Moved typescript backend into old_backend
This commit is contained in:
parent
520aeecb4e
commit
d199ecae87
29
.eslintrc.js
29
.eslintrc.js
@ -1,29 +0,0 @@
|
|||||||
module.exports = {
|
|
||||||
parser: '@typescript-eslint/parser',
|
|
||||||
parserOptions: {
|
|
||||||
project: 'tsconfig.json',
|
|
||||||
tsconfigRootDir: __dirname,
|
|
||||||
sourceType: 'module',
|
|
||||||
},
|
|
||||||
plugins: ['@typescript-eslint/eslint-plugin', 'no-relative-import-paths'],
|
|
||||||
extends: [
|
|
||||||
'plugin:@typescript-eslint/recommended',
|
|
||||||
'plugin:prettier/recommended',
|
|
||||||
],
|
|
||||||
root: true,
|
|
||||||
env: {
|
|
||||||
node: true,
|
|
||||||
jest: true,
|
|
||||||
},
|
|
||||||
ignorePatterns: ['.eslintrc.js'],
|
|
||||||
rules: {
|
|
||||||
'@typescript-eslint/interface-name-prefix': 'off',
|
|
||||||
'@typescript-eslint/explicit-function-return-type': 'off',
|
|
||||||
'@typescript-eslint/explicit-module-boundary-types': 'off',
|
|
||||||
'@typescript-eslint/no-explicit-any': 'off',
|
|
||||||
'no-relative-import-paths/no-relative-import-paths': [
|
|
||||||
'error',
|
|
||||||
{ 'allowSameFolder': true, 'rootDir': 'src' }
|
|
||||||
]
|
|
||||||
},
|
|
||||||
};
|
|
422
.gitignore
vendored
422
.gitignore
vendored
@ -1,37 +1,58 @@
|
|||||||
# Created by .ignore support plugin (hsz.mobi)
|
# Created by https://www.toptal.com/developers/gitignore/api/clion
|
||||||
### JetBrains template
|
# Edit at https://www.toptal.com/developers/gitignore?templates=clion
|
||||||
# Covers JetBrains IDEs: IntelliJ, RubyMine, PhpStorm, AppCode, PyCharm, CLion, Android Studio and Webstorm
|
|
||||||
|
### CLion ###
|
||||||
|
# Covers JetBrains IDEs: IntelliJ, RubyMine, PhpStorm, AppCode, PyCharm, CLion, Android Studio, WebStorm and Rider
|
||||||
# Reference: https://intellij-support.jetbrains.com/hc/en-us/articles/206544839
|
# Reference: https://intellij-support.jetbrains.com/hc/en-us/articles/206544839
|
||||||
|
|
||||||
# User-specific stuff:
|
# User-specific stuff
|
||||||
.idea/**/workspace.xml
|
.idea/**/workspace.xml
|
||||||
.idea/**/tasks.xml
|
.idea/**/tasks.xml
|
||||||
.idea/dictionaries
|
.idea/**/usage.statistics.xml
|
||||||
|
.idea/**/dictionaries
|
||||||
|
.idea/**/shelf
|
||||||
|
|
||||||
# Sensitive or high-churn files:
|
# AWS User-specific
|
||||||
|
.idea/**/aws.xml
|
||||||
|
|
||||||
|
# Generated files
|
||||||
|
.idea/**/contentModel.xml
|
||||||
|
|
||||||
|
# Sensitive or high-churn files
|
||||||
.idea/**/dataSources/
|
.idea/**/dataSources/
|
||||||
.idea/**/dataSources.ids
|
.idea/**/dataSources.ids
|
||||||
.idea/**/dataSources.xml
|
|
||||||
.idea/**/dataSources.local.xml
|
.idea/**/dataSources.local.xml
|
||||||
.idea/**/sqlDataSources.xml
|
.idea/**/sqlDataSources.xml
|
||||||
.idea/**/dynamic.xml
|
.idea/**/dynamic.xml
|
||||||
.idea/**/uiDesigner.xml
|
.idea/**/uiDesigner.xml
|
||||||
|
.idea/**/dbnavigator.xml
|
||||||
|
|
||||||
# Gradle:
|
# Gradle
|
||||||
.idea/**/gradle.xml
|
.idea/**/gradle.xml
|
||||||
.idea/**/libraries
|
.idea/**/libraries
|
||||||
|
|
||||||
# CMake
|
# Gradle and Maven with auto-import
|
||||||
cmake-build-debug/
|
# When using Gradle or Maven with auto-import, you should exclude module files,
|
||||||
|
# since they will be recreated, and may cause churn. Uncomment if using
|
||||||
|
# auto-import.
|
||||||
|
# .idea/artifacts
|
||||||
|
# .idea/compiler.xml
|
||||||
|
# .idea/jarRepositories.xml
|
||||||
|
# .idea/modules.xml
|
||||||
|
# .idea/*.iml
|
||||||
|
# .idea/modules
|
||||||
|
# *.iml
|
||||||
|
# *.ipr
|
||||||
|
|
||||||
# Mongo Explorer plugin:
|
# CMake
|
||||||
|
cmake-build-*/
|
||||||
|
|
||||||
|
# Mongo Explorer plugin
|
||||||
.idea/**/mongoSettings.xml
|
.idea/**/mongoSettings.xml
|
||||||
|
|
||||||
## File-based project format:
|
# File-based project format
|
||||||
*.iws
|
*.iws
|
||||||
|
|
||||||
## Plugin-specific files:
|
|
||||||
|
|
||||||
# IntelliJ
|
# IntelliJ
|
||||||
out/
|
out/
|
||||||
|
|
||||||
@ -44,358 +65,53 @@ atlassian-ide-plugin.xml
|
|||||||
# Cursive Clojure plugin
|
# Cursive Clojure plugin
|
||||||
.idea/replstate.xml
|
.idea/replstate.xml
|
||||||
|
|
||||||
|
# SonarLint plugin
|
||||||
|
.idea/sonarlint/
|
||||||
|
|
||||||
# Crashlytics plugin (for Android Studio and IntelliJ)
|
# Crashlytics plugin (for Android Studio and IntelliJ)
|
||||||
com_crashlytics_export_strings.xml
|
com_crashlytics_export_strings.xml
|
||||||
crashlytics.properties
|
crashlytics.properties
|
||||||
crashlytics-build.properties
|
crashlytics-build.properties
|
||||||
fabric.properties
|
fabric.properties
|
||||||
### VisualStudio template
|
|
||||||
## Ignore Visual Studio temporary files, build results, and
|
|
||||||
## files generated by popular Visual Studio add-ons.
|
|
||||||
##
|
|
||||||
## Get latest from https://github.com/github/gitignore/blob/master/VisualStudio.gitignore
|
|
||||||
|
|
||||||
# User-specific files
|
# Editor-based Rest Client
|
||||||
*.suo
|
.idea/httpRequests
|
||||||
*.user
|
|
||||||
*.userosscache
|
|
||||||
*.sln.docstates
|
|
||||||
|
|
||||||
# User-specific files (MonoDevelop/Xamarin Studio)
|
# Android studio 3.1+ serialized cache file
|
||||||
*.userprefs
|
.idea/caches/build_file_checksums.ser
|
||||||
|
|
||||||
# Build results
|
### CLion Patch ###
|
||||||
[Dd]ebug/
|
# Comment Reason: https://github.com/joeblau/gitignore.io/issues/186#issuecomment-215987721
|
||||||
[Dd]ebugPublic/
|
|
||||||
[Rr]elease/
|
|
||||||
[Rr]eleases/
|
|
||||||
x64/
|
|
||||||
x86/
|
|
||||||
bld/
|
|
||||||
[Bb]in/
|
|
||||||
[Oo]bj/
|
|
||||||
[Ll]og/
|
|
||||||
|
|
||||||
# Visual Studio 2015 cache/options directory
|
# *.iml
|
||||||
.vs/
|
# modules.xml
|
||||||
# Uncomment if you have tasks that create the project's static files in wwwroot
|
# .idea/misc.xml
|
||||||
#wwwroot/
|
# *.ipr
|
||||||
|
|
||||||
# MSTest test Results
|
# Sonarlint plugin
|
||||||
[Tt]est[Rr]esult*/
|
# https://plugins.jetbrains.com/plugin/7973-sonarlint
|
||||||
[Bb]uild[Ll]og.*
|
.idea/**/sonarlint/
|
||||||
|
|
||||||
# NUNIT
|
# SonarQube Plugin
|
||||||
*.VisualState.xml
|
# https://plugins.jetbrains.com/plugin/7238-sonarqube-community-plugin
|
||||||
TestResult.xml
|
.idea/**/sonarIssues.xml
|
||||||
|
|
||||||
# Build Results of an ATL Project
|
# Markdown Navigator plugin
|
||||||
[Dd]ebugPS/
|
# https://plugins.jetbrains.com/plugin/7896-markdown-navigator-enhanced
|
||||||
[Rr]eleasePS/
|
.idea/**/markdown-navigator.xml
|
||||||
dlldata.c
|
.idea/**/markdown-navigator-enh.xml
|
||||||
|
.idea/**/markdown-navigator/
|
||||||
|
|
||||||
# Benchmark Results
|
# Cache file creation bug
|
||||||
BenchmarkDotNet.Artifacts/
|
# See https://youtrack.jetbrains.com/issue/JBR-2257
|
||||||
|
.idea/$CACHE_FILE$
|
||||||
|
|
||||||
# .NET Core
|
# CodeStream plugin
|
||||||
project.lock.json
|
# https://plugins.jetbrains.com/plugin/12206-codestream
|
||||||
project.fragment.lock.json
|
.idea/codestream.xml
|
||||||
artifacts/
|
|
||||||
**/Properties/launchSettings.json
|
|
||||||
|
|
||||||
*_i.c
|
# Azure Toolkit for IntelliJ plugin
|
||||||
*_p.c
|
# https://plugins.jetbrains.com/plugin/8053-azure-toolkit-for-intellij
|
||||||
*_i.h
|
.idea/**/azureSettings.xml
|
||||||
*.ilk
|
|
||||||
*.meta
|
|
||||||
*.obj
|
|
||||||
*.pch
|
|
||||||
*.pdb
|
|
||||||
*.pgc
|
|
||||||
*.pgd
|
|
||||||
*.rsp
|
|
||||||
*.sbr
|
|
||||||
*.tlb
|
|
||||||
*.tli
|
|
||||||
*.tlh
|
|
||||||
*.tmp
|
|
||||||
*.tmp_proj
|
|
||||||
*.log
|
|
||||||
*.vspscc
|
|
||||||
*.vssscc
|
|
||||||
.builds
|
|
||||||
*.pidb
|
|
||||||
*.svclog
|
|
||||||
*.scc
|
|
||||||
|
|
||||||
# Chutzpah Test files
|
# End of https://www.toptal.com/developers/gitignore/api/clion
|
||||||
_Chutzpah*
|
|
||||||
|
|
||||||
# Visual C++ cache files
|
|
||||||
ipch/
|
|
||||||
*.aps
|
|
||||||
*.ncb
|
|
||||||
*.opendb
|
|
||||||
*.opensdf
|
|
||||||
*.sdf
|
|
||||||
*.cachefile
