handling
|
||||||
|
return false;
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -6,7 +6,7 @@ export const load: PageLoad = async ({ fetch }) => {
|
|||||||
const trpc = useTRPC(fetch);
|
const trpc = useTRPC(fetch);
|
||||||
|
|
||||||
try {
|
try {
|
||||||
const { nickname } = await trpc.user.info.query();
|
const { nickname } = await trpc.user.get.query();
|
||||||
return { nickname };
|
return { nickname };
|
||||||
} catch {
|
} catch {
|
||||||
error(500, "Internal server error");
|
error(500, "Internal server error");
|
||||||
|
|||||||
@@ -1,16 +0,0 @@
|
|||||||
import { error, text } from "@sveltejs/kit";
|
|
||||||
import { authorize } from "$lib/server/modules/auth";
|
|
||||||
import { passwordChangeRequest } from "$lib/server/schemas";
|
|
||||||
import { changePassword } from "$lib/server/services/auth";
|
|
||||||
import type { RequestHandler } from "./$types";
|
|
||||||
|
|
||||||
export const POST: RequestHandler = async ({ locals, request }) => {
|
|
||||||
const { sessionId, userId } = await authorize(locals, "any");
|
|
||||||
|
|
||||||
const zodRes = passwordChangeRequest.safeParse(await request.json());
|
|
||||||
if (!zodRes.success) error(400, "Invalid request body");
|
|
||||||
const { oldPassword, newPassword } = zodRes.data;
|
|
||||||
|
|
||||||
await changePassword(userId, sessionId, oldPassword, newPassword);
|
|
||||||
return text("Password changed", { headers: { "Content-Type": "text/plain" } });
|
|
||||||
};
|
|
||||||
@@ -1,21 +0,0 @@
|
|||||||
import { error, text } from "@sveltejs/kit";
|
|
||||||
import env from "$lib/server/loadenv";
|
|
||||||
import { loginRequest } from "$lib/server/schemas";
|
|
||||||
import { login } from "$lib/server/services/auth";
|
|
||||||
import type { RequestHandler } from "./$types";
|
|
||||||
|
|
||||||
export const POST: RequestHandler = async ({ locals, request, cookies }) => {
|
|
||||||
const zodRes = loginRequest.safeParse(await request.json());
|
|
||||||
if (!zodRes.success) error(400, "Invalid request body");
|
|
||||||
const { email, password } = zodRes.data;
|
|
||||||
|
|
||||||
const { sessionIdSigned } = await login(email, password, locals.ip, locals.userAgent);
|
|
||||||
cookies.set("sessionId", sessionIdSigned, {
|
|
||||||
path: "/",
|
|
||||||
maxAge: env.session.exp / 1000,
|
|
||||||
secure: true,
|
|
||||||
sameSite: "strict",
|
|
||||||
});
|
|
||||||
|
|
||||||
return text("Logged in", { headers: { "Content-Type": "text/plain" } });
|
|
||||||
};
|
|
||||||
@@ -1,13 +0,0 @@
|
|||||||
import { text } from "@sveltejs/kit";
|
|
||||||
import { authorize } from "$lib/server/modules/auth";
|
|
||||||
import { logout } from "$lib/server/services/auth";
|
|
||||||
import type { RequestHandler } from "./$types";
|
|
||||||
|
|
||||||
export const POST: RequestHandler = async ({ locals, cookies }) => {
|
|
||||||
const { sessionId } = await authorize(locals, "any");
|
|
||||||
|
|
||||||
await logout(sessionId);
|
|
||||||
cookies.delete("sessionId", { path: "/" });
|
|
||||||
|
|
||||||
return text("Logged out", { headers: { "Content-Type": "text/plain" } });
|
|
||||||
};
|
|
||||||
@@ -1,26 +0,0 @@
|
|||||||
import { error, json } from "@sveltejs/kit";
|
|
||||||
import { authorize } from "$lib/server/modules/auth";
|
|
||||||
import {
|
|
||||||
sessionUpgradeRequest,
|
|
||||||
sessionUpgradeResponse,
|
|
||||||
type SessionUpgradeResponse,
|
|
||||||
} from "$lib/server/schemas";
|
|
||||||
import { createSessionUpgradeChallenge } from "$lib/server/services/auth";
|
|
||||||
import type { RequestHandler } from "./$types";
|
|
||||||
|
|
||||||
export const POST: RequestHandler = async ({ locals, request }) => {
|
|
||||||
const { sessionId, userId } = await authorize(locals, "notClient");
|
|
||||||
|
|
||||||
const zodRes = sessionUpgradeRequest.safeParse(await request.json());
|
|
||||||
if (!zodRes.success) error(400, "Invalid request body");
|
|
||||||
const { encPubKey, sigPubKey } = zodRes.data;
|
|
||||||
|
|
||||||
const { id, challenge } = await createSessionUpgradeChallenge(
|
|
||||||
sessionId,
|
|
||||||
userId,
|
|
||||||
locals.ip,
|
|
||||||
encPubKey,
|
|
||||||
sigPubKey,
|
|
||||||
);
|
|
||||||
return json(sessionUpgradeResponse.parse({ id, challenge } satisfies SessionUpgradeResponse));
|
|
||||||
};
|
|
||||||
@@ -1,16 +0,0 @@
|
|||||||
import { error, text } from "@sveltejs/kit";
|
|
||||||
import { authorize } from "$lib/server/modules/auth";
|
|
||||||
import { sessionUpgradeVerifyRequest } from "$lib/server/schemas";
|
|
||||||
import { verifySessionUpgradeChallenge } from "$lib/server/services/auth";
|
|
||||||
import type { RequestHandler } from "./$types";
|
|
||||||
|
|
||||||
export const POST: RequestHandler = async ({ locals, request }) => {
|
|
||||||
const { sessionId, userId } = await authorize(locals, "notClient");
|
|
||||||
|
|
||||||
const zodRes = sessionUpgradeVerifyRequest.safeParse(await request.json());
|
|
||||||
if (!zodRes.success) error(400, "Invalid request body");
|
|
||||||
const { id, answerSig, force } = zodRes.data;
|
|
||||||
|
|
||||||
await verifySessionUpgradeChallenge(sessionId, userId, locals.ip, id, answerSig, force);
|
|
||||||
return text("Session upgraded", { headers: { "Content-Type": "text/plain" } });
|
|
||||||
};
|
|
||||||
@@ -1,33 +0,0 @@
|
|||||||
import { error, json } from "@sveltejs/kit";
|
|
||||||
import { z } from "zod";
|
|
||||||
import { authorize } from "$lib/server/modules/auth";
|
|
||||||
import { categoryInfoResponse, type CategoryInfoResponse } from "$lib/server/schemas";
|
|
||||||
import { getCategoryInformation } from "$lib/server/services/category";
|
|
||||||
import type { RequestHandler } from "./$types";
|
|
||||||
|
|
||||||
export const GET: RequestHandler = async ({ locals, params }) => {
|
|
||||||
const { userId } = await authorize(locals, "activeClient");
|
|
||||||
|
|
||||||
const zodRes = z
|
|
||||||
.object({
|
|
||||||
id: z.union([z.enum(["root"]), z.coerce.number().int().positive()]),
|
|
||||||
})
|
|
||||||
.safeParse(params);
|
|
||||||
if (!zodRes.success) error(400, "Invalid path parameters");
|
|
||||||
const { id } = zodRes.data;
|
|
||||||
|
|
||||||
const { metadata, categories } = await getCategoryInformation(userId, id);
|
|
||||||
return json(
|
|
||||||
categoryInfoResponse.parse({
|
|
||||||
metadata: metadata && {
|
|
||||||
parent: metadata.parentId,
|
|
||||||
mekVersion: metadata.mekVersion,
|
|
||||||
dek: metadata.encDek,
|
|
||||||
dekVersion: metadata.dekVersion.toISOString(),
|
|
||||||
name: metadata.encName.ciphertext,
|
|
||||||
nameIv: metadata.encName.iv,
|
|
||||||
},
|
|
||||||
subCategories: categories,
|
|
||||||
} satisfies CategoryInfoResponse),
|
|
||||||
);
|
|
||||||
};
|
|
||||||
@@ -1,20 +0,0 @@
|
|||||||
import { error, text } from "@sveltejs/kit";
|
|
||||||
import { z } from "zod";
|
|
||||||
import { authorize } from "$lib/server/modules/auth";
|
|
||||||
import { deleteCategory } from "$lib/server/services/category";
|
|
||||||
import type { RequestHandler } from "./$types";
|
|
||||||
|
|
||||||
export const POST: RequestHandler = async ({ locals, params }) => {
