securequ 1.1.4 → 1.1.6

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1 +1 @@
1
- {"version":3,"file":"Base.js","sources":["../../src/client/Base.ts"],"sourcesContent":["import crypto from \"../include/crypto\";\nimport { HandshakeInfo, HttpRequestInit, SecurequClientConfig, SecurequClientResponse } from \"./types\";\nimport xanFetch from 'xanfetch'\n\n\nconst Clients = new Map<string, Base>()\n\nclass Base {\n protected config: SecurequClientConfig;\n protected loadingHandshake: boolean = false;\n protected secret_length: number = 0;\n protected handshakeInfo: HandshakeInfo | null = null;\n readonly CONTENT_TYPE = \"application/octet-stream\";\n\n constructor(config: SecurequClientConfig) {\n this.config = { ...config }\n const url = new URL(config.url)\n if (url.search || url.hash) throw new Error(`Invalid config url ${config.url}. Search params or Hash url is not supported in config.url`)\n config.url = `${url.origin}${url.pathname}`\n\n if (Clients.has(config.url)) {\n throw new Error(`Client is Blocked!`);\n }\n }\n\n protected hooksCall(hook: keyof NonNullable<SecurequClientConfig['hooks']>, ...args: any[]) {\n if (this.config.hooks && this.config.hooks[hook]) {\n return (this.config.hooks[hook] as Function)(...args)\n }\n }\n\n protected async getSecret() {\n let full = this.config.secret\n let secret = full.substring(0, this.secret_length)\n let hash = (await crypto.hash(secret)).substring(0, this.secret_length)\n return { full, secret, hash }\n }\n\n protected async url(path: string) {\n const secret = await this.getSecret()\n const base = this.config.url;\n if (path === '/') path = ''\n path = path.trim();\n path = path.startsWith('/') ? path.substring(1) : path\n path = path.endsWith('/') ? path.substring(0, path.length - 1) : path\n if (path) path = `/${path}`\n return new URL(`${base}/${secret.hash}${path}`);\n }\n\n protected async getHeaders(path: string, init?: HttpRequestInit) {\n const url = await this.url(path)\n const secret = await this.getSecret()\n let headers: any = {};\n if (this.handshakeInfo) {\n headers[\"X-SIGNETURE\"] = await crypto.encrypt({\n signeture: this.handshakeInfo?.signeture,\n expire: Date.now() + this.handshakeInfo!.timeDiffarenc + 10000 // 10 seconds\n }, secret.secret) || '';\n }\n\n headers = {\n ...this.config?.defaultOptions?.headers,\n ...init?.headers,\n ...headers,\n 'Content-Type': this.CONTENT_TYPE,\n \"X-ORIGIN\": url.origin,\n \"X-METHOD\": (init?.method || 'GET').toUpperCase()\n }\n\n return headers;\n }\n\n protected async awaitForHandshake() {\n if (this.loadingHandshake) {\n await new Promise((resolve) => {\n const interval = setInterval(() => {\n if (!this.loadingHandshake) {\n clearInterval(interval);\n resolve(null);\n }\n }, 100);\n })\n }\n if (!this.handshakeInfo) {\n await this.handshake();\n }\n }\n\n async handshake() {\n await this.hooksCall('beforeHandshake');\n this.handshakeInfo = null;\n this.loadingHandshake = true;\n\n let max = this.config.secret.length\n let min = Math.floor(max / 4) * 3\n this.secret_length = Math.floor(Math.random() * (max - min + 1)) + min\n\n const secret = await this.getSecret()\n const res = await this.fetch('/', {\n method: 'POST',\n body: {\n hash: secret.hash,\n clientTime: new Date().toISOString(),\n secret: secret.secret,\n }\n })\n this.handshakeInfo = res.data\n this.loadingHandshake = false;\n await this.hooksCall('afterHandshake', this.handshakeInfo);\n }\n\n protected async fetch(path: string, init?: HttpRequestInit): Promise<SecurequClientResponse> {\n const isDev = path !== '/' && this.handshakeInfo?.dev\n const secret = await this.getSecret()\n const url = await this.url(path)\n let sparams = Object.fromEntries(url.searchParams.entries())\n const _init = { ...init }\n let params: any = {\n ...sparams,\n }\n\n if (Object.keys(sparams).length > 0) {\n for (let key in sparams) {\n url.searchParams.delete(key)\n }\n }\n\n if (_init?.params) {\n for (let key in _init.params) {\n params[key] = _init.params[key]\n }\n delete _init.params\n }\n\n if (Object.keys(params).length > 0) {\n if (isDev) {\n _init.params = params\n } else {\n const enc = await crypto.encrypt(params, secret.secret)\n url.href = url.href + \"?\" + encodeURIComponent(enc)\n }\n }\n\n const httpOption: any = {\n method: \"GET\",\n ...this.config?.defaultOptions,\n ..._init,\n headers: await this.getHeaders(path, _init)\n }\n\n if (httpOption?.body) {\n if (isDev) {\n httpOption.body = JSON.stringify(httpOption.body)\n } else {\n httpOption.body = await crypto.encryptBuffer(httpOption.body, secret.secret);\n }\n }\n const res = await xanFetch(url.href, httpOption)\n if (isDev) {\n const value = await res.text()\n const val = JSON.parse(value)\n return {\n success: res.ok,\n message: res.ok ? res.statusText : val,\n data: res.ok ? val : null,\n code: res.status\n }\n }\n const value = await res.arrayBuffer()\n const val = await crypto.decryptBuffer(new Uint8Array(value), secret.secret) as any\n\n return {\n success: res.ok,\n message: res.ok ? res.statusText : (val || res.statusText),\n data: res.ok ? val : null,\n code: res.status\n }\n }\n\n}\n\nexport default Base;\n"],"names":["Object","defineProperty","exports","value","crypto","require","xanFetch","Clients","Map","default","constructor","config","this","loadingHandshake","secret_length","handshakeInfo","CONTENT_TYPE","assign","url","URL","search","hash","Error","origin","pathname","has","hooksCall","hook","args","hooks","getSecret","full","secret","substring","path","base","trim","startsWith","endsWith","length","getHeaders","init","headers","encrypt","signeture","_a","expire","Date","now","timeDiffarenc","_b","defaultOptions","_c","method","toUpperCase","awaitForHandshake","Promise","resolve","interval","setInterval","clearInterval","handshake","max","min","Math","floor","random","res","fetch","body","clientTime","toISOString","data","isDev","dev","sparams","fromEntries","searchParams","entries","_init","params","keys","key","delete","enc","href","encodeURIComponent","httpOption","JSON","stringify","encryptBuffer","text","val","parse","success","ok","message","statusText","code","status","arrayBuffer","decryptBuffer","Uint8Array"],"mappings":"AAKA,aAAAA,OAAAC,eAAAC,QAAA,aAAA,CAAAC,OAAA,IAAA,IAAAC,EAAAC,QAAA,wBAAAC,EAAAD,QAAA,YAAA,MAAME,EAAU,IAAIC,IA8KnBN,QAAAO,QA5KD,MAOG,WAAAC,CAAYC,GALFC,KAAAC,kBAA4B,EAC5BD,KAAAE,cAAwB,EACxBF,KAAAG,cAAsC,KACvCH,KAAAI,aAAe,2BAGrBJ,KAAKD,OAAMX,OAAAiB,OAAA,CAAA,EAAQN,GACnB,MAAMO,EAAM,IAAIC,IAAIR,EAAOO,KAC3B,GAAIA,EAAIE,QAAUF,EAAIG,KAAM,MAAM,IAAIC,MAAM,sBAAsBX,EAAOO,iEAGzE,GAFAP,EAAOO,IAAM,GAAGA,EAAIK,SAASL,EAAIM,WAE7BjB,EAAQkB,IAAId,EAAOO,KACpB,MAAM,IAAII,MAAM,qBAEtB,CAEU,SAAAI,CAAUC,KAA2DC,GAC5E,GAAIhB,KAAKD,OAAOkB,OAASjB,KAAKD,OAAOkB,MAAMF,GACxC,OAAQf,KAAKD,OAAOkB,MAAMF,MAAsBC,EAEtD,CAEU,eAAME,GACb,IAAIC,EAAOnB,KAAKD,OAAOqB,OACnBA,EAASD,EAAKE,UAAU,EAAGrB,KAAKE,eAEpC,MAAO,CAAEiB,OAAMC,SAAQX,YADLjB,EAAAA,QAAOiB,KAAKW,IAASC,UAAU,EAAGrB,KAAKE,eAE5D,CAEU,SAAMI,CAAIgB,GACjB,MAAMF,QAAepB,KAAKkB,YACpBK,EAAOvB,KAAKD,OAAOO,IAMzB,MALa,MAATgB,IAAcA,EAAO,KAGzBA,GADAA,GADAA,EAAOA,EAAKE,QACAC,WAAW,KAAOH,EAAKD,UAAU,GAAKC,GACtCI,SAAS,KAAOJ,EAAKD,UAAU,EAAGC,EAAKK,OAAS,GAAKL,KACvDA,EAAO,IAAIA,KACd,IAAIf,IAAI,GAAGgB,KAAQH,EAAOX,OAAOa,IAC3C,CAEU,gBAAMM,CAAWN,EAAcO,aACtC,MAAMvB,QAAYN,KAAKM,IAAIgB,GACrBF,QAAepB,KAAKkB,YAC1B,IAAIY,EAAe,CAAA,EAiBnB,OAhBI9B,KAAKG,gBACN2B,EAAQ,qBAAuBtC,EAAAA,QAAOuC,QAAQ,CAC3CC,kBAAWC,EAAAjC,KAAKG,oCAAe6B,UAC/BE,OAAQC,KAAKC,MAAQpC,KAAKG,cAAekC,cAAgB,KACzDjB,EAAOA,SAAW,IAGxBU,EAAO1C,OAAAiB,OAAAjB,OAAAiB,OAAAjB,OAAAiB,OAAAjB,OAAAiB,OAAA,CAAA,EAC0B,UAAhB,QAAXiC,EAAAtC,KAAKD,cAAM,IAAAuC,OAAA,EAAAA,EAAEC,sBAAc,IAAAC,OAAA,EAAAA,EAAEV,SAC7BD,aAAI,EAAJA,EAAMC,SACNA,GAAO,CACV,eAAgB9B,KAAKI,aACrB,WAAYE,EAAIK,OAChB,aAAakB,aAAI,EAAJA,EAAMY,SAAU,OAAOC,gBAGhCZ,CACV,CAEU,uBAAMa,GACT3C,KAAKC,wBACA,IAAI2C,QAASC,IAChB,MAAMC,EAAWC,YAAY,KACrB/C,KAAKC,mBACP+C,cAAcF,GACdD,EAAQ,QAEX,OAGJ7C,KAAKG,qBACDH,KAAKiD,WAEjB,CAEA,eAAMA,SACGjD,KAAKc,UAAU,mBACrBd,KAAKG,cAAgB,KACrBH,KAAKC,kBAAmB,EAExB,IAAIiD,EAAMlD,KAAKD,OAAOqB,OAAOO,OACzBwB,EAA4B,EAAtBC,KAAKC,MAAMH,EAAM,GAC3BlD,KAAKE,cAAgBkD,KAAKC,MAAMD,KAAKE,UAAYJ,EAAMC,EAAM,IAAMA,EAEnE,MAAM/B,QAAepB,KAAKkB,YACpBqC,QAAYvD,KAAKwD,MAAM,IAAK,CAC/Bf,OAAQ,OACRgB,KAAM,CACHhD,KAAMW,EAAOX,KACbiD,YAAY,IAAIvB,MAAOwB,cACvBvC,OAAQA,EAAOA,UAGrBpB,KAAKG,cAAgBoD,EAAIK,KACzB5D,KAAKC,kBAAmB,QAClBD,KAAKc,UAAU,iBAAkBd,KAAKG,cAC/C,CAEU,WAAMqD,CAAMlC,EAAcO,WACjC,MAAMgC,EAAiB,MAATvC,IAAkC,QAAlBW,EAAAjC,KAAKG,qBAAa,IAAA8B,OAAA,EAAAA,EAAE6B,KAC5C1C,QAAepB,KAAKkB,YACpBZ,QAAYN,KAAKM,IAAIgB,GAC3B,IAAIyC,EAAU3E,OAAO4E,YAAY1D,EAAI2D,aAAaC,WAClD,MAAMC,EAAK/E,OAAAiB,OAAA,CAAA,EAAQwB,GACnB,IAAIuC,EAAMhF,OAAAiB,OAAA,CAAA,EACJ0D,GAGN,GAAI3E,OAAOiF,KAAKN,GAASpC,OAAS,EAC/B,IAAK,IAAI2C,KAAOP,EACbzD,EAAI2D,aAAaM,OAAOD,GAI9B,GAAIH,eAAAA,EAAOC,OAAQ,CAChB,IAAK,IAAIE,KAAOH,EAAMC,OACnBA,EAAOE,GAAOH,EAAMC,OAAOE,UAEvBH,EAAMC,MACf,CAED,GAAIhF,OAAOiF,KAAKD,GAAQzC,OAAS,EAC9B,GAAIkC,EACDM,EAAMC,OAASA,MACX,CACJ,MAAMI,QAAYhF,EAAAA,QAAOuC,QAAQqC,EAAQhD,EAAOA,QAChDd,EAAImE,KAAOnE,EAAImE,KAAO,IAAMC,mBAAmBF,EACjD,CAGJ,MAAMG,EAAUvF,OAAAiB,OAAAjB,OAAAiB,OAAAjB,OAAAiB,OAAA,CACboC,OAAQ,OACM,QAAXH,EAAAtC,KAAKD,cAAM,IAAAuC,OAAA,EAAAA,EAAEC,gBACb4B,GAAK,CACRrC,cAAe9B,KAAK4B,WAAWN,EAAM6C,MAGpCQ,eAAAA,EAAYlB,QAEVkB,EAAWlB,KADVI,EACiBe,KAAKC,UAAUF,EAAWlB,YAEpBjE,UAAOsF,cAAcH,EAAWlB,KAAMrC,EAAOA,SAG3E,MAAMmC,QAAY7D,EAASY,EAAImE,KAAME,GACrC,GAAId,EAAO,CACR,MAAMtE,QAAcgE,EAAIwB,OAClBC,EAAMJ,KAAKK,MAAM1F,GACvB,MAAO,CACJ2F,QAAS3B,EAAI4B,GACbC,QAAS7B,EAAI4B,GAAK5B,EAAI8B,WAAaL,EACnCpB,KAAML,EAAI4B,GAAKH,EAAM,KACrBM,KAAM/B,EAAIgC,OAEf,CACD,MAAMhG,QAAcgE,EAAIiC,cAClBR,QAAYxF,EAAAA,QAAOiG,cAAc,IAAIC,WAAWnG,GAAQ6B,EAAOA,QAErE,MAAO,CACJ8D,QAAS3B,EAAI4B,GACbC,QAAS7B,EAAI4B,GAAK5B,EAAI8B,WAAcL,GAAOzB,EAAI8B,WAC/CzB,KAAML,EAAI4B,GAAKH,EAAM,KACrBM,KAAM/B,EAAIgC,OAEhB"}
1
+ {"version":3,"file":"Base.js","sources":["../../src/client/Base.ts"],"sourcesContent":["import crypto from \"../include/crypto\";\nimport { HandshakeInfo, HttpRequestInit, SecurequClientConfig, SecurequClientResponse } from \"./types\";\nimport xanFetch from 'xanfetch'\n\n\nconst Clients = new Map<string, Base>()\n\nclass Base {\n protected config: SecurequClientConfig;\n protected loadingHandshake: boolean = false;\n protected secret_length: number = 0;\n protected handshakeInfo: HandshakeInfo | null = null;\n readonly CONTENT_TYPE = \"application/octet-stream\";\n\n constructor(config: SecurequClientConfig) {\n this.config = {\n ...config,\n }\n const url = new URL(config.url)\n if (url.search || url.hash) throw new Error(`Invalid config url ${config.url}. Search params or Hash url is not supported in config.url`)\n config.url = `${url.origin}${url.pathname}`\n\n if (Clients.has(config.url)) {\n throw new Error(`Client is Blocked!`);\n }\n }\n\n protected hooksCall(hook: keyof NonNullable<SecurequClientConfig['hooks']>, ...args: any[]) {\n if (this.config.hooks && this.config.hooks[hook]) {\n return (this.config.hooks[hook] as Function)(...args)\n }\n }\n\n protected async getSecret() {\n let full = this.config.secret\n let secret = full.substring(0, this.secret_length)\n let hash = (await crypto.hash(secret)).substring(0, this.secret_length)\n return { full, secret, hash }\n }\n\n protected async url(path: string) {\n const secret = await this.getSecret()\n const base = this.config.url;\n if (path === '/') path = ''\n path = path.trim();\n path = path.startsWith('/') ? path.substring(1) : path\n path = path.endsWith('/') ? path.substring(0, path.length - 1) : path\n if (path) path = `/${path}`\n return new URL(`${base}/${secret.hash}${path}`);\n }\n\n protected async getHeaders(path: string, init?: HttpRequestInit) {\n const url = await this.url(path)\n const secret = await this.getSecret()\n let headers: any = {};\n if (this.handshakeInfo) {\n headers[\"X-SIGNETURE\"] = await crypto.encrypt({\n signeture: this.handshakeInfo?.signeture,\n expire: Date.now() + this.handshakeInfo!.timeDiffarenc + 10000 // 10 seconds\n }, secret.secret) || '';\n }\n\n headers = {\n ...this.config?.defaultOptions?.headers,\n ...init?.headers,\n ...headers,\n 'Content-Type': this.CONTENT_TYPE,\n \"X-ORIGIN\": url.origin,\n \"X-METHOD\": (init?.method || 'GET').toUpperCase()\n }\n\n return headers;\n }\n\n protected async awaitForHandshake() {\n if (this.loadingHandshake) {\n await new Promise((resolve) => {\n const interval = setInterval(() => {\n if (!this.loadingHandshake) {\n clearInterval(interval);\n resolve(null);\n }\n }, 100);\n })\n }\n if (!this.handshakeInfo) {\n await this.handshake();\n }\n }\n\n async handshake() {\n await this.hooksCall('beforeHandshake');\n this.handshakeInfo = null;\n this.loadingHandshake = true;\n\n let max = this.config.secret.length\n let min = Math.floor(max / 4) * 3\n this.secret_length = Math.floor(Math.random() * (max - min + 1)) + min\n\n const secret = await this.getSecret()\n const res = await this.fetch('/', {\n method: 'POST',\n body: {\n hash: secret.hash,\n clientTime: new Date().toISOString(),\n secret: secret.secret,\n }\n })\n this.handshakeInfo = res.data\n this.loadingHandshake = false;\n await this.hooksCall('afterHandshake', this.handshakeInfo);\n }\n\n protected async fetch(path: string, init?: HttpRequestInit): Promise<SecurequClientResponse> {\n const isDev = path !== '/' && this.handshakeInfo?.dev\n const secret = await this.getSecret()\n const url = await this.url(path)\n let sparams = Object.fromEntries(url.searchParams.entries())\n const _init = { ...init }\n let params: any = {\n ...sparams,\n }\n\n if (Object.keys(sparams).length > 0) {\n for (let key in sparams) {\n url.searchParams.delete(key)\n }\n }\n\n if (_init?.params) {\n for (let key in _init.params) {\n params[key] = _init.params[key]\n }\n delete _init.params\n }\n\n if (Object.keys(params).length > 0) {\n if (isDev) {\n _init.params = params\n } else {\n const enc = await crypto.encrypt(params, secret.secret)\n url.href = url.href + \"?\" + encodeURIComponent(enc)\n }\n }\n\n const httpOption: any = {\n method: \"GET\",\n ...this.config?.defaultOptions,\n ..._init,\n headers: await this.getHeaders(path, _init)\n }\n\n if (httpOption?.body) {\n if (isDev) {\n httpOption.body = JSON.stringify(httpOption.body)\n } else {\n httpOption.body = await crypto.encryptBuffer(httpOption.body, secret.secret);\n }\n }\n const res = await xanFetch(url.href, httpOption)\n if (isDev) {\n const value = await res.text()\n const val = JSON.parse(value)\n return {\n success: res.ok,\n message: res.ok ? res.statusText : val,\n data: res.ok ? val : null,\n code: res.status\n }\n }\n const value = await res.arrayBuffer()\n const val = await crypto.decryptBuffer(new Uint8Array(value), secret.secret) as any\n\n return {\n success: res.ok,\n message: res.ok ? res.statusText : (val || res.statusText),\n data: res.ok ? val : null,\n code: res.status\n }\n }\n\n}\n\nexport default Base;\n"],"names":["Object","defineProperty","exports","value","crypto","require","xanFetch","Clients","Map","default","constructor","config","this","loadingHandshake","secret_length","handshakeInfo","CONTENT_TYPE","assign","url","URL","search","hash","Error","origin","pathname","has","hooksCall","hook","args","hooks","getSecret","full","secret","substring","path","base","trim","startsWith","endsWith","length","getHeaders","init","headers","encrypt","signeture","_a","expire","Date","now","timeDiffarenc","_b","defaultOptions","_c","method","toUpperCase","awaitForHandshake","Promise","resolve","interval","setInterval","clearInterval","handshake","max","min","Math","floor","random","res","fetch","body","clientTime","toISOString","data","isDev","dev","sparams","fromEntries","searchParams","entries","_init","params","keys","key","delete","enc","href","encodeURIComponent","httpOption","JSON","stringify","encryptBuffer","text","val","parse","success","ok","message","statusText","code","status","arrayBuffer","decryptBuffer","Uint8Array"],"mappings":"AAKA,aAAAA,OAAAC,eAAAC,QAAA,aAAA,CAAAC,OAAA,IAAA,IAAAC,EAAAC,QAAA,wBAAAC,EAAAD,QAAA,YAAA,MAAME,EAAU,IAAIC,IAgLnBN,QAAAO,QA9KD,MAOG,WAAAC,CAAYC,GALFC,KAAAC,kBAA4B,EAC5BD,KAAAE,cAAwB,EACxBF,KAAAG,cAAsC,KACvCH,KAAAI,aAAe,2BAGrBJ,KAAKD,OAAMX,OAAAiB,OAAA,CAAA,EACLN,GAEN,MAAMO,EAAM,IAAIC,IAAIR,EAAOO,KAC3B,GAAIA,EAAIE,QAAUF,EAAIG,KAAM,MAAM,IAAIC,MAAM,sBAAsBX,EAAOO,iEAGzE,GAFAP,EAAOO,IAAM,GAAGA,EAAIK,SAASL,EAAIM,WAE7BjB,EAAQkB,IAAId,EAAOO,KACpB,MAAM,IAAII,MAAM,qBAEtB,CAEU,SAAAI,CAAUC,KAA2DC,GAC5E,GAAIhB,KAAKD,OAAOkB,OAASjB,KAAKD,OAAOkB,MAAMF,GACxC,OAAQf,KAAKD,OAAOkB,MAAMF,MAAsBC,EAEtD,CAEU,eAAME,GACb,IAAIC,EAAOnB,KAAKD,OAAOqB,OACnBA,EAASD,EAAKE,UAAU,EAAGrB,KAAKE,eAEpC,MAAO,CAAEiB,OAAMC,SAAQX,YADLjB,EAAAA,QAAOiB,KAAKW,IAASC,UAAU,EAAGrB,KAAKE,eAE5D,CAEU,SAAMI,CAAIgB,GACjB,MAAMF,QAAepB,KAAKkB,YACpBK,EAAOvB,KAAKD,OAAOO,IAMzB,MALa,MAATgB,IAAcA,EAAO,KAGzBA,GADAA,GADAA,EAAOA,EAAKE,QACAC,WAAW,KAAOH,EAAKD,UAAU,GAAKC,GACtCI,SAAS,KAAOJ,EAAKD,UAAU,EAAGC,EAAKK,OAAS,GAAKL,KACvDA,EAAO,IAAIA,KACd,IAAIf,IAAI,GAAGgB,KAAQH,EAAOX,OAAOa,IAC3C,CAEU,gBAAMM,CAAWN,EAAcO,aACtC,MAAMvB,QAAYN,KAAKM,IAAIgB,GACrBF,QAAepB,KAAKkB,YAC1B,IAAIY,EAAe,CAAA,EAiBnB,OAhBI9B,KAAKG,gBACN2B,EAAQ,qBAAuBtC,EAAAA,QAAOuC,QAAQ,CAC3CC,kBAAWC,EAAAjC,KAAKG,oCAAe6B,UAC/BE,OAAQC,KAAKC,MAAQpC,KAAKG,cAAekC,cAAgB,KACzDjB,EAAOA,SAAW,IAGxBU,EAAO1C,OAAAiB,OAAAjB,OAAAiB,OAAAjB,OAAAiB,OAAAjB,OAAAiB,OAAA,CAAA,EAC0B,UAAhB,QAAXiC,EAAAtC,KAAKD,cAAM,IAAAuC,OAAA,EAAAA,EAAEC,sBAAc,IAAAC,OAAA,EAAAA,EAAEV,SAC7BD,aAAI,EAAJA,EAAMC,SACNA,GAAO,CACV,eAAgB9B,KAAKI,aACrB,WAAYE,EAAIK,OAChB,aAAakB,aAAI,EAAJA,EAAMY,SAAU,OAAOC,gBAGhCZ,CACV,CAEU,uBAAMa,GACT3C,KAAKC,wBACA,IAAI2C,QAASC,IAChB,MAAMC,EAAWC,YAAY,KACrB/C,KAAKC,mBACP+C,cAAcF,GACdD,EAAQ,QAEX,OAGJ7C,KAAKG,qBACDH,KAAKiD,WAEjB,CAEA,eAAMA,SACGjD,KAAKc,UAAU,mBACrBd,KAAKG,cAAgB,KACrBH,KAAKC,kBAAmB,EAExB,IAAIiD,EAAMlD,KAAKD,OAAOqB,OAAOO,OACzBwB,EAA4B,EAAtBC,KAAKC,MAAMH,EAAM,GAC3BlD,KAAKE,cAAgBkD,KAAKC,MAAMD,KAAKE,UAAYJ,EAAMC,EAAM,IAAMA,EAEnE,MAAM/B,QAAepB,KAAKkB,YACpBqC,QAAYvD,KAAKwD,MAAM,IAAK,CAC/Bf,OAAQ,OACRgB,KAAM,CACHhD,KAAMW,EAAOX,KACbiD,YAAY,IAAIvB,MAAOwB,cACvBvC,OAAQA,EAAOA,UAGrBpB,KAAKG,cAAgBoD,EAAIK,KACzB5D,KAAKC,kBAAmB,QAClBD,KAAKc,UAAU,iBAAkBd,KAAKG,cAC/C,CAEU,WAAMqD,CAAMlC,EAAcO,WACjC,MAAMgC,EAAiB,MAATvC,IAAkC,QAAlBW,EAAAjC,KAAKG,qBAAa,IAAA8B,OAAA,EAAAA,EAAE6B,KAC5C1C,QAAepB,KAAKkB,YACpBZ,QAAYN,KAAKM,IAAIgB,GAC3B,IAAIyC,EAAU3E,OAAO4E,YAAY1D,EAAI2D,aAAaC,WAClD,MAAMC,EAAK/E,OAAAiB,OAAA,CAAA,EAAQwB,GACnB,IAAIuC,EAAMhF,OAAAiB,OAAA,CAAA,EACJ0D,GAGN,GAAI3E,OAAOiF,KAAKN,GAASpC,OAAS,EAC/B,IAAK,IAAI2C,KAAOP,EACbzD,EAAI2D,aAAaM,OAAOD,GAI9B,GAAIH,eAAAA,EAAOC,OAAQ,CAChB,IAAK,IAAIE,KAAOH,EAAMC,OACnBA,EAAOE,GAAOH,EAAMC,OAAOE,UAEvBH,EAAMC,MACf,CAED,GAAIhF,OAAOiF,KAAKD,GAAQzC,OAAS,EAC9B,GAAIkC,EACDM,EAAMC,OAASA,MACX,CACJ,MAAMI,QAAYhF,EAAAA,QAAOuC,QAAQqC,EAAQhD,EAAOA,QAChDd,EAAImE,KAAOnE,EAAImE,KAAO,IAAMC,mBAAmBF,EACjD,CAGJ,MAAMG,EAAUvF,OAAAiB,OAAAjB,OAAAiB,OAAAjB,OAAAiB,OAAA,CACboC,OAAQ,OACM,QAAXH,EAAAtC,KAAKD,cAAM,IAAAuC,OAAA,EAAAA,EAAEC,gBACb4B,GAAK,CACRrC,cAAe9B,KAAK4B,WAAWN,EAAM6C,MAGpCQ,eAAAA,EAAYlB,QAEVkB,EAAWlB,KADVI,EACiBe,KAAKC,UAAUF,EAAWlB,YAEpBjE,UAAOsF,cAAcH,EAAWlB,KAAMrC,EAAOA,SAG3E,MAAMmC,QAAY7D,EAASY,EAAImE,KAAME,GACrC,GAAId,EAAO,CACR,MAAMtE,QAAcgE,EAAIwB,OAClBC,EAAMJ,KAAKK,MAAM1F,GACvB,MAAO,CACJ2F,QAAS3B,EAAI4B,GACbC,QAAS7B,EAAI4B,GAAK5B,EAAI8B,WAAaL,EACnCpB,KAAML,EAAI4B,GAAKH,EAAM,KACrBM,KAAM/B,EAAIgC,OAEf,CACD,MAAMhG,QAAcgE,EAAIiC,cAClBR,QAAYxF,EAAAA,QAAOiG,cAAc,IAAIC,WAAWnG,GAAQ6B,EAAOA,QAErE,MAAO,CACJ8D,QAAS3B,EAAI4B,GACbC,QAAS7B,EAAI4B,GAAK5B,EAAI8B,WAAcL,GAAOzB,EAAI8B,WAC/CzB,KAAML,EAAI4B,GAAKH,EAAM,KACrBM,KAAM/B,EAAIgC,OAEhB"}