|
|
||||||
*.VC.db
|
|
||||||
*.VC.VC.opendb
|
|
||||||
|
|
||||||
# Visual Studio profiler
|
|
||||||
*.psess
|
|
||||||
*.vsp
|
|
||||||
*.vspx
|
|
||||||
*.sap
|
|
||||||
|
|
||||||
# Visual Studio Trace Files
|
|
||||||
*.e2e
|
|
||||||
|
|
||||||
# TFS 2012 Local Workspace
|
|
||||||
$tf/
|
|
||||||
|
|
||||||
# Guidance Automation Toolkit
|
|
||||||
*.gpState
|
|
||||||
|
|
||||||
# ReSharper is a .NET coding add-in
|
|
||||||
_ReSharper*/
|
|
||||||
*.[Rr]e[Ss]harper
|
|
||||||
*.DotSettings.user
|
|
||||||
|
|
||||||
# JustCode is a .NET coding add-in
|
|
||||||
.JustCode
|
|
||||||
|
|
||||||
# TeamCity is a build add-in
|
|
||||||
_TeamCity*
|
|
||||||
|
|
||||||
# DotCover is a Code Coverage Tool
|
|
||||||
*.dotCover
|
|
||||||
|
|
||||||
# AxoCover is a Code Coverage Tool
|
|
||||||
.axoCover/*
|
|
||||||
!.axoCover/settings.json
|
|
||||||
|
|
||||||
# Visual Studio code coverage results
|
|
||||||
*.coverage
|
|
||||||
*.coveragexml
|
|
||||||
|
|
||||||
# NCrunch
|
|
||||||
_NCrunch_*
|
|
||||||
.*crunch*.local.xml
|
|
||||||
nCrunchTemp_*
|
|
||||||
|
|
||||||
# MightyMoose
|
|
||||||
*.mm.*
|
|
||||||
AutoTest.Net/
|
|
||||||
|
|
||||||
# Web workbench (sass)
|
|
||||||
.sass-cache/
|
|
||||||
|
|
||||||
# Installshield output folder
|
|
||||||
[Ee]xpress/
|
|
||||||
|
|
||||||
# DocProject is a documentation generator add-in
|
|
||||||
DocProject/buildhelp/
|
|
||||||
DocProject/Help/*.HxT
|
|
||||||
DocProject/Help/*.HxC
|
|
||||||
DocProject/Help/*.hhc
|
|
||||||
DocProject/Help/*.hhk
|
|
||||||
DocProject/Help/*.hhp
|
|
||||||
DocProject/Help/Html2
|
|
||||||
DocProject/Help/html
|
|
||||||
|
|
||||||
# Click-Once directory
|
|
||||||
publish/
|
|
||||||
|
|
||||||
# Publish Web Output
|
|
||||||
*.[Pp]ublish.xml
|
|
||||||
*.azurePubxml
|
|
||||||
# Note: Comment the next line if you want to checkin your web deploy settings,
|
|
||||||
# but database connection strings (with potential passwords) will be unencrypted
|
|
||||||
*.pubxml
|
|
||||||
*.publishproj
|
|
||||||
|
|
||||||
# Microsoft Azure Web App publish settings. Comment the next line if you want to
|
|
||||||
# checkin your Azure Web App publish settings, but sensitive information contained
|
|
||||||
# in these scripts will be unencrypted
|
|
||||||
PublishScripts/
|
|
||||||
|
|
||||||
# NuGet Packages
|
|
||||||
*.nupkg
|
|
||||||
# The packages folder can be ignored because of Package Restore
|
|
||||||
**/[Pp]ackages/*
|
|
||||||
# except build/, which is used as an MSBuild target.
|
|
||||||
!**/[Pp]ackages/build/
|
|
||||||
# Uncomment if necessary however generally it will be regenerated when needed
|
|
||||||
#!**/[Pp]ackages/repositories.config
|
|
||||||
# NuGet v3's project.json files produces more ignorable files
|
|
||||||
*.nuget.props
|
|
||||||
*.nuget.targets
|
|
||||||
|
|
||||||
# Microsoft Azure Build Output
|
|
||||||
csx/
|
|
||||||
*.build.csdef
|
|
||||||
|
|
||||||
# Microsoft Azure Emulator
|
|
||||||
ecf/
|
|
||||||
rcf/
|
|
||||||
|
|
||||||
# Windows Store app package directories and files
|
|
||||||
AppPackages/
|
|
||||||
BundleArtifacts/
|
|
||||||
Package.StoreAssociation.xml
|
|
||||||
_pkginfo.txt
|
|
||||||
*.appx
|
|
||||||
|
|
||||||
# Visual Studio cache files
|
|
||||||
# files ending in .cache can be ignored
|
|
||||||
*.[Cc]ache
|
|
||||||
# but keep track of directories ending in .cache
|
|
||||||
!*.[Cc]ache/
|
|
||||||
|
|
||||||
# Others
|
|
||||||
ClientBin/
|
|
||||||
~$*
|
|
||||||
*~
|
|
||||||
*.dbmdl
|
|
||||||
*.dbproj.schemaview
|
|
||||||
*.jfm
|
|
||||||
*.pfx
|
|
||||||
*.publishsettings
|
|
||||||
orleans.codegen.cs
|
|
||||||
|
|
||||||
# Since there are multiple workflows, uncomment next line to ignore bower_components
|
|
||||||
# (https://github.com/github/gitignore/pull/1529#issuecomment-104372622)
|
|
||||||
#bower_components/
|
|
||||||
|
|
||||||
# RIA/Silverlight projects
|
|
||||||
Generated_Code/
|
|
||||||
|
|
||||||
# Backup & report files from converting an old project file
|
|
||||||
# to a newer Visual Studio version. Backup files are not needed,
|
|
||||||
# because we have git ;-)
|
|
||||||
_UpgradeReport_Files/
|
|
||||||
Backup*/
|
|
||||||
UpgradeLog*.XML
|
|
||||||
UpgradeLog*.htm
|
|
||||||
|
|
||||||
# SQL Server files
|
|
||||||
*.mdf
|
|
||||||
*.ldf
|
|
||||||
*.ndf
|
|
||||||
|
|
||||||
# Business Intelligence projects
|
|
||||||
*.rdl.data
|
|
||||||
*.bim.layout
|
|
||||||
*.bim_*.settings
|
|
||||||
|
|
||||||
# Microsoft Fakes
|
|
||||||
FakesAssemblies/
|
|
||||||
|
|
||||||
# GhostDoc plugin setting file
|
|
||||||
*.GhostDoc.xml
|
|
||||||
|
|
||||||
# Node.js Tools for Visual Studio
|
|
||||||
.ntvs_analysis.dat
|
|
||||||
node_modules/
|
|
||||||
|
|
||||||
# Typescript v1 declaration files
|
|
||||||
typings/
|
|
||||||
|
|
||||||
# Visual Studio 6 build log
|
|
||||||
*.plg
|
|
||||||
|
|
||||||
# Visual Studio 6 workspace options file
|
|
||||||
*.opt
|
|
||||||
|
|
||||||
# Visual Studio 6 auto-generated workspace file (contains which files were open etc.)
|
|
||||||
*.vbw
|
|
||||||
|
|
||||||
# Visual Studio LightSwitch build output
|
|
||||||
**/*.HTMLClient/GeneratedArtifacts
|
|
||||||
**/*.DesktopClient/GeneratedArtifacts
|
|
||||||
**/*.DesktopClient/ModelManifest.xml
|
|
||||||
**/*.Server/GeneratedArtifacts
|
|
||||||
**/*.Server/ModelManifest.xml
|
|
||||||
_Pvt_Extensions
|
|
||||||
|
|
||||||
# Paket dependency manager
|
|
||||||
.paket/paket.exe
|
|
||||||
paket-files/
|
|
||||||
|
|
||||||
# FAKE - F# Make
|
|
||||||
.fake/
|
|
||||||
|
|
||||||
# JetBrains Rider
|
|
||||||
.idea/
|
|
||||||
*.sln.iml
|
|
||||||
|
|
||||||
# IDE - VSCode
|
|
||||||
.vscode/*
|
|
||||||
!.vscode/settings.json
|
|
||||||
!.vscode/tasks.json
|
|
||||||
!.vscode/launch.json
|
|
||||||
!.vscode/extensions.json
|
|
||||||
|
|
||||||
# CodeRush
|
|
||||||
.cr/
|
|
||||||
|
|
||||||
# Python Tools for Visual Studio (PTVS)
|
|
||||||
__pycache__/
|
|
||||||
*.pyc
|
|
||||||
|
|
||||||
# Cake - Uncomment if you are using it
|
|
||||||
# tools/**
|
|
||||||
# !tools/packages.config
|
|
||||||
|
|
||||||
# Tabs Studio
|
|
||||||
*.tss
|
|
||||||
|
|
||||||
# Telerik's JustMock configuration file
|
|
||||||
*.jmconfig
|
|
||||||
|
|
||||||
# BizTalk build output
|
|
||||||
*.btp.cs
|
|
||||||
*.btm.cs
|
|
||||||
*.odx.cs
|
|
||||||
*.xsd.cs
|
|
||||||
|
|
||||||
# OpenCover UI analysis results
|
|
||||||
OpenCover/
|
|
||||||
coverage/
|
|
||||||
|
|
||||||
### macOS template
|
|
||||||
# General
|
|
||||||
.DS_Store
|
|
||||||
.AppleDouble
|
|
||||||
.LSOverride
|
|
||||||
|
|
||||||
# Icon must end with two \r
|
|
||||||
Icon
|
|
||||||
|
|
||||||
# Thumbnails
|
|
||||||
._*
|
|
||||||
|
|
||||||
# Files that might appear in the root of a volume
|
|
||||||
.DocumentRevisions-V100
|
|
||||||
.fseventsd
|
|
||||||
.Spotlight-V100
|
|
||||||
.TemporaryItems
|
|
||||||
.Trashes
|
|
||||||
.VolumeIcon.icns
|
|
||||||
.com.apple.timemachine.donotpresent
|
|
||||||
|
|
||||||
# Directories potentially created on remote AFP share
|
|
||||||
.AppleDB
|
|
||||||
.AppleDesktop
|
|
||||||
Network Trash Folder
|
|
||||||
Temporary Items
|
|
||||||
.apdisk
|
|
||||||
|
|
||||||
=======
|
|
||||||
# Local
|
|
||||||
.env
|
|
||||||
dist
|
|
||||||
|
|
||||||
files
|
|
||||||
sqlite.db
|
|
||||||
|
114
.gitlab-ci.yml
114
.gitlab-ci.yml
@ -1,114 +0,0 @@
|
|||||||
image: node:latest
|
|
||||||
|
|
||||||
stages:
|
|
||||||
- setup
|
|
||||||
- test
|
|
||||||
- build
|
|
||||||
- package
|
|
||||||
|
|
||||||
cache: &global_cache
|
|
||||||
paths:
|
|
||||||
- .yarn
|
|
||||||
- node_modules
|
|
||||||
- frontend/.yarn
|
|
||||||
- frontend/node_modules
|
|
||||||
policy: pull
|
|
||||||
|
|
||||||
before_script:
|
|
||||||
- yarn install --cache-folder .yarn --frozen-lockfile
|
|
||||||
- cd frontend
|
|
||||||
- yarn install --cache-folder .yarn --frozen-lockfile
|
|
||||||
- cd ..