|
|
||||||
const { userId } = await authorize(locals, "activeClient");
|
|
||||||
|
|
||||||
const zodRes = z
|
|
||||||
.object({
|
|
||||||
id: z.coerce.number().int().positive(),
|
|
||||||
})
|
|
||||||
.safeParse(params);
|
|
||||||
if (!zodRes.success) error(400, "Invalid path parameters");
|
|
||||||
const { id } = zodRes.data;
|
|
||||||
|
|
||||||
await deleteCategory(userId, id);
|
|
||||||
return text("Category deleted", { headers: { "Content-Type": "text/plain" } });
|
|
||||||
};
|
|
||||||
@@ -1,25 +0,0 @@
|
|||||||
import { error, text } from "@sveltejs/kit";
|
|
||||||
import { z } from "zod";
|
|
||||||
import { authorize } from "$lib/server/modules/auth";
|
|
||||||
import { categoryFileAddRequest } from "$lib/server/schemas";
|
|
||||||
import { addCategoryFile } from "$lib/server/services/category";
|
|
||||||
import type { RequestHandler } from "./$types";
|
|
||||||
|
|
||||||
export const POST: RequestHandler = async ({ locals, params, request }) => {
|
|
||||||
const { userId } = await authorize(locals, "activeClient");
|
|
||||||
|
|
||||||
const paramsZodRes = z
|
|
||||||
.object({
|
|
||||||
id: z.coerce.number().int().positive(),
|
|
||||||
})
|
|
||||||
.safeParse(params);
|
|
||||||
if (!paramsZodRes.success) error(400, "Invalid path parameters");
|
|
||||||
const { id } = paramsZodRes.data;
|
|
||||||
|
|
||||||
const bodyZodRes = categoryFileAddRequest.safeParse(await request.json());
|
|
||||||
if (!bodyZodRes.success) error(400, "Invalid request body");
|
|
||||||
const { file } = bodyZodRes.data;
|
|
||||||
|
|
||||||
await addCategoryFile(userId, id, file);
|
|
||||||
return text("File added", { headers: { "Content-Type": "text/plain" } });
|
|
||||||
};
|
|
||||||
@@ -1,36 +0,0 @@
|
|||||||
import { error, json } from "@sveltejs/kit";
|
|
||||||
import { z } from "zod";
|
|
||||||
import { authorize } from "$lib/server/modules/auth";
|
|
||||||
import { categoryFileListResponse, type CategoryFileListResponse } from "$lib/server/schemas";
|
|
||||||
import { getCategoryFiles } from "$lib/server/services/category";
|
|
||||||
import type { RequestHandler } from "./$types";
|
|
||||||
|
|
||||||
export const GET: RequestHandler = async ({ locals, url, params }) => {
|
|
||||||
const { userId } = await authorize(locals, "activeClient");
|
|
||||||
|
|
||||||
const paramsZodRes = z
|
|
||||||
.object({
|
|
||||||
id: z.coerce.number().int().positive(),
|
|
||||||
})
|
|
||||||
.safeParse(params);
|
|
||||||
if (!paramsZodRes.success) error(400, "Invalid path parameters");
|
|
||||||
const { id } = paramsZodRes.data;
|
|
||||||
|
|
||||||
const queryZodRes = z
|
|
||||||
.object({
|
|
||||||
recurse: z
|
|
||||||
.enum(["true", "false"])
|
|
||||||
.transform((value) => value === "true")
|
|
||||||
.nullable(),
|
|
||||||
})
|
|
||||||
.safeParse({ recurse: url.searchParams.get("recurse") });
|
|
||||||
if (!queryZodRes.success) error(400, "Invalid query parameters");
|
|
||||||
const { recurse } = queryZodRes.data;
|
|
||||||
|
|
||||||
const { files } = await getCategoryFiles(userId, id, recurse ?? false);
|
|
||||||
return json(
|
|
||||||
categoryFileListResponse.parse({
|
|
||||||
files: files.map(({ id, isRecursive }) => ({ file: id, isRecursive })),
|
|
||||||
} satisfies CategoryFileListResponse),
|
|
||||||
);
|
|
||||||
};
|
|
||||||
@@ -1,25 +0,0 @@
|
|||||||
import { error, text } from "@sveltejs/kit";
|
|
||||||
import { z } from "zod";
|
|
||||||
import { authorize } from "$lib/server/modules/auth";
|
|
||||||
import { categoryFileRemoveRequest } from "$lib/server/schemas";
|
|
||||||
import { removeCategoryFile } from "$lib/server/services/category";
|
|
||||||
import type { RequestHandler } from "./$types";
|
|
||||||
|
|
||||||
export const POST: RequestHandler = async ({ locals, params, request }) => {
|
|
||||||
const { userId } = await authorize(locals, "activeClient");
|
|
||||||
|
|
||||||
const paramsZodRes = z
|
|
||||||
.object({
|
|
||||||
id: z.coerce.number().int().positive(),
|
|
||||||
})
|
|
||||||
.safeParse(params);
|
|
||||||
if (!paramsZodRes.success) error(400, "Invalid path parameters");
|
|
||||||
const { id } = paramsZodRes.data;
|
|
||||||
|
|
||||||
const bodyZodRes = categoryFileRemoveRequest.safeParse(await request.json());
|
|
||||||
if (!bodyZodRes.success) error(400, "Invalid request body");
|
|
||||||
const { file } = bodyZodRes.data;
|
|
||||||
|
|
||||||
await removeCategoryFile(userId, id, file);
|
|
||||||
return text("File removed", { headers: { "Content-Type": "text/plain" } });
|
|
||||||
};
|
|
||||||
@@ -1,25 +0,0 @@
|
|||||||
import { error, text } from "@sveltejs/kit";
|
|
||||||
import { z } from "zod";
|
|
||||||
import { authorize } from "$lib/server/modules/auth";
|
|
||||||
import { categoryRenameRequest } from "$lib/server/schemas";
|
|
||||||
import { renameCategory } from "$lib/server/services/category";
|
|
||||||
import type { RequestHandler } from "./$types";
|
|
||||||
|
|
||||||
export const POST: RequestHandler = async ({ locals, params, request }) => {
|
|
||||||
const { userId } = await authorize(locals, "activeClient");
|
|
||||||
|
|
||||||
const paramsZodRes = z
|
|
||||||
.object({
|
|
||||||
id: z.coerce.number().int().positive(),
|
|
||||||
})
|
|
||||||
.safeParse(params);
|
|
||||||
if (!paramsZodRes.success) error(400, "Invalid path parameters");
|
|
||||||
const { id } = paramsZodRes.data;
|
|
||||||
|
|
||||||
const bodyZodRes = categoryRenameRequest.safeParse(await request.json());
|
|
||||||
if (!bodyZodRes.success) error(400, "Invalid request body");
|
|
||||||
const { dekVersion, name, nameIv } = bodyZodRes.data;
|
|
||||||
|
|
||||||
await renameCategory(userId, id, new Date(dekVersion), { ciphertext: name, iv: nameIv });
|
|
||||||
return text("Category renamed", { headers: { "Content-Type": "text/plain" } });
|
|
||||||
};
|
|
||||||
@@ -1,23 +0,0 @@
|
|||||||
import { error, text } from "@sveltejs/kit";
|
|
||||||
import { authorize } from "$lib/server/modules/auth";
|
|
||||||
import { categoryCreateRequest } from "$lib/server/schemas";
|
|
||||||
import { createCategory } from "$lib/server/services/category";
|
|
||||||
import type { RequestHandler } from "./$types";
|
|
||||||
|
|
||||||
export const POST: RequestHandler = async ({ locals, request }) => {
|
|
||||||
const { userId } = await authorize(locals, "activeClient");
|
|
||||||
|
|
||||||
const zodRes = categoryCreateRequest.safeParse(await request.json());
|
|
||||||
if (!zodRes.success) error(400, "Invalid request body");
|
|
||||||
const { parent, mekVersion, dek, dekVersion, name, nameIv } = zodRes.data;
|
|
||||||
|
|
||||||
await createCategory({
|
|
||||||
userId,
|
|
||||||
parentId: parent,
|
|
||||||
mekVersion,
|
|
||||||
encDek: dek,
|
|
||||||
dekVersion: new Date(dekVersion),
|
|
||||||
encName: { ciphertext: name, iv: nameIv },
|
|
||||||
});
|
|
||||||
return text("Category created", { headers: { "Content-Type": "text/plain" } });
|
|
||||||
};
|
|
||||||
@@ -1,34 +0,0 @@
|
|||||||
import { error, json } from "@sveltejs/kit";
|
|
||||||
import { z } from "zod";
|
|
||||||
import { authorize } from "$lib/server/modules/auth";