@@ -1 +1 @@
1
- {"version":3,"file":"Base.mjs","sources":["../../src/client/Base.ts"],"sourcesContent":["import crypto from \"../include/crypto\";\nimport { HandshakeInfo, HttpRequestInit, SecurequClientConfig, SecurequClientResponse } from \"./types\";\nimport xanFetch from 'xanfetch'\n\n\nconst Clients = new Map<string, Base>()\n\nclass Base {\n protected config: SecurequClientConfig;\n protected loadingHandshake: boolean = false;\n protected secret_length: number = 0;\n protected handshakeInfo: HandshakeInfo | null = null;\n readonly CONTENT_TYPE = \"application/octet-stream\";\n\n constructor(config: SecurequClientConfig) {\n this.config = { ...config }\n const url = new URL(config.url)\n if (url.search || url.hash) throw new Error(`Invalid config url ${config.url}. Search params or Hash url is not supported in config.url`)\n config.url = `${url.origin}${url.pathname}`\n\n if (Clients.has(config.url)) {\n throw new Error(`Client is Blocked!`);\n }\n }\n\n protected hooksCall(hook: keyof NonNullable<SecurequClientConfig['hooks']>, ...args: any[]) {\n if (this.config.hooks && this.config.hooks[hook]) {\n return (this.config.hooks[hook] as Function)(...args)\n }\n }\n\n protected async getSecret() {\n let full = this.config.secret\n let secret = full.substring(0, this.secret_length)\n let hash = (await crypto.hash(secret)).substring(0, this.secret_length)\n return { full, secret, hash }\n }\n\n protected async url(path: string) {\n const secret = await this.getSecret()\n const base = this.config.url;\n if (path === '/') path = ''\n path = path.trim();\n path = path.startsWith('/') ? path.substring(1) : path\n path = path.endsWith('/') ? path.substring(0, path.length - 1) : path\n if (path) path = `/${path}`\n return new URL(`${base}/${secret.hash}${path}`);\n }\n\n protected async getHeaders(path: string, init?: HttpRequestInit) {\n const url = await this.url(path)\n const secret = await this.getSecret()\n let headers: any = {};\n if (this.handshakeInfo) {\n headers[\"X-SIGNETURE\"] = await crypto.encrypt({\n signeture: this.handshakeInfo?.signeture,\n expire: Date.now() + this.handshakeInfo!.timeDiffarenc + 10000 // 10 seconds\n }, secret.secret) || '';\n }\n\n headers = {\n ...this.config?.defaultOptions?.headers,\n ...init?.headers,\n ...headers,\n 'Content-Type': this.CONTENT_TYPE,\n \"X-ORIGIN\": url.origin,\n \"X-METHOD\": (init?.method || 'GET').toUpperCase()\n }\n\n return headers;\n }\n\n protected async awaitForHandshake() {\n if (this.loadingHandshake) {\n await new Promise((resolve) => {\n const interval = setInterval(() => {\n if (!this.loadingHandshake) {\n clearInterval(interval);\n resolve(null);\n }\n }, 100);\n })\n }\n if (!this.handshakeInfo) {\n await this.handshake();\n }\n }\n\n async handshake() {\n await this.hooksCall('beforeHandshake');\n this.handshakeInfo = null;\n this.loadingHandshake = true;\n\n let max = this.config.secret.length\n let min = Math.floor(max / 4) * 3\n this.secret_length = Math.floor(Math.random() * (max - min + 1)) + min\n\n const secret = await this.getSecret()\n const res = await this.fetch('/', {\n method: 'POST',\n body: {\n hash: secret.hash,\n clientTime: new Date().toISOString(),\n secret: secret.secret,\n }\n })\n this.handshakeInfo = res.data\n this.loadingHandshake = false;\n await this.hooksCall('afterHandshake', this.handshakeInfo);\n }\n\n protected async fetch(path: string, init?: HttpRequestInit): Promise<SecurequClientResponse> {\n const isDev = path !== '/' && this.handshakeInfo?.dev\n const secret = await this.getSecret()\n const url = await this.url(path)\n let sparams = Object.fromEntries(url.searchParams.entries())\n const _init = { ...init }\n let params: any = {\n ...sparams,\n }\n\n if (Object.keys(sparams).length > 0) {\n for (let key in sparams) {\n url.searchParams.delete(key)\n }\n }\n\n if (_init?.params) {\n for (let key in _init.params) {\n params[key] = _init.params[key]\n }\n delete _init.params\n }\n\n if (Object.keys(params).length > 0) {\n if (isDev) {\n _init.params = params\n } else {\n const enc = await crypto.encrypt(params, secret.secret)\n url.href = url.href + \"?\" + encodeURIComponent(enc)\n }\n }\n\n const httpOption: any = {\n method: \"GET\",\n ...this.config?.defaultOptions,\n ..._init,\n headers: await this.getHeaders(path, _init)\n }\n\n if (httpOption?.body) {\n if (isDev) {\n httpOption.body = JSON.stringify(httpOption.body)\n } else {\n httpOption.body = await crypto.encryptBuffer(httpOption.body, secret.secret);\n }\n }\n const res = await xanFetch(url.href, httpOption)\n if (isDev) {\n const value = await res.text()\n const val = JSON.parse(value)\n return {\n success: res.ok,\n message: res.ok ? res.statusText : val,\n data: res.ok ? val : null,\n code: res.status\n }\n }\n const value = await res.arrayBuffer()\n const val = await crypto.decryptBuffer(new Uint8Array(value), secret.secret) as any\n\n return {\n success: res.ok,\n message: res.ok ? res.statusText : (val || res.statusText),\n data: res.ok ? val : null,\n code: res.status\n }\n }\n\n}\n\nexport default Base;\n"],"names":["crypto","xanFetch","Clients","Map","Base","constructor","config","this","loadingHandshake","secret_length","handshakeInfo","CONTENT_TYPE","Object","assign","url","URL","search","hash","Error","origin","pathname","has","hooksCall","hook","args","hooks","getSecret","full","secret","substring","path","base","trim","startsWith","endsWith","length","getHeaders","init","headers","encrypt","signeture","_a","expire","Date","now","timeDiffarenc","_b","defaultOptions","_c","method","toUpperCase","awaitForHandshake","Promise","resolve","interval","setInterval","clearInterval","handshake","max","min","Math","floor","random","res","fetch","body","clientTime","toISOString","data","isDev","dev","sparams","fromEntries","searchParams","entries","_init","params","keys","key","delete","enc","href","encodeURIComponent","httpOption","JSON","stringify","encryptBuffer","value","text","val","parse","success","ok","message","statusText","code","status","arrayBuffer","decryptBuffer","Uint8Array"],"mappings":"OAKAA,MAAA,+BAAAC,MAAA,WAAA,MAAMC,EAAU,IAAIC,IAEpB,MAAMC,EAOH,WAAAC,CAAYC,GALFC,KAAAC,kBAA4B,EAC5BD,KAAAE,cAAwB,EACxBF,KAAAG,cAAsC,KACvCH,KAAAI,aAAe,2BAGrBJ,KAAKD,OAAMM,OAAAC,OAAA,CAAA,EAAQP,GACnB,MAAMQ,EAAM,IAAIC,IAAIT,EAAOQ,KAC3B,GAAIA,EAAIE,QAAUF,EAAIG,KAAM,MAAM,IAAIC,MAAM,sBAAsBZ,EAAOQ,iEAGzE,GAFAR,EAAOQ,IAAM,GAAGA,EAAIK,SAASL,EAAIM,WAE7BlB,EAAQmB,IAAIf,EAAOQ,KACpB,MAAM,IAAII,MAAM,qBAEtB,CAEU,SAAAI,CAAUC,KAA2DC,GAC5E,GAAIjB,KAAKD,OAAOmB,OAASlB,KAAKD,OAAOmB,MAAMF,GACxC,OAAQhB,KAAKD,OAAOmB,MAAMF,MAAsBC,EAEtD,CAEU,eAAME,GACb,IAAIC,EAAOpB,KAAKD,OAAOsB,OACnBA,EAASD,EAAKE,UAAU,EAAGtB,KAAKE,eAEpC,MAAO,CAAEkB,OAAMC,SAAQX,YADLjB,EAAOiB,KAAKW,IAASC,UAAU,EAAGtB,KAAKE,eAE5D,CAEU,SAAMK,CAAIgB,GACjB,MAAMF,QAAerB,KAAKmB,YACpBK,EAAOxB,KAAKD,OAAOQ,IAMzB,MALa,MAATgB,IAAcA,EAAO,KAGzBA,GADAA,GADAA,EAAOA,EAAKE,QACAC,WAAW,KAAOH,EAAKD,UAAU,GAAKC,GACtCI,SAAS,KAAOJ,EAAKD,UAAU,EAAGC,EAAKK,OAAS,GAAKL,KACvDA,EAAO,IAAIA,KACd,IAAIf,IAAI,GAAGgB,KAAQH,EAAOX,OAAOa,IAC3C,CAEU,gBAAMM,CAAWN,EAAcO,aACtC,MAAMvB,QAAYP,KAAKO,IAAIgB,GACrBF,QAAerB,KAAKmB,YAC1B,IAAIY,EAAe,CAAA,EAiBnB,OAhBI/B,KAAKG,gBACN4B,EAAQ,qBAAuBtC,EAAOuC,QAAQ,CAC3CC,kBAAWC,EAAAlC,KAAKG,oCAAe8B,UAC/BE,OAAQC,KAAKC,MAAQrC,KAAKG,cAAemC,cAAgB,KACzDjB,EAAOA,SAAW,IAGxBU,EAAO1B,OAAAC,OAAAD,OAAAC,OAAAD,OAAAC,OAAAD,OAAAC,OAAA,CAAA,EAC0B,UAAhB,QAAXiC,EAAAvC,KAAKD,cAAM,IAAAwC,OAAA,EAAAA,EAAEC,sBAAc,IAAAC,OAAA,EAAAA,EAAEV,SAC7BD,aAAI,EAAJA,EAAMC,SACNA,GAAO,CACV,eAAgB/B,KAAKI,aACrB,WAAYG,EAAIK,OAChB,aAAakB,aAAI,EAAJA,EAAMY,SAAU,OAAOC,gBAGhCZ,CACV,CAEU,uBAAMa,GACT5C,KAAKC,wBACA,IAAI4C,QAASC,IAChB,MAAMC,EAAWC,YAAY,KACrBhD,KAAKC,mBACPgD,cAAcF,GACdD,EAAQ,QAEX,OAGJ9C,KAAKG,qBACDH,KAAKkD,WAEjB,CAEA,eAAMA,SACGlD,KAAKe,UAAU,mBACrBf,KAAKG,cAAgB,KACrBH,KAAKC,kBAAmB,EAExB,IAAIkD,EAAMnD,KAAKD,OAAOsB,OAAOO,OACzBwB,EAA4B,EAAtBC,KAAKC,MAAMH,EAAM,GAC3BnD,KAAKE,cAAgBmD,KAAKC,MAAMD,KAAKE,UAAYJ,EAAMC,EAAM,IAAMA,EAEnE,MAAM/B,QAAerB,KAAKmB,YACpBqC,QAAYxD,KAAKyD,MAAM,IAAK,CAC/Bf,OAAQ,OACRgB,KAAM,CACHhD,KAAMW,EAAOX,KACbiD,YAAY,IAAIvB,MAAOwB,cACvBvC,OAAQA,EAAOA,UAGrBrB,KAAKG,cAAgBqD,EAAIK,KACzB7D,KAAKC,kBAAmB,QAClBD,KAAKe,UAAU,iBAAkBf,KAAKG,cAC/C,CAEU,WAAMsD,CAAMlC,EAAcO,WACjC,MAAMgC,EAAiB,MAATvC,IAAkC,QAAlBW,EAAAlC,KAAKG,qBAAa,IAAA+B,OAAA,EAAAA,EAAE6B,KAC5C1C,QAAerB,KAAKmB,YACpBZ,QAAYP,KAAKO,IAAIgB,GAC3B,IAAIyC,EAAU3D,OAAO4D,YAAY1D,EAAI2D,aAAaC,WAClD,MAAMC,EAAK/D,OAAAC,OAAA,CAAA,EAAQwB,GACnB,IAAIuC,EAAMhE,OAAAC,OAAA,CAAA,EACJ0D,GAGN,GAAI3D,OAAOiE,KAAKN,GAASpC,OAAS,EAC/B,IAAK,IAAI2C,KAAOP,EACbzD,EAAI2D,aAAaM,OAAOD,GAI9B,GAAIH,eAAAA,EAAOC,OAAQ,CAChB,IAAK,IAAIE,KAAOH,EAAMC,OACnBA,EAAOE,GAAOH,EAAMC,OAAOE,UAEvBH,EAAMC,MACf,CAED,GAAIhE,OAAOiE,KAAKD,GAAQzC,OAAS,EAC9B,GAAIkC,EACDM,EAAMC,OAASA,MACX,CACJ,MAAMI,QAAYhF,EAAOuC,QAAQqC,EAAQhD,EAAOA,QAChDd,EAAImE,KAAOnE,EAAImE,KAAO,IAAMC,mBAAmBF,EACjD,CAGJ,MAAMG,EAAUvE,OAAAC,OAAAD,OAAAC,OAAAD,OAAAC,OAAA,CACboC,OAAQ,OACM,QAAXH,EAAAvC,KAAKD,cAAM,IAAAwC,OAAA,EAAAA,EAAEC,gBACb4B,GAAK,CACRrC,cAAe/B,KAAK6B,WAAWN,EAAM6C,MAGpCQ,eAAAA,EAAYlB,QAEVkB,EAAWlB,KADVI,EACiBe,KAAKC,UAAUF,EAAWlB,YAEpBjE,EAAOsF,cAAcH,EAAWlB,KAAMrC,EAAOA,SAG3E,MAAMmC,QAAY9D,EAASa,EAAImE,KAAME,GACrC,GAAId,EAAO,CACR,MAAMkB,QAAcxB,EAAIyB,OAClBC,EAAML,KAAKM,MAAMH,GACvB,MAAO,CACJI,QAAS5B,EAAI6B,GACbC,QAAS9B,EAAI6B,GAAK7B,EAAI+B,WAAaL,EACnCrB,KAAML,EAAI6B,GAAKH,EAAM,KACrBM,KAAMhC,EAAIiC,OAEf,CACD,MAAMT,QAAcxB,EAAIkC,cAClBR,QAAYzF,EAAOkG,cAAc,IAAIC,WAAWZ,GAAQ3D,EAAOA,QAErE,MAAO,CACJ+D,QAAS5B,EAAI6B,GACbC,QAAS9B,EAAI6B,GAAK7B,EAAI+B,WAAcL,GAAO1B,EAAI+B,WAC/C1B,KAAML,EAAI6B,GAAKH,EAAM,KACrBM,KAAMhC,EAAIiC,OAEhB,SAEF5F"}
1
+ {"version":3,"file":"Base.mjs","sources":["../../src/client/Base.ts"],"sourcesContent":["import crypto from \"../include/crypto\";\nimport { HandshakeInfo, HttpRequestInit, SecurequClientConfig, SecurequClientResponse } from \"./types\";\nimport xanFetch from 'xanfetch'\n\n\nconst Clients = new Map<string, Base>()\n\nclass Base {\n protected config: SecurequClientConfig;\n protected loadingHandshake: boolean = false;\n protected secret_length: number = 0;\n protected handshakeInfo: HandshakeInfo | null = null;\n readonly CONTENT_TYPE = \"application/octet-stream\";\n\n constructor(config: SecurequClientConfig) {\n this.config = {\n ...config,\n }\n const url = new URL(config.url)\n if (url.search || url.hash) throw new Error(`Invalid config url ${config.url}. Search params or Hash url is not supported in config.url`)\n config.url = `${url.origin}${url.pathname}`\n\n if (Clients.has(config.url)) {\n throw new Error(`Client is Blocked!`);\n }\n }\n\n protected hooksCall(hook: keyof NonNullable<SecurequClientConfig['hooks']>, ...args: any[]) {\n if (this.config.hooks && this.config.hooks[hook]) {\n return (this.config.hooks[hook] as Function)(...args)\n }\n }\n\n protected async getSecret() {\n let full = this.config.secret\n let secret = full.substring(0, this.secret_length)\n let hash = (await crypto.hash(secret)).substring(0, this.secret_length)\n return { full, secret, hash }\n }\n\n protected async url(path: string) {\n const secret = await this.getSecret()\n const base = this.config.url;\n if (path === '/') path = ''\n path = path.trim();\n path = path.startsWith('/') ? path.substring(1) : path\n path = path.endsWith('/') ? path.substring(0, path.length - 1) : path\n if (path) path = `/${path}`\n return new URL(`${base}/${secret.hash}${path}`);\n }\n\n protected async getHeaders(path: string, init?: HttpRequestInit) {\n const url = await this.url(path)\n const secret = await this.getSecret()\n let headers: any = {};\n if (this.handshakeInfo) {\n headers[\"X-SIGNETURE\"] = await crypto.encrypt({\n signeture: this.handshakeInfo?.signeture,\n expire: Date.now() + this.handshakeInfo!.timeDiffarenc + 10000 // 10 seconds\n }, secret.secret) || '';\n }\n\n headers = {\n ...this.config?.defaultOptions?.headers,\n ...init?.headers,\n ...headers,\n 'Content-Type': this.CONTENT_TYPE,\n \"X-ORIGIN\": url.origin,\n \"X-METHOD\": (init?.method || 'GET').toUpperCase()\n }\n\n return headers;\n }\n\n protected async awaitForHandshake() {\n if (this.loadingHandshake) {\n await new Promise((resolve) => {\n const interval = setInterval(() => {\n if (!this.loadingHandshake) {\n clearInterval(interval);\n resolve(null);\n }\n }, 100);\n })\n }\n if (!this.handshakeInfo) {\n await this.handshake();\n }\n }\n\n async handshake() {\n await this.hooksCall('beforeHandshake');\n this.handshakeInfo = null;\n this.loadingHandshake = true;\n\n let max = this.config.secret.length\n let min = Math.floor(max / 4) * 3\n this.secret_length = Math.floor(Math.random() * (max - min + 1)) + min\n\n const secret = await this.getSecret()\n const res = await this.fetch('/', {\n method: 'POST',\n body: {\n hash: secret.hash,\n clientTime: new Date().toISOString(),\n secret: secret.secret,\n }\n })\n this.handshakeInfo = res.data\n this.loadingHandshake = false;\n await this.hooksCall('afterHandshake', this.handshakeInfo);\n }\n\n protected async fetch(path: string, init?: HttpRequestInit): Promise<SecurequClientResponse> {\n const isDev = path !== '/' && this.handshakeInfo?.dev\n const secret = await this.getSecret()\n const url = await this.url(path)\n let sparams = Object.fromEntries(url.searchParams.entries())\n const _init = { ...init }\n let params: any = {\n ...sparams,\n }\n\n if (Object.keys(sparams).length > 0) {\n for (let key in sparams) {\n url.searchParams.delete(key)\n }\n }\n\n if (_init?.params) {\n for (let key in _init.params) {\n params[key] = _init.params[key]\n }\n delete _init.params\n }\n\n if (Object.keys(params).length > 0) {\n if (isDev) {\n _init.params = params\n } else {\n const enc = await crypto.encrypt(params, secret.secret)\n url.href = url.href + \"?\" + encodeURIComponent(enc)\n }\n }\n\n const httpOption: any = {\n method: \"GET\",\n ...this.config?.defaultOptions,\n ..._init,\n headers: await this.getHeaders(path, _init)\n }\n\n if (httpOption?.body) {\n if (isDev) {\n httpOption.body = JSON.stringify(httpOption.body)\n } else {\n httpOption.body = await crypto.encryptBuffer(httpOption.body, secret.secret);\n }\n }\n const res = await xanFetch(url.href, httpOption)\n if (isDev) {\n const value = await res.text()\n const val = JSON.parse(value)\n return {\n success: res.ok,\n message: res.ok ? res.statusText : val,\n data: res.ok ? val : null,\n code: res.status\n }\n }\n const value = await res.arrayBuffer()\n const val = await crypto.decryptBuffer(new Uint8Array(value), secret.secret) as any\n\n return {\n success: res.ok,\n message: res.ok ? res.statusText : (val || res.statusText),\n data: res.ok ? val : null,\n code: res.status\n }\n }\n\n}\n\nexport default Base;\n"],"names":["crypto","xanFetch","Clients","Map","Base","constructor","config","this","loadingHandshake","secret_length","handshakeInfo","CONTENT_TYPE","Object","assign","url","URL","search","hash","Error","origin","pathname","has","hooksCall","hook","args","hooks","getSecret","full","secret","substring","path","base","trim","startsWith","endsWith","length","getHeaders","init","headers","encrypt","signeture","_a","expire","Date","now","timeDiffarenc","_b","defaultOptions","_c","method","toUpperCase","awaitForHandshake","Promise","resolve","interval","setInterval","clearInterval","handshake","max","min","Math","floor","random","res","fetch","body","clientTime","toISOString","data","isDev","dev","sparams","fromEntries","searchParams","entries","_init","params","keys","key","delete","enc","href","encodeURIComponent","httpOption","JSON","stringify","encryptBuffer","value","text","val","parse","success","ok","message","statusText","code","status","arrayBuffer","decryptBuffer","Uint8Array"],"mappings":"OAKAA,MAAA,+BAAAC,MAAA,WAAA,MAAMC,EAAU,IAAIC,IAEpB,MAAMC,EAOH,WAAAC,CAAYC,GALFC,KAAAC,kBAA4B,EAC5BD,KAAAE,cAAwB,EACxBF,KAAAG,cAAsC,KACvCH,KAAAI,aAAe,2BAGrBJ,KAAKD,OAAMM,OAAAC,OAAA,CAAA,EACLP,GAEN,MAAMQ,EAAM,IAAIC,IAAIT,EAAOQ,KAC3B,GAAIA,EAAIE,QAAUF,EAAIG,KAAM,MAAM,IAAIC,MAAM,sBAAsBZ,EAAOQ,iEAGzE,GAFAR,EAAOQ,IAAM,GAAGA,EAAIK,SAASL,EAAIM,WAE7BlB,EAAQmB,IAAIf,EAAOQ,KACpB,MAAM,IAAII,MAAM,qBAEtB,CAEU,SAAAI,CAAUC,KAA2DC,GAC5E,GAAIjB,KAAKD,OAAOmB,OAASlB,KAAKD,OAAOmB,MAAMF,GACxC,OAAQhB,KAAKD,OAAOmB,MAAMF,MAAsBC,EAEtD,CAEU,eAAME,GACb,IAAIC,EAAOpB,KAAKD,OAAOsB,OACnBA,EAASD,EAAKE,UAAU,EAAGtB,KAAKE,eAEpC,MAAO,CAAEkB,OAAMC,SAAQX,YADLjB,EAAOiB,KAAKW,IAASC,UAAU,EAAGtB,KAAKE,eAE5D,CAEU,SAAMK,CAAIgB,GACjB,MAAMF,QAAerB,KAAKmB,YACpBK,EAAOxB,KAAKD,OAAOQ,IAMzB,MALa,MAATgB,IAAcA,EAAO,KAGzBA,GADAA,GADAA,EAAOA,EAAKE,QACAC,WAAW,KAAOH,EAAKD,UAAU,GAAKC,GACtCI,SAAS,KAAOJ,EAAKD,UAAU,EAAGC,EAAKK,OAAS,GAAKL,KACvDA,EAAO,IAAIA,KACd,IAAIf,IAAI,GAAGgB,KAAQH,EAAOX,OAAOa,IAC3C,CAEU,gBAAMM,CAAWN,EAAcO,aACtC,MAAMvB,QAAYP,KAAKO,IAAIgB,GACrBF,QAAerB,KAAKmB,YAC1B,IAAIY,EAAe,CAAA,EAiBnB,OAhBI/B,KAAKG,gBACN4B,EAAQ,qBAAuBtC,EAAOuC,QAAQ,CAC3CC,kBAAWC,EAAAlC,KAAKG,oCAAe8B,UAC/BE,OAAQC,KAAKC,MAAQrC,KAAKG,cAAemC,cAAgB,KACzDjB,EAAOA,SAAW,IAGxBU,EAAO1B,OAAAC,OAAAD,OAAAC,OAAAD,OAAAC,OAAAD,OAAAC,OAAA,CAAA,EAC0B,UAAhB,QAAXiC,EAAAvC,KAAKD,cAAM,IAAAwC,OAAA,EAAAA,EAAEC,sBAAc,IAAAC,OAAA,EAAAA,EAAEV,SAC7BD,aAAI,EAAJA,EAAMC,SACNA,GAAO,CACV,eAAgB/B,KAAKI,aACrB,WAAYG,EAAIK,OAChB,aAAakB,aAAI,EAAJA,EAAMY,SAAU,OAAOC,gBAGhCZ,CACV,CAEU,uBAAMa,GACT5C,KAAKC,wBACA,IAAI4C,QAASC,IAChB,MAAMC,EAAWC,YAAY,KACrBhD,KAAKC,mBACPgD,cAAcF,GACdD,EAAQ,QAEX,OAGJ9C,KAAKG,qBACDH,KAAKkD,WAEjB,CAEA,eAAMA,SACGlD,KAAKe,UAAU,mBACrBf,KAAKG,cAAgB,KACrBH,KAAKC,kBAAmB,EAExB,IAAIkD,EAAMnD,KAAKD,OAAOsB,OAAOO,OACzBwB,EAA4B,EAAtBC,KAAKC,MAAMH,EAAM,GAC3BnD,KAAKE,cAAgBmD,KAAKC,MAAMD,KAAKE,UAAYJ,EAAMC,EAAM,IAAMA,EAEnE,MAAM/B,QAAerB,KAAKmB,YACpBqC,QAAYxD,KAAKyD,MAAM,IAAK,CAC/Bf,OAAQ,OACRgB,KAAM,CACHhD,KAAMW,EAAOX,KACbiD,YAAY,IAAIvB,MAAOwB,cACvBvC,OAAQA,EAAOA,UAGrBrB,KAAKG,cAAgBqD,EAAIK,KACzB7D,KAAKC,kBAAmB,QAClBD,KAAKe,UAAU,iBAAkBf,KAAKG,cAC/C,CAEU,WAAMsD,CAAMlC,EAAcO,WACjC,MAAMgC,EAAiB,MAATvC,IAAkC,QAAlBW,EAAAlC,KAAKG,qBAAa,IAAA+B,OAAA,EAAAA,EAAE6B,KAC5C1C,QAAerB,KAAKmB,YACpBZ,QAAYP,KAAKO,IAAIgB,GAC3B,IAAIyC,EAAU3D,OAAO4D,YAAY1D,EAAI2D,aAAaC,WAClD,MAAMC,EAAK/D,OAAAC,OAAA,CAAA,EAAQwB,GACnB,IAAIuC,EAAMhE,OAAAC,OAAA,CAAA,EACJ0D,GAGN,GAAI3D,OAAOiE,KAAKN,GAASpC,OAAS,EAC/B,IAAK,IAAI2C,KAAOP,EACbzD,EAAI2D,aAAaM,OAAOD,GAI9B,GAAIH,eAAAA,EAAOC,OAAQ,CAChB,IAAK,IAAIE,KAAOH,EAAMC,OACnBA,EAAOE,GAAOH,EAAMC,OAAOE,UAEvBH,EAAMC,MACf,CAED,GAAIhE,OAAOiE,KAAKD,GAAQzC,OAAS,EAC9B,GAAIkC,EACDM,EAAMC,OAASA,MACX,CACJ,MAAMI,QAAYhF,EAAOuC,QAAQqC,EAAQhD,EAAOA,QAChDd,EAAImE,KAAOnE,EAAImE,KAAO,IAAMC,mBAAmBF,EACjD,CAGJ,MAAMG,EAAUvE,OAAAC,OAAAD,OAAAC,OAAAD,OAAAC,OAAA,CACboC,OAAQ,OACM,QAAXH,EAAAvC,KAAKD,cAAM,IAAAwC,OAAA,EAAAA,EAAEC,gBACb4B,GAAK,CACRrC,cAAe/B,KAAK6B,WAAWN,EAAM6C,MAGpCQ,eAAAA,EAAYlB,QAEVkB,EAAWlB,KADVI,EACiBe,KAAKC,UAAUF,EAAWlB,YAEpBjE,EAAOsF,cAAcH,EAAWlB,KAAMrC,EAAOA,SAG3E,MAAMmC,QAAY9D,EAASa,EAAImE,KAAME,GACrC,GAAId,EAAO,CACR,MAAMkB,QAAcxB,EAAIyB,OAClBC,EAAML,KAAKM,MAAMH,GACvB,MAAO,CACJI,QAAS5B,EAAI6B,GACbC,QAAS9B,EAAI6B,GAAK7B,EAAI+B,WAAaL,EACnCrB,KAAML,EAAI6B,GAAKH,EAAM,KACrBM,KAAMhC,EAAIiC,OAEf,CACD,MAAMT,QAAcxB,EAAIkC,cAClBR,QAAYzF,EAAOkG,cAAc,IAAIC,WAAWZ,GAAQ3D,EAAOA,QAErE,MAAO,CACJ+D,QAAS5B,EAAI6B,GACbC,QAAS9B,EAAI6B,GAAK7B,EAAI+B,WAAcL,GAAO1B,EAAI+B,WAC/C1B,KAAML,EAAI6B,GAAKH,EAAM,KACrBM,KAAMhC,EAAIiC,OAEhB,SAEF5F"}