|
|
||||||
|
|
||||||
.dto_artifacts_need: &dto_artifacts_need
|
|
||||||
job: test_build_dto
|
|
||||||
artifacts: true
|
|
||||||
|
|
||||||
test_build_dto:
|
|
||||||
stage: setup
|
|
||||||
cache:
|
|
||||||
<<: *global_cache
|
|
||||||
policy: pull-push
|
|
||||||
before_script: []
|
|
||||||
script:
|
|
||||||
- cd dto
|
|
||||||
- yarn install --frozen-lockfile
|
|
||||||
- yarn lint
|
|
||||||
- yarn build
|
|
||||||
- cd ..
|
|
||||||
- yarn install --cache-folder .yarn --frozen-lockfile
|
|
||||||
- yarn add ./dto
|
|
||||||
- cd frontend
|
|
||||||
- yarn install --cache-folder .yarn --frozen-lockfile
|
|
||||||
- yarn add ../dto
|
|
||||||
artifacts:
|
|
||||||
paths:
|
|
||||||
- dto/lib/
|
|
||||||
|
|
||||||
|
|
||||||
test_backend:
|
|
||||||
needs:
|
|
||||||
- *dto_artifacts_need
|
|
||||||
stage: test
|
|
||||||
script:
|
|
||||||
- yarn lint
|
|
||||||
|
|
||||||
test_frontend:
|
|
||||||
needs:
|
|
||||||
- *dto_artifacts_need
|
|
||||||
stage: test
|
|
||||||
script:
|
|
||||||
- cd frontend
|
|
||||||
- yarn lint
|
|
||||||
|
|
||||||
build_backend:
|
|
||||||
stage: build
|
|
||||||
needs:
|
|
||||||
- *dto_artifacts_need
|
|
||||||
- job: test_backend
|
|
||||||
artifacts: false
|
|
||||||
script:
|
|
||||||
- echo This has to work till I rewrite the backend
|
|
||||||
- false && echo
|
|
||||||
- yarn webpack
|
|
||||||
artifacts:
|
|
||||||
paths:
|
|
||||||
- dist/
|
|
||||||
expire_in: 1h
|
|
||||||
|
|
||||||
build_frontend:
|
|
||||||
stage: build
|
|
||||||
needs:
|
|
||||||
- *dto_artifacts_need
|
|
||||||
- job: test_frontend
|
|
||||||
artifacts: false
|
|
||||||
script:
|
|
||||||
- cd frontend
|
|
||||||
- yarn build
|
|
||||||
artifacts:
|
|
||||||
paths:
|
|
||||||
- frontend/dist/
|
|
||||||
expire_in: 1h
|
|
||||||
|
|
||||||
package_server:
|
|
||||||
stage: package
|
|
||||||
cache: []
|
|
||||||
before_script: []
|
|
||||||
needs:
|
|
||||||
- job: build_backend
|
|
||||||
artifacts: true
|
|
||||||
- job: build_frontend
|
|
||||||
artifacts: true
|
|
||||||
script:
|
|
||||||
- TMP=$(mktemp -d)
|
|
||||||
- mv dist/* "$TMP"
|
|
||||||
- mkdir "$TMP/frontend"
|
|
||||||
- mv frontend/dist/* "$TMP/frontend"
|
|
||||||
- rm -r *
|
|
||||||
- rm -r .* || true
|
|
||||||
- mv "$TMP/"* .
|
|
||||||
artifacts:
|
|
||||||
paths:
|
|
||||||
- package.json
|
|
||||||
- server.js
|
|
||||||
- frontend/
|
|
@ -1,7 +0,0 @@
|
|||||||
{
|
|
||||||
"tabWidth": 4,
|
|
||||||
"useTabs": true,
|
|
||||||
"singleQuote": true,
|
|
||||||
"trailingComma": "none",
|
|
||||||
"endOfLine": "lf"
|
|
||||||
}
|
|
19
README.md
19
README.md
@ -1,19 +0,0 @@
|
|||||||
# Mutzi's fileserver
|
|
||||||
|
|
||||||
## Description
|
|
||||||
The most crackhead fileserver you will find on the market
|
|
||||||
|
|
||||||
## Installation
|
|
||||||
```bash
|
|
||||||
npm install
|
|
||||||
cd frontend && npm install
|
|
||||||
```
|
|
||||||
|
|
||||||
## Running the app
|
|
||||||
```bash
|
|
||||||
npm run start:dev
|
|
||||||
```
|
|
||||||
Run in parallel for building the frontend:
|
|
||||||
````bash
|
|
||||||
cd frontend && npm run serve
|
|
||||||
````
|
|
@ -1,9 +0,0 @@
|
|||||||
{
|
|
||||||
"$schema": "https://json.schemastore.org/nest-cli",
|
|
||||||
"collection": "@nestjs/schematics",
|
|
||||||
"monorepo": true,
|
|
||||||
"sourceRoot": "src",
|
|
||||||
"compilerOptions": {
|
|
||||||
"tsConfigPath": "tsconfig.json"
|
|
||||||
}
|
|
||||||
}
|
|
122
package.json
122
package.json
@ -1,122 +0,0 @@
|
|||||||
{
|
|
||||||
"name": "fileserver",
|
|
||||||
"private": true,
|
|
||||||
"version": "1.0.0",
|
|
||||||
"description": "Crackhead fileserver",
|
|
||||||
"license": "MIT",
|
|
||||||
"scripts": {
|
|
||||||
"prebuild": "rimraf dist",
|
|
||||||
"build": "nest build",
|
|
||||||
"format": "prettier --write \"src/**/*.ts\" \"test/**/*.ts\"",
|
|
||||||
"start": "nest start",
|
|
||||||
"start:dev": "nest start --watch",
|
|
||||||
"lint": "eslint \"src/**/*.ts\"",
|
|
||||||
"lint-fix": "eslint \"src/**/*.ts\" --fix",
|
|
||||||
"test": "jest",
|
|
||||||
"test:watch": "jest --watch",
|
|
||||||
"test:cov": "jest --coverage",
|
|
||||||
"test:debug": "node --inspect-brk -r tsconfig-paths/register -r ts-node/register node_modules/.bin/jest --runInBand",
|
|
||||||
"test:e2e": "jest --config ./test/jest-e2e.json",
|
|
||||||
"genapi": "ts-node tools/apigen.ts",
|
|
||||||
"updateDto": "cd dto && yarn build && cd .. && yarn add ./dto && cd frontend && yarn add ../dto",
|
|
||||||
"lint-fix-all": "yarn lint-fix && cd dto && yarn lint-fix && cd ../frontend && yarn lint --fix"
|
|
||||||
},
|
|
||||||
"dependencies": {
|
|
||||||
"@fastify/multipart": "^7.1.0",
|
|
||||||
"@fastify/static": "^6.5.0",
|
|
||||||
"@nestjs/common": "^9.0.8",
|
|
||||||
"@nestjs/core": "^9.0.8",
|
|
||||||
"@nestjs/jwt": "^9.0.0",
|
|
||||||
"@nestjs/passport": "^9.0.0",
|
|
||||||
"@nestjs/platform-fastify": "^9.0.8",
|
|
||||||
"@nestjs/serve-static": "^3.0.0",
|
|
||||||
"@nestjs/typeorm": "^9.0.0",
|
|
||||||
"argon2": "^0.28.7",
|
|
||||||
"axios": "^0.27.2",
|
|
||||||
"class-transformer": "^0.5.1",
|
|
||||||
"class-validator": "^0.13.2",
|
|
||||||
"jsonwebtoken": "^8.5.1",
|
|
||||||
"nodemailer": "^6.7.8",
|
|
||||||
"notp": "^2.0.3",
|
|
||||||
"passport": "^0.6.0",
|
|
||||||
"passport-jwt": "^4.0.0",
|
|
||||||
"passport-local": "^1.0.0",
|
|
||||||
"qrcode": "^1.5.1",
|
|
||||||
"reflect-metadata": "^0.1.13",
|
|
||||||
"rxjs": "^7.5.6",
|
|
||||||
"sqlite3": "^5.0.11",
|
|
||||||
"thirty-two": "^1.0.2",
|
|
||||||
"typeorm": "^0.3.7"
|
|
||||||
},
|
|
||||||
"runtimeDependencies": [
|
|
||||||
"@fastify/multipart",
|
|
||||||
"@fastify/static",
|
|
||||||
"@nestjs/common",
|
|
||||||
"@nestjs/core",
|
|
||||||
"@nestjs/platform-fastify",
|
|
||||||
"@nestjs/serve-static",
|
|
||||||
"argon2",
|
|
||||||
"class-transformer",
|
|
||||||
"class-validator",
|
|
||||||
"reflect-metadata",
|
|
||||||
"rxjs",
|
|
||||||
"sqlite3",
|
|
||||||
"typeorm"
|
|
||||||
],
|
|
||||||
"devDependencies": {
|
|
||||||
"@nestjs/cli": "^9.0.0",
|
|
||||||
"@nestjs/schematics": "^9.0.1",
|
|
||||||
"@nestjs/testing": "^9.0.8",
|
|
||||||
"@types/express": "^4.17.13",
|
|
||||||
"@types/jest": "^28.1.6",
|
|
||||||
"@types/jsonwebtoken": "^8.5.8",
|
|
||||||
"@types/node": "^18.6.5",
|
|
||||||
"@types/nodemailer": "^6.4.5",
|
|
||||||
"@types/notp": "^2.0.2",
|
|
||||||
"@types/passport-jwt": "^3.0.6",
|
|
||||||
"@types/passport-local": "^1.0.34",
|
|
||||||
"@types/qrcode": "^1.5.0",
|
|
||||||
"@types/supertest": "^2.0.12",
|
|
||||||
"@types/webpack": "^5.28.0",
|
|
||||||
"@types/webpack-node-externals": "^2.5.3",
|
|
||||||
"@typescript-eslint/eslint-plugin": "^5.33.0",
|
|
||||||
"@typescript-eslint/parser": "^5.33.0",
|
|
||||||
"@typescript-eslint/typescript-estree": "^5.33.0",
|
|
||||||
"copy-webpack-plugin": "^11.0.0",
|
|
||||||
"eslint": "^8.21.0",
|
|
||||||
"eslint-config-prettier": "^8.5.0",
|
|
||||||
"eslint-plugin-no-relative-import-paths": "^1.4.0",
|
|
||||||
"eslint-plugin-prettier": "^4.2.1",
|
|
||||||
"jest": "^28.1.3",
|
|
||||||
"prettier": "^2.7.1",
|
|
||||||
"rimraf": "^3.0.2",
|
|
||||||
"source-map-support": "^0.5.21",
|
|
||||||
"supertest": "^6.2.4",
|
|
||||||
"ts-jest": "^28.0.7",
|
|
||||||
"ts-loader": "^9.3.1",
|
|
||||||
"ts-node": "^10.9.1",
|
|
||||||
"tsconfig-paths": "^4.1.0",
|
|
||||||
"tsconfig-paths-webpack-plugin": "^4.0.0",
|
|
||||||
"typescript": "^4.7.4",
|
|
||||||
"webpack": "^5.74.0",
|
|
||||||
"webpack-cli": "^4.10.0",
|
|
||||||
"webpack-node-externals": "^3.0.0"
|
|
||||||
},
|
|
||||||
"jest": {
|
|
||||||
"moduleFileExtensions": [
|
|
||||||
"js",
|
|
||||||
"json",
|
|
||||||
"ts"
|
|
||||||
],
|
|
||||||
"rootDir": "src",
|
|
||||||
"testRegex": ".*\\.spec\\.ts$",
|
|
||||||
"transform": {
|
|
||||||
"^.+\\.(t|j)s$": "ts-jest"
|
|
||||||
},
|
|
||||||
"collectCoverageFrom": [
|
|
||||||
"**/*.(t|j)s"
|
|
||||||
],
|
|
||||||
"coverageDirectory": "../coverage",
|
|
||||||
"testEnvironment": "node"
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,28 +0,0 @@
|
|||||||
### Create account
|
|
||||||
POST http://127.0.0.1:8080/api/auth/signup
|
|
||||||
Content-Type: application/json
|
|
||||||
|
|
||||||
{"username": "root@mattv.de", "password": "123"}
|
|
||||||
|
|
||||||
### Wrong authenctication
|
|
||||||
POST http://127.0.0.1:8080/api/auth/login
|
|
||||||
Content-Type: application/json
|
|
||||||
|
|
||||||
{"username": "root@mattv.de", "password": "this is not correct"}
|
|
||||||
|
|
||||||
### Correct authentication
|
|
||||||
POST http://127.0.0.1:8080/api/auth/login
|
|
||||||
Content-Type: application/json
|
|
||||||
|
|
||||||
{"username": "root@mattv.de", "password": "123"}
|
|
||||||
|
|
||||||
> {% client.global.set("auth_token", response.body.jwt); %}
|
|
||||||
|
|
||||||
### Check if authenticated with admin perms
|