|
|
||||||
import { directoryInfoResponse, type DirectoryInfoResponse } from "$lib/server/schemas";
|
|
||||||
import { getDirectoryInformation } from "$lib/server/services/directory";
|
|
||||||
import type { RequestHandler } from "./$types";
|
|
||||||
|
|
||||||
export const GET: RequestHandler = async ({ locals, params }) => {
|
|
||||||
const { userId } = await authorize(locals, "activeClient");
|
|
||||||
|
|
||||||
const zodRes = z
|
|
||||||
.object({
|
|
||||||
id: z.union([z.enum(["root"]), z.coerce.number().int().positive()]),
|
|
||||||
})
|
|
||||||
.safeParse(params);
|
|
||||||
if (!zodRes.success) error(400, "Invalid path parameters");
|
|
||||||
const { id } = zodRes.data;
|
|
||||||
|
|
||||||
const { metadata, directories, files } = await getDirectoryInformation(userId, id);
|
|
||||||
return json(
|
|
||||||
directoryInfoResponse.parse({
|
|
||||||
metadata: metadata && {
|
|
||||||
parent: metadata.parentId,
|
|
||||||
mekVersion: metadata.mekVersion,
|
|
||||||
dek: metadata.encDek,
|
|
||||||
dekVersion: metadata.dekVersion.toISOString(),
|
|
||||||
name: metadata.encName.ciphertext,
|
|
||||||
nameIv: metadata.encName.iv,
|
|
||||||
},
|
|
||||||
subDirectories: directories,
|
|
||||||
files,
|
|
||||||
} satisfies DirectoryInfoResponse),
|
|
||||||
);
|
|
||||||
};
|
|
||||||
@@ -1,23 +0,0 @@
|
|||||||
import { error, json } from "@sveltejs/kit";
|
|
||||||
import { z } from "zod";
|
|
||||||
import { authorize } from "$lib/server/modules/auth";
|
|
||||||
import { directoryDeleteResponse, type DirectoryDeleteResponse } from "$lib/server/schemas";
|
|
||||||
import { deleteDirectory } from "$lib/server/services/directory";
|
|
||||||
import type { RequestHandler } from "./$types";
|
|
||||||
|
|
||||||
export const POST: RequestHandler = async ({ locals, params }) => {
|
|
||||||
const { userId } = await authorize(locals, "activeClient");
|
|
||||||
|
|
||||||
const zodRes = z
|
|
||||||
.object({
|
|
||||||
id: z.coerce.number().int().positive(),
|
|
||||||
})
|
|
||||||
.safeParse(params);
|
|
||||||
if (!zodRes.success) error(400, "Invalid path parameters");
|
|
||||||
const { id } = zodRes.data;
|
|
||||||
|
|
||||||
const { files } = await deleteDirectory(userId, id);
|
|
||||||
return json(
|
|
||||||
directoryDeleteResponse.parse({ deletedFiles: files } satisfies DirectoryDeleteResponse),
|
|
||||||
);
|
|
||||||
};
|
|
||||||
@@ -1,25 +0,0 @@
|
|||||||
import { error, text } from "@sveltejs/kit";
|
|
||||||
import { z } from "zod";
|
|
||||||
import { authorize } from "$lib/server/modules/auth";
|
|
||||||
import { directoryRenameRequest } from "$lib/server/schemas";
|
|
||||||
import { renameDirectory } from "$lib/server/services/directory";
|
|
||||||
import type { RequestHandler } from "./$types";
|
|
||||||
|
|
||||||
export const POST: RequestHandler = async ({ locals, params, request }) => {
|
|
||||||
const { userId } = await authorize(locals, "activeClient");
|
|
||||||
|
|
||||||
const paramsZodRes = z
|
|
||||||
.object({
|
|
||||||
id: z.coerce.number().int().positive(),
|
|
||||||
})
|
|
||||||
.safeParse(params);
|
|
||||||
if (!paramsZodRes.success) error(400, "Invalid path parameters");
|
|
||||||
const { id } = paramsZodRes.data;
|
|
||||||
|
|
||||||
const bodyZodRes = directoryRenameRequest.safeParse(await request.json());
|
|
||||||
if (!bodyZodRes.success) error(400, "Invalid request body");
|
|
||||||
const { dekVersion, name, nameIv } = bodyZodRes.data;
|
|
||||||
|
|
||||||
await renameDirectory(userId, id, new Date(dekVersion), { ciphertext: name, iv: nameIv });
|
|
||||||
return text("Directory renamed", { headers: { "Content-Type": "text/plain" } });
|
|
||||||
};
|
|
||||||
@@ -1,23 +0,0 @@
|
|||||||
import { error, text } from "@sveltejs/kit";
|
|
||||||
import { authorize } from "$lib/server/modules/auth";
|
|
||||||
import { directoryCreateRequest } from "$lib/server/schemas";
|
|
||||||
import { createDirectory } from "$lib/server/services/directory";
|
|
||||||
import type { RequestHandler } from "./$types";
|
|
||||||
|
|
||||||
export const POST: RequestHandler = async ({ locals, request }) => {
|
|
||||||
const { userId } = await authorize(locals, "activeClient");
|
|
||||||
|
|
||||||
const zodRes = directoryCreateRequest.safeParse(await request.json());
|
|
||||||
if (!zodRes.success) error(400, "Invalid request body");
|
|
||||||
const { parent, mekVersion, dek, dekVersion, name, nameIv } = zodRes.data;
|
|
||||||
|
|
||||||
await createDirectory({
|
|
||||||
userId,
|
|
||||||
parentId: parent,
|
|
||||||
mekVersion,
|
|
||||||
encDek: dek,
|
|
||||||
dekVersion: new Date(dekVersion),
|
|
||||||
encName: { ciphertext: name, iv: nameIv },
|
|
||||||
});
|
|
||||||
return text("Directory created", { headers: { "Content-Type": "text/plain" } });
|
|
||||||
};
|
|
||||||
@@ -1,48 +0,0 @@
|
|||||||
import { error, json } from "@sveltejs/kit";
|
|
||||||
import { z } from "zod";
|
|
||||||
import { authorize } from "$lib/server/modules/auth";
|
|
||||||
import { fileInfoResponse, type FileInfoResponse } from "$lib/server/schemas";
|
|
||||||
import { getFileInformation } from "$lib/server/services/file";
|
|
||||||
import type { RequestHandler } from "./$types";
|
|
||||||
|
|
||||||
export const GET: RequestHandler = async ({ locals, params }) => {
|
|
||||||
const { userId } = await authorize(locals, "activeClient");
|
|
||||||
|
|
||||||
const zodRes = z
|
|
||||||
.object({
|
|
||||||
id: z.coerce.number().int().positive(),
|
|
||||||
})
|
|
||||||
.safeParse(params);
|
|
||||||
if (!zodRes.success) error(400, "Invalid path parameters");
|
|
||||||
const { id } = zodRes.data;
|
|
||||||
|
|
||||||
const {
|
|
||||||
parentId,
|
|
||||||
mekVersion,
|
|
||||||
encDek,
|
|
||||||
dekVersion,
|
|
||||||
contentType,
|
|
||||||
encContentIv,
|
|
||||||
encName,
|
|
||||||
encCreatedAt,
|
|
||||||
encLastModifiedAt,
|
|
||||||
categories,
|
|
||||||
} = await getFileInformation(userId, id);
|
|
||||||
return json(
|
|
||||||
fileInfoResponse.parse({
|
|
||||||
parent: parentId,
|
|
||||||
mekVersion,
|
|
||||||
dek: encDek,
|
|
||||||
dekVersion: dekVersion.toISOString(),
|
|
||||||
contentType: contentType,
|
|
||||||
contentIv: encContentIv,
|
|
||||||
name: encName.ciphertext,
|
|
||||||
nameIv: encName.iv,
|
|
||||||
createdAt: encCreatedAt?.ciphertext,
|
|
||||||
createdAtIv: encCreatedAt?.iv,
|
|
||||||
lastModifiedAt: encLastModifiedAt.ciphertext,
|
|
||||||
lastModifiedAtIv: encLastModifiedAt.iv,
|
|
||||||
categories,
|
|
||||||
} satisfies FileInfoResponse),
|
|
||||||
);
|
|
||||||
};
|
|
||||||
@@ -1,20 +0,0 @@
|
|||||||
import { error, text } from "@sveltejs/kit";
|
|
||||||
import { z } from "zod";
|
|
||||||
import { authorize } from "$lib/server/modules/auth";
|
|
||||||
import { deleteFile } from "$lib/server/services/file";
|
|
||||||
import type { RequestHandler } from "./$types";
|
|
||||||
|
|
||||||
export const POST: RequestHandler = async ({ locals, params }) => {
|
|
||||||
const { userId } = await authorize(locals, "activeClient");
|
|
||||||
|
|
||||||
const zodRes = z
|
|
||||||
.object({
|
|
||||||