package/client/index.d.ts CHANGED
@@ -3,7 +3,8 @@ import Base from './Base.js';
3
3
 
4
4
  declare class SecurequClient extends Base {
5
5
  send(path: string, init?: HttpRequestInit): Promise<SecurequClientResponse>;
6
- upload(file: File, onProgress?: (p: number) => void): Promise<SecurequClientResponse>;
6
+ uploadFile(file: File, onProgress?: (p: number) => void): Promise<SecurequClientResponse>;
7
+ deleteFile(fileId: string, init?: Omit<HttpRequestInit, 'body' | 'method'>): Promise<SecurequClientResponse>;
7
8
  get(path: string, init?: Omit<HttpRequestInit, 'body' | 'method'>): Promise<SecurequClientResponse>;
8
9
  post(path: string, init?: Omit<HttpRequestInit, 'method'>): Promise<SecurequClientResponse>;
9
10
  put(path: string, init?: Omit<HttpRequestInit, 'method'>): Promise<SecurequClientResponse>;
package/client/index.js CHANGED
@@ -1 +1 @@
1
- "use strict";Object.defineProperty(exports,"__esModule",{value:!0});var e=require("tslib"),t=require("../include/File.js"),a=require("./Base.js"),s=require("../include/FileScaner.js");class i extends a.default{async send(e,t){await this.awaitForHandshake(),t=await this.hooksCall("beforeRequest",e,t)||t;if("/"===(await this.url(e)).pathname)throw new Error("Path is not allowed");for(let e in null==t?void 0:t.body)(null==t?void 0:t.body[e])instanceof File&&(t.body[e]=await this.upload(t.body[e],null==t?void 0:t.onProgress));const a=await this.fetch(e,t);return["Signeture expired","Request expired"].includes(a.message)?(await this.handshake(),await this.send(e,t)):(await this.hooksCall("afterResponse",a),a)}async upload(a,i){var n,o,l,r,d,h;await this.awaitForHandshake();const u=await t.getFileId(a),c=this.config.chunkSize,f=new AbortController;let w=await this.hooksCall("beforeUpload",a,u)||a;const p=null===(d=this.handshakeInfo)||void 0===d?void 0:d.maxFileSize;if(p&&w.size>1024*p)throw new Error(`File size exceeds the limit of ${p/1024} MB`);const k={filename:a.name,filesize:a.size,filetype:a.type,fileid:u,totalChunks:t.totalChunks(a,c)},y=async()=>{await this.fetch("/",{method:"PUT",body:Object.assign(Object.assign({},k),{type:"failed"})}),f.abort(),window.removeEventListener("pagehide",y)};window.addEventListener("pagehide",y);const g=await this.fetch("/",{method:"PUT",body:Object.assign(Object.assign({},k),{type:"meta"})});if(!g.success)return["Signeture expired","Request expired"].includes(g.message)?(await this.handshake(),await this.upload(a,i)):(await y(),g);try{for(var b,m=!0,C=e.__asyncValues(t.chunkFile(w,c));!(n=(b=await C.next()).done);){r=b.value,m=!1;try{let{chunk:e,chunkIndex:t}=r;if((null===(h=this.handshakeInfo)||void 0===h?void 0:h.checkFileType)&&0===t){if(!s.fileScaner(e))return await y(),{success:!1,message:"Unknown or unsupported file type",data:null,code:0}}await this.hooksCall("beforeUploadChunk",e,t,k.totalChunks);const a={method:"PUT",signal:f.signal,body:{chunk:e,chunkIndex:t,fileId:u},onProgress:e=>{if(i){const a=Math.floor((t+1)/k.totalChunks*100),s=Math.floor(e/100/k.totalChunks*100);i(Math.min(a+s,100))}}};let n=await this.fetch("/",a);if(!n.success){if(!["Signeture expired","Request expired"].includes(g.message))return await y(),n;await this.handshake(),n=await this.fetch("/",a)}if(await this.hooksCall("afterUploadChunk",n,t,k.totalChunks),t+1===k.totalChunks){const e={success:!0,message:"File uploaded successfully",data:n.data,code:n.code};return await this.hooksCall("afterUpload",e,w),e}}finally{m=!0}}}catch(e){o={error:e}}finally{try{m||n||!(l=C.return)||await l.call(C)}finally{if(o)throw o.error}}return{success:!1,message:"File upload failed",data:null,code:0}}async get(e,t){return await this.send(e,t)}async post(e,t){return await this.send(e,Object.assign(Object.assign({},t),{method:"POST"}))}async put(e,t){return await this.send(e,Object.assign(Object.assign({},t),{method:"PUT"}))}async delete(e,t){return await this.send(e,Object.assign(Object.assign({},t),{method:"DELETE"}))}}exports.default=i;//# sourceMappingURL=index.js.map
1
+ "use strict";Object.defineProperty(exports,"__esModule",{value:!0});var e=require("tslib"),t=require("../include/File.js"),a=require("./Base.js"),i=require("../include/FileScaner.js");class s extends a.default{async send(e,t){await this.awaitForHandshake(),t=await this.hooksCall("beforeRequest",e,t)||t;if("/"===(await this.url(e)).pathname)throw new Error("Path is not allowed");for(let e in null==t?void 0:t.body)(null==t?void 0:t.body[e])instanceof File&&(t.body[e]=await this.uploadFile(t.body[e],null==t?void 0:t.onProgress));const a=await this.fetch(e,t);return["Signeture expired","Request expired"].includes(a.message)?(await this.handshake(),await this.send(e,t)):(await this.hooksCall("afterResponse",a),a)}async uploadFile(a,s){var n,o,l,r,d,h,u;await this.awaitForHandshake();const c=await t.getFileId(a),w=new AbortController;let f=await this.hooksCall("beforeUpload",a,c)||a;const k=null===(d=this.handshakeInfo)||void 0===d?void 0:d.maxFileSize;if(k&&f.size>1024*k)throw new Error(`File size exceeds the limit of ${k/1024} MB`);const p=null===(h=this.handshakeInfo)||void 0===h?void 0:h.chunkSize,y={fileId:c,name:f.name,size:f.size,type:f.type,totalChunks:t.totalChunks(f,p),chunkIndex:0,isFinish:!1},g=async()=>{await this.deleteFile(c),w.abort(),window.removeEventListener("pagehide",g)};window.addEventListener("pagehide",g);try{for(var b,v=!0,m=e.__asyncValues(t.chunkFile(f,p));!(n=(b=await m.next()).done);){r=b.value,v=!1;try{let{chunk:e,chunkIndex:t}=r;if(0===t&&(null===(u=this.handshakeInfo)||void 0===u?void 0:u.checkFileType)&&!i.fileScaner(e))return await g(),{success:!1,message:"Unknown or unsupported file type",data:null,code:0};y.chunkIndex=t,y.isFinish=t+1===y.totalChunks;const n={method:"PUT",signal:w.signal,body:{chunk:e,filemeta:y},onProgress:e=>{if(s){const a=Math.floor((t+1)/y.totalChunks*100),i=Math.floor(e/100/y.totalChunks*100);s(Math.min(a+i,100))}}};await this.hooksCall("beforeUploadChunk",e,y);let o=await this.fetch("/",n);if(!o.success){if(!["Signeture expired","Request expired"].includes(o.message))return await g(),o;await this.handshake(),window.removeEventListener("pagehide",g),o=await this.uploadFile(a,s)}await this.hooksCall("afterUploadChunk",o,y)}finally{v=!0}}}catch(e){o={error:e}}finally{try{v||n||!(l=m.return)||await l.call(m)}finally{if(o)throw o.error}}window.removeEventListener("pagehide",g);const F={success:!0,message:"File uploaded successfully",data:y,code:200};return await this.hooksCall("afterUpload",F,f),F}async deleteFile(e,t){await this.awaitForHandshake();const a=await this.fetch("/",Object.assign(Object.assign({},t),{method:"DELETE",body:{fileId:e}}));return["Signeture expired","Request expired"].includes(a.message)?(await this.handshake(),await this.deleteFile(e,t)):a}async get(e,t){return await this.send(e,t)}async post(e,t){return await this.send(e,Object.assign(Object.assign({},t),{method:"POST"}))}async put(e,t){return await this.send(e,Object.assign(Object.assign({},t),{method:"PUT"}))}async delete(e,t){return await this.send(e,Object.assign(Object.assign({},t),{method:"DELETE"}))}}exports.default=s;//# sourceMappingURL=index.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"index.js","sources":["../../src/client/index.ts"],"sourcesContent":["import { HttpRequestInit, SecurequClientResponse } from \"./types\";\nimport { chunkFile, getFileId, totalChunks } from \"../include/File\";\nimport Base from \"./Base\";\nimport fileScaner from '../include/FileScaner';\n\nclass SecurequClient extends Base {\n\n async send(path: string, init?: HttpRequestInit): Promise<SecurequClientResponse> {\n await this.awaitForHandshake();\n init = await this.hooksCall('beforeRequest', path, init) || init;\n const url = await this.url(path)\n if (url.pathname === '/') throw new Error(\"Path is not allowed\")\n\n for (let key in init?.body) {\n if (init?.body[key] instanceof File) {\n init.body[key] = await this.upload(init.body[key], init?.onProgress)\n }\n }\n\n const res = await this.fetch(path, init);\n if ([\"Signeture expired\", \"Request expired\"].includes(res.message)) {\n await this.handshake();\n return await this.send(path, init);\n }\n await this.hooksCall('afterResponse', res);\n return res;\n }\n\n async upload(file: File, onProgress?: (p: number) => void): Promise<SecurequClientResponse> {\n await this.awaitForHandshake();\n const fileId = await getFileId(file);\n const chunkSize = this.config.chunkSize\n const controller = new AbortController();\n let _file = await this.hooksCall('beforeUpload', file, fileId) || file;\n const maxFileSize = this.handshakeInfo?.maxFileSize\n if (maxFileSize && _file.size > maxFileSize * 1024) {\n throw new Error(`File size exceeds the limit of ${maxFileSize / 1024} MB`)\n }\n // send metadata\n const meta = {\n filename: file.name,\n filesize: file.size,\n filetype: file.type,\n fileid: fileId,\n totalChunks: totalChunks(file, chunkSize),\n }\n\n const abort = async () => {\n await this.fetch('/', {\n method: 'PUT',\n body: { ...meta, type: 'failed' },\n })\n controller.abort();\n window.removeEventListener(\"pagehide\", abort);\n }\n window.addEventListener(\"pagehide\", abort);\n\n const metares = await this.fetch('/', {\n method: 'PUT',\n body: { ...meta, type: 'meta' }\n })\n\n\n if (!metares.success) {\n if ([\"Signeture expired\", \"Request expired\"].includes(metares.message)) {\n await this.handshake();\n return await this.upload(file, onProgress);\n }\n await abort()\n return metares\n }\n\n\n for await (let { chunk, chunkIndex } of chunkFile(_file, chunkSize)) {\n\n if (this.handshakeInfo?.checkFileType && chunkIndex === 0) {\n let fileType = fileScaner(chunk);\n if (!fileType) {\n await abort()\n return {\n success: false,\n message: \"Unknown or unsupported file type\",\n data: null,\n code: 0\n }\n }\n }\n\n await this.hooksCall('beforeUploadChunk', chunk, chunkIndex, meta.totalChunks);\n const info: any = {\n method: 'PUT',\n signal: controller.signal,\n body: { chunk, chunkIndex, fileId },\n onProgress: (p: number) => {\n if (onProgress) {\n const totalProgress = Math.floor(((chunkIndex + 1) / meta.totalChunks) * 100)\n const currentProgress = Math.floor((p / 100) / meta.totalChunks * 100)\n onProgress(Math.min(totalProgress + currentProgress, 100))\n }\n }\n }\n\n let res = await this.fetch('/', info)\n\n if (!res.success) {\n if ([\"Signeture expired\", \"Request expired\"].includes(metares.message)) {\n await this.handshake();\n res = await this.fetch('/', info)\n } else {\n await abort()\n return res\n }\n }\n await this.hooksCall('afterUploadChunk', res, chunkIndex, meta.totalChunks);\n\n if (chunkIndex + 1 === meta.totalChunks) {\n const info = {\n success: true,\n message: 'File uploaded successfully',\n data: res.data,\n code: res.code\n }\n await this.hooksCall('afterUpload', info, _file);\n return info\n }\n }\n return {\n success: false,\n message: 'File upload failed',\n data: null,\n code: 0\n }\n }\n\n async get(path: string, init?: Omit<HttpRequestInit, 'body' | 'method'>) {\n return await this.send(path, init);\n }\n\n async post(path: string, init?: Omit<HttpRequestInit, 'method'>) {\n return await this.send(path, { ...init, method: \"POST\" });\n }\n\n async put(path: string, init?: Omit<HttpRequestInit, 'method'>) {\n return await this.send(path, { ...init, method: \"PUT\" });\n }\n\n async delete(path: string, init?: Omit<HttpRequestInit, 'method'>) {\n return await this.send(path, { ...init, method: \"DELETE\" });\n }\n\n}\n\nexport default SecurequClient;\n"],"names":["SecurequClient","Base","send","path","init","this","awaitForHandshake","hooksCall","url","pathname","Error","key","body","File","upload","onProgress","res","fetch","includes","message","handshake","file","fileId","getFileId","chunkSize","config","controller","AbortController","_file","maxFileSize","_d","handshakeInfo","size","meta","filename","name","filesize","filetype","type","fileid","totalChunks","abort","async","method","window","removeEventListener","addEventListener","metares","success","_h","_f","_g","__asyncValues","chunkFile","_a","next","done","_c","value","chunk","chunkIndex","_e","checkFileType","fileScaner","data","code","info","signal","p","totalProgress","Math","floor","currentProgress","min","get","post","Object","assign","put","exports","default"],"mappings":"wLAKA,MAAMA,UAAuBC,EAAAA,QAE1B,UAAMC,CAAKC,EAAcC,SAChBC,KAAKC,oBACXF,QAAaC,KAAKE,UAAU,gBAAiBJ,EAAMC,IAASA,EAE5D,GAAqB,aADHC,KAAKG,IAAIL,IACnBM,SAAkB,MAAM,IAAIC,MAAM,uBAE1C,IAAK,IAAIC,KAAOP,aAAI,EAAJA,EAAMQ,MACfR,aAAI,EAAJA,EAAMQ,KAAKD,cAAgBE,OAC5BT,EAAKQ,KAAKD,SAAaN,KAAKS,OAAOV,EAAKQ,KAAKD,GAAMP,aAAI,EAAJA,EAAMW,aAI/D,MAAMC,QAAYX,KAAKY,MAAMd,EAAMC,GACnC,MAAI,CAAC,oBAAqB,mBAAmBc,SAASF,EAAIG,gBACjDd,KAAKe,kBACEf,KAAKH,KAAKC,EAAMC,WAE1BC,KAAKE,UAAU,gBAAiBS,GAC/BA,EACV,CAEA,YAAMF,CAAOO,EAAYN,yBAChBV,KAAKC,oBACX,MAAMgB,QAAeC,EAAAA,UAAUF,GACzBG,EAAYnB,KAAKoB,OAAOD,UACxBE,EAAa,IAAIC,gBACvB,IAAIC,QAAcvB,KAAKE,UAAU,eAAgBc,EAAMC,IAAWD,EAClE,MAAMQ,EAAgC,QAAlBC,EAAAzB,KAAK0B,qBAAa,IAAAD,OAAA,EAAAA,EAAED,YACxC,GAAIA,GAAeD,EAAMI,KAAqB,KAAdH,EAC7B,MAAM,IAAInB,MAAM,kCAAkCmB,EAAc,WAGnE,MAAMI,EAAO,CACVC,SAAUb,EAAKc,KACfC,SAAUf,EAAKW,KACfK,SAAUhB,EAAKiB,KACfC,OAAQjB,EACRkB,YAAaA,EAAAA,YAAYnB,EAAMG,IAG5BiB,EAAQC,gBACLrC,KAAKY,MAAM,IAAK,CACnB0B,OAAQ,MACR/B,oCAAWqB,GAAI,CAAEK,KAAM,aAE1BZ,EAAWe,QACXG,OAAOC,oBAAoB,WAAYJ,IAE1CG,OAAOE,iBAAiB,WAAYL,GAEpC,MAAMM,QAAgB1C,KAAKY,MAAM,IAAK,CACnC0B,OAAQ,MACR/B,oCAAWqB,GAAI,CAAEK,KAAM,WAI1B,IAAKS,EAAQC,QACV,MAAI,CAAC,oBAAqB,mBAAmB9B,SAAS6B,EAAQ5B,gBACrDd,KAAKe,kBACEf,KAAKS,OAAOO,EAAMN,WAE5B0B,IACCM,OAIV,IAAwC,IAA2BE,EAA3BC,GAAA,EAAAC,EAAAC,EAAAA,cAAAC,YAAUzB,EAAOJ,MAAU8B,GAAAL,QAAAE,EAAAI,QAAAC,OAAA,CAA3BC,EAAAR,EAAAS,MAAAR,GAAA,MAA7B,IAAIS,MAAEA,EAAKC,WAAEA,KAErB,IAAsB,QAAlBC,EAAAxD,KAAK0B,qBAAa,IAAA8B,OAAA,EAAAA,EAAEC,gBAAgC,IAAfF,EAAkB,CAExD,IADeG,EAAAA,WAAWJ,GAGvB,aADMlB,IACC,CACJO,SAAS,EACT7B,QAAS,mCACT6C,KAAM,KACNC,KAAM,EAGd,OAEK5D,KAAKE,UAAU,oBAAqBoD,EAAOC,EAAY3B,EAAKO,aAClE,MAAM0B,EAAY,CACfvB,OAAQ,MACRwB,OAAQzC,EAAWyC,OACnBvD,KAAM,CAAE+C,QAAOC,aAAYtC,UAC3BP,WAAaqD,IACV,GAAIrD,EAAY,CACb,MAAMsD,EAAgBC,KAAKC,OAAQX,EAAa,GAAK3B,EAAKO,YAAe,KACnEgC,EAAkBF,KAAKC,MAAOH,EAAI,IAAOnC,EAAKO,YAAc,KAClEzB,EAAWuD,KAAKG,IAAIJ,EAAgBG,EAAiB,KACvD,IAIP,IAAIxD,QAAYX,KAAKY,MAAM,IAAKiD,GAEhC,IAAKlD,EAAIgC,QAAS,CACf,IAAI,CAAC,oBAAqB,mBAAmB9B,SAAS6B,EAAQ5B,SAK3D,aADMsB,IACCzB,QAJDX,KAAKe,YACXJ,QAAYX,KAAKY,MAAM,IAAKiD,EAKjC,CAGD,SAFM7D,KAAKE,UAAU,mBAAoBS,EAAK4C,EAAY3B,EAAKO,aAE3DoB,EAAa,IAAM3B,EAAKO,YAAa,CACtC,MAAM0B,EAAO,CACVlB,SAAS,EACT7B,QAAS,6BACT6C,KAAMhD,EAAIgD,KACVC,KAAMjD,EAAIiD,MAGb,aADM5D,KAAKE,UAAU,cAAe2D,EAAMtC,GACnCsC,CACT,eACH,oGACD,MAAO,CACJlB,SAAS,EACT7B,QAAS,qBACT6C,KAAM,KACNC,KAAM,EAEZ,CAEA,SAAMS,CAAIvE,EAAcC,GACrB,aAAaC,KAAKH,KAAKC,EAAMC,EAChC,CAEA,UAAMuE,CAAKxE,EAAcC,GACtB,aAAaC,KAAKH,KAAKC,EAAIyE,OAAAC,OAAAD,OAAAC,OAAA,CAAA,EAAOzE,GAAI,CAAEuC,OAAQ,SACnD,CAEA,SAAMmC,CAAI3E,EAAcC,GACrB,aAAaC,KAAKH,KAAKC,EAAIyE,OAAAC,OAAAD,OAAAC,OAAA,CAAA,EAAOzE,GAAI,CAAEuC,OAAQ,QACnD,CAEA,YAAM,CAAOxC,EAAcC,GACxB,aAAaC,KAAKH,KAAKC,EAAIyE,OAAAC,OAAAD,OAAAC,OAAA,CAAA,EAAOzE,GAAI,CAAEuC,OAAQ,WACnD,EAEFoC,QAAAC,QAAAhF"}
1