|
||||||
GET http://127.0.0.1:8080/test/hello2
|
|
||||||
Authorization: Bearer {{auth_token}}
|
|
||||||
|
|
||||||
|
|
||||||
### Refresh token
|
|
||||||
POST http://127.0.0.1:8080/api/auth/refresh
|
|
||||||
Authorization: Bearer {{auth_token}}
|
|
@ -1,59 +0,0 @@
|
|||||||
import { Controller, Get, Module } from '@nestjs/common';
|
|
||||||
import { TypeOrmModule } from '@nestjs/typeorm';
|
|
||||||
import { INode, JWTToken, User } from './entities';
|
|
||||||
import FileSystemModule from './modules/filesystem';
|
|
||||||
import { JWTAuthGuard, Role, RoleGuard } from './authguards';
|
|
||||||
import AuthModule from './modules/auth';
|
|
||||||
import { ServeStaticModule } from '@nestjs/serve-static';
|
|
||||||
import { join } from 'path';
|
|
||||||
import { cwd } from 'process';
|
|
||||||
import { UserRole } from '../dto/';
|
|
||||||
|
|
||||||
declare const PROD: boolean | undefined;
|
|
||||||
|
|
||||||
@Controller('test')
|
|
||||||
class TestController {
|
|
||||||
@Role(UserRole.USER)
|
|
||||||
@Get('hello')
|
|
||||||
getHello(): string {
|
|
||||||
return 'UwU';
|
|
||||||
}
|
|
||||||
|
|
||||||
@Role(UserRole.ADMIN)
|
|
||||||
@Get('hello2')
|
|
||||||
getHelloAdmin(): string {
|
|
||||||
return 'UwU Admin';
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
@Module({
|
|
||||||
imports: [
|
|
||||||
TypeOrmModule.forRoot({
|
|
||||||
type: 'sqlite',
|
|
||||||
database: 'sqlite.db',
|
|
||||||
synchronize: true,
|
|
||||||
entities: [User, INode, JWTToken]
|
|
||||||
}),
|
|
||||||
ServeStaticModule.forRoot({
|
|
||||||
rootPath:
|
|
||||||
typeof PROD !== 'undefined' && PROD
|
|
||||||
? join(cwd(), 'frontend')
|
|
||||||
: join(__dirname, '..', '..', 'frontend', 'dist'),
|
|
||||||
exclude: ['/api*']
|
|
||||||
}),
|
|
||||||
FileSystemModule,
|
|
||||||
AuthModule
|
|
||||||
],
|
|
||||||
controllers: [TestController],
|
|
||||||
providers: [
|
|
||||||
{
|
|
||||||
provide: 'APP_GUARD',
|
|
||||||
useClass: JWTAuthGuard
|
|
||||||
},
|
|
||||||
{
|
|
||||||
provide: 'APP_GUARD',
|
|
||||||
useClass: RoleGuard
|
|
||||||
}
|
|
||||||
]
|
|
||||||
})
|
|
||||||
export class AppModule {}
|
|
@ -1,47 +0,0 @@
|
|||||||
import {
|
|
||||||
CanActivate,
|
|
||||||
ExecutionContext,
|
|
||||||
Injectable,
|
|
||||||
SetMetadata
|
|
||||||
} from '@nestjs/common';
|
|
||||||
import { AuthGuard } from '@nestjs/passport';
|
|
||||||
import { Reflector } from '@nestjs/core';
|
|
||||||
import { User } from './entities';
|
|
||||||
import { UserRole } from '../dto';
|
|
||||||
|
|
||||||
const IS_PUBLIC_KEY = 'isPublic';
|
|
||||||
export const Public = () => SetMetadata(IS_PUBLIC_KEY, true);
|
|
||||||
|
|
||||||
@Injectable()
|
|
||||||
export class JWTAuthGuard extends AuthGuard('jwt') {
|
|
||||||
constructor(private reflector: Reflector) {
|
|
||||||
super();
|
|
||||||
}
|
|
||||||
|
|
||||||
canActivate(context: ExecutionContext) {
|
|
||||||
const isPublic = this.reflector.getAllAndOverride<boolean>(
|
|
||||||
IS_PUBLIC_KEY,
|
|
||||||
[context.getHandler(), context.getClass()]
|
|
||||||
);
|
|
||||||
if (isPublic) return true;
|
|
||||||
return super.canActivate(context);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
const ROLE_KEY = 'role';
|
|
||||||
export const Role = (role: UserRole) => SetMetadata(ROLE_KEY, role);
|
|
||||||
|
|
||||||
@Injectable()
|
|
||||||
export class RoleGuard implements CanActivate {
|
|
||||||
constructor(private reflector: Reflector) {}
|
|
||||||
|
|
||||||
canActivate(context: ExecutionContext) {
|
|
||||||
const requiredRole = this.reflector.getAllAndOverride<UserRole>(
|
|
||||||
ROLE_KEY,
|
|
||||||
[context.getHandler(), context.getClass()]
|
|
||||||
);
|
|
||||||
if (!requiredRole) return true;
|
|
||||||
const user: User = context.switchToHttp().getRequest().user;
|
|
||||||
return user.role >= requiredRole;
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,83 +0,0 @@
|
|||||||
import {
|
|
||||||
BadRequestException,
|
|
||||||
Body,
|
|
||||||
Controller,
|
|
||||||
Get,
|
|
||||||
Post,
|
|
||||||
Request,
|
|
||||||
ValidationPipe
|
|
||||||
} from '@nestjs/common';
|
|
||||||
import { AuthService } from 'services/auth';
|
|
||||||
import { Requests, Responses, UserRole } from '../../dto';
|
|
||||||
import { Role } from 'authguards';
|
|
||||||
import { tfaTypes } from 'entities';
|
|
||||||
|
|
||||||
@Controller('api/admin')
|
|
||||||
export default class AdminController {
|
|
||||||
constructor(private authService: AuthService) {}
|
|
||||||
|
|
||||||
@Role(UserRole.ADMIN)
|
|
||||||
@Get('users')
|
|
||||||
async getUsers(): Promise<Responses.Admin.GetUsers> {
|
|
||||||
const users = await this.authService.getUsers();
|
|
||||||
const entries = users.map(
|
|
||||||
(user) =>
|
|
||||||
new Responses.Admin.GetUsersEntry(
|
|
||||||
user.id,
|
|
||||||
user.isGitlabUser,
|
|
||||||
user.name,
|
|
||||||
user.role,
|
|
||||||
this.authService.requiresTfa(user)
|
|
||||||
)
|
|
||||||
);
|
|
||||||
return new Responses.Admin.GetUsers(entries);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Role(UserRole.ADMIN)
|
|
||||||
@Post('set_role')
|
|
||||||
async setRole(
|
|
||||||
@Request() req,
|
|
||||||
@Body(new ValidationPipe()) data: Requests.Admin.SetUserRole
|
|
||||||
): Promise<Responses.Admin.SetUserRole> {
|
|
||||||
const user = await this.authService.getUser(data.user);
|
|
||||||
if (!user) throw new BadRequestException('Invalid user');
|
|
||||||
await this.authService.setUserRole(user, data.role);
|
|
||||||
return new Responses.Admin.SetUserRole();
|
|
||||||
}
|
|
||||||
|
|
||||||
@Role(UserRole.ADMIN)
|
|
||||||
@Post('logout')
|
|
||||||
async logout(
|
|
||||||
@Request() req,
|
|
||||||
@Body(new ValidationPipe()) data: Requests.Admin.LogoutAll
|
|
||||||
): Promise<Responses.Admin.LogoutAllUser> {
|
|
||||||
const user = await this.authService.getUser(data.user);
|
|
||||||
if (!user) throw new BadRequestException('Invalid user');
|
|
||||||
await this.authService.revokeAll(user);
|
|
||||||
return new Responses.Admin.LogoutAllUser();
|
|
||||||
}
|
|
||||||
|
|
||||||
@Role(UserRole.ADMIN)
|
|
||||||
@Post('delete')
|
|
||||||
async delete(
|
|
||||||
@Request() req,
|
|
||||||
@Body(new ValidationPipe()) data: Requests.Admin.DeleteUser
|
|
||||||
): Promise<Responses.Admin.DeleteUser> {
|
|
||||||
const user = await this.authService.getUser(data.user);
|
|
||||||
if (!user) throw new BadRequestException('Invalid user');
|
|
||||||
await this.authService.deleteUser(user);
|
|
||||||
return new Responses.Admin.DeleteUser();
|
|
||||||
}
|
|
||||||
|
|
||||||
@Role(UserRole.ADMIN)
|
|
||||||
@Post('disable_2fa')
|
|
||||||
async disableTfa(
|
|
||||||
@Request() req,
|
|
||||||
@Body(new ValidationPipe()) data: Requests.Admin.DisableTfa
|
|
||||||
): Promise<Responses.Admin.DisableTfa> {
|
|
||||||
const user = await this.authService.getUser(data.user);
|
|
||||||
if (!user) throw new BadRequestException('Invalid user');
|
|
||||||
await this.authService.setTfaType(user, tfaTypes.NONE);
|
|
||||||
return new Responses.Admin.DisableTfa();
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,150 +0,0 @@
|
|||||||
import {
|
|
||||||
BadRequestException,
|
|
||||||
Body,
|
|
||||||
Controller,
|
|
||||||
Get,
|
|
||||||
HttpCode,
|
|
||||||
Post,
|
|
||||||
Query,
|
|
||||||
Redirect,
|
|
||||||
Request,
|
|
||||||
UnauthorizedException,
|
|
||||||
UseGuards,
|
|
||||||
ValidationPipe
|
|
||||||
} from '@nestjs/common';
|
|
||||||
import { AuthService } from 'services/auth';
|
|
||||||
import { AuthGuard } from '@nestjs/passport';
|
|
||||||
import { Public } from 'authguards';
|
|
||||||
import { Requests, Responses } from '../../dto';
|
|
||||||
import { tfaTypes } from 'entities';
|
|
||||||
import { toDataURL } from 'qrcode';
|
|
||||||
import * as base32 from 'thirty-two';
|
|
||||||
|
|
||||||
@Controller('api/auth')
|
|
||||||
export default class AuthController {
|
|
||||||
constructor(private authService: AuthService) {}
|
|
||||||
|
|
||||||
@Public()
|
|
||||||
@UseGuards(AuthGuard('local'))
|
|
||||||
@Post('login')
|
|
||||||
@HttpCode(200)
|
|
||||||
async login(
|
|
||||||
@Request() req,
|
|
||||||
@Body(new ValidationPipe()) data: Requests.Auth.LoginRequest
|
|
||||||
): Promise<
|
|
||||||
Responses.Auth.LoginResponse | Responses.Auth.TfaRequiredResponse
|
|
||||||
> {
|
|
||||||
if (this.authService.requiresTfa(req.user)) {
|
|
||||||
if (!data.otp) {
|
|
||||||
if (req.user.tfaType == tfaTypes.EMAIL)
|
|
||||||
await this.authService.sendTfaMail(req.user);
|
|
||||||
return new Responses.Auth.TfaRequiredResponse();
|
|
||||||
}
|
|
||||||
if (!(await this.authService.verifyTfa(req.user, data.otp)))
|
|
||||||
throw new UnauthorizedException('Incorrect 2fa');
|
|
||||||
}
|
|
||||||
return new Responses.Auth.LoginResponse(
|