id: z.coerce.number().int().positive(),
|
|
||||||
})
|
|
||||||
.safeParse(params);
|
|
||||||
if (!zodRes.success) error(400, "Invalid path parameters");
|
|
||||||
const { id } = zodRes.data;
|
|
||||||
|
|
||||||
await deleteFile(userId, id);
|
|
||||||
return text("File deleted", { headers: { "Content-Type": "text/plain" } });
|
|
||||||
};
|
|
||||||
@@ -1,25 +0,0 @@
|
|||||||
import { error, text } from "@sveltejs/kit";
|
|
||||||
import { z } from "zod";
|
|
||||||
import { authorize } from "$lib/server/modules/auth";
|
|
||||||
import { fileRenameRequest } from "$lib/server/schemas";
|
|
||||||
import { renameFile } from "$lib/server/services/file";
|
|
||||||
import type { RequestHandler } from "./$types";
|
|
||||||
|
|
||||||
export const POST: RequestHandler = async ({ locals, params, request }) => {
|
|
||||||
const { userId } = await authorize(locals, "activeClient");
|
|
||||||
|
|
||||||
const paramsZodRes = z
|
|
||||||
.object({
|
|
||||||
id: z.coerce.number().int().positive(),
|
|
||||||
})
|
|
||||||
.safeParse(params);
|
|
||||||
if (!paramsZodRes.success) error(400, "Invalid path parameters");
|
|
||||||
const { id } = paramsZodRes.data;
|
|
||||||
|
|
||||||
const bodyZodRes = fileRenameRequest.safeParse(await request.json());
|
|
||||||
if (!bodyZodRes.success) error(400, "Invalid request body");
|
|
||||||
const { dekVersion, name, nameIv } = bodyZodRes.data;
|
|
||||||
|
|
||||||
await renameFile(userId, id, new Date(dekVersion), { ciphertext: name, iv: nameIv });
|
|
||||||
return text("File renamed", { headers: { "Content-Type": "text/plain" } });
|
|
||||||
};
|
|
||||||
@@ -1,26 +0,0 @@
|
|||||||
import { error, json } from "@sveltejs/kit";
|
|
||||||
import { z } from "zod";
|
|
||||||
import { authorize } from "$lib/server/modules/auth";
|
|
||||||
import { fileThumbnailInfoResponse, type FileThumbnailInfoResponse } from "$lib/server/schemas";
|
|
||||||
import { getFileThumbnailInformation } from "$lib/server/services/file";
|
|
||||||
import type { RequestHandler } from "./$types";
|
|
||||||
|
|
||||||
export const GET: RequestHandler = async ({ locals, params }) => {
|
|
||||||
const { userId } = await authorize(locals, "activeClient");
|
|
||||||
|
|
||||||
const zodRes = z
|
|
||||||
.object({
|
|
||||||
id: z.coerce.number().int().positive(),
|
|
||||||
})
|
|
||||||
.safeParse(params);
|
|
||||||
if (!zodRes.success) error(400, "Invalid path parameters");
|
|
||||||
const { id } = zodRes.data;
|
|
||||||
|
|
||||||
const { updatedAt, encContentIv } = await getFileThumbnailInformation(userId, id);
|
|
||||||
return json(
|
|
||||||
fileThumbnailInfoResponse.parse({
|
|
||||||
updatedAt: updatedAt.toISOString(),
|
|
||||||
contentIv: encContentIv,
|
|
||||||
} satisfies FileThumbnailInfoResponse),
|
|
||||||
);
|
|
||||||
};
|
|
||||||
@@ -1,11 +0,0 @@
|
|||||||
import { json } from "@sveltejs/kit";
|
|
||||||
import { authorize } from "$lib/server/modules/auth";
|
|
||||||
import { fileListResponse, type FileListResponse } from "$lib/server/schemas";
|
|
||||||
import { getFileList } from "$lib/server/services/file";
|
|
||||||
import type { RequestHandler } from "./$types";
|
|
||||||
|
|
||||||
export const GET: RequestHandler = async ({ locals }) => {
|
|
||||||
const { userId } = await authorize(locals, "activeClient");
|
|
||||||
const { files } = await getFileList(userId);
|
|
||||||
return json(fileListResponse.parse({ files } satisfies FileListResponse));
|
|
||||||
};
|
|
||||||
@@ -1,20 +0,0 @@
|
|||||||
import { error, json } from "@sveltejs/kit";
|
|
||||||
import { authorize } from "$lib/server/modules/auth";
|
|
||||||
import {
|
|
||||||
duplicateFileScanRequest,
|
|
||||||
duplicateFileScanResponse,
|
|
||||||
type DuplicateFileScanResponse,
|
|
||||||
} from "$lib/server/schemas";
|
|
||||||
import { scanDuplicateFiles } from "$lib/server/services/file";
|
|
||||||
import type { RequestHandler } from "./$types";
|
|
||||||
|
|
||||||
export const POST: RequestHandler = async ({ locals, request }) => {
|
|
||||||
const { userId } = await authorize(locals, "activeClient");
|
|
||||||
|
|
||||||
const zodRes = duplicateFileScanRequest.safeParse(await request.json());
|
|
||||||
if (!zodRes.success) error(400, "Invalid request body");
|
|
||||||
const { hskVersion, contentHmac } = zodRes.data;
|
|
||||||
|
|
||||||
const { files } = await scanDuplicateFiles(userId, hskVersion, contentHmac);
|
|
||||||
return json(duplicateFileScanResponse.parse({ files } satisfies DuplicateFileScanResponse));
|
|
||||||
};
|
|
||||||
@@ -1,16 +0,0 @@
|
|||||||
import { json } from "@sveltejs/kit";
|
|
||||||
import { authorize } from "$lib/server/modules/auth";
|
|
||||||
import {
|
|
||||||
missingThumbnailFileScanResponse,
|
|
||||||
type MissingThumbnailFileScanResponse,
|
|
||||||
} from "$lib/server/schemas/file";
|
|
||||||
import { scanMissingFileThumbnails } from "$lib/server/services/file";
|
|
||||||
import type { RequestHandler } from "./$types";
|
|
||||||
|
|
||||||
export const POST: RequestHandler = async ({ locals }) => {
|
|
||||||
const { userId } = await authorize(locals, "activeClient");
|
|
||||||
const { files } = await scanMissingFileThumbnails(userId);
|
|
||||||
return json(
|
|
||||||
missingThumbnailFileScanResponse.parse({ files } satisfies MissingThumbnailFileScanResponse),
|
|
||||||
);
|
|
||||||
};
|
|
||||||
@@ -1,4 +1,5 @@
|
|||||||
import { createTRPCClient, httpBatchLink } from "@trpc/client";
|
import { createTRPCClient, httpBatchLink } from "@trpc/client";
|
||||||
|
import superjson from "superjson";
|
||||||
import { browser } from "$app/environment";
|
import { browser } from "$app/environment";
|
||||||
import type { AppRouter } from "./router.server";
|
import type { AppRouter } from "./router.server";
|
||||||
|
|
||||||
@@ -7,6 +8,7 @@ const createClient = (fetch: typeof globalThis.fetch) =>
|
|||||||
links: [
|
links: [
|
||||||
httpBatchLink({
|
httpBatchLink({
|
||||||
url: "/api/trpc",
|
url: "/api/trpc",
|
||||||
|
transformer: superjson,
|
||||||
fetch,
|
fetch,
|
||||||
}),
|
}),
|
||||||
],
|
],
|
||||||
|
|||||||
@@ -1,10 +1,12 @@
|
|||||||
import type { RequestEvent } from "@sveltejs/kit";
|
import type { RequestEvent } from "@sveltejs/kit";
|
||||||
import { initTRPC, TRPCError } from "@trpc/server";
|
import { initTRPC, TRPCError } from "@trpc/server";
|
||||||
|
import superjson from "superjson";
|
||||||
import { authorizeMiddleware, authorizeClientMiddleware } from "./middlewares/authorize";
|
import { authorizeMiddleware, authorizeClientMiddleware } from "./middlewares/authorize";
|
||||||
|
|
||||||
export const createContext = (event: RequestEvent) => event;
|
export type Context = Awaited<ReturnType<typeof createContext>>;
|
||||||
|
|
||||||
export const t = initTRPC.context<Awaited<ReturnType<typeof createContext>>>().create();
|
export const createContext = (event: RequestEvent) => event;
|
||||||
|
export const t = initTRPC.context<Context>().create({ transformer: superjson });
|
||||||
|
|
||||||
export const router = t.router;
|
export const router = t.router;
|
||||||
export const publicProcedure = t.procedure;