+ {"version":3,"file":"index.js","sources":["../../src/client/index.ts"],"sourcesContent":["import { HttpRequestInit, SecurequClientResponse } from \"./types\";\nimport { chunkFile, getFileId, totalChunks } from \"../include/File\";\nimport Base from \"./Base\";\nimport fileScaner from '../include/FileScaner';\nimport { UploadFileMeta } from \"../server/types\";\n\nclass SecurequClient extends Base {\n\n async send(path: string, init?: HttpRequestInit): Promise<SecurequClientResponse> {\n await this.awaitForHandshake();\n init = await this.hooksCall('beforeRequest', path, init) || init;\n const url = await this.url(path)\n if (url.pathname === '/') throw new Error(\"Path is not allowed\")\n\n for (let key in init?.body) {\n if (init?.body[key] instanceof File) {\n init.body[key] = await this.uploadFile(init.body[key], init?.onProgress)\n }\n }\n\n const res = await this.fetch(path, init);\n if ([\"Signeture expired\", \"Request expired\"].includes(res.message)) {\n await this.handshake();\n return await this.send(path, init);\n }\n await this.hooksCall('afterResponse', res);\n return res;\n }\n\n async uploadFile(file: File, onProgress?: (p: number) => void): Promise<SecurequClientResponse> {\n await this.awaitForHandshake();\n const fileId = await getFileId(file);\n const controller = new AbortController();\n\n let _file = await this.hooksCall('beforeUpload', file, fileId) || file;\n const maxFileSize = this.handshakeInfo?.maxFileSize\n if (maxFileSize && _file.size > maxFileSize * 1024) {\n throw new Error(`File size exceeds the limit of ${maxFileSize / 1024} MB`)\n }\n\n const chunkSize = this.handshakeInfo?.chunkSize\n\n // send metadata\n const filemeta: UploadFileMeta = {\n fileId: fileId,\n name: _file.name,\n size: _file.size,\n type: _file.type,\n totalChunks: totalChunks(_file, chunkSize),\n chunkIndex: 0,\n isFinish: false\n }\n\n const abort = async () => {\n await this.deleteFile(fileId);\n controller.abort();\n window.removeEventListener(\"pagehide\", abort);\n }\n\n window.addEventListener(\"pagehide\", abort);\n\n for await (let { chunk, chunkIndex } of chunkFile(_file, chunkSize)) {\n if (chunkIndex === 0 && this.handshakeInfo?.checkFileType && !fileScaner(chunk)) {\n await abort()\n return {\n success: false,\n message: \"Unknown or unsupported file type\",\n data: null,\n code: 0\n }\n }\n\n filemeta.chunkIndex = chunkIndex;\n filemeta.isFinish = chunkIndex + 1 === filemeta.totalChunks;\n\n const info: any = {\n method: 'PUT',\n signal: controller.signal,\n body: {\n chunk,\n filemeta\n },\n onProgress: (p: number) => {\n if (onProgress) {\n const totalProgress = Math.floor(((chunkIndex + 1) / filemeta.totalChunks) * 100)\n const currentProgress = Math.floor((p / 100) / filemeta.totalChunks * 100)\n onProgress(Math.min(totalProgress + currentProgress, 100))\n }\n }\n }\n await this.hooksCall('beforeUploadChunk', chunk, filemeta);\n\n let res = await this.fetch('/', info)\n\n if (!res.success) {\n if ([\"Signeture expired\", \"Request expired\"].includes(res.message)) {\n await this.handshake();\n window.removeEventListener(\"pagehide\", abort);\n res = await this.uploadFile(file, onProgress);\n } else {\n await abort()\n return res\n }\n }\n await this.hooksCall('afterUploadChunk', res, filemeta);\n }\n\n window.removeEventListener(\"pagehide\", abort);\n\n const info = {\n success: true,\n message: 'File uploaded successfully',\n data: filemeta,\n code: 200\n }\n await this.hooksCall('afterUpload', info, _file);\n return info\n }\n\n async deleteFile(fileId: string, init?: Omit<HttpRequestInit, 'body' | 'method'>): Promise<SecurequClientResponse> {\n await this.awaitForHandshake();\n const res = await this.fetch('/', {\n ...init,\n method: 'DELETE',\n body: { fileId }\n });\n if ([\"Signeture expired\", \"Request expired\"].includes(res.message)) {\n await this.handshake();\n return await this.deleteFile(fileId, init);\n }\n return res;\n }\n\n async get(path: string, init?: Omit<HttpRequestInit, 'body' | 'method'>) {\n return await this.send(path, init);\n }\n\n async post(path: string, init?: Omit<HttpRequestInit, 'method'>) {\n return await this.send(path, { ...init, method: \"POST\" });\n }\n\n async put(path: string, init?: Omit<HttpRequestInit, 'method'>) {\n return await this.send(path, { ...init, method: \"PUT\" });\n }\n\n async delete(path: string, init?: Omit<HttpRequestInit, 'method'>) {\n return await this.send(path, { ...init, method: \"DELETE\" });\n }\n\n}\n\nexport default SecurequClient;\n"],"names":["SecurequClient","Base","send","path","init","this","awaitForHandshake","hooksCall","url","pathname","Error","key","body","File","uploadFile","onProgress","res","fetch","includes","message","handshake","file","fileId","getFileId","controller","AbortController","_file","maxFileSize","_d","handshakeInfo","size","chunkSize","_e","filemeta","name","type","totalChunks","chunkIndex","isFinish","abort","async","deleteFile","window","removeEventListener","addEventListener","_j","_g","_h","__asyncValues","chunkFile","_a","next","done","_c","value","chunk","_f","checkFileType","fileScaner","success","data","code","info","method","signal","p","totalProgress","Math","floor","currentProgress","min","Object","assign","get","post","put","exports","default"],"mappings":"wLAMA,MAAMA,UAAuBC,EAAAA,QAE1B,UAAMC,CAAKC,EAAcC,SAChBC,KAAKC,oBACXF,QAAaC,KAAKE,UAAU,gBAAiBJ,EAAMC,IAASA,EAE5D,GAAqB,aADHC,KAAKG,IAAIL,IACnBM,SAAkB,MAAM,IAAIC,MAAM,uBAE1C,IAAK,IAAIC,KAAOP,aAAI,EAAJA,EAAMQ,MACfR,aAAI,EAAJA,EAAMQ,KAAKD,cAAgBE,OAC5BT,EAAKQ,KAAKD,SAAaN,KAAKS,WAAWV,EAAKQ,KAAKD,GAAMP,aAAI,EAAJA,EAAMW,aAInE,MAAMC,QAAYX,KAAKY,MAAMd,EAAMC,GACnC,MAAI,CAAC,oBAAqB,mBAAmBc,SAASF,EAAIG,gBACjDd,KAAKe,kBACEf,KAAKH,KAAKC,EAAMC,WAE1BC,KAAKE,UAAU,gBAAiBS,GAC/BA,EACV,CAEA,gBAAMF,CAAWO,EAAYN,2BACpBV,KAAKC,oBACX,MAAMgB,QAAeC,EAAAA,UAAUF,GACzBG,EAAa,IAAIC,gBAEvB,IAAIC,QAAcrB,KAAKE,UAAU,eAAgBc,EAAMC,IAAWD,EAClE,MAAMM,EAAgC,QAAlBC,EAAAvB,KAAKwB,qBAAa,IAAAD,OAAA,EAAAA,EAAED,YACxC,GAAIA,GAAeD,EAAMI,KAAqB,KAAdH,EAC7B,MAAM,IAAIjB,MAAM,kCAAkCiB,EAAc,WAGnE,MAAMI,EAA8B,QAAlBC,EAAA3B,KAAKwB,qBAAa,IAAAG,OAAA,EAAAA,EAAED,UAGhCE,EAA2B,CAC9BX,OAAQA,EACRY,KAAMR,EAAMQ,KACZJ,KAAMJ,EAAMI,KACZK,KAAMT,EAAMS,KACZC,YAAaA,EAAAA,YAAYV,EAAOK,GAChCM,WAAY,EACZC,UAAU,GAGPC,EAAQC,gBACLnC,KAAKoC,WAAWnB,GACtBE,EAAWe,QACXG,OAAOC,oBAAoB,WAAYJ,IAG1CG,OAAOE,iBAAiB,WAAYL,OAEpC,IAAwC,IAA2BM,EAA3BC,GAAA,EAAAC,EAAAC,EAAAA,cAAAC,YAAUvB,EAAOK,MAAUmB,GAAAL,QAAAE,EAAAI,QAAAC,OAAA,CAA3BC,EAAAR,EAAAS,MAAAR,GAAA,MAA7B,IAAIS,MAAEA,EAAKlB,WAAEA,KACrB,GAAmB,IAAfA,IAAsC,QAAlBmB,EAAAnD,KAAKwB,qBAAa,IAAA2B,OAAA,EAAAA,EAAEC,iBAAkBC,EAAAA,WAAWH,GAEtE,aADMhB,IACC,CACJoB,SAAS,EACTxC,QAAS,mCACTyC,KAAM,KACNC,KAAM,GAIZ5B,EAASI,WAAaA,EACtBJ,EAASK,SAAWD,EAAa,IAAMJ,EAASG,YAEhD,MAAM0B,EAAY,CACfC,OAAQ,MACRC,OAAQxC,EAAWwC,OACnBpD,KAAM,CACH2C,QACAtB,YAEHlB,WAAakD,IACV,GAAIlD,EAAY,CACb,MAAMmD,EAAgBC,KAAKC,OAAQ/B,EAAa,GAAKJ,EAASG,YAAe,KACvEiC,EAAkBF,KAAKC,MAAOH,EAAI,IAAOhC,EAASG,YAAc,KACtErB,EAAWoD,KAAKG,IAAIJ,EAAgBG,EAAiB,KACvD,UAGDhE,KAAKE,UAAU,oBAAqBgD,EAAOtB,GAEjD,IAAIjB,QAAYX,KAAKY,MAAM,IAAK6C,GAEhC,IAAK9C,EAAI2C,QAAS,CACf,IAAI,CAAC,oBAAqB,mBAAmBzC,SAASF,EAAIG,SAMvD,aADMoB,IACCvB,QALDX,KAAKe,YACXsB,OAAOC,oBAAoB,WAAYJ,GACvCvB,QAAYX,KAAKS,WAAWO,EAAMN,EAKvC,OACKV,KAAKE,UAAU,mBAAoBS,EAAKiB,gBAChD,oGAEDS,OAAOC,oBAAoB,WAAYJ,GAEvC,MAAMuB,EAAO,CACVH,SAAS,EACTxC,QAAS,6BACTyC,KAAM3B,EACN4B,KAAM,KAGT,aADMxD,KAAKE,UAAU,cAAeuD,EAAMpC,GACnCoC,CACV,CAEA,gBAAMrB,CAAWnB,EAAgBlB,SACxBC,KAAKC,oBACX,MAAMU,QAAYX,KAAKY,MAAM,IAAGsD,OAAAC,OAAAD,OAAAC,OAAA,CAAA,EAC1BpE,IACH2D,OAAQ,SACRnD,KAAM,CAAEU,aAEX,MAAI,CAAC,oBAAqB,mBAAmBJ,SAASF,EAAIG,gBACjDd,KAAKe,kBACEf,KAAKoC,WAAWnB,EAAQlB,IAEjCY,CACV,CAEA,SAAMyD,CAAItE,EAAcC,GACrB,aAAaC,KAAKH,KAAKC,EAAMC,EAChC,CAEA,UAAMsE,CAAKvE,EAAcC,GACtB,aAAaC,KAAKH,KAAKC,EAAIoE,OAAAC,OAAAD,OAAAC,OAAA,CAAA,EAAOpE,GAAI,CAAE2D,OAAQ,SACnD,CAEA,SAAMY,CAAIxE,EAAcC,GACrB,aAAaC,KAAKH,KAAKC,EAAIoE,OAAAC,OAAAD,OAAAC,OAAA,CAAA,EAAOpE,GAAI,CAAE2D,OAAQ,QACnD,CAEA,YAAM,CAAO5D,EAAcC,GACxB,aAAaC,KAAKH,KAAKC,EAAIoE,OAAAC,OAAAD,OAAAC,OAAA,CAAA,EAAOpE,GAAI,CAAE2D,OAAQ,WACnD,EAEFa,QAAAC,QAAA7E"}
package/client/index.mjs CHANGED
@@ -1 +1 @@
1
- import{__asyncValues as e}from"tslib";import{getFileId as t,totalChunks as a,chunkFile as s}from"../include/File.mjs";import i from"./Base.mjs";import{fileScaner as n}from"../include/FileScaner.mjs";class o extends i{async send(e,t){await this.awaitForHandshake(),t=await this.hooksCall("beforeRequest",e,t)||t;if("/"===(await this.url(e)).pathname)throw new Error("Path is not allowed");for(let e in null==t?void 0:t.body)(null==t?void 0:t.body[e])instanceof File&&(t.body[e]=await this.upload(t.body[e],null==t?void 0:t.onProgress));const a=await this.fetch(e,t);return["Signeture expired","Request expired"].includes(a.message)?(await this.handshake(),await this.send(e,t)):(await this.hooksCall("afterResponse",a),a)}async upload(i,o){var l,r,h,d,c,u;await this.awaitForHandshake();const f=await t(i),w=this.config.chunkSize,p=new AbortController;let m=await this.hooksCall("beforeUpload",i,f)||i;const k=null===(c=this.handshakeInfo)||void 0===c?void 0:c.maxFileSize;if(k&&m.size>1024*k)throw new Error(`File size exceeds the limit of ${k/1024} MB`);const g={filename:i.name,filesize:i.size,filetype:i.type,fileid:f,totalChunks:a(i,w)},y=async()=>{await this.fetch("/",{method:"PUT",body:Object.assign(Object.assign({},g),{type:"failed"})}),p.abort(),window.removeEventListener("pagehide",y)};window.addEventListener("pagehide",y);const b=await this.fetch("/",{method:"PUT",body:Object.assign(Object.assign({},g),{type:"meta"})});if(!b.success)return["Signeture expired","Request expired"].includes(b.message)?(await this.handshake(),await this.upload(i,o)):(await y(),b);try{for(var C,j=!0,v=e(s(m,w));!(l=(C=await v.next()).done);){d=C.value,j=!1;try{let{chunk:e,chunkIndex:t}=d;if((null===(u=this.handshakeInfo)||void 0===u?void 0:u.checkFileType)&&0===t){if(!n(e))return await y(),{success:!1,message:"Unknown or unsupported file type",data:null,code:0}}await this.hooksCall("beforeUploadChunk",e,t,g.totalChunks);const a={method:"PUT",signal:p.signal,body:{chunk:e,chunkIndex:t,fileId:f},onProgress:e=>{if(o){const a=Math.floor((t+1)/g.totalChunks*100),s=Math.floor(e/100/g.totalChunks*100);o(Math.min(a+s,100))}}};let s=await this.fetch("/",a);if(!s.success){if(!["Signeture expired","Request expired"].includes(b.message))return await y(),s;await this.handshake(),s=await this.fetch("/",a)}if(await this.hooksCall("afterUploadChunk",s,t,g.totalChunks),t+1===g.totalChunks){const e={success:!0,message:"File uploaded successfully",data:s.data,code:s.code};return await this.hooksCall("afterUpload",e,m),e}}finally{j=!0}}}catch(e){r={error:e}}finally{try{j||l||!(h=v.return)||await h.call(v)}finally{if(r)throw r.error}}return{success:!1,message:"File upload failed",data:null,code:0}}async get(e,t){return await this.send(e,t)}async post(e,t){return await this.send(e,Object.assign(Object.assign({},t),{method:"POST"}))}async put(e,t){return await this.send(e,Object.assign(Object.assign({},t),{method:"PUT"}))}async delete(e,t){return await this.send(e,Object.assign(Object.assign({},t),{method:"DELETE"}))}}export{o as default};//# sourceMappingURL=index.mjs.map
1
+ import{__asyncValues as e}from"tslib";import{getFileId as t,totalChunks as a,chunkFile as i}from"../include/File.mjs";import s from"./Base.mjs";import{fileScaner as n}from"../include/FileScaner.mjs";class o extends s{async send(e,t){await this.awaitForHandshake(),t=await this.hooksCall("beforeRequest",e,t)||t;if("/"===(await this.url(e)).pathname)throw new Error("Path is not allowed");for(let e in null==t?void 0:t.body)(null==t?void 0:t.body[e])instanceof File&&(t.body[e]=await this.uploadFile(t.body[e],null==t?void 0:t.onProgress));const a=await this.fetch(e,t);return["Signeture expired","Request expired"].includes(a.message)?(await this.handshake(),await this.send(e,t)):(await this.hooksCall("afterResponse",a),a)}async uploadFile(s,o){var l,r,h,d,c,u,w;await this.awaitForHandshake();const f=await t(s),p=new AbortController;let m=await this.hooksCall("beforeUpload",s,f)||s;const k=null===(c=this.handshakeInfo)||void 0===c?void 0:c.maxFileSize;if(k&&m.size>1024*k)throw new Error(`File size exceeds the limit of ${k/1024} MB`);const g=null===(u=this.handshakeInfo)||void 0===u?void 0:u.chunkSize,y={fileId:f,name:m.name,size:m.size,type:m.type,totalChunks:a(m,g),chunkIndex:0,isFinish:!1},b=async()=>{await this.deleteFile(f),p.abort(),window.removeEventListener("pagehide",b)};window.addEventListener("pagehide",b);try{for(var v,F=!0,x=e(i(m,g));!(l=(v=await x.next()).done);){d=v.value,F=!1;try{let{chunk:e,chunkIndex:t}=d;if(0===t&&(null===(w=this.handshakeInfo)||void 0===w?void 0:w.checkFileType)&&!n(e))return await b(),{success:!1,message:"Unknown or unsupported file type",data:null,code:0};y.chunkIndex=t,y.isFinish=t+1===y.totalChunks;const a={method:"PUT",signal:p.signal,body:{chunk:e,filemeta:y},onProgress:e=>{if(o){const a=Math.floor((t+1)/y.totalChunks*100),i=Math.floor(e/100/y.totalChunks*100);o(Math.min(a+i,100))}}};await this.hooksCall("beforeUploadChunk",e,y);let i=await this.fetch("/",a);if(!i.success){if(!["Signeture expired","Request expired"].includes(i.message))return await b(),i;await this.handshake(),window.removeEventListener("pagehide",b),i=await this.uploadFile(s,o)}await this.hooksCall("afterUploadChunk",i,y)}finally{F=!0}}}catch(e){r={error:e}}finally{try{F||l||!(h=x.return)||await h.call(x)}finally{if(r)throw r.error}}window.removeEventListener("pagehide",b);const C={success:!0,message:"File uploaded successfully",data:y,code:200};return await this.hooksCall("afterUpload",C,m),C}async deleteFile(e,t){await this.awaitForHandshake();const a=await this.fetch("/",Object.assign(Object.assign({},t),{method:"DELETE",body:{fileId:e}}));return["Signeture expired","Request expired"].includes(a.message)?(await this.handshake(),await this.deleteFile(e,t)):a}async get(e,t){return await this.send(e,t)}async post(e,t){return await this.send(e,Object.assign(Object.assign({},t),{method:"POST"}))}async put(e,t){return await this.send(e,Object.assign(Object.assign({},t),{method:"PUT"}))}async delete(e,t){return await this.send(e,Object.assign(Object.assign({},t),{method:"DELETE"}))}}export{o as default};//# sourceMappingURL=index.mjs.map
@@ -1 +1 @@
1
- {"version":3,"file":"index.mjs","sources":["../../src/client/index.ts"],"sourcesContent":["import { HttpRequestInit, SecurequClientResponse } from \"./types\";\nimport { chunkFile, getFileId, totalChunks } from \"../include/File\";\nimport Base from \"./Base\";\nimport fileScaner from '../include/FileScaner';\n\nclass SecurequClient extends Base {\n\n async send(path: string, init?: HttpRequestInit): Promise<SecurequClientResponse> {\n await this.awaitForHandshake();\n init = await this.hooksCall('beforeRequest', path, init) || init;\n const url = await this.url(path)\n if (url.pathname === '/') throw new Error(\"Path is not allowed\")\n\n for (let key in init?.body) {\n if (init?.body[key] instanceof File) {\n init.body[key] = await this.upload(init.body[key], init?.onProgress)\n }\n }\n\n const res = await this.fetch(path, init);\n if ([\"Signeture expired\", \"Request expired\"].includes(res.message)) {\n await this.handshake();\n return await this.send(path, init);\n }\n await this.hooksCall('afterResponse', res);\n return res;\n }\n\n async upload(file: File, onProgress?: (p: number) => void): Promise<SecurequClientResponse> {\n await this.awaitForHandshake();\n const fileId = await getFileId(file);\n const chunkSize = this.config.chunkSize\n const controller = new AbortController();\n let _file = await this.hooksCall('beforeUpload', file, fileId) || file;\n const maxFileSize = this.handshakeInfo?.maxFileSize\n if (maxFileSize && _file.size > maxFileSize * 1024) {\n throw new Error(`File size exceeds the limit of ${maxFileSize / 1024} MB`)\n }\n // send metadata\n const meta = {\n filename: file.name,\n filesize: file.size,\n filetype: file.type,\n fileid: fileId,\n totalChunks: totalChunks(file, chunkSize),\n }\n\n const abort = async () => {\n await this.fetch('/', {\n method: 'PUT',\n body: { ...meta, type: 'failed' },\n })\n controller.abort();\n window.removeEventListener(\"pagehide\", abort);\n }\n window.addEventListener(\"pagehide\", abort);\n\n const metares = await this.fetch('/', {\n method: 'PUT',\n body: { ...meta, type: 'meta' }\n })\n\n\n if (!metares.success) {\n if ([\"Signeture expired\", \"Request expired\"].includes(metares.message)) {\n await this.handshake();\n return await this.upload(file, onProgress);\n }\n await abort()\n return metares\n }\n\n\n for await (let { chunk, chunkIndex } of chunkFile(_file, chunkSize)) {\n\n if (this.handshakeInfo?.checkFileType && chunkIndex === 0) {\n let fileType = fileScaner(chunk);\n if (!fileType) {\n await abort()\n return {\n success: false,\n message: \"Unknown or unsupported file type\",\n data: null,\n code: 0\n }\n }\n }\n\n await this.hooksCall('beforeUploadChunk', chunk, chunkIndex, meta.totalChunks);\n const info: any = {\n method: 'PUT',\n signal: controller.signal,\n body: { chunk, chunkIndex, fileId },\n onProgress: (p: number) => {\n if (onProgress) {\n const totalProgress = Math.floor(((chunkIndex + 1) / meta.totalChunks) * 100)\n const currentProgress = Math.floor((p / 100) / meta.totalChunks * 100)\n onProgress(Math.min(totalProgress + currentProgress, 100))\n }\n }\n }\n\n let res = await this.fetch('/', info)\n\n if (!res.success) {\n if ([\"Signeture expired\", \"Request expired\"].includes(metares.message)) {\n await this.handshake();\n res = await this.fetch('/', info)\n } else {\n await abort()\n return res\n }\n }\n await this.hooksCall('afterUploadChunk', res, chunkIndex, meta.totalChunks);\n\n if (chunkIndex + 1 === meta.totalChunks) {\n const info = {\n success: true,\n message: 'File uploaded successfully',\n data: res.data,\n code: res.code\n }\n await this.hooksCall('afterUpload', info, _file);\n return info\n }\n }\n return {\n success: false,\n message: 'File upload failed',\n data: null,\n code: 0\n }\n }\n\n async get(path: string, init?: Omit<HttpRequestInit, 'body' | 'method'>) {\n return await this.send(path, init);\n }\n\n async post(path: string, init?: Omit<HttpRequestInit, 'method'>) {\n return await this.send(path, { ...init, method: \"POST\" });\n }\n\n async put(path: string, init?: Omit<HttpRequestInit, 'method'>) {\n return await this.send(path, { ...init, method: \"PUT\" });\n }\n\n async delete(path: string, init?: Omit<HttpRequestInit, 'method'>) {\n return await this.send(path, { ...init, method: \"DELETE\" });\n }\n\n}\n\nexport default SecurequClient;\n"],"names":["SecurequClient","Base","send","path","init","this","awaitForHandshake","hooksCall","url","pathname","Error","key","body","File","upload","onProgress","res","fetch","includes","message","handshake","file","fileId","getFileId","chunkSize","config","controller","AbortController","_file","maxFileSize","_d","handshakeInfo","size","meta","filename","name","filesize","filetype","type","fileid","totalChunks","abort","async","method","window","removeEventListener","addEventListener","metares","success","_h","_f","_g","__asyncValues","chunkFile","_a","next","done","_c","value","chunk","chunkIndex","_e","checkFileType","fileScaner","data","code","info","signal","p","totalProgress","Math","floor","currentProgress","min","get","post","Object","assign","put"],"mappings":"uMAKA,MAAMA,UAAuBC,EAE1B,UAAMC,CAAKC,EAAcC,SAChBC,KAAKC,oBACXF,QAAaC,KAAKE,UAAU,gBAAiBJ,EAAMC,IAASA,EAE5D,GAAqB,aADHC,KAAKG,IAAIL,IACnBM,SAAkB,MAAM,IAAIC,MAAM,uBAE1C,IAAK,IAAIC,KAAOP,aAAI,EAAJA,EAAMQ,MACfR,aAAI,EAAJA,EAAMQ,KAAKD,cAAgBE,OAC5BT,EAAKQ,KAAKD,SAAaN,KAAKS,OAAOV,EAAKQ,KAAKD,GAAMP,aAAI,EAAJA,EAAMW,aAI/D,MAAMC,QAAYX,KAAKY,MAAMd,EAAMC,GACnC,MAAI,CAAC,oBAAqB,mBAAmBc,SAASF,EAAIG,gBACjDd,KAAKe,kBACEf,KAAKH,KAAKC,EAAMC,WAE1BC,KAAKE,UAAU,gBAAiBS,GAC/BA,EACV,CAEA,YAAMF,CAAOO,EAAYN,yBAChBV,KAAKC,oBACX,MAAMgB,QAAeC,EAAUF,GACzBG,EAAYnB,KAAKoB,OAAOD,UACxBE,EAAa,IAAIC,gBACvB,IAAIC,QAAcvB,KAAKE,UAAU,eAAgBc,EAAMC,IAAWD,EAClE,MAAMQ,EAAgC,QAAlBC,EAAAzB,KAAK0B,qBAAa,IAAAD,OAAA,EAAAA,EAAED,YACxC,GAAIA,GAAeD,EAAMI,KAAqB,KAAdH,EAC7B,MAAM,IAAInB,MAAM,kCAAkCmB,EAAc,WAGnE,MAAMI,EAAO,CACVC,SAAUb,EAAKc,KACfC,SAAUf,EAAKW,KACfK,SAAUhB,EAAKiB,KACfC,OAAQjB,EACRkB,YAAaA,EAAYnB,EAAMG,IAG5BiB,EAAQC,gBACLrC,KAAKY,MAAM,IAAK,CACnB0B,OAAQ,MACR/B,oCAAWqB,GAAI,CAAEK,KAAM,aAE1BZ,EAAWe,QACXG,OAAOC,oBAAoB,WAAYJ,IAE1CG,OAAOE,iBAAiB,WAAYL,GAEpC,MAAMM,QAAgB1C,KAAKY,MAAM,IAAK,CACnC0B,OAAQ,MACR/B,oCAAWqB,GAAI,CAAEK,KAAM,WAI1B,IAAKS,EAAQC,QACV,MAAI,CAAC,oBAAqB,mBAAmB9B,SAAS6B,EAAQ5B,gBACrDd,KAAKe,kBACEf,KAAKS,OAAOO,EAAMN,WAE5B0B,IACCM,OAIV,IAAwC,IAA2BE,EAA3BC,GAAA,EAAAC,EAAAC,EAAAC,EAAUzB,EAAOJ,MAAU8B,GAAAL,QAAAE,EAAAI,QAAAC,OAAA,CAA3BC,EAAAR,EAAAS,MAAAR,GAAA,MAA7B,IAAIS,MAAEA,EAAKC,WAAEA,KAErB,IAAsB,QAAlBC,EAAAxD,KAAK0B,qBAAa,IAAA8B,OAAA,EAAAA,EAAEC,gBAAgC,IAAfF,EAAkB,CAExD,IADeG,EAAWJ,GAGvB,aADMlB,IACC,CACJO,SAAS,EACT7B,QAAS,mCACT6C,KAAM,KACNC,KAAM,EAGd,OAEK5D,KAAKE,UAAU,oBAAqBoD,EAAOC,EAAY3B,EAAKO,aAClE,MAAM0B,EAAY,CACfvB,OAAQ,MACRwB,OAAQzC,EAAWyC,OACnBvD,KAAM,CAAE+C,QAAOC,aAAYtC,UAC3BP,WAAaqD,IACV,GAAIrD,EAAY,CACb,MAAMsD,EAAgBC,KAAKC,OAAQX,EAAa,GAAK3B,EAAKO,YAAe,KACnEgC,EAAkBF,KAAKC,MAAOH,EAAI,IAAOnC,EAAKO,YAAc,KAClEzB,EAAWuD,KAAKG,IAAIJ,EAAgBG,EAAiB,KACvD,IAIP,IAAIxD,QAAYX,KAAKY,MAAM,IAAKiD,GAEhC,IAAKlD,EAAIgC,QAAS,CACf,IAAI,CAAC,oBAAqB,mBAAmB9B,SAAS6B,EAAQ5B,SAK3D,aADMsB,IACCzB,QAJDX,KAAKe,YACXJ,QAAYX,KAAKY,MAAM,IAAKiD,EAKjC,CAGD,SAFM7D,KAAKE,UAAU,mBAAoBS,EAAK4C,EAAY3B,EAAKO,aAE3DoB,EAAa,IAAM3B,EAAKO,YAAa,CACtC,MAAM0B,EAAO,CACVlB,SAAS,EACT7B,QAAS,6BACT6C,KAAMhD,EAAIgD,KACVC,KAAMjD,EAAIiD,MAGb,aADM5D,KAAKE,UAAU,cAAe2D,EAAMtC,GACnCsC,CACT,eACH,oGACD,MAAO,CACJlB,SAAS,EACT7B,QAAS,qBACT6C,KAAM,KACNC,KAAM,EAEZ,CAEA,SAAMS,CAAIvE,EAAcC,GACrB,aAAaC,KAAKH,KAAKC,EAAMC,EAChC,CAEA,UAAMuE,CAAKxE,EAAcC,GACtB,aAAaC,KAAKH,KAAKC,EAAIyE,OAAAC,OAAAD,OAAAC,OAAA,CAAA,EAAOzE,GAAI,CAAEuC,OAAQ,SACnD,CAEA,SAAMmC,CAAI3E,EAAcC,GACrB,aAAaC,KAAKH,KAAKC,EAAIyE,OAAAC,OAAAD,OAAAC,OAAA,CAAA,EAAOzE,GAAI,CAAEuC,OAAQ,QACnD,CAEA,YAAM,CAAOxC,EAAcC,GACxB,aAAaC,KAAKH,KAAKC,EAAIyE,OAAAC,OAAAD,OAAAC,OAAA,CAAA,EAAOzE,GAAI,CAAEuC,OAAQ,WACnD,SAEF3C"}