|
||||||
await this.authService.login(req, req.user)
|
|
||||||
);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Post('2fa/disable')
|
|
||||||
async tfaDisable(
|
|
||||||
@Request() req
|
|
||||||
): Promise<Responses.Auth.RemoveTfaResponse> {
|
|
||||||
await this.authService.setTfaType(req.user, tfaTypes.NONE);
|
|
||||||
await this.authService.revokeAll(req.user);
|
|
||||||
return new Responses.Auth.RemoveTfaResponse();
|
|
||||||
}
|
|
||||||
|
|
||||||
@Post('2fa/complete')
|
|
||||||
async tfaMail(
|
|
||||||
@Request() req,
|
|
||||||
@Body(new ValidationPipe()) data: Requests.Auth.TfaComplete
|
|
||||||
): Promise<Responses.Auth.TfaCompletedResponse> {
|
|
||||||
const type = data.mail ? tfaTypes.EMAIL : tfaTypes.TOTP;
|
|
||||||
if (!(await this.authService.verifyTfa(req.user, data.code, type))) {
|
|
||||||
throw new UnauthorizedException('Incorrect 2fa');
|
|
||||||
}
|
|
||||||
await this.authService.setTfaType(req.user, type);
|
|
||||||
await this.authService.revokeAll(req.user);
|
|
||||||
return new Responses.Auth.TfaCompletedResponse();
|
|
||||||
}
|
|
||||||
|
|
||||||
@Post('2fa/setup')
|
|
||||||
async setupTotp(
|
|
||||||
@Request() req,
|
|
||||||
@Body(new ValidationPipe()) data: Requests.Auth.TfaSetup
|
|
||||||
): Promise<
|
|
||||||
| Responses.Auth.RequestTotpTfaResponse
|
|
||||||
| Responses.Auth.RequestEmailTfaResponse
|
|
||||||
> {
|
|
||||||
const secret = await this.authService.setupTfa(req.user);
|
|
||||||
if (data.mail) return new Responses.Auth.RequestEmailTfaResponse();
|
|
||||||
return new Responses.Auth.RequestTotpTfaResponse(
|
|
||||||
await toDataURL(
|
|
||||||
`otpauth://totp/MFileserver:${req.user.name}?secret=${base32
|
|
||||||
.encode(secret)
|
|
||||||
.toString()}&issuer=MFileserver`
|
|
||||||
),
|
|
||||||
base32.encode(secret).toString()
|
|
||||||
);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Public()
|
|
||||||
@Post('signup')
|
|
||||||
async signup(
|
|
||||||
@Body(new ValidationPipe()) data: Requests.Auth.SignUpRequest
|
|
||||||
): Promise<Responses.Auth.SignupResponse> {
|
|
||||||
if ((await this.authService.findUser(data.username, false)) != null)
|
|
||||||
throw new BadRequestException('Username already taken');
|
|
||||||
await this.authService.signup(data.username, data.password);
|
|
||||||
return new Responses.Auth.SignupResponse();
|
|
||||||
}
|
|
||||||
|
|
||||||
@Post('refresh')
|
|
||||||
async refresh(@Request() req): Promise<Responses.Auth.RefreshResponse> {
|
|
||||||
const token = await this.authService.login(req, req.user);
|
|
||||||
await this.authService.revoke(req.token);
|
|
||||||
return await new Responses.Auth.RefreshResponse(token);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Public()
|
|
||||||
@Redirect()
|
|
||||||
@Get('gitlab')
|
|
||||||
async gitlab(@Request() req) {
|
|
||||||
return {
|
|
||||||
url: this.authService.getGitlabAuthUrl(req)
|
|
||||||
};
|
|
||||||
}
|
|
||||||
|
|
||||||
@Public()
|
|
||||||
@Redirect()
|
|
||||||
@Get('gitlab_callback')
|
|
||||||
async gitlabCallback(@Request() req, @Query('code') code) {
|
|
||||||
const user = await this.authService.getGitlabUserFromCode(req, code);
|
|
||||||
const token = await this.authService.login(req, user);
|
|
||||||
return {
|
|
||||||
url: `/set_token?token=${token}`
|
|
||||||
};
|
|
||||||
}
|
|
||||||
|
|
||||||
@Post('change_password')
|
|
||||||
async changePassword(
|
|
||||||
@Request() req,
|
|
||||||
@Body(new ValidationPipe()) data: Requests.Auth.ChangePasswordRequest
|
|
||||||
): Promise<Responses.Auth.ChangePasswordResponse> {
|
|
||||||
await this.authService.changePassword(
|
|
||||||
req.user,
|
|
||||||
data.oldPassword,
|
|
||||||
data.newPassword
|
|
||||||
);
|
|
||||||
return new Responses.Auth.ChangePasswordResponse();
|
|
||||||
}
|
|
||||||
|
|
||||||
@Post('logout_all')
|
|
||||||
async logoutAll(@Request() req): Promise<Responses.Auth.LogoutAllResponse> {
|
|
||||||
await this.authService.revokeAll(req.user);
|
|
||||||
return new Responses.Auth.LogoutAllResponse();
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,121 +0,0 @@
|
|||||||
import {
|
|
||||||
Body,
|
|
||||||
Controller,
|
|
||||||
Get,
|
|
||||||
Param,
|
|
||||||
ParseIntPipe,
|
|
||||||
Post,
|
|
||||||
Request,
|
|
||||||
StreamableFile,
|
|
||||||
ValidationPipe
|
|
||||||
} from '@nestjs/common';
|
|
||||||
import { Responses, Requests, validateAsyncInline, UserRole } from '../../dto';
|
|
||||||
import FileSystemService from 'services/filesystem';
|
|
||||||
import { Role } from 'authguards';
|
|
||||||
|
|
||||||
@Controller('api/fs')
|
|
||||||
export default class FileSystemController {
|
|
||||||
constructor(private fsService: FileSystemService) {}
|
|
||||||
|
|
||||||
@Get('root')
|
|
||||||
@Role(UserRole.USER)
|
|
||||||
async getRoot(@Request() req): Promise<Responses.FS.GetRootResponse> {
|
|
||||||
return new Responses.FS.GetRootResponse(req.user.rootId);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Get('node/:node')
|
|
||||||
@Role(UserRole.USER)
|
|
||||||
async getNode(
|
|
||||||
@Request() req,
|
|
||||||
@Param('node', ParseIntPipe) nodeId
|
|
||||||
): Promise<Responses.FS.GetNodeResponse> {
|
|
||||||
const node = await this.fsService.getNodeAndValidate(nodeId, req.user);
|
|
||||||
const data = new Responses.FS.GetNodeResponse(
|
|
||||||
nodeId,
|
|
||||||
node.name,
|
|
||||||
node.isFile,
|
|
||||||
node.parentId
|
|
||||||
);
|
|
||||||
|
|
||||||
if (data.isFile) {
|
|
||||||
data.size = node.size;
|
|
||||||
} else {
|
|
||||||
data.children = (await node.children).map((child) => child.id);
|
|
||||||
}
|
|
||||||
return validateAsyncInline(data);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Get('path/:node')
|
|
||||||
@Role(UserRole.USER)
|
|
||||||
async getPath(
|
|
||||||
@Request() req,
|
|
||||||
@Param('node', ParseIntPipe) nodeId
|
|
||||||
): Promise<Responses.FS.GetPathResponse> {
|
|
||||||
return new Responses.FS.GetPathResponse(
|
|
||||||
await this.fsService.generatePath(
|
|
||||||
await this.fsService.getNodeAndValidate(nodeId, req.user)
|
|
||||||
)
|
|
||||||
);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Post('createFolder')
|
|
||||||
@Role(UserRole.USER)
|
|
||||||
async createFolder(
|
|
||||||
@Request() req,
|
|
||||||
@Body(new ValidationPipe()) data: Requests.FS.CreateFolderRequest
|
|
||||||
): Promise<Responses.FS.CreateFolderResponse> {
|
|
||||||
const newChild = await this.fsService.create(
|
|
||||||
await this.fsService.getNodeAndValidate(data.parent, req.user),
|
|
||||||
data.name,
|
|
||||||
req.user,
|
|
||||||
false
|
|
||||||
);
|
|
||||||
return new Responses.FS.CreateFolderResponse(newChild.id);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Post('createFile')
|
|
||||||
@Role(UserRole.USER)
|
|
||||||
async createFile(
|
|
||||||
@Request() req,
|
|
||||||
@Body(new ValidationPipe()) data: Requests.FS.CreateFileRequest
|
|
||||||
): Promise<Responses.FS.CreateFileResponse> {
|
|
||||||
const newChild = await this.fsService.create(
|
|
||||||
await this.fsService.getNodeAndValidate(data.parent, req.user),
|
|
||||||
data.name,
|
|
||||||
req.user,
|
|
||||||
true
|
|
||||||
);
|
|
||||||
return new Responses.FS.CreateFileResponse(newChild.id);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Post('delete')
|
|
||||||
@Role(UserRole.USER)
|
|
||||||
async delete(
|
|
||||||
@Request() req,
|
|
||||||
@Body(new ValidationPipe()) data: Requests.FS.DeleteRequest
|
|
||||||
): Promise<Responses.FS.DeleteResponse> {
|
|
||||||
await this.fsService.delete(
|
|
||||||
await this.fsService.getNodeAndValidate(data.node, req.user)
|
|
||||||
);
|
|
||||||
return new Responses.FS.DeleteResponse();
|
|
||||||
}
|
|
||||||
|
|
||||||
@Post('upload/:node')
|
|
||||||
@Role(UserRole.USER)
|
|
||||||
async upload(
|
|
||||||
@Request() req,
|
|
||||||
@Param('node', ParseIntPipe) nodeId
|
|
||||||
): Promise<Responses.FS.UploadFileResponse> {
|
|
||||||
await this.fsService.uploadFile(await req.file(), nodeId, req.user);
|
|
||||||
return new Responses.FS.UploadFileResponse();
|
|
||||||
}
|
|
||||||
|
|
||||||
@Post('download')
|
|
||||||
@Role(UserRole.USER)
|
|
||||||
async download(
|
|
||||||
@Request() req,
|
|
||||||
@Body('id', ParseIntPipe) id
|
|
||||||
): Promise<StreamableFile> {
|
|
||||||
return this.fsService.downloadFile(id, req.user);
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,27 +0,0 @@
|
|||||||
import { Controller, Get, Post, Request } from '@nestjs/common';
|
|
||||||
import { AuthService } from 'services/auth';
|
|
||||||
import { Responses } from '../../dto';
|
|
||||||
|
|
||||||
@Controller('api/user')
|
|
||||||
export default class UserController {
|
|
||||||
constructor(private authService: AuthService) {}
|
|
||||||
|
|
||||||
@Get('info')
|
|
||||||
async getUserInfo(