|
export const publicProcedure = t.procedure;
|
||||||
|
|||||||
@@ -1,10 +1,23 @@
|
|||||||
import type { RequestEvent } from "@sveltejs/kit";
|
import type { RequestEvent } from "@sveltejs/kit";
|
||||||
import type { inferRouterInputs, inferRouterOutputs } from "@trpc/server";
|
import type { inferRouterInputs, inferRouterOutputs } from "@trpc/server";
|
||||||
import { createContext, router } from "./init.server";
|
import { createContext, router } from "./init.server";
|
||||||
import { clientRouter, hskRouter, mekRouter, userRouter } from "./routers";
|
import {
|
||||||
|
authRouter,
|
||||||
|
categoryRouter,
|
||||||
|
clientRouter,
|
||||||
|
directoryRouter,
|
||||||
|
fileRouter,
|
||||||
|
hskRouter,
|
||||||
|
mekRouter,
|
||||||
|
userRouter,
|
||||||
|
} from "./routers";
|
||||||
|
|
||||||
export const appRouter = router({
|
export const appRouter = router({
|
||||||
|
auth: authRouter,
|
||||||
|
category: categoryRouter,
|
||||||
client: clientRouter,
|
client: clientRouter,
|
||||||
|
directory: directoryRouter,
|
||||||
|
file: fileRouter,
|
||||||
hsk: hskRouter,
|
hsk: hskRouter,
|
||||||
mek: mekRouter,
|
mek: mekRouter,
|
||||||
user: userRouter,
|
user: userRouter,
|
||||||
|
|||||||
153
src/trpc/routers/auth.ts
Normal file
153
src/trpc/routers/auth.ts
Normal file
@@ -0,0 +1,153 @@
|
|||||||
|
import { TRPCError } from "@trpc/server";
|
||||||
|
import argon2 from "argon2";
|
||||||
|
import { z } from "zod";
|
||||||
|
import { ClientRepo, SessionRepo, UserRepo, IntegrityError } from "$lib/server/db";
|
||||||
|
import env from "$lib/server/loadenv";
|
||||||
|
import { startSession } from "$lib/server/modules/auth";
|
||||||
|
import { generateChallenge, verifySignature } from "$lib/server/modules/crypto";
|
||||||
|
import { publicProcedure, roleProcedure, router } from "../init.server";
|
||||||
|
|
||||||
|
const hashPassword = async (password: string) => {
|
||||||
|
return await argon2.hash(password);
|
||||||
|
};
|
||||||
|
|
||||||
|
const verifyPassword = async (hash: string, password: string) => {
|
||||||
|
return await argon2.verify(hash, password);
|
||||||
|
};
|
||||||
|
|
||||||
|
const authRouter = router({
|
||||||
|
login: publicProcedure
|
||||||
|
.input(
|
||||||
|
z.object({
|
||||||
|
email: z.email(),
|
||||||
|
password: z.string().trim().nonempty(),
|
||||||
|
}),
|
||||||
|
)
|
||||||
|
.mutation(async ({ ctx, input }) => {
|
||||||
|
const user = await UserRepo.getUserByEmail(input.email);
|
||||||
|
if (!user || !(await verifyPassword(user.password, input.password))) {
|
||||||
|
throw new TRPCError({ code: "UNAUTHORIZED", message: "Invalid email or password" });
|
||||||
|
}
|
||||||
|
|
||||||
|
const sessionIdSigned = await startSession(user.id, ctx.locals.ip, ctx.locals.userAgent);
|
||||||
|
ctx.cookies.set("sessionId", sessionIdSigned, {
|
||||||
|
path: "/",
|
||||||
|
maxAge: env.session.exp / 1000,
|
||||||
|
secure: true,
|
||||||
|
sameSite: "strict",
|
||||||
|
});
|
||||||
|
}),
|
||||||
|
|
||||||
|
logout: roleProcedure["any"].mutation(async ({ ctx }) => {
|
||||||
|
await SessionRepo.deleteSession(ctx.session.sessionId);
|
||||||
|
ctx.cookies.delete("sessionId", { path: "/" });
|
||||||
|
}),
|
||||||
|
|
||||||
|
changePassword: roleProcedure["any"]
|
||||||
|
.input(
|
||||||
|
z.object({
|
||||||
|
oldPassword: z.string().trim().nonempty(),
|
||||||
|
newPassword: z.string().trim().nonempty(),
|
||||||
|
}),
|
||||||
|
)
|
||||||
|
.mutation(async ({ ctx, input }) => {
|
||||||
|
if (input.oldPassword === input.newPassword) {
|
||||||
|
throw new TRPCError({ code: "BAD_REQUEST", message: "Same passwords" });
|
||||||
|
} else if (input.newPassword.length < 8) {
|
||||||
|
throw new TRPCError({ code: "BAD_REQUEST", message: "Too short password" });
|
||||||
|
}
|
||||||
|
|
||||||
|
const user = await UserRepo.getUser(ctx.session.userId);
|
||||||
|
if (!user) {
|
||||||
|
throw new TRPCError({ code: "INTERNAL_SERVER_ERROR", message: "Invalid session id" });
|
||||||
|
} else if (!(await verifyPassword(user.password, input.oldPassword))) {
|
||||||
|
throw new TRPCError({ code: "FORBIDDEN", message: "Invalid password" });
|
||||||
|
}
|
||||||
|
|
||||||
|
await UserRepo.setUserPassword(ctx.session.userId, await hashPassword(input.newPassword));
|
||||||
|
await SessionRepo.deleteAllOtherSessions(ctx.session.userId, ctx.session.sessionId);
|
||||||
|
}),
|
||||||
|
|
||||||
|
upgradeSession: roleProcedure["notClient"]
|
||||||
|
.input(
|
||||||
|
z.object({
|
||||||
|
encPubKey: z.base64().nonempty(),
|
||||||
|
sigPubKey: z.base64().nonempty(),
|
||||||
|
}),
|
||||||
|
)
|
||||||
|
.mutation(async ({ ctx, input }) => {
|
||||||
|
const client = await ClientRepo.getClientByPubKeys(input.encPubKey, input.sigPubKey);
|
||||||
|
const userClient = client
|
||||||
|
? await ClientRepo.getUserClient(ctx.session.userId, client.id)
|
||||||
|
: undefined;
|
||||||
|
if (!client) {
|
||||||
|
throw new TRPCError({ code: "UNAUTHORIZED", message: "Invalid public key(s)" });
|
||||||
|
} else if (!userClient || userClient.state === "challenging") {
|
||||||
|
throw new TRPCError({ code: "FORBIDDEN", message: "Unregistered client" });
|
||||||
|
}
|
||||||
|
|
||||||
|
const { answer, challenge } = await generateChallenge(32, input.encPubKey);
|
||||||
|
const { id } = await SessionRepo.registerSessionUpgradeChallenge(
|
||||||
|
ctx.session.sessionId,
|
||||||
|
client.id,
|
||||||
|
answer.toString("base64"),
|
||||||
|
ctx.locals.ip,
|
||||||
|
new Date(Date.now() + env.challenge.sessionUpgradeExp),
|
||||||
|
);
|
||||||
|
return { id, challenge: challenge.toString("base64") };
|
||||||
|
}),
|
||||||
|
|
||||||
|
verifySessionUpgrade: roleProcedure["notClient"]
|
||||||
|
.input(
|
||||||
|
z.object({
|
||||||
|
id: z.int().positive(),
|
||||||
|
answerSig: z.base64().nonempty(),
|
||||||
|
force: z.boolean().default(false),
|
||||||
|
}),
|
||||||
|
)
|
||||||
|
.mutation(async ({ ctx, input }) => {
|
||||||
|
const challenge = await SessionRepo.consumeSessionUpgradeChallenge(
|
||||||
|
input.id,
|
||||||
|
ctx.session.sessionId,
|
||||||
|
ctx.locals.ip,
|
||||||
|
);
|
||||||
|
if (!challenge) {
|
||||||
|
throw new TRPCError({ code: "FORBIDDEN", message: "Invalid challenge answer" });
|
||||||
|
}
|
||||||
|
|
||||||
|
const client = await ClientRepo.getClient(challenge.clientId);
|
||||||
|
if (!client) {
|
||||||
|
throw new TRPCError({ code: "INTERNAL_SERVER_ERROR", message: "Invalid challenge answer" });
|
||||||
|
} else if (
|
||||||
|
!verifySignature(Buffer.from(challenge.answer, "base64"), input.answerSig, client.sigPubKey)
|
||||||
|
) {
|
||||||
|
throw new TRPCError({
|
||||||
|
code: "FORBIDDEN",
|
||||||
|
message: "Invalid challenge answer signature",
|
||||||
|
});
|
||||||
|
}
|
||||||
|
|
||||||
|
try {
|
||||||
|
await SessionRepo.upgradeSession(
|
||||||
|
ctx.session.userId,
|
||||||
|
ctx.session.sessionId,
|
||||||
|
client.id,
|
||||||
|
input.force,
|
||||||
|
);
|
||||||
|
} catch (e) {
|
||||||
|
if (e instanceof IntegrityError) {
|
||||||
|
if (e.message === "Session not found") {
|
||||||
|
throw new TRPCError({