1
+ {"version":3,"file":"index.mjs","sources":["../../src/client/index.ts"],"sourcesContent":["import { HttpRequestInit, SecurequClientResponse } from \"./types\";\nimport { chunkFile, getFileId, totalChunks } from \"../include/File\";\nimport Base from \"./Base\";\nimport fileScaner from '../include/FileScaner';\nimport { UploadFileMeta } from \"../server/types\";\n\nclass SecurequClient extends Base {\n\n async send(path: string, init?: HttpRequestInit): Promise<SecurequClientResponse> {\n await this.awaitForHandshake();\n init = await this.hooksCall('beforeRequest', path, init) || init;\n const url = await this.url(path)\n if (url.pathname === '/') throw new Error(\"Path is not allowed\")\n\n for (let key in init?.body) {\n if (init?.body[key] instanceof File) {\n init.body[key] = await this.uploadFile(init.body[key], init?.onProgress)\n }\n }\n\n const res = await this.fetch(path, init);\n if ([\"Signeture expired\", \"Request expired\"].includes(res.message)) {\n await this.handshake();\n return await this.send(path, init);\n }\n await this.hooksCall('afterResponse', res);\n return res;\n }\n\n async uploadFile(file: File, onProgress?: (p: number) => void): Promise<SecurequClientResponse> {\n await this.awaitForHandshake();\n const fileId = await getFileId(file);\n const controller = new AbortController();\n\n let _file = await this.hooksCall('beforeUpload', file, fileId) || file;\n const maxFileSize = this.handshakeInfo?.maxFileSize\n if (maxFileSize && _file.size > maxFileSize * 1024) {\n throw new Error(`File size exceeds the limit of ${maxFileSize / 1024} MB`)\n }\n\n const chunkSize = this.handshakeInfo?.chunkSize\n\n // send metadata\n const filemeta: UploadFileMeta = {\n fileId: fileId,\n name: _file.name,\n size: _file.size,\n type: _file.type,\n totalChunks: totalChunks(_file, chunkSize),\n chunkIndex: 0,\n isFinish: false\n }\n\n const abort = async () => {\n await this.deleteFile(fileId);\n controller.abort();\n window.removeEventListener(\"pagehide\", abort);\n }\n\n window.addEventListener(\"pagehide\", abort);\n\n for await (let { chunk, chunkIndex } of chunkFile(_file, chunkSize)) {\n if (chunkIndex === 0 && this.handshakeInfo?.checkFileType && !fileScaner(chunk)) {\n await abort()\n return {\n success: false,\n message: \"Unknown or unsupported file type\",\n data: null,\n code: 0\n }\n }\n\n filemeta.chunkIndex = chunkIndex;\n filemeta.isFinish = chunkIndex + 1 === filemeta.totalChunks;\n\n const info: any = {\n method: 'PUT',\n signal: controller.signal,\n body: {\n chunk,\n filemeta\n },\n onProgress: (p: number) => {\n if (onProgress) {\n const totalProgress = Math.floor(((chunkIndex + 1) / filemeta.totalChunks) * 100)\n const currentProgress = Math.floor((p / 100) / filemeta.totalChunks * 100)\n onProgress(Math.min(totalProgress + currentProgress, 100))\n }\n }\n }\n await this.hooksCall('beforeUploadChunk', chunk, filemeta);\n\n let res = await this.fetch('/', info)\n\n if (!res.success) {\n if ([\"Signeture expired\", \"Request expired\"].includes(res.message)) {\n await this.handshake();\n window.removeEventListener(\"pagehide\", abort);\n res = await this.uploadFile(file, onProgress);\n } else {\n await abort()\n return res\n }\n }\n await this.hooksCall('afterUploadChunk', res, filemeta);\n }\n\n window.removeEventListener(\"pagehide\", abort);\n\n const info = {\n success: true,\n message: 'File uploaded successfully',\n data: filemeta,\n code: 200\n }\n await this.hooksCall('afterUpload', info, _file);\n return info\n }\n\n async deleteFile(fileId: string, init?: Omit<HttpRequestInit, 'body' | 'method'>): Promise<SecurequClientResponse> {\n await this.awaitForHandshake();\n const res = await this.fetch('/', {\n ...init,\n method: 'DELETE',\n body: { fileId }\n });\n if ([\"Signeture expired\", \"Request expired\"].includes(res.message)) {\n await this.handshake();\n return await this.deleteFile(fileId, init);\n }\n return res;\n }\n\n async get(path: string, init?: Omit<HttpRequestInit, 'body' | 'method'>) {\n return await this.send(path, init);\n }\n\n async post(path: string, init?: Omit<HttpRequestInit, 'method'>) {\n return await this.send(path, { ...init, method: \"POST\" });\n }\n\n async put(path: string, init?: Omit<HttpRequestInit, 'method'>) {\n return await this.send(path, { ...init, method: \"PUT\" });\n }\n\n async delete(path: string, init?: Omit<HttpRequestInit, 'method'>) {\n return await this.send(path, { ...init, method: \"DELETE\" });\n }\n\n}\n\nexport default SecurequClient;\n"],"names":["SecurequClient","Base","send","path","init","this","awaitForHandshake","hooksCall","url","pathname","Error","key","body","File","uploadFile","onProgress","res","fetch","includes","message","handshake","file","fileId","getFileId","controller","AbortController","_file","maxFileSize","_d","handshakeInfo","size","chunkSize","_e","filemeta","name","type","totalChunks","chunkIndex","isFinish","abort","async","deleteFile","window","removeEventListener","addEventListener","_j","_g","_h","__asyncValues","chunkFile","_a","next","done","_c","value","chunk","_f","checkFileType","fileScaner","success","data","code","info","method","signal","p","totalProgress","Math","floor","currentProgress","min","Object","assign","get","post","put"],"mappings":"uMAMA,MAAMA,UAAuBC,EAE1B,UAAMC,CAAKC,EAAcC,SAChBC,KAAKC,oBACXF,QAAaC,KAAKE,UAAU,gBAAiBJ,EAAMC,IAASA,EAE5D,GAAqB,aADHC,KAAKG,IAAIL,IACnBM,SAAkB,MAAM,IAAIC,MAAM,uBAE1C,IAAK,IAAIC,KAAOP,aAAI,EAAJA,EAAMQ,MACfR,aAAI,EAAJA,EAAMQ,KAAKD,cAAgBE,OAC5BT,EAAKQ,KAAKD,SAAaN,KAAKS,WAAWV,EAAKQ,KAAKD,GAAMP,aAAI,EAAJA,EAAMW,aAInE,MAAMC,QAAYX,KAAKY,MAAMd,EAAMC,GACnC,MAAI,CAAC,oBAAqB,mBAAmBc,SAASF,EAAIG,gBACjDd,KAAKe,kBACEf,KAAKH,KAAKC,EAAMC,WAE1BC,KAAKE,UAAU,gBAAiBS,GAC/BA,EACV,CAEA,gBAAMF,CAAWO,EAAYN,2BACpBV,KAAKC,oBACX,MAAMgB,QAAeC,EAAUF,GACzBG,EAAa,IAAIC,gBAEvB,IAAIC,QAAcrB,KAAKE,UAAU,eAAgBc,EAAMC,IAAWD,EAClE,MAAMM,EAAgC,QAAlBC,EAAAvB,KAAKwB,qBAAa,IAAAD,OAAA,EAAAA,EAAED,YACxC,GAAIA,GAAeD,EAAMI,KAAqB,KAAdH,EAC7B,MAAM,IAAIjB,MAAM,kCAAkCiB,EAAc,WAGnE,MAAMI,EAA8B,QAAlBC,EAAA3B,KAAKwB,qBAAa,IAAAG,OAAA,EAAAA,EAAED,UAGhCE,EAA2B,CAC9BX,OAAQA,EACRY,KAAMR,EAAMQ,KACZJ,KAAMJ,EAAMI,KACZK,KAAMT,EAAMS,KACZC,YAAaA,EAAYV,EAAOK,GAChCM,WAAY,EACZC,UAAU,GAGPC,EAAQC,gBACLnC,KAAKoC,WAAWnB,GACtBE,EAAWe,QACXG,OAAOC,oBAAoB,WAAYJ,IAG1CG,OAAOE,iBAAiB,WAAYL,OAEpC,IAAwC,IAA2BM,EAA3BC,GAAA,EAAAC,EAAAC,EAAAC,EAAUvB,EAAOK,MAAUmB,GAAAL,QAAAE,EAAAI,QAAAC,OAAA,CAA3BC,EAAAR,EAAAS,MAAAR,GAAA,MAA7B,IAAIS,MAAEA,EAAKlB,WAAEA,KACrB,GAAmB,IAAfA,IAAsC,QAAlBmB,EAAAnD,KAAKwB,qBAAa,IAAA2B,OAAA,EAAAA,EAAEC,iBAAkBC,EAAWH,GAEtE,aADMhB,IACC,CACJoB,SAAS,EACTxC,QAAS,mCACTyC,KAAM,KACNC,KAAM,GAIZ5B,EAASI,WAAaA,EACtBJ,EAASK,SAAWD,EAAa,IAAMJ,EAASG,YAEhD,MAAM0B,EAAY,CACfC,OAAQ,MACRC,OAAQxC,EAAWwC,OACnBpD,KAAM,CACH2C,QACAtB,YAEHlB,WAAakD,IACV,GAAIlD,EAAY,CACb,MAAMmD,EAAgBC,KAAKC,OAAQ/B,EAAa,GAAKJ,EAASG,YAAe,KACvEiC,EAAkBF,KAAKC,MAAOH,EAAI,IAAOhC,EAASG,YAAc,KACtErB,EAAWoD,KAAKG,IAAIJ,EAAgBG,EAAiB,KACvD,UAGDhE,KAAKE,UAAU,oBAAqBgD,EAAOtB,GAEjD,IAAIjB,QAAYX,KAAKY,MAAM,IAAK6C,GAEhC,IAAK9C,EAAI2C,QAAS,CACf,IAAI,CAAC,oBAAqB,mBAAmBzC,SAASF,EAAIG,SAMvD,aADMoB,IACCvB,QALDX,KAAKe,YACXsB,OAAOC,oBAAoB,WAAYJ,GACvCvB,QAAYX,KAAKS,WAAWO,EAAMN,EAKvC,OACKV,KAAKE,UAAU,mBAAoBS,EAAKiB,gBAChD,oGAEDS,OAAOC,oBAAoB,WAAYJ,GAEvC,MAAMuB,EAAO,CACVH,SAAS,EACTxC,QAAS,6BACTyC,KAAM3B,EACN4B,KAAM,KAGT,aADMxD,KAAKE,UAAU,cAAeuD,EAAMpC,GACnCoC,CACV,CAEA,gBAAMrB,CAAWnB,EAAgBlB,SACxBC,KAAKC,oBACX,MAAMU,QAAYX,KAAKY,MAAM,IAAGsD,OAAAC,OAAAD,OAAAC,OAAA,CAAA,EAC1BpE,IACH2D,OAAQ,SACRnD,KAAM,CAAEU,aAEX,MAAI,CAAC,oBAAqB,mBAAmBJ,SAASF,EAAIG,gBACjDd,KAAKe,kBACEf,KAAKoC,WAAWnB,EAAQlB,IAEjCY,CACV,CAEA,SAAMyD,CAAItE,EAAcC,GACrB,aAAaC,KAAKH,KAAKC,EAAMC,EAChC,CAEA,UAAMsE,CAAKvE,EAAcC,GACtB,aAAaC,KAAKH,KAAKC,EAAIoE,OAAAC,OAAAD,OAAAC,OAAA,CAAA,EAAOpE,GAAI,CAAE2D,OAAQ,SACnD,CAEA,SAAMY,CAAIxE,EAAcC,GACrB,aAAaC,KAAKH,KAAKC,EAAIoE,OAAAC,OAAAD,OAAAC,OAAA,CAAA,EAAOpE,GAAI,CAAE2D,OAAQ,QACnD,CAEA,YAAM,CAAO5D,EAAcC,GACxB,aAAaC,KAAKH,KAAKC,EAAIoE,OAAAC,OAAAD,OAAAC,OAAA,CAAA,EAAOpE,GAAI,CAAE2D,OAAQ,WACnD,SAEF/D"}
package/client/types.d.ts CHANGED
@@ -1,18 +1,18 @@
1
1
  import { XanFetchOptions } from 'xanfetch/types';
2
+ import { UploadFileMeta } from '../server/types.js';
2
3
 
3
4
  type HandshakeInfo = {
5
+ dev: boolean;
4
6
  timeDiffarenc: number;
5
7
  signeture: string;
6
8
  maxFileSize: number | null;
7
- dev: boolean;
8
9
  checkFileType: boolean;
10
+ chunkSize?: number;
9
11
  };
10
- type Kilobyte = number;
11
12
  type SecurequClientConfig = {
12
13
  url: string;
13
14
  secret: string;
14
15
  defaultOptions?: XanFetchOptions;
15
- chunkSize?: Kilobyte;
16
16
  hooks?: {
17
17
  beforeHandshake?: () => Promise<void> | void;
18
18
  afterHandshake?: (info: HandshakeInfo) => Promise<void> | void;
@@ -20,8 +20,8 @@ type SecurequClientConfig = {
20
20
  afterResponse?: (response: Response) => Promise<void> | void;
21
21
  beforeUpload?: (file: File, fileId: string) => Promise<File> | void;
22
22
  afterUpload?: (response: SecurequClientResponse, file: File) => Promise<void> | void;
23
- beforeUploadChunk?: (chunk: Blob, chunkIndex: number, totalChunks: number) => Promise<void> | void;
24
- afterUploadChunk?: (response: SecurequClientResponse, chunkIndex: number, totalChunks: number) => Promise<void> | void;
23
+ beforeUploadChunk?: (chunk: Blob, filemeta: UploadFileMeta) => Promise<void> | void;
24
+ afterUploadChunk?: (response: SecurequClientResponse, filemeta: UploadFileMeta) => Promise<void> | void;
25
25
  };
26
26
  };
27
27
  type SecurequClientResponse = {
package/include/File.js CHANGED
@@ -1 +1 @@
1
- "use strict";Object.defineProperty(exports,"__esModule",{value:!0});var e=require("tslib"),t=require("./crypto.js");function n(e){return e<=5242880?131072:e<=52428800?262144:e<=209715200?524288:1048576}exports.chunkFile=function(t,r){return e.__asyncGenerator(this,arguments,function*(){const i=t.size;r=r||n(i);let a=0;for(;a<i;){const n=t.slice(a,a+r),i=new Uint8Array(yield e.__await(n.arrayBuffer()));yield yield e.__await({chunk:i,chunkIndex:Math.floor(a/r)}),a+=r}})},exports.getFileId=async function(e){const n=[navigator.userAgent,navigator.language,screen.width,screen.height,screen.colorDepth,(new Date).getTimezoneOffset(),Intl.DateTimeFormat().resolvedOptions().timeZone||""].join("||"),r=`${e.name}||${e.size}||${e.lastModified}||${n}`;return await t.default.hash(r)},exports.totalChunks=(e,t)=>Math.ceil(e.size/(t||n(e.size)));//# sourceMappingURL=File.js.map
1
+ "use strict";Object.defineProperty(exports,"__esModule",{value:!0});var e=require("tslib"),t=require("./crypto.js");function n(e){const t=1048576;return e<=1*t?65536:e<=10*t?262144:e<=100*t?524288:e<=500*t?1*t:e<=2048*t?2*t:4*t}exports.chunkFile=function(t,i){return e.__asyncGenerator(this,arguments,function*(){const r=t.size;i=i||n(r);let o=0;for(;o<r;){const n=t.slice(o,o+i),r=new Uint8Array(yield e.__await(n.arrayBuffer()));yield yield e.__await({chunk:r,chunkIndex:Math.floor(o/i)}),o+=i}})},exports.getChunkSize=n,exports.getFileId=async function(e){let n=[];"undefined"!=typeof window&&(n=[navigator.userAgent,navigator.language,screen.width,screen.height,screen.colorDepth,(new Date).getTimezoneOffset(),Intl.DateTimeFormat().resolvedOptions().timeZone||""]);const i=`${e.name}||${e.size}||${e.lastModified}||${n.join("||")}`,r=e.name.split(".").pop()||"";return`${await t.default.hash(i)}.${r}`},exports.totalChunks=(e,t)=>Math.ceil(e.size/(t||n(e.size)));//# sourceMappingURL=File.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"File.js","sources":["../../src/include/File.ts"],"sourcesContent":["import crypto from \"./crypto\";\n\nfunction getChunkSize(fileSize: number): number {\n // fileSize in bytes\n if (fileSize <= 5 * 1024 * 1024) {\n // <= 5MB 128KB\n return 128 * 1024;\n } else if (fileSize <= 50 * 1024 * 1024) {\n // 550MB 256KB\n\n return 256 * 1024;\n } else if (fileSize <= 200 * 1024 * 1024) {\n // 50200MB 512KB\n return 512 * 1024;\n } else {\n // > 200MB 1MB (max)\n return 1024 * 1024;\n }\n}\n\n\nexport const totalChunks = (file: File, chunkSize?: number) => Math.ceil(file.size / (chunkSize || getChunkSize(file.size)));\n\nexport async function* chunkFile(file: File, chunkSize?: number) {\n const fileSize = file.size;\n chunkSize = chunkSize || getChunkSize(fileSize);\n let offset = 0;\n\n while (offset < fileSize) {\n const chunk = file.slice(offset, offset + chunkSize);\n const buffer = new Uint8Array(await chunk.arrayBuffer());\n yield { chunk: buffer, chunkIndex: Math.floor(offset / chunkSize) };\n offset += chunkSize;\n }\n}\n\n\nexport async function getFileId(file: File): Promise<string> {\n const data = [\n navigator.userAgent,\n navigator.language,\n screen.width,\n screen.height,\n screen.colorDepth,\n new Date().getTimezoneOffset(),\n Intl.DateTimeFormat().resolvedOptions().timeZone || \"\"\n ].join(\"||\");\n\n const meta = `${file.name}||${file.size}||${file.lastModified}||${data}`\n return await crypto.hash(meta);\n}"],"names":["getChunkSize","fileSize","exports","chunkFile","file","chunkSize","size","offset","chunk","slice","buffer","Uint8Array","__await","arrayBuffer","chunkIndex","Math","floor","getFileId","async","data","navigator","userAgent","language","screen","width","height","colorDepth","Date","getTimezoneOffset","Intl","DateTimeFormat","resolvedOptions","timeZone","join","meta","name","lastModified","crypto","hash","totalChunks","ceil"],"mappings":"oHAEA,SAASA,EAAaC,GAEnB,OAAIA,GAAY,QAEN,OACCA,GAAY,SAGb,OACCA,GAAY,UAEb,OAGA,OAEb,CAgCAC,QAAAC,UA3BM,SAA2BC,EAAYC,wDAC1C,MAAMJ,EAAWG,EAAKE,KACtBD,EAAYA,GAAaL,EAAaC,GACtC,IAAIM,EAAS,EAEb,KAAOA,EAASN,GAAU,CACvB,MAAMO,EAAQJ,EAAKK,MAAMF,EAAQA,EAASF,GACpCK,EAAS,IAAIC,iBAAWC,EAAAA,QAAMJ,EAAMK,4BAC1CD,EAAAA,QAAM,CAAEJ,MAAOE,EAAQI,WAAYC,KAAKC,MAAMT,EAASF,KACvDE,GAAUF,CACZ,CACJ,EAAC,EAgBDH,QAAAe,UAbOC,eAAyBd,GAC7B,MAAMe,EAAO,CACVC,UAAUC,UACVD,UAAUE,SACVC,OAAOC,MACPD,OAAOE,OACPF,OAAOG,YACP,IAAIC,MAAOC,oBACXC,KAAKC,iBAAiBC,kBAAkBC,UAAY,IACrDC,KAAK,MAEDC,EAAO,GAAG9B,EAAK+B,SAAS/B,EAAKE,SAASF,EAAKgC,iBAAiBjB,IAClE,aAAakB,EAAAA,QAAOC,KAAKJ,EAC5B,EAAAhC,QAAAqC,YA7B2B,CAACnC,EAAYC,IAAuBU,KAAKyB,KAAKpC,EAAKE,MAAQD,GAAaL,EAAaI,EAAKE"}
1
+ {"version":3,"file":"File.js","sources":["../../src/include/File.ts"],"sourcesContent":["import crypto from \"./crypto\";\n\nexport function getChunkSize(fileSize: number): number {\n // fileSize in bytes\n const MB = 1024 * 1024;\n\n if (fileSize <= 1 * MB) {\n // Very small files (<1MB): single small chunk\n return 64 * 1024; // 64 KB\n } else if (fileSize <= 10 * MB) {\n // Small files (1–10MB): medium chunks\n return 256 * 1024; // 256 KB\n } else if (fileSize <= 100 * MB) {\n // Medium files (10–100MB): faster upload, moderate size\n return 512 * 1024; // 512 KB\n } else if (fileSize <= 500 * MB) {\n // Large files (100500MB): larger chunks to reduce overhead\n return 1 * MB; // 1 MB\n } else if (fileSize <= 2 * 1024 * MB) {\n // Very large files (500MB2GB): fewer but larger parts\n return 2 * MB; // 2 MB\n } else {\n // Extremely large files (>2GB)\n return 4 * MB; // 4 MB max chunk size\n }\n}\n\nexport const totalChunks = (file: File, chunkSize?: number) => Math.ceil(file.size / (chunkSize || getChunkSize(file.size)));\n\nexport async function* chunkFile(file: File, chunkSize?: number) {\n const fileSize = file.size;\n chunkSize = chunkSize || getChunkSize(fileSize);\n let offset = 0;\n\n while (offset < fileSize) {\n const chunk = file.slice(offset, offset + chunkSize);\n const buffer = new Uint8Array(await chunk.arrayBuffer());\n yield { chunk: buffer, chunkIndex: Math.floor(offset / chunkSize) };\n offset += chunkSize;\n }\n}\n\n\nexport async function getFileId(file: File): Promise<string> {\n let data: any[] = [];\n if (typeof window !== 'undefined') {\n data = [\n navigator.userAgent,\n navigator.language,\n screen.width,\n screen.height,\n screen.colorDepth,\n new Date().getTimezoneOffset(),\n Intl.DateTimeFormat().resolvedOptions().timeZone || \"\"\n ]\n }\n\n const meta = `${file.name}||${file.size}||${file.lastModified}||${data.join(\"||\")}`\n const ext = file.name.split('.').pop() || ''\n const id = await crypto.hash(meta);\n return `${id}.${ext}`;\n}"],"names":["getChunkSize","fileSize","MB","exports","chunkFile","file","chunkSize","size","offset","chunk","slice","buffer","Uint8Array","__await","arrayBuffer","chunkIndex","Math","floor","getFileId","async","data","window","navigator","userAgent","language","screen","width","height","colorDepth","Date","getTimezoneOffset","Intl","DateTimeFormat","resolvedOptions","timeZone","meta","name","lastModified","join","ext","split","pop","crypto","hash","totalChunks","ceil"],"mappings":"oHAEM,SAAUA,EAAaC,GAE1B,MAAMC,EAAK,QAEX,OAAID,GAAY,EAAIC,EAEV,MACCD,GAAY,GAAKC,EAElB,OACCD,GAAY,IAAMC,EAEnB,OACCD,GAAY,IAAMC,EAEnB,EAAIA,EACHD,GAAY,KAAWC,EAExB,EAAIA,EAGJ,EAAIA,CAEjB,CAoCAC,QAAAC,UAhCM,SAA2BC,EAAYC,wDAC1C,MAAML,EAAWI,EAAKE,KACtBD,EAAYA,GAAaN,EAAaC,GACtC,IAAIO,EAAS,EAEb,KAAOA,EAASP,GAAU,CACvB,MAAMQ,EAAQJ,EAAKK,MAAMF,EAAQA,EAASF,GACpCK,EAAS,IAAIC,iBAAWC,EAAAA,QAAMJ,EAAMK,4BAC1CD,EAAAA,QAAM,CAAEJ,MAAOE,EAAQI,WAAYC,KAAKC,MAAMT,EAASF,KACvDE,GAAUF,CACZ,CACJ,EAAC,EAqBDH,QAAAH,aAAAA,EAAAG,QAAAe,UAlBOC,eAAyBd,GAC7B,IAAIe,EAAc,GACI,oBAAXC,SACRD,EAAO,CACJE,UAAUC,UACVD,UAAUE,SACVC,OAAOC,MACPD,OAAOE,OACPF,OAAOG,YACP,IAAIC,MAAOC,oBACXC,KAAKC,iBAAiBC,kBAAkBC,UAAY,KAI1D,MAAMC,EAAO,GAAG9B,EAAK+B,SAAS/B,EAAKE,SAASF,EAAKgC,iBAAiBjB,EAAKkB,KAAK,QACtEC,EAAMlC,EAAK+B,KAAKI,MAAM,KAAKC,OAAS,GAE1C,MAAO,SADUC,UAAOC,KAAKR,MACbI,GACnB,EAAApC,QAAAyC,YAlC2B,CAACvC,EAAYC,IAAuBU,KAAK6B,KAAKxC,EAAKE,MAAQD,GAAaN,EAAaK,EAAKE"}