|
|
||||||
@Request() req
|
|
||||||
): Promise<Responses.User.UserInfoResponse> {
|
|
||||||
return new Responses.User.UserInfoResponse(
|
|
||||||
req.user.name,
|
|
||||||
req.user.isGitlabUser,
|
|
||||||
this.authService.requiresTfa(req.user)
|
|
||||||
);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Post('delete')
|
|
||||||
async deleteUser(
|
|
||||||
@Request() req
|
|
||||||
): Promise<Responses.User.DeleteUserResponse> {
|
|
||||||
await this.authService.deleteUser(req.user);
|
|
||||||
return new Responses.User.DeleteUserResponse();
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,95 +0,0 @@
|
|||||||
import {
|
|
||||||
Entity,
|
|
||||||
Column,
|
|
||||||
PrimaryGeneratedColumn,
|
|
||||||
ManyToOne,
|
|
||||||
OneToMany,
|
|
||||||
OneToOne
|
|
||||||
} from 'typeorm';
|
|
||||||
import { UserRole } from '../dto';
|
|
||||||
|
|
||||||
export enum tfaTypes {
|
|
||||||
NONE = 0,
|
|
||||||
EMAIL = 1,
|
|
||||||
TOTP = 2
|
|
||||||
}
|
|
||||||
|
|
||||||
@Entity()
|
|
||||||
export class INode {
|
|
||||||
@PrimaryGeneratedColumn()
|
|
||||||
id: number;
|
|
||||||
@Column()
|
|
||||||
isFile: boolean;
|
|
||||||
@Column()
|
|
||||||
name: string;
|
|
||||||
@Column({ nullable: true })
|
|
||||||
size: number;
|
|
||||||
|
|
||||||
@Column({ nullable: true })
|
|
||||||
parentId: number;
|
|
||||||
@ManyToOne(() => INode, (node) => node.children)
|
|
||||||
parent: Promise<INode>;
|
|
||||||
@OneToMany(() => INode, (node) => node.parent)
|
|
||||||
children: Promise<INode[]>;
|
|
||||||
|
|
||||||
@Column({ nullable: true })
|
|
||||||
ownerId: number;
|
|
||||||
@ManyToOne(() => User)
|
|
||||||
owner: Promise<User>;
|
|
||||||
}
|
|
||||||
|
|
||||||
@Entity()
|
|
||||||
export class User {
|
|
||||||
@PrimaryGeneratedColumn()
|
|
||||||
id: number;
|
|
||||||
@Column({ default: false })
|
|
||||||
isGitlabUser: boolean;
|
|
||||||
@Column()
|
|
||||||
name: string;
|
|
||||||
@Column()
|
|
||||||
password: string;
|
|
||||||
@Column({
|
|
||||||
type: 'int',
|
|
||||||
default: UserRole.DISABLED,
|
|
||||||
transformer: {
|
|
||||||
from: (db: number): UserRole => db,
|
|
||||||
to: (role: UserRole): number => role
|
|
||||||
}
|
|
||||||
})
|
|
||||||
role: UserRole;
|
|
||||||
|
|
||||||
@Column({ nullable: true })
|
|
||||||
rootId: number;
|
|
||||||
@OneToOne(() => INode)
|
|
||||||
root: Promise<INode>;
|
|
||||||
|
|
||||||
@Column({
|
|
||||||
type: 'int',
|
|
||||||
default: tfaTypes.NONE,
|
|
||||||
transformer: {
|
|
||||||
from: (db: number): tfaTypes => db,
|
|
||||||
to: (type: tfaTypes): number => type
|
|
||||||
}
|
|
||||||
})
|
|
||||||
tfaType: tfaTypes;
|
|
||||||
|
|
||||||
@Column({ nullable: true })
|
|
||||||
tfaSecret: string;
|
|
||||||
|
|
||||||
@Column({ nullable: true })
|
|
||||||
gitlabAT: string;
|
|
||||||
@Column({ nullable: true })
|
|
||||||
gitlabRT: string;
|
|
||||||
}
|
|
||||||
|
|
||||||
@Entity()
|
|
||||||
export class JWTToken {
|
|
||||||
@PrimaryGeneratedColumn()
|
|
||||||
id: number;
|
|
||||||
|
|
||||||
@Column()
|
|
||||||
ownerId: number;
|
|
||||||
|
|
||||||
@Column({ nullable: true })
|
|
||||||
exp: number;
|
|
||||||
}
|
|
20
src/main.ts
20
src/main.ts
@ -1,20 +0,0 @@
|
|||||||
import { NestFactory } from '@nestjs/core';
|
|
||||||
import { AppModule } from './app.module';
|
|
||||||
import {
|
|
||||||
FastifyAdapter,
|
|
||||||
NestFastifyApplication
|
|
||||||
} from '@nestjs/platform-fastify';
|
|
||||||
import fastifyMultipart from '@fastify/multipart';
|
|
||||||
import { existsSync, mkdirSync } from 'fs';
|
|
||||||
|
|
||||||
async function bootstrap() {
|
|
||||||
if (!existsSync('files')) mkdirSync('files');
|
|
||||||
|
|
||||||
const app = await NestFactory.create<NestFastifyApplication>(
|
|
||||||
AppModule,
|
|
||||||
new FastifyAdapter({ logger: true })
|
|
||||||
);
|
|
||||||
await app.register(fastifyMultipart);
|
|
||||||
await app.listen(8080, '0.0.0.0');
|
|
||||||
}
|
|
||||||
bootstrap();
|
|
@ -1,20 +0,0 @@
|
|||||||
import { Module } from '@nestjs/common';
|
|
||||||
import { TypeOrmModule } from '@nestjs/typeorm';
|
|
||||||
import { INode, JWTToken, User } from 'entities';
|
|
||||||
import { AuthService, AuthLocalService, AuthJwtService } from 'services/auth';
|
|
||||||
import FileSystemService from 'services/filesystem';
|
|
||||||
import AuthController from 'controller/auth';
|
|
||||||
import UserController from 'controller/user';
|
|
||||||
import AdminController from 'controller/admin';
|
|
||||||
|
|
||||||
@Module({
|
|
||||||
imports: [TypeOrmModule.forFeature([User, INode, JWTToken])],
|
|
||||||
providers: [
|
|
||||||
AuthService,
|
|
||||||
AuthLocalService,
|
|
||||||
AuthJwtService,
|
|
||||||
FileSystemService
|
|
||||||
],
|
|
||||||
controllers: [AuthController, UserController, AdminController]
|
|
||||||
})
|
|
||||||
export default class AuthModule {}
|
|
@ -1,12 +0,0 @@
|
|||||||
import { Module } from '@nestjs/common';
|
|
||||||
import { TypeOrmModule } from '@nestjs/typeorm';
|
|
||||||
import { INode } from 'entities';
|
|
||||||
import FileSystemService from 'services/filesystem';
|
|
||||||
import FileSystemController from 'controller/filesystem';
|
|
||||||
|
|
||||||
@Module({
|
|
||||||
imports: [TypeOrmModule.forFeature([INode])],
|
|
||||||
providers: [FileSystemService],
|
|
||||||
controllers: [FileSystemController]
|
|
||||||
})
|
|
||||||
export default class FileSystemModule {}
|
|
@ -1,121 +0,0 @@
|
|||||||
import {
|
|
||||||
BadRequestException,
|
|
||||||
Injectable,
|
|
||||||
UnauthorizedException
|
|
||||||
} from '@nestjs/common';
|
|
||||||
import { InjectRepository } from '@nestjs/typeorm';
|
|
||||||
import { JWTToken, User } from 'entities';
|
|
||||||
import { LessThanOrEqual, Repository } from 'typeorm';
|
|
||||||
import * as argon2 from 'argon2';
|
|
||||||
import FileSystemService from 'services/filesystem';
|
|
||||||
import * as jwt from 'jsonwebtoken';
|
|
||||||
import { UserRole } from '../../../dto';
|
|
||||||
|
|
||||||
export const jwtSecret = 'CUM';
|
|
||||||
|
|
||||||
export interface jwtPayload {
|
|
||||||
sub: number;
|
|
||||||
jti: number;
|
|
||||||
exp?: number;
|
|
||||||
iat?: number;
|
|
||||||
}
|
|
||||||
|
|
||||||
@Injectable()
|
|
||||||
export default class BaseAuthService {
|
|
||||||
constructor(
|
|
||||||
@InjectRepository(User)
|
|
||||||
protected userRepo: Repository<User>,
|
|
||||||
@InjectRepository(JWTToken)
|
|
||||||
protected tokenRepo: Repository<JWTToken>,
|
|
||||||
protected fsService: FileSystemService
|
|
||||||
) {}
|
|
||||||
|
|
||||||
getUsers(): Promise<User[]> {
|
|
||||||
return this.userRepo.find();
|
|
||||||
}
|
|
||||||
|
|
||||||
async getUser(userId: number): Promise<User | null> {
|
|
||||||
return this.userRepo.findOneBy({
|
|
||||||
id: userId
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
async findUser(username: string, gitlab: boolean): Promise<User | null> {
|
|
||||||
return this.userRepo.findOneBy({
|
|
||||||
name: username,
|
|
||||||
isGitlabUser: gitlab
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
async getToken(tokenId: number): Promise<JWTToken | null> {
|
|
||||||
return this.tokenRepo.findOneBy({
|
|
||||||
id: tokenId
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
async validateUser(username: string, pass: string): Promise<User | null> {
|
|
||||||
const user = await this.findUser(username, false);
|
|
||||||
if (!user)
|
|
||||||
throw new UnauthorizedException('Invalid username or password');
|
|
||||||
if (!(await argon2.verify(user.password, pass)))
|
|
||||||
throw new UnauthorizedException('Invalid username or password');
|
|
||||||
if (user.role == UserRole.DISABLED)
|
|
||||||
throw new UnauthorizedException('Account is disabled');
|
|
||||||
return user;
|
|
||||||
}
|
|
||||||
|
|
||||||
async cleanupTokens(): Promise<void> {
|
|
||||||
await this.tokenRepo.delete({
|
|
||||||
exp: LessThanOrEqual(Math.floor(Date.now() / 1000))
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
async login(req: Request, user: User) {
|
|
||||||
const token = new JWTToken();
|
|
||||||
token.ownerId = user.id;
|
|
||||||
const db_token = await this.tokenRepo.save(token);
|
|
||||||
const payload: jwtPayload = {
|
|
||||||
sub: user.id,
|
|
||||||
jti: db_token.id
|
|
||||||
};
|
|
||||||
const jwtToken = jwt.sign(payload, jwtSecret, {
|
|
||||||
mutatePayload: true,
|
|
||||||
expiresIn: '1d'
|
|
||||||
});
|
|
||||||
db_token.exp = payload.exp;
|
|
||||||
await this.tokenRepo.save(db_token);
|
|
||||||
return jwtToken;
|
|
||||||
}
|
|
||||||
|
|
||||||
async singupInternal(user: User): Promise<User> {
|
|
||||||
const root = await this.fsService.generateRoot(user);
|
|
||||||
user.rootId = root.id;
|
|
||||||
return this.userRepo.save(user);
|
|
||||||
}
|
|
||||||
|
|
||||||