|
||||||
|
code: "INTERNAL_SERVER_ERROR",
|
||||||
|
message: "Invalid challenge answer",
|
||||||
|
});
|
||||||
|
} else if (!input.force && e.message === "Session already exists") {
|
||||||
|
throw new TRPCError({ code: "CONFLICT", message: "Already logged in" });
|
||||||
|
}
|
||||||
|
}
|
||||||
|
throw e;
|
||||||
|
}
|
||||||
|
}),
|
||||||
|
});
|
||||||
|
|
||||||
|
export default authRouter;
|
||||||
194
src/trpc/routers/category.ts
Normal file
194
src/trpc/routers/category.ts
Normal file
@@ -0,0 +1,194 @@
|
|||||||
|
import { TRPCError } from "@trpc/server";
|
||||||
|
import { z } from "zod";
|
||||||
|
import { CategoryRepo, FileRepo, IntegrityError } from "$lib/server/db";
|
||||||
|
import { categoryIdSchema } from "$lib/server/schemas";
|
||||||
|
import { router, roleProcedure } from "../init.server";
|
||||||
|
|
||||||
|
const categoryRouter = router({
|
||||||
|
get: roleProcedure["activeClient"]
|
||||||
|
.input(
|
||||||
|
z.object({
|
||||||
|
id: categoryIdSchema,
|
||||||
|
}),
|
||||||
|
)
|
||||||
|
.query(async ({ ctx, input }) => {
|
||||||
|
const category =
|
||||||
|
input.id !== "root"
|
||||||
|
? await CategoryRepo.getCategory(ctx.session.userId, input.id)
|
||||||
|
: undefined;
|
||||||
|
if (category === null) {
|
||||||
|
throw new TRPCError({ code: "NOT_FOUND", message: "Invalid category id" });
|
||||||
|
}
|
||||||
|
|
||||||
|
const categories = await CategoryRepo.getAllCategoriesByParent(ctx.session.userId, input.id);
|
||||||
|
return {
|
||||||
|
metadata: category && {
|
||||||
|
parent: category.parentId,
|
||||||
|
mekVersion: category.mekVersion,
|
||||||
|
dek: category.encDek,
|
||||||
|
dekVersion: category.dekVersion,
|
||||||
|
name: category.encName.ciphertext,
|
||||||
|
nameIv: category.encName.iv,
|
||||||
|
},
|
||||||
|
subCategories: categories.map(({ id }) => id),
|
||||||
|
};
|
||||||
|
}),
|
||||||
|
|
||||||
|
create: roleProcedure["activeClient"]
|
||||||
|
.input(
|
||||||
|
z.object({
|
||||||
|
parent: categoryIdSchema,
|
||||||
|
mekVersion: z.int().positive(),
|
||||||
|
dek: z.base64().nonempty(),
|
||||||
|
dekVersion: z.date(),
|
||||||
|
name: z.base64().nonempty(),
|
||||||
|
nameIv: z.base64().nonempty(),
|
||||||
|
}),
|
||||||
|
)
|
||||||
|
.mutation(async ({ ctx, input }) => {
|
||||||
|
const oneMinuteAgo = new Date(Date.now() - 60 * 1000);
|
||||||
|
const oneMinuteLater = new Date(Date.now() + 60 * 1000);
|
||||||
|
if (input.dekVersion <= oneMinuteAgo || input.dekVersion >= oneMinuteLater) {
|
||||||
|
throw new TRPCError({ code: "BAD_REQUEST", message: "Invalid DEK version" });
|
||||||
|
}
|
||||||
|
|
||||||
|
try {
|
||||||
|
await CategoryRepo.registerCategory({
|
||||||
|
parentId: input.parent,
|
||||||
|
userId: ctx.session.userId,
|
||||||
|
mekVersion: input.mekVersion,
|
||||||
|
encDek: input.dek,
|
||||||
|
dekVersion: input.dekVersion,
|
||||||
|
encName: { ciphertext: input.name, iv: input.nameIv },
|
||||||
|
});
|
||||||
|
} catch (e) {
|
||||||
|
if (e instanceof IntegrityError && e.message === "Inactive MEK version") {
|
||||||
|
throw new TRPCError({ code: "BAD_REQUEST", message: e.message });
|
||||||
|
}
|
||||||
|
throw e;
|
||||||
|
}
|
||||||
|
}),
|
||||||
|
|
||||||
|
rename: roleProcedure["activeClient"]
|
||||||
|
.input(
|
||||||
|
z.object({
|
||||||
|
id: z.int().positive(),
|
||||||
|
dekVersion: z.date(),
|
||||||
|
name: z.base64().nonempty(),
|
||||||
|
nameIv: z.base64().nonempty(),
|
||||||
|
}),
|
||||||
|
)
|
||||||
|
.mutation(async ({ ctx, input }) => {
|
||||||
|
try {
|
||||||
|
await CategoryRepo.setCategoryEncName(ctx.session.userId, input.id, input.dekVersion, {
|
||||||
|
ciphertext: input.name,
|
||||||
|
iv: input.nameIv,
|
||||||
|
});
|
||||||
|
} catch (e) {
|
||||||
|
if (e instanceof IntegrityError) {
|
||||||
|
if (e.message === "Category not found") {
|
||||||
|
throw new TRPCError({ code: "NOT_FOUND", message: "Invalid category id" });
|
||||||
|
} else if (e.message === "Invalid DEK version") {
|
||||||
|
throw new TRPCError({ code: "BAD_REQUEST", message: e.message });
|
||||||
|
}
|
||||||
|
}
|
||||||
|
throw e;
|
||||||
|
}
|
||||||
|
}),
|
||||||
|
|
||||||
|
delete: roleProcedure["activeClient"]
|
||||||
|
.input(
|
||||||
|
z.object({
|
||||||
|
id: z.int().positive(),
|
||||||
|
}),
|
||||||
|
)
|
||||||
|
.mutation(async ({ ctx, input }) => {
|
||||||
|
try {
|
||||||
|
await CategoryRepo.unregisterCategory(ctx.session.userId, input.id);
|
||||||
|
} catch (e) {
|
||||||
|
if (e instanceof IntegrityError && e.message === "Category not found") {
|
||||||
|
throw new TRPCError({ code: "NOT_FOUND", message: "Invalid category id" });
|
||||||
|
}
|
||||||
|
throw e;
|
||||||
|
}
|
||||||
|
}),
|
||||||
|
|
||||||
|
files: roleProcedure["activeClient"]
|
||||||
|
.input(
|
||||||
|
z.object({
|
||||||
|
id: z.int().positive(),
|
||||||
|
recurse: z.boolean().default(false),
|
||||||
|
}),
|
||||||
|
)
|
||||||
|
.query(async ({ ctx, input }) => {
|
||||||
|
const category = await CategoryRepo.getCategory(ctx.session.userId, input.id);
|
||||||
|
if (!category) {
|
||||||
|
throw new TRPCError({ code: "NOT_FOUND", message: "Invalid category id" });
|
||||||
|
}
|
||||||
|
|
||||||
|
const files = await FileRepo.getAllFilesByCategory(
|
||||||
|
ctx.session.userId,
|
||||||
|
input.id,
|
||||||
|
input.recurse,
|
||||||
|
);
|
||||||
|
return files.map(({ id, isRecursive }) => ({ file: id, isRecursive }));
|
||||||
|
}),
|
||||||
|
|
||||||
|
addFile: roleProcedure["activeClient"]
|
||||||
|
.input(
|
||||||
|
z.object({
|
||||||
|
id: z.int().positive(),
|
||||||
|
file: z.int().positive(),
|
||||||
|
}),
|
||||||
|
)
|
||||||
|
.mutation(async ({ ctx, input }) => {
|
||||||
|
const [category, file] = await Promise.all([
|
||||||
|
CategoryRepo.getCategory(ctx.session.userId, input.id),
|
||||||
|
FileRepo.getFile(ctx.session.userId, input.file),
|
||||||
|
]);
|
||||||
|
if (!category) {
|
||||||
|
throw new TRPCError({ code: "NOT_FOUND", message: "Invalid category id" });
|
||||||
|
} else if (!file) {
|
||||||
|
throw new TRPCError({ code: "NOT_FOUND", message: "Invalid file id" });
|
||||||
|
}
|
||||||
|
|
||||||
|
try {
|
||||||
|
await FileRepo.addFileToCategory(input.file, input.id);
|
||||||
|
} catch (e) {
|
||||||
|
if (e instanceof IntegrityError && e.message === "File already added to category") {
|
||||||
|
throw new TRPCError({ code: "BAD_REQUEST", message: "File already added" });
|
||||||
|
}
|
||||||
|
throw e;
|
||||||
|
}
|
||||||
|
}),
|
||||||
|
|
||||||
|
removeFile: roleProcedure["activeClient"]
|
||||||
|
.input(
|
||||||
|
z.object({
|
||||||
|
id: z.int().positive(),
|
||||||
|
file: z.int().positive(),
|
||||||
|
}),
|
||||||
|
)
|
||||||
|
.mutation(async ({ ctx, input }) => {
|
||||||
|
const [category, file] = await Promise.all([
|
||||||
|
CategoryRepo.getCategory(ctx.session.userId, input.id),
|
||||||
|
FileRepo.getFile(ctx.session.userId, input.file),
|
||||||
|
]);
|
||||||
|
if (!category) {
|
||||||
|
throw new TRPCError({ code: "NOT_FOUND", message: "Invalid category id" });
|
||||||
|
} else if (!file) {
|
||||||
|