package/include/File.mjs CHANGED
@@ -1 +1 @@
1
- import{__asyncGenerator as e,__await as t}from"tslib";import n from"./crypto.mjs";function i(e){return e<=5242880?131072:e<=52428800?262144:e<=209715200?524288:1048576}const o=(e,t)=>Math.ceil(e.size/(t||i(e.size)));function r(n,o){return e(this,arguments,function*(){const e=n.size;o=o||i(e);let r=0;for(;r<e;){const e=n.slice(r,r+o),i=new Uint8Array(yield t(e.arrayBuffer()));yield yield t({chunk:i,chunkIndex:Math.floor(r/o)}),r+=o}})}async function s(e){const t=[navigator.userAgent,navigator.language,screen.width,screen.height,screen.colorDepth,(new Date).getTimezoneOffset(),Intl.DateTimeFormat().resolvedOptions().timeZone||""].join("||"),i=`${e.name}||${e.size}||${e.lastModified}||${t}`;return await n.hash(i)}export{r as chunkFile,s as getFileId,o as totalChunks};//# sourceMappingURL=File.mjs.map
1
+ import{__asyncGenerator as e,__await as t}from"tslib";import n from"./crypto.mjs";function i(e){const t=1048576;return e<=1*t?65536:e<=10*t?262144:e<=100*t?524288:e<=500*t?1*t:e<=2048*t?2*t:4*t}const o=(e,t)=>Math.ceil(e.size/(t||i(e.size)));function r(n,o){return e(this,arguments,function*(){const e=n.size;o=o||i(e);let r=0;for(;r<e;){const e=n.slice(r,r+o),i=new Uint8Array(yield t(e.arrayBuffer()));yield yield t({chunk:i,chunkIndex:Math.floor(r/o)}),r+=o}})}async function s(e){let t=[];"undefined"!=typeof window&&(t=[navigator.userAgent,navigator.language,screen.width,screen.height,screen.colorDepth,(new Date).getTimezoneOffset(),Intl.DateTimeFormat().resolvedOptions().timeZone||""]);const i=`${e.name}||${e.size}||${e.lastModified}||${t.join("||")}`,o=e.name.split(".").pop()||"";return`${await n.hash(i)}.${o}`}export{r as chunkFile,i as getChunkSize,s as getFileId,o as totalChunks};//# sourceMappingURL=File.mjs.map
@@ -1 +1 @@
1
- {"version":3,"file":"File.mjs","sources":["../../src/include/File.ts"],"sourcesContent":["import crypto from \"./crypto\";\n\nfunction getChunkSize(fileSize: number): number {\n // fileSize in bytes\n if (fileSize <= 5 * 1024 * 1024) {\n // <= 5MB 128KB\n return 128 * 1024;\n } else if (fileSize <= 50 * 1024 * 1024) {\n // 550MB 256KB\n\n return 256 * 1024;\n } else if (fileSize <= 200 * 1024 * 1024) {\n // 50200MB 512KB\n return 512 * 1024;\n } else {\n // > 200MB 1MB (max)\n return 1024 * 1024;\n }\n}\n\n\nexport const totalChunks = (file: File, chunkSize?: number) => Math.ceil(file.size / (chunkSize || getChunkSize(file.size)));\n\nexport async function* chunkFile(file: File, chunkSize?: number) {\n const fileSize = file.size;\n chunkSize = chunkSize || getChunkSize(fileSize);\n let offset = 0;\n\n while (offset < fileSize) {\n const chunk = file.slice(offset, offset + chunkSize);\n const buffer = new Uint8Array(await chunk.arrayBuffer());\n yield { chunk: buffer, chunkIndex: Math.floor(offset / chunkSize) };\n offset += chunkSize;\n }\n}\n\n\nexport async function getFileId(file: File): Promise<string> {\n const data = [\n navigator.userAgent,\n navigator.language,\n screen.width,\n screen.height,\n screen.colorDepth,\n new Date().getTimezoneOffset(),\n Intl.DateTimeFormat().resolvedOptions().timeZone || \"\"\n ].join(\"||\");\n\n const meta = `${file.name}||${file.size}||${file.lastModified}||${data}`\n return await crypto.hash(meta);\n}"],"names":["getChunkSize","fileSize","totalChunks","file","chunkSize","Math","ceil","size","chunkFile","offset","chunk","slice","buffer","Uint8Array","__await","arrayBuffer","chunkIndex","floor","async","getFileId","data","navigator","userAgent","language","screen","width","height","colorDepth","Date","getTimezoneOffset","Intl","DateTimeFormat","resolvedOptions","timeZone","join","meta","name","lastModified","crypto","hash"],"mappings":"kFAEA,SAASA,EAAaC,GAEnB,OAAIA,GAAY,QAEN,OACCA,GAAY,SAGb,OACCA,GAAY,UAEb,OAGA,OAEb,CAGO,MAAMC,EAAc,CAACC,EAAYC,IAAuBC,KAAKC,KAAKH,EAAKI,MAAQH,GAAaJ,EAAaG,EAAKI,QAE/G,SAAiBC,EAAUL,EAAYC,uCAC1C,MAAMH,EAAWE,EAAKI,KACtBH,EAAYA,GAAaJ,EAAaC,GACtC,IAAIQ,EAAS,EAEb,KAAOA,EAASR,GAAU,CACvB,MAAMS,EAAQP,EAAKQ,MAAMF,EAAQA,EAASL,GACpCQ,EAAS,IAAIC,iBAAWC,EAAMJ,EAAMK,4BAC1CD,EAAM,CAAEJ,MAAOE,EAAQI,WAAYX,KAAKY,MAAMR,EAASL,KACvDK,GAAUL,CACZ,CACJ,EAAC,CAGMc,eAAeC,EAAUhB,GAC7B,MAAMiB,EAAO,CACVC,UAAUC,UACVD,UAAUE,SACVC,OAAOC,MACPD,OAAOE,OACPF,OAAOG,YACP,IAAIC,MAAOC,oBACXC,KAAKC,iBAAiBC,kBAAkBC,UAAY,IACrDC,KAAK,MAEDC,EAAO,GAAGhC,EAAKiC,SAASjC,EAAKI,SAASJ,EAAKkC,iBAAiBjB,IAClE,aAAakB,EAAOC,KAAKJ,EAC5B,QAAA3B,eAAAW,eAAAjB"}
1
+ {"version":3,"file":"File.mjs","sources":["../../src/include/File.ts"],"sourcesContent":["import crypto from \"./crypto\";\n\nexport function getChunkSize(fileSize: number): number {\n // fileSize in bytes\n const MB = 1024 * 1024;\n\n if (fileSize <= 1 * MB) {\n // Very small files (<1MB): single small chunk\n return 64 * 1024; // 64 KB\n } else if (fileSize <= 10 * MB) {\n // Small files (1–10MB): medium chunks\n return 256 * 1024; // 256 KB\n } else if (fileSize <= 100 * MB) {\n // Medium files (10–100MB): faster upload, moderate size\n return 512 * 1024; // 512 KB\n } else if (fileSize <= 500 * MB) {\n // Large files (100500MB): larger chunks to reduce overhead\n return 1 * MB; // 1 MB\n } else if (fileSize <= 2 * 1024 * MB) {\n // Very large files (500MB2GB): fewer but larger parts\n return 2 * MB; // 2 MB\n } else {\n // Extremely large files (>2GB)\n return 4 * MB; // 4 MB max chunk size\n }\n}\n\nexport const totalChunks = (file: File, chunkSize?: number) => Math.ceil(file.size / (chunkSize || getChunkSize(file.size)));\n\nexport async function* chunkFile(file: File, chunkSize?: number) {\n const fileSize = file.size;\n chunkSize = chunkSize || getChunkSize(fileSize);\n let offset = 0;\n\n while (offset < fileSize) {\n const chunk = file.slice(offset, offset + chunkSize);\n const buffer = new Uint8Array(await chunk.arrayBuffer());\n yield { chunk: buffer, chunkIndex: Math.floor(offset / chunkSize) };\n offset += chunkSize;\n }\n}\n\n\nexport async function getFileId(file: File): Promise<string> {\n let data: any[] = [];\n if (typeof window !== 'undefined') {\n data = [\n navigator.userAgent,\n navigator.language,\n screen.width,\n screen.height,\n screen.colorDepth,\n new Date().getTimezoneOffset(),\n Intl.DateTimeFormat().resolvedOptions().timeZone || \"\"\n ]\n }\n\n const meta = `${file.name}||${file.size}||${file.lastModified}||${data.join(\"||\")}`\n const ext = file.name.split('.').pop() || ''\n const id = await crypto.hash(meta);\n return `${id}.${ext}`;\n}"],"names":["getChunkSize","fileSize","MB","totalChunks","file","chunkSize","Math","ceil","size","chunkFile","offset","chunk","slice","buffer","Uint8Array","__await","arrayBuffer","chunkIndex","floor","async","getFileId","data","window","navigator","userAgent","language","screen","width","height","colorDepth","Date","getTimezoneOffset","Intl","DateTimeFormat","resolvedOptions","timeZone","meta","name","lastModified","join","ext","split","pop","crypto","hash"],"mappings":"kFAEM,SAAUA,EAAaC,GAE1B,MAAMC,EAAK,QAEX,OAAID,GAAY,EAAIC,EAEV,MACCD,GAAY,GAAKC,EAElB,OACCD,GAAY,IAAMC,EAEnB,OACCD,GAAY,IAAMC,EAEnB,EAAIA,EACHD,GAAY,KAAWC,EAExB,EAAIA,EAGJ,EAAIA,CAEjB,CAEO,MAAMC,EAAc,CAACC,EAAYC,IAAuBC,KAAKC,KAAKH,EAAKI,MAAQH,GAAaL,EAAaI,EAAKI,QAE/G,SAAiBC,EAAUL,EAAYC,uCAC1C,MAAMJ,EAAWG,EAAKI,KACtBH,EAAYA,GAAaL,EAAaC,GACtC,IAAIS,EAAS,EAEb,KAAOA,EAAST,GAAU,CACvB,MAAMU,EAAQP,EAAKQ,MAAMF,EAAQA,EAASL,GACpCQ,EAAS,IAAIC,iBAAWC,EAAMJ,EAAMK,4BAC1CD,EAAM,CAAEJ,MAAOE,EAAQI,WAAYX,KAAKY,MAAMR,EAASL,KACvDK,GAAUL,CACZ,CACJ,EAAC,CAGMc,eAAeC,EAAUhB,GAC7B,IAAIiB,EAAc,GACI,oBAAXC,SACRD,EAAO,CACJE,UAAUC,UACVD,UAAUE,SACVC,OAAOC,MACPD,OAAOE,OACPF,OAAOG,YACP,IAAIC,MAAOC,oBACXC,KAAKC,iBAAiBC,kBAAkBC,UAAY,KAI1D,MAAMC,EAAO,GAAGhC,EAAKiC,SAASjC,EAAKI,SAASJ,EAAKkC,iBAAiBjB,EAAKkB,KAAK,QACtEC,EAAMpC,EAAKiC,KAAKI,MAAM,KAAKC,OAAS,GAE1C,MAAO,SADUC,EAAOC,KAAKR,MACbI,GACnB,QAAA/B,eAAAT,kBAAAoB,eAAAjB"}
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "securequ",
3
- "version": "1.1.4",
3
+ "version": "1.1.6",
4
4
  "description": "",
5
5
  "keywords": [],
6
6
  "sideEffects": false,
package/server/Base.js CHANGED
@@ -1 +1 @@
1
- "use strict";Object.defineProperty(exports,"__esModule",{value:!0});var e=require("../include/crypto.js"),t=require("./Router.js");class s extends t.default{constructor(e){if(super(),this.secret=null,this.clients=new Map,this.uploadMeta=new Map,this.CONTENT_TYPE="application/octet-stream",!e.basepath)throw new Error("Basepath is required");if(!e.clients||0===Object.keys(e.clients).length)throw new Error("Atleast one client is required");e.basepath.startsWith("/")||(e.basepath=`/${e.basepath}`),e.basepath.endsWith("/")&&(e.basepath=e.basepath.substring(0,e.basepath.length-1)),e.upload&&(e.upload.maxFilesize=e.upload.maxFilesize||51200,e.upload.checkFileType=e.upload.checkFileType||!0),e.mode=["production","development"].includes(e.mode||"")?e.mode:"production",this.config=e;for(let e of this.config.clients)this.clients.set(e.origin,e.secret)}async getSecret(){return this.secret||(this.secret=await e.default.hash(Math.random().toString(36).substring(2,15)+Math.random().toString(36).substring(2,15))),this.secret}async clientInfo(t,s){const i="/"!==t&&"development"===this.config.mode;let a=t.split("?");const n=(t=(t=(t=(t=a[0]).replace(this.config.basepath+"/","")).endsWith("/")?t.substring(0,t.length-1):t).startsWith("/")?t.substring(1):t).split("/"),r=n.shift();let o=this.clients.get(s);if(o||(o=this.clients.get("*")),!(null==r?void 0:r.length)||!o)return null;let c=o.substring(0,r.length),h={};return a.length>1&&(h=i?Object.fromEntries(new URLSearchParams(decodeURIComponent(a[1]))):await e.default.decrypt(decodeURIComponent(a[1]),c)),{path:"/"+n.join("/"),secret:c,hash:r,searchParams:h}}async isValidSigneture(t,s){const i=await this.getSecret();if(this.secret&&t){let a=await e.default.decrypt(t,i),n=a.hash===s,r=a.expire>Date.now();if(!n)throw new Response("Invalid Signeture",{status:403});if(!r)throw new Response("Signeture expired",{status:403})}}async handleRequest(e,t){if(this.config.accept){if(!await this.config.accept(e,t))throw new Response("Request not accepted",{status:403})}const{path:s,method:i}=e;let a=Object.values(this.routes[i]);for(let{test:i,handler:n}of a){const a=i(s);a&&await n(Object.assign(Object.assign({},e),{params:a.params}),t)}}}exports.default=s;//# sourceMappingURL=Base.js.map
1
+ "use strict";Object.defineProperty(exports,"__esModule",{value:!0});var e=require("../include/crypto.js"),t=require("./Router.js");class s extends t.default{constructor(e){if(super(),this.secret=null,this.clients=new Map,this.uploadMeta=new Map,this.CONTENT_TYPE="application/octet-stream",!e.basepath)throw new Error("Basepath is required");if(!e.clients||0===Object.keys(e.clients).length)throw new Error("Atleast one client is required");e.basepath.startsWith("/")||(e.basepath=`/${e.basepath}`),e.basepath.endsWith("/")&&(e.basepath=e.basepath.substring(0,e.basepath.length-1)),e.file&&(e.file.maxFilesize=e.file.maxFilesize||51200,e.file.checkFileType=e.file.checkFileType||!0),e.mode=["production","development"].includes(e.mode||"")?e.mode:"production",this.config=e;for(let e of this.config.clients)this.clients.set(e.origin,e.secret)}async getSecret(){return this.secret||(this.secret=await e.default.hash(Math.random().toString(36).substring(2,15)+Math.random().toString(36).substring(2,15))),this.secret}async clientInfo(t,s){const i="/"!==t&&"development"===this.config.mode;let a=t.split("?");const n=(t=(t=(t=(t=a[0]).replace(this.config.basepath+"/","")).endsWith("/")?t.substring(0,t.length-1):t).startsWith("/")?t.substring(1):t).split("/"),r=n.shift();let c=this.clients.get(s);if(c||(c=this.clients.get("*")),!(null==r?void 0:r.length)||!c)return null;let o=c.substring(0,r.length),h={};return a.length>1&&(h=i?Object.fromEntries(new URLSearchParams(decodeURIComponent(a[1]))):await e.default.decrypt(decodeURIComponent(a[1]),o)),{path:"/"+n.join("/"),secret:o,hash:r,searchParams:h}}async isValidSigneture(t,s){const i=await this.getSecret();if(this.secret&&t){let a=await e.default.decrypt(t,i),n=a.hash===s,r=a.expire>Date.now();if(!n)throw new Response("Invalid Signeture",{status:403});if(!r)throw new Response("Signeture expired",{status:403})}}async handleRequest(e,t){if(this.config.accept){if(!await this.config.accept(e,t))throw new Response("Request not accepted",{status:403})}const{path:s,method:i}=e;let a=Object.values(this.routes[i]);for(let{test:i,handler:n}of a){const a=i(s);a&&await n(Object.assign(Object.assign({},e),{params:a.params}),t)}}}exports.default=s;//# sourceMappingURL=Base.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"Base.js","sources":["../../src/server/Base.ts"],"sourcesContent":["import crypto from \"../include/crypto\";\nimport Router from \"./Router\";\nimport { HandlerInfo, SecurequServerConfig, ServerClientSecret, ServerClientOrigin, UploadFileMeta, Metadata } from \"./types\";\n\nclass SecurequServerBase extends Router {\n protected config: SecurequServerConfig;\n protected secret: string | null = null\n protected clients = new Map<ServerClientOrigin, ServerClientSecret>();\n protected uploadMeta = new Map<string, UploadFileMeta & { expire: number }>();\n readonly CONTENT_TYPE = \"application/octet-stream\";\n\n constructor(config: SecurequServerConfig) {\n super()\n if (!config.basepath) throw new Error(\"Basepath is required\");\n if (!config.clients || Object.keys(config.clients).length === 0) throw new Error(\"Atleast one client is required\");\n if (!config.basepath.startsWith(\"/\")) config.basepath = `/${config.basepath}`;\n if (config.basepath.endsWith(\"/\")) config.basepath = config.basepath.substring(0, config.basepath.length - 1);\n if (config.upload) {\n config.upload.maxFilesize = config.upload.maxFilesize || 50 * 1024 // 50MB default\n config.upload.checkFileType = config.upload.checkFileType || true\n }\n config.mode = [\"production\", 'development'].includes(config.mode || \"\") ? config.mode : \"production\"\n this.config = config\n for (let client of this.config.clients) {\n this.clients.set(client.origin, client.secret)\n }\n }\n\n protected async getSecret() {\n if (!this.secret) {\n this.secret = await crypto.hash(Math.random().toString(36).substring(2, 15) + Math.random().toString(36).substring(2, 15))\n }\n return this.secret\n }\n\n protected async clientInfo(path: string, origin: string) {\n const isDev = path !== '/' && this.config.mode === 'development'\n let splitUrl = path.split(\"?\")\n path = splitUrl[0]\n path = path.replace(this.config.basepath + \"/\", \"\")\n path = path.endsWith('/') ? path.substring(0, path.length - 1) : path\n path = path.startsWith('/') ? path.substring(1) : path\n\n const split = path.split(\"/\")\n const hash = split.shift()\n let client = this.clients.get(origin)\n if (!client) {\n client = this.clients.get(\"*\")\n }\n\n if (!hash?.length || !client) return null\n let secret = client.substring(0, hash.length as number);\n let searchParams: { [key: string]: any } = {}\n if (splitUrl.length > 1) {\n if (isDev) {\n searchParams = Object.fromEntries(new URLSearchParams(decodeURIComponent(splitUrl[1])))\n } else {\n searchParams = await crypto.decrypt(decodeURIComponent(splitUrl[1]), secret) as any\n }\n }\n return {\n path: \"/\" + split.join('/'),\n secret,\n hash,\n searchParams\n }\n }\n\n protected async isValidSigneture(signeture: string | undefined, hash: string) {\n const serverSecret = await this.getSecret()\n if (this.secret && signeture) {\n let info: any = await crypto.decrypt(signeture, serverSecret)\n let isHashValid = info.hash === hash\n let isNotExpired = info.expire > Date.now()\n if (!isHashValid) throw new Response(\"Invalid Signeture\", { status: 403 });\n if (!isNotExpired) throw new Response(\"Signeture expired\", { status: 403 });\n }\n }\n\n async handleRequest(info: HandlerInfo, metadata?: Metadata) {\n if (this.config.accept) {\n const is = await this.config.accept(info, metadata)\n if (!is) throw new Response(\"Request not accepted\", { status: 403 })\n }\n\n const { path, method } = info;\n let values: any = Object.values(this.routes[method]);\n for (let { test, handler } of values) {\n const match = test(path)\n if (match) {\n await handler({ ...info, params: match.params }, metadata)\n }\n }\n }\n\n}\n\nexport default SecurequServerBase;"],"names":["SecurequServerBase","Router","constructor","config","super","this","secret","clients","Map","uploadMeta","CONTENT_TYPE","basepath","Error","Object","keys","length","startsWith","endsWith","substring","upload","maxFilesize","checkFileType","mode","includes","client","set","origin","getSecret","crypto","hash","Math","random","toString","clientInfo","path","isDev","splitUrl","split","replace","shift","get","searchParams","fromEntries","URLSearchParams","decodeURIComponent","decrypt","join","isValidSigneture","signeture","serverSecret","info","isHashValid","isNotExpired","expire","Date","now","Response","status","handleRequest","metadata","accept","method","values","routes","test","handler","match","assign","params","exports","default"],"mappings":"mIAIA,MAAMA,UAA2BC,EAAAA,QAO9B,WAAAC,CAAYC,GAET,GADAC,QANOC,KAAAC,OAAwB,KACxBD,KAAAE,QAAU,IAAIC,IACdH,KAAAI,WAAa,IAAID,IAClBH,KAAAK,aAAe,4BAIhBP,EAAOQ,SAAU,MAAM,IAAIC,MAAM,wBACtC,IAAKT,EAAOI,SAAkD,IAAvCM,OAAOC,KAAKX,EAAOI,SAASQ,OAAc,MAAM,IAAIH,MAAM,kCAC5ET,EAAOQ,SAASK,WAAW,OAAMb,EAAOQ,SAAW,IAAIR,EAAOQ,YAC/DR,EAAOQ,SAASM,SAAS,OAAMd,EAAOQ,SAAWR,EAAOQ,SAASO,UAAU,EAAGf,EAAOQ,SAASI,OAAS,IACvGZ,EAAOgB,SACRhB,EAAOgB,OAAOC,YAAcjB,EAAOgB,OAAOC,aAAe,MACzDjB,EAAOgB,OAAOE,cAAgBlB,EAAOgB,OAAOE,gBAAiB,GAEhElB,EAAOmB,KAAO,CAAC,aAAc,eAAeC,SAASpB,EAAOmB,MAAQ,IAAMnB,EAAOmB,KAAO,aACxFjB,KAAKF,OAASA,EACd,IAAK,IAAIqB,KAAUnB,KAAKF,OAAOI,QAC5BF,KAAKE,QAAQkB,IAAID,EAAOE,OAAQF,EAAOlB,OAE7C,CAEU,eAAMqB,GAIb,OAHKtB,KAAKC,SACPD,KAAKC,aAAesB,EAAAA,QAAOC,KAAKC,KAAKC,SAASC,SAAS,IAAId,UAAU,EAAG,IAAMY,KAAKC,SAASC,SAAS,IAAId,UAAU,EAAG,MAElHb,KAAKC,MACf,CAEU,gBAAM2B,CAAWC,EAAcR,GACtC,MAAMS,EAAiB,MAATD,GAAqC,gBAArB7B,KAAKF,OAAOmB,KAC1C,IAAIc,EAAWF,EAAKG,MAAM,KAM1B,MAAMA,GAFNH,GADAA,GADAA,GADAA,EAAOE,EAAS,IACJE,QAAQjC,KAAKF,OAAOQ,SAAW,IAAK,KACpCM,SAAS,KAAOiB,EAAKhB,UAAU,EAAGgB,EAAKnB,OAAS,GAAKmB,GACrDlB,WAAW,KAAOkB,EAAKhB,UAAU,GAAKgB,GAE/BG,MAAM,KACnBR,EAAOQ,EAAME,QACnB,IAAIf,EAASnB,KAAKE,QAAQiC,IAAId,GAK9B,GAJKF,IACFA,EAASnB,KAAKE,QAAQiC,IAAI,QAGxBX,aAAI,EAAJA,EAAMd,UAAWS,EAAQ,OAAO,KACrC,IAAIlB,EAASkB,EAAON,UAAU,EAAGW,EAAKd,QAClC0B,EAAuC,CAAA,EAQ3C,OAPIL,EAASrB,OAAS,IAEhB0B,EADCN,EACctB,OAAO6B,YAAY,IAAIC,gBAAgBC,mBAAmBR,EAAS,YAE7DR,EAAAA,QAAOiB,QAAQD,mBAAmBR,EAAS,IAAK9B,IAGpE,CACJ4B,KAAM,IAAMG,EAAMS,KAAK,KACvBxC,SACAuB,OACAY,eAEN,CAEU,sBAAMM,CAAiBC,EAA+BnB,GAC7D,MAAMoB,QAAqB5C,KAAKsB,YAChC,GAAItB,KAAKC,QAAU0C,EAAW,CAC3B,IAAIE,QAAkBtB,EAAAA,QAAOiB,QAAQG,EAAWC,GAC5CE,EAAcD,EAAKrB,OAASA,EAC5BuB,EAAeF,EAAKG,OAASC,KAAKC,MACtC,IAAKJ,EAAa,MAAM,IAAIK,SAAS,oBAAqB,CAAEC,OAAQ,MACpE,IAAKL,EAAc,MAAM,IAAII,SAAS,oBAAqB,CAAEC,OAAQ,KACvE,CACJ,CAEA,mBAAMC,CAAcR,EAAmBS,GACpC,GAAItD,KAAKF,OAAOyD,OAAQ,CAErB,UADiBvD,KAAKF,OAAOyD,OAAOV,EAAMS,GACjC,MAAM,IAAIH,SAAS,uBAAwB,CAAEC,OAAQ,KAChE,CAED,MAAMvB,KAAEA,EAAI2B,OAAEA,GAAWX,EACzB,IAAIY,EAAcjD,OAAOiD,OAAOzD,KAAK0D,OAAOF,IAC5C,IAAK,IAAIG,KAAEA,EAAIC,QAAEA,KAAaH,EAAQ,CACnC,MAAMI,EAAQF,EAAK9B,GACfgC,SACKD,EAAOpD,OAAAsD,OAAAtD,OAAAsD,OAAA,CAAA,EAAMjB,GAAI,CAAEkB,OAAQF,EAAME,SAAUT,EAEtD,CACJ,EAEFU,QAAAC,QAAAtE"}