async signup(username: string, password: string) {
|
|
||||||
if (await this.findUser(username, false))
|
|
||||||
throw new BadRequestException('User already exists');
|
|
||||||
const user = new User();
|
|
||||||
user.name = username;
|
|
||||||
user.password = await argon2.hash(password);
|
|
||||||
await this.singupInternal(await this.userRepo.save(user));
|
|
||||||
}
|
|
||||||
|
|
||||||
async revoke(token: JWTToken) {
|
|
||||||
await this.tokenRepo.delete({
|
|
||||||
id: token.id
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
async revokeAll(user: User) {
|
|
||||||
await this.tokenRepo.delete({
|
|
||||||
ownerId: user.id
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
async setUserRole(user: User, role: UserRole) {
|
|
||||||
user.role = role;
|
|
||||||
await this.userRepo.save(user);
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,160 +0,0 @@
|
|||||||
import { User } from 'entities';
|
|
||||||
import { FastifyRequest } from 'fastify';
|
|
||||||
import axios from 'axios';
|
|
||||||
import * as argon2 from 'argon2';
|
|
||||||
import { ForbiddenException, UnauthorizedException } from '@nestjs/common';
|
|
||||||
import TfaAuthService from './tfa';
|
|
||||||
import { UserRole } from '../../../dto';
|
|
||||||
|
|
||||||
const GITLAB_ID =
|
|
||||||
'98bcbad78cb1f880d1d1de62291d70a791251a7bea077bfe7df111ef3c115760';
|
|
||||||
const GITLAB_SECRET =
|
|
||||||
'7ee01d2b204aff3a05f9d028f004d169b6d381ec873e195f314b3935fa150959';
|
|
||||||
const GITLAB_URL = 'https://gitlab.mattv.de';
|
|
||||||
const GITLAB_API_URL = 'https://ssh.gitlab.mattv.de';
|
|
||||||
|
|
||||||
interface GitlabTokenResponse {
|
|
||||||
access_token: string;
|
|
||||||
token_type: string;
|
|
||||||
expires_in: number;
|
|
||||||
refresh_token: string;
|
|
||||||
created_at: number;
|
|
||||||
}
|
|
||||||
|
|
||||||
interface GitlabUserResponse {
|
|
||||||
username: string;
|
|
||||||
is_admin?: boolean;
|
|
||||||
}
|
|
||||||
|
|
||||||
export default class GitlabAuthService extends TfaAuthService {
|
|
||||||
async login(req: Request, user: User) {
|
|
||||||
if (user.isGitlabUser && !(await this.verifyGitlabUser(req, user))) {
|
|
||||||
await this.revokeAll(user);
|
|
||||||
throw new UnauthorizedException('Invalid gitlab token');
|
|
||||||
}
|
|
||||||
return super.login(req, user);
|
|
||||||
}
|
|
||||||
|
|
||||||
async singupGitlab(
|
|
||||||
info: GitlabUserResponse,
|
|
||||||
data: GitlabTokenResponse
|
|
||||||
): Promise<User> {
|
|
||||||
const user = new User();
|
|
||||||
user.name = info.username;
|
|
||||||
user.password = '';
|
|
||||||
user.isGitlabUser = true;
|
|
||||||
user.role = info.is_admin ? UserRole.ADMIN : UserRole.DISABLED;
|
|
||||||
return this.singupInternal(await this.setGitlabTokens(user, data));
|
|
||||||
}
|
|
||||||
|
|
||||||
async setGitlabTokens(
|
|
||||||
user: User,
|
|
||||||
data: GitlabTokenResponse
|
|
||||||
): Promise<User> {
|
|
||||||
user.gitlabAT = data.access_token;
|
|
||||||
user.gitlabRT = data.refresh_token;
|
|
||||||
return this.userRepo.save(user);
|
|
||||||
}
|
|
||||||
|
|
||||||
getGitlabRedirectUrl(req: Request): string {
|
|
||||||
const _req = req as unknown as FastifyRequest;
|
|
||||||
return `${_req.protocol}://${_req.hostname}/api/auth/gitlab_callback`;
|
|
||||||
}
|
|
||||||
|
|
||||||
getGitlabAuthUrl(req: Request): string {
|
|
||||||
const params = new URLSearchParams();
|
|
||||||
params.append('redirect_uri', this.getGitlabRedirectUrl(req));
|
|
||||||
params.append('response_type', 'code');
|
|
||||||
params.append('scope', 'read_user');
|
|
||||||
params.append('client_id', GITLAB_ID);
|
|
||||||
return `${GITLAB_URL}/oauth/authorize?${params.toString()}`;
|
|
||||||
}
|
|
||||||
|
|
||||||
async getGitlabUserFromCode(req: Request, code: string): Promise<User> {
|
|
||||||
const params = new URLSearchParams();
|
|
||||||
params.append('redirect_uri', this.getGitlabRedirectUrl(req));
|
|
||||||
params.append('client_id', GITLAB_ID);
|
|
||||||
params.append('client_secret', GITLAB_SECRET);
|
|
||||||
params.append('code', code);
|
|
||||||
params.append('grant_type', 'authorization_code');
|
|
||||||
const resp = await axios.post(
|
|
||||||
`${GITLAB_API_URL}/oauth/token?${params.toString()}`,
|
|
||||||
{}
|
|
||||||
);
|
|
||||||
const data: GitlabTokenResponse = resp.data;
|
|
||||||
const userInfoResp = await axios.get(`${GITLAB_API_URL}/api/v4/user`, {
|
|
||||||
headers: { Authorization: `Bearer ${data.access_token}` }
|
|
||||||
});
|
|
||||||
const userInfo: GitlabUserResponse = userInfoResp.data;
|
|
||||||
let user = await this.findUser(userInfo.username, true);
|
|
||||||
if (!user) user = await this.singupGitlab(userInfo, data);
|
|
||||||
else user = await this.setGitlabTokens(user, data);
|
|
||||||
return user;
|
|
||||||
}
|
|
||||||
|
|
||||||
async getGitlabUserInfo(
|
|
||||||
req: Request,
|
|
||||||
user: User
|
|
||||||
): Promise<GitlabUserResponse | null> {
|
|
||||||
try {
|
|
||||||
const userInfoResp = await axios.get(
|
|
||||||
`${GITLAB_API_URL}/api/v4/user`,
|
|
||||||
{
|
|
||||||
headers: { Authorization: `Bearer ${user.gitlabAT}` }
|
|
||||||
}
|
|
||||||
);
|
|
||||||
return userInfoResp.data;
|
|
||||||
} catch (e) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
async tryRefreshGitlabTokens(
|
|
||||||
req: Request,
|
|
||||||
user: User
|
|
||||||
): Promise<User | null> {
|
|
||||||
const params = new URLSearchParams();
|
|
||||||
params.append('redirect_uri', this.getGitlabRedirectUrl(req));
|
|
||||||
params.append('client_id', GITLAB_ID);
|
|
||||||
params.append('client_secret', GITLAB_SECRET);
|
|
||||||
params.append('refresh_token', user.gitlabRT);
|
|
||||||
params.append('grant_type', 'refresh_token');
|
|
||||||
try {
|
|
||||||
const resp = await axios.post(
|
|
||||||
`${GITLAB_API_URL}/oauth/token?${params.toString()}`,
|
|
||||||
{}
|
|
||||||
);
|
|
||||||
const data: GitlabTokenResponse = resp.data;
|
|
||||||
return this.setGitlabTokens(user, data);
|
|
||||||
} catch (e) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
async verifyGitlabUser(req: Request, user: User): Promise<boolean> {
|
|
||||||
let info = await this.getGitlabUserInfo(req, user);
|
|
||||||
if (!info) {
|
|
||||||
user = await this.tryRefreshGitlabTokens(req, user);
|
|
||||||
if (!user) return false;
|
|
||||||
info = await this.getGitlabUserInfo(req, user);
|
|
||||||
}
|
|
||||||
return info && info.username == user.name;
|
|
||||||
}
|
|
||||||
|
|
||||||
async deleteUser(user: User): Promise<void> {
|
|
||||||
await this.revokeAll(user);
|
|
||||||
await this.fsService.delete(await user.root, true);
|
|
||||||
await this.userRepo.remove(user);
|
|
||||||
}
|
|
||||||
|
|
||||||
async changePassword(
|
|
||||||
user: User,
|
|
||||||
oldPW: string,
|
|
||||||
newPw: string
|
|
||||||
): Promise<void> {
|
|
||||||
if (!(await argon2.verify(user.password, oldPW)))
|
|
||||||
throw new ForbiddenException('Old password is wrong');
|
|
||||||
user.password = await argon2.hash(newPw);
|
|
||||||
await this.revokeAll(await this.userRepo.save(user));
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,2 +0,0 @@
|
|||||||
export { default as AuthService } from './gitlab';
|
|
||||||
export * from './strategies';
|
|
@ -1,60 +0,0 @@
|
|||||||
import { Injectable, UnauthorizedException } from '@nestjs/common';
|
|
||||||
import { PassportStrategy } from '@nestjs/passport';
|
|
||||||
import { Strategy as LocalStrategy } from 'passport-local';
|
|
||||||
import { ExtractJwt, Strategy as JWTStrategy } from 'passport-jwt';
|
|
||||||
import AuthService from './gitlab';
|
|
||||||
import { jwtPayload, jwtSecret } from './base';
|
|
||||||
|
|
||||||
@Injectable()
|
|
||||||
export class AuthLocalService extends PassportStrategy(LocalStrategy) {
|
|
||||||
constructor(private authService: AuthService) {
|
|
||||||
super();
|
|
||||||
}
|
|
||||||
|
|
||||||
async validate(username: string, pass: string) {
|
|
||||||
const user = await this.authService.validateUser(username, pass);
|
|
||||||
if (!user)
|
|
||||||
throw new UnauthorizedException('Invalid username or password');
|
|
||||||
return user;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
@Injectable()
|
|
||||||
export class AuthJwtService extends PassportStrategy(JWTStrategy) {
|
|
||||||
constructor(private authService: AuthService) {
|
|
||||||
super({
|
|
||||||
jwtFromRequest: ExtractJwt.fromExtractors([
|
|
||||||
ExtractJwt.fromAuthHeaderAsBearerToken(),
|
|
||||||
ExtractJwt.fromBodyField('jwtToken')
|
|
||||||
]),
|
|
||||||
ignoreExpiration: false,
|
|
||||||
passReqToCallback: true,
|
|
||||||
secretOrKey: jwtSecret
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
async validate(req: Request, payload: jwtPayload) {
|
|
||||||
await this.authService.cleanupTokens();
|
|
||||||