throw new TRPCError({ code: "NOT_FOUND", message: "Invalid file id" });
|
||||||
|
}
|
||||||
|
|
||||||
|
try {
|
||||||
|
await FileRepo.removeFileFromCategory(input.file, input.id);
|
||||||
|
} catch (e) {
|
||||||
|
if (e instanceof IntegrityError && e.message === "File not found in category") {
|
||||||
|
throw new TRPCError({ code: "BAD_REQUEST", message: "File not added" });
|
||||||
|
}
|
||||||
|
throw e;
|
||||||
|
}
|
||||||
|
}),
|
||||||
|
});
|
||||||
|
|
||||||
|
export default categoryRouter;
|
||||||
@@ -26,8 +26,8 @@ const clientRouter = router({
|
|||||||
register: roleProcedure["notClient"]
|
register: roleProcedure["notClient"]
|
||||||
.input(
|
.input(
|
||||||
z.object({
|
z.object({
|
||||||
encPubKey: z.string().base64().nonempty(),
|
encPubKey: z.base64().nonempty(),
|
||||||
sigPubKey: z.string().base64().nonempty(),
|
sigPubKey: z.base64().nonempty(),
|
||||||
}),
|
}),
|
||||||
)
|
)
|
||||||
.mutation(async ({ ctx, input }) => {
|
.mutation(async ({ ctx, input }) => {
|
||||||
@@ -66,8 +66,8 @@ const clientRouter = router({
|
|||||||
verify: roleProcedure["notClient"]
|
verify: roleProcedure["notClient"]
|
||||||
.input(
|
.input(
|
||||||
z.object({
|
z.object({
|
||||||
id: z.number().int().positive(),
|
id: z.int().positive(),
|
||||||
answerSig: z.string().base64().nonempty(),
|
answerSig: z.base64().nonempty(),
|
||||||
}),
|
}),
|
||||||
)
|
)
|
||||||
.mutation(async ({ ctx, input }) => {
|
.mutation(async ({ ctx, input }) => {
|
||||||
|
|||||||
125
src/trpc/routers/directory.ts
Normal file
125
src/trpc/routers/directory.ts
Normal file
@@ -0,0 +1,125 @@
|
|||||||
|
import { TRPCError } from "@trpc/server";
|
||||||
|
import { z } from "zod";
|
||||||
|
import { FileRepo, IntegrityError } from "$lib/server/db";
|
||||||
|
import { safeUnlink } from "$lib/server/modules/filesystem";
|
||||||
|
import { directoryIdSchema } from "$lib/server/schemas";
|
||||||
|
import { router, roleProcedure } from "../init.server";
|
||||||
|
|
||||||
|
const directoryRouter = router({
|
||||||
|
get: roleProcedure["activeClient"]
|
||||||
|
.input(
|
||||||
|
z.object({
|
||||||
|
id: directoryIdSchema,
|
||||||
|
}),
|
||||||
|
)
|
||||||
|
.query(async ({ ctx, input }) => {
|
||||||
|
const directory =
|
||||||
|
input.id !== "root" ? await FileRepo.getDirectory(ctx.session.userId, input.id) : undefined;
|
||||||
|
if (directory === null) {
|
||||||
|
throw new TRPCError({ code: "NOT_FOUND", message: "Invalid directory id" });
|
||||||
|
}
|
||||||
|
|
||||||
|
const [directories, files] = await Promise.all([
|
||||||
|
FileRepo.getAllDirectoriesByParent(ctx.session.userId, input.id),
|
||||||
|
FileRepo.getAllFilesByParent(ctx.session.userId, input.id),
|
||||||
|
]);
|
||||||
|
return {
|
||||||
|
metadata: directory && {
|
||||||
|
parent: directory.parentId,
|
||||||
|
mekVersion: directory.mekVersion,
|
||||||
|
dek: directory.encDek,
|
||||||
|
dekVersion: directory.dekVersion,
|
||||||
|
name: directory.encName.ciphertext,
|
||||||
|
nameIv: directory.encName.iv,
|
||||||
|
},
|
||||||
|
subDirectories: directories.map(({ id }) => id),
|
||||||
|
files: files.map(({ id }) => id),
|
||||||
|
};
|
||||||
|
}),
|
||||||
|
|
||||||
|
create: roleProcedure["activeClient"]
|
||||||
|
.input(
|
||||||
|
z.object({
|
||||||
|
parent: directoryIdSchema,
|
||||||
|
mekVersion: z.int().positive(),
|
||||||
|
dek: z.base64().nonempty(),
|
||||||
|
dekVersion: z.date(),
|
||||||
|
name: z.base64().nonempty(),
|
||||||
|
nameIv: z.base64().nonempty(),
|
||||||
|
}),
|
||||||
|
)
|
||||||
|
.mutation(async ({ ctx, input }) => {
|
||||||
|
const oneMinuteAgo = new Date(Date.now() - 60 * 1000);
|
||||||
|
const oneMinuteLater = new Date(Date.now() + 60 * 1000);
|
||||||
|
if (input.dekVersion <= oneMinuteAgo || input.dekVersion >= oneMinuteLater) {
|
||||||
|
throw new TRPCError({ code: "BAD_REQUEST", message: "Invalid DEK version" });
|
||||||
|
}
|
||||||
|
|
||||||
|
try {
|
||||||
|
await FileRepo.registerDirectory({
|
||||||
|
parentId: input.parent,
|
||||||
|
userId: ctx.session.userId,
|
||||||
|
mekVersion: input.mekVersion,
|
||||||
|
encDek: input.dek,
|
||||||
|
dekVersion: input.dekVersion,
|
||||||
|
encName: { ciphertext: input.name, iv: input.nameIv },
|
||||||
|
});
|
||||||
|
} catch (e) {
|
||||||
|
if (e instanceof IntegrityError && e.message === "Inactive MEK version") {
|
||||||
|
throw new TRPCError({ code: "BAD_REQUEST", message: e.message });
|
||||||
|
}
|
||||||
|
throw e;
|
||||||
|
}
|
||||||
|
}),
|
||||||
|
|
||||||
|
rename: roleProcedure["activeClient"]
|
||||||
|
.input(
|
||||||
|
z.object({
|
||||||
|
id: z.int().positive(),
|
||||||
|
dekVersion: z.date(),
|
||||||
|
name: z.base64().nonempty(),
|
||||||
|
nameIv: z.base64().nonempty(),
|
||||||
|
}),
|
||||||
|
)
|
||||||
|
.mutation(async ({ ctx, input }) => {
|
||||||
|
try {
|
||||||
|
await FileRepo.setDirectoryEncName(ctx.session.userId, input.id, input.dekVersion, {
|
||||||
|
ciphertext: input.name,
|
||||||
|
iv: input.nameIv,
|
||||||
|
});
|
||||||
|
} catch (e) {
|
||||||
|
if (e instanceof IntegrityError) {
|
||||||
|
if (e.message === "Directory not found") {
|
||||||
|
throw new TRPCError({ code: "NOT_FOUND", message: "Invalid directory id" });
|
||||||
|
} else if (e.message === "Invalid DEK version") {
|
||||||
|
throw new TRPCError({ code: "BAD_REQUEST", message: e.message });
|
||||||
|
}
|
||||||
|
}
|
||||||
|
throw e;
|
||||||
|
}
|
||||||
|
}),
|
||||||
|
|
||||||
|
delete: roleProcedure["activeClient"]
|
||||||
|
.input(
|
||||||
|
z.object({
|
||||||
|
id: z.int().positive(),
|
||||||
|
}),
|
||||||
|
)
|
||||||
|
.mutation(async ({ ctx, input }) => {
|
||||||
|
try {
|
||||||
|
const files = await FileRepo.unregisterDirectory(ctx.session.userId, input.id);
|
||||||
|
files.forEach(({ path, thumbnailPath }) => {
|
||||||
|
safeUnlink(path); // Intended
|
||||||
|
safeUnlink(thumbnailPath); // Intended
|
||||||
|
});
|
||||||
|
return { deletedFiles: files.map(({ id }) => id) };
|
||||||
|
} catch (e) {
|
||||||
|
if (e instanceof IntegrityError && e.message === "Directory not found") {
|
||||||
|
throw new TRPCError({ code: "NOT_FOUND", message: "Invalid directory id" });
|
||||||
|
}
|
||||||
|
throw e;
|
||||||
|
}
|
||||||
|
}),
|
||||||
|
});
|
||||||
|
|
||||||
|
export default directoryRouter;
|
||||||
122
src/trpc/routers/file.ts
Normal file
122
src/trpc/routers/file.ts
Normal file
@@ -0,0 +1,122 @@
|
|||||||
|
import { TRPCError } from "@trpc/server";
|
||||||
|
import { z } from "zod";
|
||||||
|
import { FileRepo, MediaRepo, IntegrityError } from "$lib/server/db";
|
||||||
|
import { safeUnlink } from "$lib/server/modules/filesystem";
|
||||||
|
import { router, roleProcedure } from "../init.server";
|
||||||
|
|
||||||
|
const fileRouter = router({
|
||||||
|
get: roleProcedure["activeClient"]
|
||||||
|
.input(
|
||||||
|
z.object({
|
||||||
|
id: z.int().positive(),
|
||||||
|
}),
|
||||||
|
)
|
||||||
|
.query(async ({ ctx, input }) => {
|
||||||
|
const file = await FileRepo.getFile(ctx.session.userId, input.id);
|
||||||
|
if (!file) {
|
||||||
|