1
+ {"version":3,"file":"Base.js","sources":["../../src/server/Base.ts"],"sourcesContent":["import crypto from \"../include/crypto\";\nimport Router from \"./Router\";\nimport { HandlerInfo, SecurequServerConfig, ServerClientSecret, ServerClientOrigin, UploadFileMeta, Metadata } from \"./types\";\n\nclass SecurequServerBase extends Router {\n protected config: SecurequServerConfig;\n protected secret: string | null = null\n protected clients = new Map<ServerClientOrigin, ServerClientSecret>();\n protected uploadMeta = new Map<string, UploadFileMeta & { expire: number }>();\n readonly CONTENT_TYPE = \"application/octet-stream\";\n\n constructor(config: SecurequServerConfig) {\n super()\n if (!config.basepath) throw new Error(\"Basepath is required\");\n if (!config.clients || Object.keys(config.clients).length === 0) throw new Error(\"Atleast one client is required\");\n if (!config.basepath.startsWith(\"/\")) config.basepath = `/${config.basepath}`;\n if (config.basepath.endsWith(\"/\")) config.basepath = config.basepath.substring(0, config.basepath.length - 1);\n if (config.file) {\n config.file.maxFilesize = config.file.maxFilesize || 50 * 1024 // 50MB default\n config.file.checkFileType = config.file.checkFileType || true\n }\n config.mode = [\"production\", 'development'].includes(config.mode || \"\") ? config.mode : \"production\"\n this.config = config\n for (let client of this.config.clients) {\n this.clients.set(client.origin, client.secret)\n }\n }\n\n protected async getSecret() {\n if (!this.secret) {\n this.secret = await crypto.hash(Math.random().toString(36).substring(2, 15) + Math.random().toString(36).substring(2, 15))\n }\n return this.secret\n }\n\n protected async clientInfo(path: string, origin: string) {\n const isDev = path !== '/' && this.config.mode === 'development'\n let splitUrl = path.split(\"?\")\n path = splitUrl[0]\n path = path.replace(this.config.basepath + \"/\", \"\")\n path = path.endsWith('/') ? path.substring(0, path.length - 1) : path\n path = path.startsWith('/') ? path.substring(1) : path\n\n const split = path.split(\"/\")\n const hash = split.shift()\n let client = this.clients.get(origin)\n if (!client) {\n client = this.clients.get(\"*\")\n }\n\n if (!hash?.length || !client) return null\n let secret = client.substring(0, hash.length as number);\n let searchParams: { [key: string]: any } = {}\n if (splitUrl.length > 1) {\n if (isDev) {\n searchParams = Object.fromEntries(new URLSearchParams(decodeURIComponent(splitUrl[1])))\n } else {\n searchParams = await crypto.decrypt(decodeURIComponent(splitUrl[1]), secret) as any\n }\n }\n return {\n path: \"/\" + split.join('/'),\n secret,\n hash,\n searchParams\n }\n }\n\n protected async isValidSigneture(signeture: string | undefined, hash: string) {\n const serverSecret = await this.getSecret()\n if (this.secret && signeture) {\n let info: any = await crypto.decrypt(signeture, serverSecret)\n let isHashValid = info.hash === hash\n let isNotExpired = info.expire > Date.now()\n if (!isHashValid) throw new Response(\"Invalid Signeture\", { status: 403 });\n if (!isNotExpired) throw new Response(\"Signeture expired\", { status: 403 });\n }\n }\n\n async handleRequest(info: HandlerInfo, metadata?: Metadata) {\n if (this.config.accept) {\n const is = await this.config.accept(info, metadata)\n if (!is) throw new Response(\"Request not accepted\", { status: 403 })\n }\n\n const { path, method } = info;\n let values: any = Object.values(this.routes[method]);\n for (let { test, handler } of values) {\n const match = test(path)\n if (match) {\n await handler({ ...info, params: match.params }, metadata)\n }\n }\n }\n\n}\n\nexport default SecurequServerBase;"],"names":["SecurequServerBase","Router","constructor","config","super","this","secret","clients","Map","uploadMeta","CONTENT_TYPE","basepath","Error","Object","keys","length","startsWith","endsWith","substring","file","maxFilesize","checkFileType","mode","includes","client","set","origin","getSecret","crypto","hash","Math","random","toString","clientInfo","path","isDev","splitUrl","split","replace","shift","get","searchParams","fromEntries","URLSearchParams","decodeURIComponent","decrypt","join","isValidSigneture","signeture","serverSecret","info","isHashValid","isNotExpired","expire","Date","now","Response","status","handleRequest","metadata","accept","method","values","routes","test","handler","match","assign","params","exports","default"],"mappings":"mIAIA,MAAMA,UAA2BC,EAAAA,QAO9B,WAAAC,CAAYC,GAET,GADAC,QANOC,KAAAC,OAAwB,KACxBD,KAAAE,QAAU,IAAIC,IACdH,KAAAI,WAAa,IAAID,IAClBH,KAAAK,aAAe,4BAIhBP,EAAOQ,SAAU,MAAM,IAAIC,MAAM,wBACtC,IAAKT,EAAOI,SAAkD,IAAvCM,OAAOC,KAAKX,EAAOI,SAASQ,OAAc,MAAM,IAAIH,MAAM,kCAC5ET,EAAOQ,SAASK,WAAW,OAAMb,EAAOQ,SAAW,IAAIR,EAAOQ,YAC/DR,EAAOQ,SAASM,SAAS,OAAMd,EAAOQ,SAAWR,EAAOQ,SAASO,UAAU,EAAGf,EAAOQ,SAASI,OAAS,IACvGZ,EAAOgB,OACRhB,EAAOgB,KAAKC,YAAcjB,EAAOgB,KAAKC,aAAe,MACrDjB,EAAOgB,KAAKE,cAAgBlB,EAAOgB,KAAKE,gBAAiB,GAE5DlB,EAAOmB,KAAO,CAAC,aAAc,eAAeC,SAASpB,EAAOmB,MAAQ,IAAMnB,EAAOmB,KAAO,aACxFjB,KAAKF,OAASA,EACd,IAAK,IAAIqB,KAAUnB,KAAKF,OAAOI,QAC5BF,KAAKE,QAAQkB,IAAID,EAAOE,OAAQF,EAAOlB,OAE7C,CAEU,eAAMqB,GAIb,OAHKtB,KAAKC,SACPD,KAAKC,aAAesB,EAAAA,QAAOC,KAAKC,KAAKC,SAASC,SAAS,IAAId,UAAU,EAAG,IAAMY,KAAKC,SAASC,SAAS,IAAId,UAAU,EAAG,MAElHb,KAAKC,MACf,CAEU,gBAAM2B,CAAWC,EAAcR,GACtC,MAAMS,EAAiB,MAATD,GAAqC,gBAArB7B,KAAKF,OAAOmB,KAC1C,IAAIc,EAAWF,EAAKG,MAAM,KAM1B,MAAMA,GAFNH,GADAA,GADAA,GADAA,EAAOE,EAAS,IACJE,QAAQjC,KAAKF,OAAOQ,SAAW,IAAK,KACpCM,SAAS,KAAOiB,EAAKhB,UAAU,EAAGgB,EAAKnB,OAAS,GAAKmB,GACrDlB,WAAW,KAAOkB,EAAKhB,UAAU,GAAKgB,GAE/BG,MAAM,KACnBR,EAAOQ,EAAME,QACnB,IAAIf,EAASnB,KAAKE,QAAQiC,IAAId,GAK9B,GAJKF,IACFA,EAASnB,KAAKE,QAAQiC,IAAI,QAGxBX,aAAI,EAAJA,EAAMd,UAAWS,EAAQ,OAAO,KACrC,IAAIlB,EAASkB,EAAON,UAAU,EAAGW,EAAKd,QAClC0B,EAAuC,CAAA,EAQ3C,OAPIL,EAASrB,OAAS,IAEhB0B,EADCN,EACctB,OAAO6B,YAAY,IAAIC,gBAAgBC,mBAAmBR,EAAS,YAE7DR,EAAAA,QAAOiB,QAAQD,mBAAmBR,EAAS,IAAK9B,IAGpE,CACJ4B,KAAM,IAAMG,EAAMS,KAAK,KACvBxC,SACAuB,OACAY,eAEN,CAEU,sBAAMM,CAAiBC,EAA+BnB,GAC7D,MAAMoB,QAAqB5C,KAAKsB,YAChC,GAAItB,KAAKC,QAAU0C,EAAW,CAC3B,IAAIE,QAAkBtB,EAAAA,QAAOiB,QAAQG,EAAWC,GAC5CE,EAAcD,EAAKrB,OAASA,EAC5BuB,EAAeF,EAAKG,OAASC,KAAKC,MACtC,IAAKJ,EAAa,MAAM,IAAIK,SAAS,oBAAqB,CAAEC,OAAQ,MACpE,IAAKL,EAAc,MAAM,IAAII,SAAS,oBAAqB,CAAEC,OAAQ,KACvE,CACJ,CAEA,mBAAMC,CAAcR,EAAmBS,GACpC,GAAItD,KAAKF,OAAOyD,OAAQ,CAErB,UADiBvD,KAAKF,OAAOyD,OAAOV,EAAMS,GACjC,MAAM,IAAIH,SAAS,uBAAwB,CAAEC,OAAQ,KAChE,CAED,MAAMvB,KAAEA,EAAI2B,OAAEA,GAAWX,EACzB,IAAIY,EAAcjD,OAAOiD,OAAOzD,KAAK0D,OAAOF,IAC5C,IAAK,IAAIG,KAAEA,EAAIC,QAAEA,KAAaH,EAAQ,CACnC,MAAMI,EAAQF,EAAK9B,GACfgC,SACKD,EAAOpD,OAAAsD,OAAAtD,OAAAsD,OAAA,CAAA,EAAMjB,GAAI,CAAEkB,OAAQF,EAAME,SAAUT,EAEtD,CACJ,EAEFU,QAAAC,QAAAtE"}
package/server/Base.mjs CHANGED
@@ -1 +1 @@
1
- import t from"../include/crypto.mjs";import e from"./Router.mjs";class s extends e{constructor(t){if(super(),this.secret=null,this.clients=new Map,this.uploadMeta=new Map,this.CONTENT_TYPE="application/octet-stream",!t.basepath)throw new Error("Basepath is required");if(!t.clients||0===Object.keys(t.clients).length)throw new Error("Atleast one client is required");t.basepath.startsWith("/")||(t.basepath=`/${t.basepath}`),t.basepath.endsWith("/")&&(t.basepath=t.basepath.substring(0,t.basepath.length-1)),t.upload&&(t.upload.maxFilesize=t.upload.maxFilesize||51200,t.upload.checkFileType=t.upload.checkFileType||!0),t.mode=["production","development"].includes(t.mode||"")?t.mode:"production",this.config=t;for(let t of this.config.clients)this.clients.set(t.origin,t.secret)}async getSecret(){return this.secret||(this.secret=await t.hash(Math.random().toString(36).substring(2,15)+Math.random().toString(36).substring(2,15))),this.secret}async clientInfo(e,s){const i="/"!==e&&"development"===this.config.mode;let a=e.split("?");const n=(e=(e=(e=(e=a[0]).replace(this.config.basepath+"/","")).endsWith("/")?e.substring(0,e.length-1):e).startsWith("/")?e.substring(1):e).split("/"),r=n.shift();let o=this.clients.get(s);if(o||(o=this.clients.get("*")),!(null==r?void 0:r.length)||!o)return null;let c=o.substring(0,r.length),h={};return a.length>1&&(h=i?Object.fromEntries(new URLSearchParams(decodeURIComponent(a[1]))):await t.decrypt(decodeURIComponent(a[1]),c)),{path:"/"+n.join("/"),secret:c,hash:r,searchParams:h}}async isValidSigneture(e,s){const i=await this.getSecret();if(this.secret&&e){let a=await t.decrypt(e,i),n=a.hash===s,r=a.expire>Date.now();if(!n)throw new Response("Invalid Signeture",{status:403});if(!r)throw new Response("Signeture expired",{status:403})}}async handleRequest(t,e){if(this.config.accept){if(!await this.config.accept(t,e))throw new Response("Request not accepted",{status:403})}const{path:s,method:i}=t;let a=Object.values(this.routes[i]);for(let{test:i,handler:n}of a){const a=i(s);a&&await n(Object.assign(Object.assign({},t),{params:a.params}),e)}}}export{s as default};//# sourceMappingURL=Base.mjs.map
1
+ import e from"../include/crypto.mjs";import t from"./Router.mjs";class s extends t{constructor(e){if(super(),this.secret=null,this.clients=new Map,this.uploadMeta=new Map,this.CONTENT_TYPE="application/octet-stream",!e.basepath)throw new Error("Basepath is required");if(!e.clients||0===Object.keys(e.clients).length)throw new Error("Atleast one client is required");e.basepath.startsWith("/")||(e.basepath=`/${e.basepath}`),e.basepath.endsWith("/")&&(e.basepath=e.basepath.substring(0,e.basepath.length-1)),e.file&&(e.file.maxFilesize=e.file.maxFilesize||51200,e.file.checkFileType=e.file.checkFileType||!0),e.mode=["production","development"].includes(e.mode||"")?e.mode:"production",this.config=e;for(let e of this.config.clients)this.clients.set(e.origin,e.secret)}async getSecret(){return this.secret||(this.secret=await e.hash(Math.random().toString(36).substring(2,15)+Math.random().toString(36).substring(2,15))),this.secret}async clientInfo(t,s){const i="/"!==t&&"development"===this.config.mode;let n=t.split("?");const a=(t=(t=(t=(t=n[0]).replace(this.config.basepath+"/","")).endsWith("/")?t.substring(0,t.length-1):t).startsWith("/")?t.substring(1):t).split("/"),r=a.shift();let o=this.clients.get(s);if(o||(o=this.clients.get("*")),!(null==r?void 0:r.length)||!o)return null;let c=o.substring(0,r.length),h={};return n.length>1&&(h=i?Object.fromEntries(new URLSearchParams(decodeURIComponent(n[1]))):await e.decrypt(decodeURIComponent(n[1]),c)),{path:"/"+a.join("/"),secret:c,hash:r,searchParams:h}}async isValidSigneture(t,s){const i=await this.getSecret();if(this.secret&&t){let n=await e.decrypt(t,i),a=n.hash===s,r=n.expire>Date.now();if(!a)throw new Response("Invalid Signeture",{status:403});if(!r)throw new Response("Signeture expired",{status:403})}}async handleRequest(e,t){if(this.config.accept){if(!await this.config.accept(e,t))throw new Response("Request not accepted",{status:403})}const{path:s,method:i}=e;let n=Object.values(this.routes[i]);for(let{test:i,handler:a}of n){const n=i(s);n&&await a(Object.assign(Object.assign({},e),{params:n.params}),t)}}}export{s as default};//# sourceMappingURL=Base.mjs.map
@@ -1 +1 @@
1
- {"version":3,"file":"Base.mjs","sources":["../../src/server/Base.ts"],"sourcesContent":["import crypto from \"../include/crypto\";\nimport Router from \"./Router\";\nimport { HandlerInfo, SecurequServerConfig, ServerClientSecret, ServerClientOrigin, UploadFileMeta, Metadata } from \"./types\";\n\nclass SecurequServerBase extends Router {\n protected config: SecurequServerConfig;\n protected secret: string | null = null\n protected clients = new Map<ServerClientOrigin, ServerClientSecret>();\n protected uploadMeta = new Map<string, UploadFileMeta & { expire: number }>();\n readonly CONTENT_TYPE = \"application/octet-stream\";\n\n constructor(config: SecurequServerConfig) {\n super()\n if (!config.basepath) throw new Error(\"Basepath is required\");\n if (!config.clients || Object.keys(config.clients).length === 0) throw new Error(\"Atleast one client is required\");\n if (!config.basepath.startsWith(\"/\")) config.basepath = `/${config.basepath}`;\n if (config.basepath.endsWith(\"/\")) config.basepath = config.basepath.substring(0, config.basepath.length - 1);\n if (config.upload) {\n config.upload.maxFilesize = config.upload.maxFilesize || 50 * 1024 // 50MB default\n config.upload.checkFileType = config.upload.checkFileType || true\n }\n config.mode = [\"production\", 'development'].includes(config.mode || \"\") ? config.mode : \"production\"\n this.config = config\n for (let client of this.config.clients) {\n this.clients.set(client.origin, client.secret)\n }\n }\n\n protected async getSecret() {\n if (!this.secret) {\n this.secret = await crypto.hash(Math.random().toString(36).substring(2, 15) + Math.random().toString(36).substring(2, 15))\n }\n return this.secret\n }\n\n protected async clientInfo(path: string, origin: string) {\n const isDev = path !== '/' && this.config.mode === 'development'\n let splitUrl = path.split(\"?\")\n path = splitUrl[0]\n path = path.replace(this.config.basepath + \"/\", \"\")\n path = path.endsWith('/') ? path.substring(0, path.length - 1) : path\n path = path.startsWith('/') ? path.substring(1) : path\n\n const split = path.split(\"/\")\n const hash = split.shift()\n let client = this.clients.get(origin)\n if (!client) {\n client = this.clients.get(\"*\")\n }\n\n if (!hash?.length || !client) return null\n let secret = client.substring(0, hash.length as number);\n let searchParams: { [key: string]: any } = {}\n if (splitUrl.length > 1) {\n if (isDev) {\n searchParams = Object.fromEntries(new URLSearchParams(decodeURIComponent(splitUrl[1])))\n } else {\n searchParams = await crypto.decrypt(decodeURIComponent(splitUrl[1]), secret) as any\n }\n }\n return {\n path: \"/\" + split.join('/'),\n secret,\n hash,\n searchParams\n }\n }\n\n protected async isValidSigneture(signeture: string | undefined, hash: string) {\n const serverSecret = await this.getSecret()\n if (this.secret && signeture) {\n let info: any = await crypto.decrypt(signeture, serverSecret)\n let isHashValid = info.hash === hash\n let isNotExpired = info.expire > Date.now()\n if (!isHashValid) throw new Response(\"Invalid Signeture\", { status: 403 });\n if (!isNotExpired) throw new Response(\"Signeture expired\", { status: 403 });\n }\n }\n\n async handleRequest(info: HandlerInfo, metadata?: Metadata) {\n if (this.config.accept) {\n const is = await this.config.accept(info, metadata)\n if (!is) throw new Response(\"Request not accepted\", { status: 403 })\n }\n\n const { path, method } = info;\n let values: any = Object.values(this.routes[method]);\n for (let { test, handler } of values) {\n const match = test(path)\n if (match) {\n await handler({ ...info, params: match.params }, metadata)\n }\n }\n }\n\n}\n\nexport default SecurequServerBase;"],"names":["SecurequServerBase","Router","constructor","config","super","this","secret","clients","Map","uploadMeta","CONTENT_TYPE","basepath","Error","Object","keys","length","startsWith","endsWith","substring","upload","maxFilesize","checkFileType","mode","includes","client","set","origin","getSecret","crypto","hash","Math","random","toString","clientInfo","path","isDev","splitUrl","split","replace","shift","get","searchParams","fromEntries","URLSearchParams","decodeURIComponent","decrypt","join","isValidSigneture","signeture","serverSecret","info","isHashValid","isNotExpired","expire","Date","now","Response","status","handleRequest","metadata","accept","method","values","routes","test","handler","match","assign","params"],"mappings":"iEAIA,MAAMA,UAA2BC,EAO9B,WAAAC,CAAYC,GAET,GADAC,QANOC,KAAAC,OAAwB,KACxBD,KAAAE,QAAU,IAAIC,IACdH,KAAAI,WAAa,IAAID,IAClBH,KAAAK,aAAe,4BAIhBP,EAAOQ,SAAU,MAAM,IAAIC,MAAM,wBACtC,IAAKT,EAAOI,SAAkD,IAAvCM,OAAOC,KAAKX,EAAOI,SAASQ,OAAc,MAAM,IAAIH,MAAM,kCAC5ET,EAAOQ,SAASK,WAAW,OAAMb,EAAOQ,SAAW,IAAIR,EAAOQ,YAC/DR,EAAOQ,SAASM,SAAS,OAAMd,EAAOQ,SAAWR,EAAOQ,SAASO,UAAU,EAAGf,EAAOQ,SAASI,OAAS,IACvGZ,EAAOgB,SACRhB,EAAOgB,OAAOC,YAAcjB,EAAOgB,OAAOC,aAAe,MACzDjB,EAAOgB,OAAOE,cAAgBlB,EAAOgB,OAAOE,gBAAiB,GAEhElB,EAAOmB,KAAO,CAAC,aAAc,eAAeC,SAASpB,EAAOmB,MAAQ,IAAMnB,EAAOmB,KAAO,aACxFjB,KAAKF,OAASA,EACd,IAAK,IAAIqB,KAAUnB,KAAKF,OAAOI,QAC5BF,KAAKE,QAAQkB,IAAID,EAAOE,OAAQF,EAAOlB,OAE7C,CAEU,eAAMqB,GAIb,OAHKtB,KAAKC,SACPD,KAAKC,aAAesB,EAAOC,KAAKC,KAAKC,SAASC,SAAS,IAAId,UAAU,EAAG,IAAMY,KAAKC,SAASC,SAAS,IAAId,UAAU,EAAG,MAElHb,KAAKC,MACf,CAEU,gBAAM2B,CAAWC,EAAcR,GACtC,MAAMS,EAAiB,MAATD,GAAqC,gBAArB7B,KAAKF,OAAOmB,KAC1C,IAAIc,EAAWF,EAAKG,MAAM,KAM1B,MAAMA,GAFNH,GADAA,GADAA,GADAA,EAAOE,EAAS,IACJE,QAAQjC,KAAKF,OAAOQ,SAAW,IAAK,KACpCM,SAAS,KAAOiB,EAAKhB,UAAU,EAAGgB,EAAKnB,OAAS,GAAKmB,GACrDlB,WAAW,KAAOkB,EAAKhB,UAAU,GAAKgB,GAE/BG,MAAM,KACnBR,EAAOQ,EAAME,QACnB,IAAIf,EAASnB,KAAKE,QAAQiC,IAAId,GAK9B,GAJKF,IACFA,EAASnB,KAAKE,QAAQiC,IAAI,QAGxBX,aAAI,EAAJA,EAAMd,UAAWS,EAAQ,OAAO,KACrC,IAAIlB,EAASkB,EAAON,UAAU,EAAGW,EAAKd,QAClC0B,EAAuC,CAAA,EAQ3C,OAPIL,EAASrB,OAAS,IAEhB0B,EADCN,EACctB,OAAO6B,YAAY,IAAIC,gBAAgBC,mBAAmBR,EAAS,YAE7DR,EAAOiB,QAAQD,mBAAmBR,EAAS,IAAK9B,IAGpE,CACJ4B,KAAM,IAAMG,EAAMS,KAAK,KACvBxC,SACAuB,OACAY,eAEN,CAEU,sBAAMM,CAAiBC,EAA+BnB,GAC7D,MAAMoB,QAAqB5C,KAAKsB,YAChC,GAAItB,KAAKC,QAAU0C,EAAW,CAC3B,IAAIE,QAAkBtB,EAAOiB,QAAQG,EAAWC,GAC5CE,EAAcD,EAAKrB,OAASA,EAC5BuB,EAAeF,EAAKG,OAASC,KAAKC,MACtC,IAAKJ,EAAa,MAAM,IAAIK,SAAS,oBAAqB,CAAEC,OAAQ,MACpE,IAAKL,EAAc,MAAM,IAAII,SAAS,oBAAqB,CAAEC,OAAQ,KACvE,CACJ,CAEA,mBAAMC,CAAcR,EAAmBS,GACpC,GAAItD,KAAKF,OAAOyD,OAAQ,CAErB,UADiBvD,KAAKF,OAAOyD,OAAOV,EAAMS,GACjC,MAAM,IAAIH,SAAS,uBAAwB,CAAEC,OAAQ,KAChE,CAED,MAAMvB,KAAEA,EAAI2B,OAAEA,GAAWX,EACzB,IAAIY,EAAcjD,OAAOiD,OAAOzD,KAAK0D,OAAOF,IAC5C,IAAK,IAAIG,KAAEA,EAAIC,QAAEA,KAAaH,EAAQ,CACnC,MAAMI,EAAQF,EAAK9B,GACfgC,SACKD,EAAOpD,OAAAsD,OAAAtD,OAAAsD,OAAA,CAAA,EAAMjB,GAAI,CAAEkB,OAAQF,EAAME,SAAUT,EAEtD,CACJ,SAEF3D"}