const token = await this.authService.getToken(payload.jti);
|
|
||||||
if (!token)
|
|
||||||
throw new UnauthorizedException(
|
|
||||||
'Invalid token, please log in again'
|
|
||||||
);
|
|
||||||
const user = await this.authService.getUser(token.ownerId);
|
|
||||||
if (!user || user.id != payload.sub)
|
|
||||||
throw new UnauthorizedException(
|
|
||||||
'Invalid token, please log in again'
|
|
||||||
);
|
|
||||||
if (
|
|
||||||
user.isGitlabUser &&
|
|
||||||
!(await this.authService.verifyGitlabUser(req, user))
|
|
||||||
) {
|
|
||||||
await this.authService.revokeAll(user);
|
|
||||||
throw new UnauthorizedException('Invalid gitlab token');
|
|
||||||
}
|
|
||||||
// eslint-disable-next-line @typescript-eslint/ban-ts-comment
|
|
||||||
// @ts-ignore
|
|
||||||
req.token = token;
|
|
||||||
return user;
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,74 +0,0 @@
|
|||||||
import { tfaTypes, User } from 'entities';
|
|
||||||
import { BadRequestException } from '@nestjs/common';
|
|
||||||
import BaseAuthService from './base';
|
|
||||||
import { randomBytes } from 'crypto';
|
|
||||||
import * as notp from 'notp';
|
|
||||||
import { createTransport } from 'nodemailer';
|
|
||||||
|
|
||||||
const mailAccount = createTransport({
|
|
||||||
host: 'mail.mattv.de',
|
|
||||||
port: 587,
|
|
||||||
secure: false,
|
|
||||||
auth: {
|
|
||||||
user: 'no-reply@mattv.de',
|
|
||||||
pass: 'noreplyLONGPASS123'
|
|
||||||
}
|
|
||||||
});
|
|
||||||
|
|
||||||
export default class TfaAuthService extends BaseAuthService {
|
|
||||||
generateTfaSecret(): string {
|
|
||||||
const set =
|
|
||||||
'0123456789ABCDEFGHIJKLMNOPQRSTUVWXTZabcdefghiklmnopqrstuvwxyz!@#$%^&*()<>?/[]{},.:;';
|
|
||||||
return randomBytes(32)
|
|
||||||
.map((b) =>
|
|
||||||
set.charCodeAt(Math.floor((b / 255.0) * (set.length - 1)))
|
|
||||||
)
|
|
||||||
.toString();
|
|
||||||
}
|
|
||||||
|
|
||||||
requiresTfa(user: User): boolean {
|
|
||||||
return user.tfaType != tfaTypes.NONE;
|
|
||||||
}
|
|
||||||
|
|
||||||
async verifyTfa(
|
|
||||||
user: User,
|
|
||||||
token: string,
|
|
||||||
type?: tfaTypes
|
|
||||||
): Promise<boolean> {
|
|
||||||
if (!type) type = user.tfaType;
|
|
||||||
const delta = notp.totp.verify(token, user.tfaSecret, {
|
|
||||||
window: 10
|
|
||||||
});
|
|
||||||
return (
|
|
||||||
delta &&
|
|
||||||
(type == tfaTypes.EMAIL ? delta.delta <= 0 : delta.delta == 0)
|
|
||||||
);
|
|
||||||
}
|
|
||||||
|
|
||||||
async sendTfaMail(user: User) {
|
|
||||||
await mailAccount.sendMail({
|
|
||||||
from: 'fileserver@mattv.de',
|
|
||||||
to: user.name,
|
|
||||||
subject: 'Fileserver - EMail 2fa code',
|
|
||||||
text: `Your code is: ${notp.totp.gen(
|
|
||||||
user.tfaSecret
|
|
||||||
)}\nIt is valid for 5 Minutes`
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
async setupTfa(user: User): Promise<string> {
|
|
||||||
if (user.tfaType != tfaTypes.NONE)
|
|
||||||
throw new BadRequestException(
|
|
||||||
'2 Factor authentication is already setup'
|
|
||||||
);
|
|
||||||
const secret = this.generateTfaSecret();
|
|
||||||
user.tfaSecret = secret;
|
|
||||||
await this.userRepo.save(user);
|
|
||||||
return secret;
|
|
||||||
}
|
|
||||||
|
|
||||||
async setTfaType(user: User, type: tfaTypes) {
|
|
||||||
user.tfaType = type;
|
|
||||||
await this.userRepo.save(user);
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,129 +0,0 @@
|
|||||||
import {
|
|
||||||
BadRequestException,
|
|
||||||
Injectable,
|
|
||||||
NotImplementedException,
|
|
||||||
StreamableFile,
|
|
||||||
UnauthorizedException
|
|
||||||
} from '@nestjs/common';
|
|
||||||
import { InjectRepository } from '@nestjs/typeorm';
|
|
||||||
import { INode, User } from 'entities';
|
|
||||||
import { Repository } from 'typeorm';
|
|
||||||
import { Multipart } from '@fastify/multipart';
|
|
||||||
import { pipeline } from 'stream/promises';
|
|
||||||
import { createReadStream, createWriteStream, statSync, unlink } from 'fs';
|
|
||||||
import { Writable } from 'stream';
|
|
||||||
|
|
||||||
@Injectable()
|
|
||||||
export default class FileSystemService {
|
|
||||||
constructor(
|
|
||||||
@InjectRepository(INode)
|
|
||||||
private inodeRepo: Repository<INode>
|
|
||||||
) {}
|
|
||||||
|
|
||||||
async generateRoot(user: User): Promise<INode> {
|
|
||||||
const node = new INode();
|
|
||||||
node.isFile = false;
|
|
||||||
node.name = '';
|
|
||||||
node.owner = Promise.resolve(user);
|
|
||||||
return await this.inodeRepo.save(node);
|
|
||||||
}
|
|
||||||
|
|
||||||
async getNode(nodeId: number): Promise<INode> {
|
|
||||||
return await this.inodeRepo.findOneBy({
|
|
||||||
id: nodeId
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
async getNodeAndValidate(node_id: number, user: User): Promise<INode> {
|
|
||||||
const node = await this.getNode(node_id);
|
|
||||||
if (node == null) throw new BadRequestException();
|
|
||||||
if (node.ownerId != user.id) throw new UnauthorizedException();
|
|
||||||
return node;
|
|
||||||
}
|
|
||||||
|
|
||||||
async generatePath(node: INode): Promise<string> {
|
|
||||||
if (node.parentId == null) return '/';
|
|
||||||
return (
|
|
||||||
(await this.generatePath(await node.parent)).slice(0, -1) +
|
|
||||||
'/' +
|
|
||||||
node.name +
|
|
||||||
(node.isFile ? '' : '/')
|
|
||||||
);
|
|
||||||
}
|
|
||||||
|
|
||||||
async delete(node: INode, force = false): Promise<void> {
|
|
||||||
if (node.parentId == null || force)
|
|
||||||
throw new BadRequestException("Can't delete root");
|
|
||||||
if (!node.isFile)
|
|
||||||
await Promise.all(
|
|
||||||
(await node.children).map((child) => this.delete(child, force))
|
|
||||||
);
|
|
||||||
else
|
|
||||||
unlink(`files/${node.id}`, (err) => {
|
|
||||||
if (err) console.error(`Error while deleting ${node.id}`, err);
|
|
||||||
});
|
|
||||||
await this.inodeRepo.remove(node);
|
|
||||||
}
|
|
||||||
|
|
||||||
async create(
|
|
||||||
parent: INode,
|
|
||||||
full_name: string,
|
|
||||||
owner: User,
|
|
||||||
file: boolean
|
|
||||||
): Promise<INode> {
|
|
||||||
const name = full_name.trim();
|
|
||||||
if (name == '') throw new BadRequestException("Name can't be empty");
|
|
||||||
if (name == '.' || name == '..')
|
|
||||||
throw new BadRequestException('Invalid name');
|
|
||||||
if (parent.isFile)
|
|
||||||
throw new BadRequestException("Can't create file/folder in file");
|
|
||||||
if (
|
|
||||||
await this.inodeRepo.findOneBy({
|
|
||||||
parentId: parent.id,
|
|
||||||
name: name
|
|
||||||
})
|
|
||||||
)
|
|
||||||
throw new BadRequestException('File/Folder already exists');
|
|
||||||
const node = new INode();
|
|
||||||
node.isFile = file;
|
|
||||||
node.name = name;
|
|
||||||
node.owner = Promise.resolve(owner);
|
|
||||||
node.parent = Promise.resolve(parent);
|
|
||||||
return await this.inodeRepo.save(node);
|
|
||||||
}
|
|
||||||
|
|
||||||
async uploadFile(file: Multipart, nodeId: number, user: User) {
|
|
||||||
try {
|
|
||||||
const node = await this.getNodeAndValidate(nodeId, user);
|
|
||||||
|
|
||||||
await pipeline(file.file, createWriteStream(`files/${node.id}`));
|
|
||||||
|
|
||||||
const stats = statSync(`files/${node.id}`);
|
|
||||||
node.size = stats.size;
|
|
||||||
await this.inodeRepo.save(node);
|
|
||||||
} catch (e) {
|
|
||||||
await pipeline(
|
|
||||||
file.file,
|
|
||||||
new Writable({
|
|
||||||
write(
|
|
||||||
chunk: any,
|
|
||||||
encoding: BufferEncoding,
|
|
||||||
callback: (error?: Error | null) => void
|
|
||||||
) {
|
|
||||||
setImmediate(callback);
|
|
||||||
}
|
|
||||||
})
|
|
||||||
);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
async downloadFile(id: number, user: User): Promise<StreamableFile> {
|
|
||||||
const node = await this.getNodeAndValidate(id, user);
|
|
||||||
if (!node.isFile) throw new NotImplementedException();
|
|
||||||
const stats = statSync(`files/${node.id}`);
|
|
||||||
return new StreamableFile(createReadStream(`files/${node.id}`), {
|
|
||||||
disposition: `attachment; filename="${node.name}"`,
|
|
||||||
length: stats.size
|
|
||||||
});
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,19 +0,0 @@
|
|||||||
{
|
|
||||||
"compilerOptions": {
|
|
||||||
"module": "commonjs",
|
|
||||||
"declaration": false,
|
|
||||||
"removeComments": true,
|
|
||||||
"emitDecoratorMetadata": true,
|
|
||||||
"experimentalDecorators": true,
|
|
||||||
"allowSyntheticDefaultImports": true,
|
|
||||||
"target": "es2017",
|
|
||||||
"sourceMap": true,
|
|
||||||
"outDir": "./dist",
|
|
||||||
"baseUrl": "./src",
|
|
||||||
"incremental": true,
|
|
||||||
"skipLibCheck": true,
|
|
||||||
"resolveJsonModule": true,
|
|
||||||
"strictPropertyInitialization": false
|
|
||||||
},
|
|
||||||
"exclude": ["node_modules", "dist", "test", "**/*spec.ts", "frontend"]
|
|
||||||
}
|
|
Loading…
Reference in New Issue
Block a user