throw new TRPCError({ code: "NOT_FOUND", message: "Invalid file id" });
|
||||||
|
}
|
||||||
|
|
||||||
|
const categories = await FileRepo.getAllFileCategories(input.id);
|
||||||
|
return {
|
||||||
|
parent: file.parentId,
|
||||||
|
mekVersion: file.mekVersion,
|
||||||
|
dek: file.encDek,
|
||||||
|
dekVersion: file.dekVersion,
|
||||||
|
contentType: file.contentType,
|
||||||
|
contentIv: file.encContentIv,
|
||||||
|
name: file.encName.ciphertext,
|
||||||
|
nameIv: file.encName.iv,
|
||||||
|
createdAt: file.encCreatedAt?.ciphertext,
|
||||||
|
createdAtIv: file.encCreatedAt?.iv,
|
||||||
|
lastModifiedAt: file.encLastModifiedAt.ciphertext,
|
||||||
|
lastModifiedAtIv: file.encLastModifiedAt.iv,
|
||||||
|
categories: categories.map(({ id }) => id),
|
||||||
|
};
|
||||||
|
}),
|
||||||
|
|
||||||
|
list: roleProcedure["activeClient"].query(async ({ ctx }) => {
|
||||||
|
return await FileRepo.getAllFileIds(ctx.session.userId);
|
||||||
|
}),
|
||||||
|
|
||||||
|
listByHash: roleProcedure["activeClient"]
|
||||||
|
.input(
|
||||||
|
z.object({
|
||||||
|
hskVersion: z.int().positive(),
|
||||||
|
contentHmac: z.base64().nonempty(),
|
||||||
|
}),
|
||||||
|
)
|
||||||
|
.query(async ({ ctx, input }) => {
|
||||||
|
return await FileRepo.getAllFileIdsByContentHmac(
|
||||||
|
ctx.session.userId,
|
||||||
|
input.hskVersion,
|
||||||
|
input.contentHmac,
|
||||||
|
);
|
||||||
|
}),
|
||||||
|
|
||||||
|
listWithoutThumbnail: roleProcedure["activeClient"].query(async ({ ctx }) => {
|
||||||
|
return await MediaRepo.getMissingFileThumbnails(ctx.session.userId);
|
||||||
|
}),
|
||||||
|
|
||||||
|
rename: roleProcedure["activeClient"]
|
||||||
|
.input(
|
||||||
|
z.object({
|
||||||
|
id: z.int().positive(),
|
||||||
|
dekVersion: z.date(),
|
||||||
|
name: z.base64().nonempty(),
|
||||||
|
nameIv: z.base64().nonempty(),
|
||||||
|
}),
|
||||||
|
)
|
||||||
|
.mutation(async ({ ctx, input }) => {
|
||||||
|
try {
|
||||||
|
await FileRepo.setFileEncName(ctx.session.userId, input.id, input.dekVersion, {
|
||||||
|
ciphertext: input.name,
|
||||||
|
iv: input.nameIv,
|
||||||
|
});
|
||||||
|
} catch (e) {
|
||||||
|
if (e instanceof IntegrityError) {
|
||||||
|
if (e.message === "File not found") {
|
||||||
|
throw new TRPCError({ code: "NOT_FOUND", message: "Invalid file id" });
|
||||||
|
} else if (e.message === "Invalid DEK version") {
|
||||||
|
throw new TRPCError({ code: "BAD_REQUEST", message: e.message });
|
||||||
|
}
|
||||||
|
}
|
||||||
|
throw e;
|
||||||
|
}
|
||||||
|
}),
|
||||||
|
|
||||||
|
delete: roleProcedure["activeClient"]
|
||||||
|
.input(
|
||||||
|
z.object({
|
||||||
|
id: z.int().positive(),
|
||||||
|
}),
|
||||||
|
)
|
||||||
|
.mutation(async ({ ctx, input }) => {
|
||||||
|
try {
|
||||||
|
const { path, thumbnailPath } = await FileRepo.unregisterFile(ctx.session.userId, input.id);
|
||||||
|
safeUnlink(path); // Intended
|
||||||
|
safeUnlink(thumbnailPath); // Intended
|
||||||
|
} catch (e) {
|
||||||
|
if (e instanceof IntegrityError && e.message === "File not found") {
|
||||||
|
throw new TRPCError({ code: "NOT_FOUND", message: "Invalid file id" });
|
||||||
|
}
|
||||||
|
throw e;
|
||||||
|
}
|
||||||
|
}),
|
||||||
|
|
||||||
|
thumbnail: roleProcedure["activeClient"]
|
||||||
|
.input(
|
||||||
|
z.object({
|
||||||
|
id: z.int().positive(),
|
||||||
|
}),
|
||||||
|
)
|
||||||
|
.query(async ({ ctx, input }) => {
|
||||||
|
const thumbnail = await MediaRepo.getFileThumbnail(ctx.session.userId, input.id);
|
||||||
|
if (!thumbnail) {
|
||||||
|
throw new TRPCError({ code: "NOT_FOUND", message: "File or its thumbnail not found" });
|
||||||
|
}
|
||||||
|
return { updatedAt: thumbnail.updatedAt, contentIv: thumbnail.encContentIv };
|
||||||
|
}),
|
||||||
|
});
|
||||||
|
|
||||||
|
export default fileRouter;
|
||||||
@@ -17,8 +17,8 @@ const hskRouter = router({
|
|||||||
registerInitial: roleProcedure["activeClient"]
|
registerInitial: roleProcedure["activeClient"]
|
||||||
.input(
|
.input(
|
||||||
z.object({
|
z.object({
|
||||||
mekVersion: z.number().int().positive(),
|
mekVersion: z.int().positive(),
|
||||||
hsk: z.string().base64().nonempty(),
|
hsk: z.base64().nonempty(),
|
||||||
}),
|
}),
|
||||||
)
|
)
|
||||||
.mutation(async ({ ctx, input }) => {
|
.mutation(async ({ ctx, input }) => {
|
||||||
|
|||||||
@@ -1,4 +1,8 @@
|
|||||||
|
export { default as authRouter } from "./auth";
|
||||||
|
export { default as categoryRouter } from "./category";
|
||||||
export { default as clientRouter } from "./client";
|
export { default as clientRouter } from "./client";
|
||||||
|
export { default as directoryRouter } from "./directory";
|
||||||
|
export { default as fileRouter } from "./file";
|
||||||
export { default as hskRouter } from "./hsk";
|
export { default as hskRouter } from "./hsk";
|
||||||
export { default as mekRouter } from "./mek";
|
export { default as mekRouter } from "./mek";
|
||||||
export { default as userRouter } from "./user";
|
export { default as userRouter } from "./user";
|
||||||
|
|||||||
@@ -37,8 +37,8 @@ const mekRouter = router({
|
|||||||
registerInitial: roleProcedure["pendingClient"]
|
registerInitial: roleProcedure["pendingClient"]
|
||||||
.input(
|
.input(
|
||||||
z.object({
|
z.object({
|
||||||
mek: z.string().base64().nonempty(),
|
mek: z.base64().nonempty(),
|
||||||
mekSig: z.string().base64().nonempty(),
|
mekSig: z.base64().nonempty(),
|
||||||
}),
|
}),
|
||||||
)
|
)
|
||||||
.mutation(async ({ ctx, input }) => {
|
.mutation(async ({ ctx, input }) => {
|
||||||
|
|||||||
@@ -1,10 +1,9 @@
|
|||||||
import { TRPCError } from "@trpc/server";
|
import { TRPCError } from "@trpc/server";
|
||||||
import { z } from "zod";
|
|
||||||
import { UserRepo } from "$lib/server/db";
|
import { UserRepo } from "$lib/server/db";
|
||||||
import { router, roleProcedure } from "../init.server";
|
import { router, roleProcedure } from "../init.server";
|
||||||
|
|
||||||
const userRouter = router({
|
const userRouter = router({
|
||||||
info: roleProcedure.any.query(async ({ ctx }) => {
|
get: roleProcedure["any"].query(async ({ ctx }) => {
|
||||||
const user = await UserRepo.getUser(ctx.session.userId);
|
const user = await UserRepo.getUser(ctx.session.userId);
|
||||||
if (!user) {
|
if (!user) {
|
||||||
throw new TRPCError({ code: "INTERNAL_SERVER_ERROR", message: "Invalid session id" });
|
throw new TRPCError({ code: "INTERNAL_SERVER_ERROR", message: "Invalid session id" });
|
||||||
@@ -12,16 +11,6 @@ const userRouter = router({
|
|||||||
|
|
||||||
return { email: user.email, nickname: user.nickname };
|
return { email: user.email, nickname: user.nickname };
|
||||||
}),
|
}),
|
||||||
|
|
||||||
changeNickname: roleProcedure.any
|
|
||||||
.input(
|
|
||||||
z.object({
|
|
||||||
newNickname: z.string().trim().min(2).max(8),
|
|
||||||
}),
|
|
||||||
)
|
|
||||||
.mutation(async ({ ctx, input }) => {
|
|
||||||
await UserRepo.setUserNickname(ctx.session.userId, input.newNickname);
|
|
||||||
}),
|
|
||||||
});
|
});
|
||||||
|
|
||||||
export default userRouter;
|
export default userRouter;
|
||||||
|
|||||||
Reference in New Issue
Block a user