1
+ {"version":3,"file":"Base.mjs","sources":["../../src/server/Base.ts"],"sourcesContent":["import crypto from \"../include/crypto\";\nimport Router from \"./Router\";\nimport { HandlerInfo, SecurequServerConfig, ServerClientSecret, ServerClientOrigin, UploadFileMeta, Metadata } from \"./types\";\n\nclass SecurequServerBase extends Router {\n protected config: SecurequServerConfig;\n protected secret: string | null = null\n protected clients = new Map<ServerClientOrigin, ServerClientSecret>();\n protected uploadMeta = new Map<string, UploadFileMeta & { expire: number }>();\n readonly CONTENT_TYPE = \"application/octet-stream\";\n\n constructor(config: SecurequServerConfig) {\n super()\n if (!config.basepath) throw new Error(\"Basepath is required\");\n if (!config.clients || Object.keys(config.clients).length === 0) throw new Error(\"Atleast one client is required\");\n if (!config.basepath.startsWith(\"/\")) config.basepath = `/${config.basepath}`;\n if (config.basepath.endsWith(\"/\")) config.basepath = config.basepath.substring(0, config.basepath.length - 1);\n if (config.file) {\n config.file.maxFilesize = config.file.maxFilesize || 50 * 1024 // 50MB default\n config.file.checkFileType = config.file.checkFileType || true\n }\n config.mode = [\"production\", 'development'].includes(config.mode || \"\") ? config.mode : \"production\"\n this.config = config\n for (let client of this.config.clients) {\n this.clients.set(client.origin, client.secret)\n }\n }\n\n protected async getSecret() {\n if (!this.secret) {\n this.secret = await crypto.hash(Math.random().toString(36).substring(2, 15) + Math.random().toString(36).substring(2, 15))\n }\n return this.secret\n }\n\n protected async clientInfo(path: string, origin: string) {\n const isDev = path !== '/' && this.config.mode === 'development'\n let splitUrl = path.split(\"?\")\n path = splitUrl[0]\n path = path.replace(this.config.basepath + \"/\", \"\")\n path = path.endsWith('/') ? path.substring(0, path.length - 1) : path\n path = path.startsWith('/') ? path.substring(1) : path\n\n const split = path.split(\"/\")\n const hash = split.shift()\n let client = this.clients.get(origin)\n if (!client) {\n client = this.clients.get(\"*\")\n }\n\n if (!hash?.length || !client) return null\n let secret = client.substring(0, hash.length as number);\n let searchParams: { [key: string]: any } = {}\n if (splitUrl.length > 1) {\n if (isDev) {\n searchParams = Object.fromEntries(new URLSearchParams(decodeURIComponent(splitUrl[1])))\n } else {\n searchParams = await crypto.decrypt(decodeURIComponent(splitUrl[1]), secret) as any\n }\n }\n return {\n path: \"/\" + split.join('/'),\n secret,\n hash,\n searchParams\n }\n }\n\n protected async isValidSigneture(signeture: string | undefined, hash: string) {\n const serverSecret = await this.getSecret()\n if (this.secret && signeture) {\n let info: any = await crypto.decrypt(signeture, serverSecret)\n let isHashValid = info.hash === hash\n let isNotExpired = info.expire > Date.now()\n if (!isHashValid) throw new Response(\"Invalid Signeture\", { status: 403 });\n if (!isNotExpired) throw new Response(\"Signeture expired\", { status: 403 });\n }\n }\n\n async handleRequest(info: HandlerInfo, metadata?: Metadata) {\n if (this.config.accept) {\n const is = await this.config.accept(info, metadata)\n if (!is) throw new Response(\"Request not accepted\", { status: 403 })\n }\n\n const { path, method } = info;\n let values: any = Object.values(this.routes[method]);\n for (let { test, handler } of values) {\n const match = test(path)\n if (match) {\n await handler({ ...info, params: match.params }, metadata)\n }\n }\n }\n\n}\n\nexport default SecurequServerBase;"],"names":["SecurequServerBase","Router","constructor","config","super","this","secret","clients","Map","uploadMeta","CONTENT_TYPE","basepath","Error","Object","keys","length","startsWith","endsWith","substring","file","maxFilesize","checkFileType","mode","includes","client","set","origin","getSecret","crypto","hash","Math","random","toString","clientInfo","path","isDev","splitUrl","split","replace","shift","get","searchParams","fromEntries","URLSearchParams","decodeURIComponent","decrypt","join","isValidSigneture","signeture","serverSecret","info","isHashValid","isNotExpired","expire","Date","now","Response","status","handleRequest","metadata","accept","method","values","routes","test","handler","match","assign","params"],"mappings":"iEAIA,MAAMA,UAA2BC,EAO9B,WAAAC,CAAYC,GAET,GADAC,QANOC,KAAAC,OAAwB,KACxBD,KAAAE,QAAU,IAAIC,IACdH,KAAAI,WAAa,IAAID,IAClBH,KAAAK,aAAe,4BAIhBP,EAAOQ,SAAU,MAAM,IAAIC,MAAM,wBACtC,IAAKT,EAAOI,SAAkD,IAAvCM,OAAOC,KAAKX,EAAOI,SAASQ,OAAc,MAAM,IAAIH,MAAM,kCAC5ET,EAAOQ,SAASK,WAAW,OAAMb,EAAOQ,SAAW,IAAIR,EAAOQ,YAC/DR,EAAOQ,SAASM,SAAS,OAAMd,EAAOQ,SAAWR,EAAOQ,SAASO,UAAU,EAAGf,EAAOQ,SAASI,OAAS,IACvGZ,EAAOgB,OACRhB,EAAOgB,KAAKC,YAAcjB,EAAOgB,KAAKC,aAAe,MACrDjB,EAAOgB,KAAKE,cAAgBlB,EAAOgB,KAAKE,gBAAiB,GAE5DlB,EAAOmB,KAAO,CAAC,aAAc,eAAeC,SAASpB,EAAOmB,MAAQ,IAAMnB,EAAOmB,KAAO,aACxFjB,KAAKF,OAASA,EACd,IAAK,IAAIqB,KAAUnB,KAAKF,OAAOI,QAC5BF,KAAKE,QAAQkB,IAAID,EAAOE,OAAQF,EAAOlB,OAE7C,CAEU,eAAMqB,GAIb,OAHKtB,KAAKC,SACPD,KAAKC,aAAesB,EAAOC,KAAKC,KAAKC,SAASC,SAAS,IAAId,UAAU,EAAG,IAAMY,KAAKC,SAASC,SAAS,IAAId,UAAU,EAAG,MAElHb,KAAKC,MACf,CAEU,gBAAM2B,CAAWC,EAAcR,GACtC,MAAMS,EAAiB,MAATD,GAAqC,gBAArB7B,KAAKF,OAAOmB,KAC1C,IAAIc,EAAWF,EAAKG,MAAM,KAM1B,MAAMA,GAFNH,GADAA,GADAA,GADAA,EAAOE,EAAS,IACJE,QAAQjC,KAAKF,OAAOQ,SAAW,IAAK,KACpCM,SAAS,KAAOiB,EAAKhB,UAAU,EAAGgB,EAAKnB,OAAS,GAAKmB,GACrDlB,WAAW,KAAOkB,EAAKhB,UAAU,GAAKgB,GAE/BG,MAAM,KACnBR,EAAOQ,EAAME,QACnB,IAAIf,EAASnB,KAAKE,QAAQiC,IAAId,GAK9B,GAJKF,IACFA,EAASnB,KAAKE,QAAQiC,IAAI,QAGxBX,aAAI,EAAJA,EAAMd,UAAWS,EAAQ,OAAO,KACrC,IAAIlB,EAASkB,EAAON,UAAU,EAAGW,EAAKd,QAClC0B,EAAuC,CAAA,EAQ3C,OAPIL,EAASrB,OAAS,IAEhB0B,EADCN,EACctB,OAAO6B,YAAY,IAAIC,gBAAgBC,mBAAmBR,EAAS,YAE7DR,EAAOiB,QAAQD,mBAAmBR,EAAS,IAAK9B,IAGpE,CACJ4B,KAAM,IAAMG,EAAMS,KAAK,KACvBxC,SACAuB,OACAY,eAEN,CAEU,sBAAMM,CAAiBC,EAA+BnB,GAC7D,MAAMoB,QAAqB5C,KAAKsB,YAChC,GAAItB,KAAKC,QAAU0C,EAAW,CAC3B,IAAIE,QAAkBtB,EAAOiB,QAAQG,EAAWC,GAC5CE,EAAcD,EAAKrB,OAASA,EAC5BuB,EAAeF,EAAKG,OAASC,KAAKC,MACtC,IAAKJ,EAAa,MAAM,IAAIK,SAAS,oBAAqB,CAAEC,OAAQ,MACpE,IAAKL,EAAc,MAAM,IAAII,SAAS,oBAAqB,CAAEC,OAAQ,KACvE,CACJ,CAEA,mBAAMC,CAAcR,EAAmBS,GACpC,GAAItD,KAAKF,OAAOyD,OAAQ,CAErB,UADiBvD,KAAKF,OAAOyD,OAAOV,EAAMS,GACjC,MAAM,IAAIH,SAAS,uBAAwB,CAAEC,OAAQ,KAChE,CAED,MAAMvB,KAAEA,EAAI2B,OAAEA,GAAWX,EACzB,IAAIY,EAAcjD,OAAOiD,OAAOzD,KAAK0D,OAAOF,IAC5C,IAAK,IAAIG,KAAEA,EAAIC,QAAEA,KAAaH,EAAQ,CACnC,MAAMI,EAAQF,EAAK9B,GACfgC,SACKD,EAAOpD,OAAAsD,OAAAtD,OAAAsD,OAAA,CAAA,EAAMjB,GAAI,CAAEkB,OAAQF,EAAME,SAAUT,EAEtD,CACJ,SAEF3D"}
package/server/index.d.ts CHANGED
@@ -1,9 +1,10 @@
1
- import { Metadata, ListenerInfo, ServerResponse } from './types.js';
1
+ import { UploadFileMeta, ListenerInfo, ServerResponse } from './types.js';
2
2
  import SecurequServerBase from './Base.js';
3
3
 
4
4
  declare class SecurequServer extends SecurequServerBase {
5
5
  handshake(body: any, clientInfo: any): Promise<void>;
6
- upload(body: any, clientInfo: any, signeture: string, metadata?: Metadata): Promise<void>;
6
+ uploadFile(file: File, onProgress?: (p: number) => void): Promise<UploadFileMeta>;
7
+ deleteFile(fileId: string): Promise<void>;
7
8
  listen(url: string, { body, headers, metadata }: ListenerInfo): Promise<ServerResponse>;
8
9
  }
9
10
 
package/server/index.js CHANGED
@@ -1 +1 @@
1
- "use strict";Object.defineProperty(exports,"__esModule",{value:!0});var e=require("../include/crypto.js"),t=require("./Base.js"),i=require("../include/FileScaner.js");class a extends t.default{async handshake(t,i){var a,s;const n=await e.default.decryptBuffer(t,i.secret),o=await this.getSecret();if(!n)throw new Error("Invalid handshake data");if(n.hash!==i.hash)throw new Error("Invalid handshake");if(n.secret!==i.secret)throw new Error("Invalid handshake secret");if(Date.now()-n.clientTime>3e4)throw new Error("Handshake expired");const l=new Date;throw{timeDiffarenc:new Date(n.clientTime).getTime()-l.getTime(),maxFileSize:(null===(a=this.config.upload)||void 0===a?void 0:a.maxFilesize)||null,dev:"development"===this.config.mode,checkFileType:(null===(s=this.config.upload)||void 0===s?void 0:s.checkFileType)||!1,signeture:await e.default.encrypt({expire:Date.now()+3e4,hash:i.hash},o)}}async upload(t,a,s,n){var o;const l=await e.default.decryptBuffer(t,a.secret),r=await e.default.decrypt(s,a.secret);await this.isValidSigneture(r.signeture,a.hash);const d=this.config.upload;if(!(null==d?void 0:d.chunk)||!(null==d?void 0:d.complete))throw new Response("Upload not supported",{status:403});if("failed"===(null==l?void 0:l.type)){const e=this.uploadMeta.get(l.fileid);throw e&&d.failed?(await d.failed(e,n),this.uploadMeta.delete(l.fileid),{success:!0}):new Response("Invalid upload",{status:400})}if("meta"===l.type){if((null==d?void 0:d.maxFilesize)&&l.filesize>1024*d.maxFilesize)throw new Response(`File size exceeds the limit of ${d.maxFilesize} KB`,{status:413});throw this.uploadMeta.set(l.fileid,Object.assign(Object.assign({},l),{expire:Date.now()+36e5})),this.uploadMeta.forEach((e,t)=>{e.expire<Date.now()&&this.uploadMeta.delete(t)}),l}{const{chunk:e,fileId:t,chunkIndex:a}=l,s=this.uploadMeta.get(t);if(!s)throw new Response("Invalid upload meta",{status:400});if(d.checkFileType&&0===a){if(!i.fileScaner(e))throw new Error("Unknown or unsupported file type")}if((null===(o=this.config.upload)||void 0===o?void 0:o.maxFilesize)&&l.filesize>1024*this.config.upload.maxFilesize)throw new Response(`File size exceeds the limit of ${this.config.upload.maxFilesize/1024} MB`,{status:413});if(await d.chunk(e,{filename:s.filename,filesize:s.filesize,filetype:s.filetype,fileid:s.fileid,totalChunks:s.totalChunks,chunkIndex:a},n),a+1===s.totalChunks){const e=await d.complete(s,n);throw this.uploadMeta.delete(t),e}throw l}}async listen(t,{body:i,headers:a,metadata:s}){const n=a["x-signeture"]||"",o=a["x-origin"]||"",l=a["x-method"]||"POST";let r=await this.clientInfo(t,o);if(!r)return{status:403,content:"Client not allowed"};let d=r.path;const u="/"!==d&&"development"===this.config.mode;try{if("/"===d){if(!["POST","PUT"].includes(l))throw new Response("Invalid method",{status:405});"POST"===l?await this.handshake(i,r):await this.upload(i,r,n,s)}const t=await e.default.decrypt(n,r.secret);if(await this.isValidSigneture(t.signeture,r.hash),t.expire<Date.now())throw new Response("Request expired",{status:403});let a=null;if(i)if(u){const e=(new TextDecoder).decode(i);a=JSON.parse(e)}else a=await e.default.decryptBuffer(i,r.secret);await this.handleRequest({method:l,path:d,body:a,searchParams:r.searchParams,params:{}},s)}catch(t){const i=t instanceof Error,a=t instanceof Response;let s=i?t.message:a?await t.text():t;return u?{status:i?404:(null==t?void 0:t.status)||200,content:JSON.stringify(s)}:{status:i?404:(null==t?void 0:t.status)||200,content:await e.default.encryptBuffer(s,r.secret)}}return u?{status:404,content:"Not found"}:{status:404,content:await e.default.encryptBuffer("Not found",r.secret)}}}exports.default=a;//# sourceMappingURL=index.js.map
1
+ "use strict";Object.defineProperty(exports,"__esModule",{value:!0});var e=require("tslib"),t=require("../include/crypto.js"),i=require("./Base.js"),n=require("../include/FileScaner.js"),a=require("../include/File.js");class s extends i.default{async handshake(e,i){var n,a;const s=await t.default.decryptBuffer(e,i.secret),r=await this.getSecret();if(!s)throw new Error("Invalid handshake data");if(s.hash!==i.hash)throw new Error("Invalid handshake");if(s.secret!==i.secret)throw new Error("Invalid handshake secret");if(Date.now()-s.clientTime>3e4)throw new Error("Handshake expired");const o=new Date,l=new Date(s.clientTime).getTime()-o.getTime();throw{dev:"development"===this.config.mode,timeDiffarenc:l,maxFileSize:(null===(n=this.config.file)||void 0===n?void 0:n.maxFilesize)||null,checkFileType:(null===(a=this.config.file)||void 0===a?void 0:a.checkFileType)||!1,signeture:await t.default.encrypt({expire:Date.now()+3e4,hash:i.hash},r)}}async uploadFile(t,i){var s,r,o,l,c;if(!(null===(c=this.config.file)||void 0===c?void 0:c.upload))throw new Response("Upload not supported",{status:403});const d=await a.getFileId(t),u=this.config.file.chunkSize,h={fileId:d,name:t.name,size:t.size,type:t.type,totalChunks:a.totalChunks(t,u),chunkIndex:0,isFinish:!1};try{for(var f,w=!0,p=e.__asyncValues(a.chunkFile(t,u));!(s=(f=await p.next()).done);){l=f.value,w=!1;try{let{chunk:e,chunkIndex:t}=l;if(this.config.file.checkFileType&&0===t){if(!n.fileScaner(e))throw new Error("Unknown or unsupported file type")}if(h.chunkIndex=t,h.isFinish=t+1===h.totalChunks,await this.config.file.upload(e,h),i){i(Math.floor((t+1)/h.totalChunks*100))}}finally{w=!0}}}catch(e){r={error:e}}finally{try{w||s||!(o=p.return)||await o.call(p)}finally{if(r)throw r.error}}return h}async deleteFile(e){var t;if(!(null===(t=this.config.file)||void 0===t?void 0:t.delete))throw new Response("Delete not supported",{status:403});await this.config.file.delete(e)}async listen(e,{body:i,headers:a,metadata:s}){const r=a["x-signeture"]||"",o=a["x-origin"]||"",l=a["x-method"]||"POST";let c=await this.clientInfo(e,o);if(!c)return{status:403,content:"Client not allowed"};let d=c.path;const u="/"!==d&&"development"===this.config.mode;try{if("/"===d&&"POST"===l&&await this.handshake(i,c),"/"===d&&"GET"===l)throw new Response("Invalid method",{status:405});const e=await t.default.decrypt(r,c.secret);if(e.expire<Date.now())throw new Response("Request expired",{status:403});await this.isValidSigneture(e.signeture,c.hash);let a=null;if(i)if(u){const e=(new TextDecoder).decode(i);a=JSON.parse(e)}else a=await t.default.decryptBuffer(i,c.secret);if("/"===d){const e=this.config.file;if("PUT"===l){if(!(null==e?void 0:e.upload))throw new Response("Upload not supported",{status:403});const t=a.filemeta,i=a.chunk;if(0===t.chunkIndex&&e.checkFileType&&!n.fileScaner(i))throw new Error("Unknown or unsupported file type");throw await e.upload(i,t),{success:!0}}throw"DELETE"===l?(await this.deleteFile(a.fileId),{success:!0}):new Response("Invalid method",{status:405})}await this.handleRequest({method:l,path:d,body:a,searchParams:c.searchParams,params:{}},s)}catch(e){const i=e instanceof Error,n=e instanceof Response;let a=i?e.message:n?await e.text():e;return u?{status:i?404:(null==e?void 0:e.status)||200,content:JSON.stringify(a)}:{status:i?404:(null==e?void 0:e.status)||200,content:await t.default.encryptBuffer(a,c.secret)}}return u?{status:404,content:"Not found"}:{status:404,content:await t.default.encryptBuffer("Not found",c.secret)}}}exports.default=s;//# sourceMappingURL=index.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"index.js","sources":["../../src/server/index.ts"],"sourcesContent":["import crypto from \"../include/crypto\";\nimport { Metadata, ListenerInfo, ServerResponse } from \"./types\";\nimport SecurequServerBase from \"./Base\";\nimport fileScaner from \"../include/FileScaner\";\nimport { HTTPMethods } from \"../client/types\";\n\nclass SecurequServer extends SecurequServerBase {\n\n async handshake(body: any, clientInfo: any) {\n const data: any = await crypto.decryptBuffer(body, clientInfo.secret)\n const serverSecret = await this.getSecret()\n if (!data) throw new Error(\"Invalid handshake data\");\n if (data.hash !== clientInfo.hash) {\n throw new Error(\"Invalid handshake\");\n } else if (data.secret !== clientInfo.secret) {\n throw new Error(\"Invalid handshake secret\");\n } else if (Date.now() - data.clientTime > 30000) { // 30 seconds\n throw new Error(\"Handshake expired\");\n }\n\n const serverTime = new Date();\n const clientDate = new Date(data.clientTime);\n const offsetMs = clientDate.getTime() - serverTime.getTime();\n\n let info = {\n timeDiffarenc: offsetMs,\n maxFileSize: this.config.upload?.maxFilesize || null,\n dev: this.config.mode === 'development',\n checkFileType: this.config.upload?.checkFileType || false,\n signeture: await crypto.encrypt({\n expire: Date.now() + 30000, // 30 seconds\n hash: clientInfo.hash\n }, serverSecret)\n }\n throw info\n }\n\n async upload(body: any, clientInfo: any, signeture: string, metadata?: Metadata) {\n const data: any = await crypto.decryptBuffer(body, clientInfo.secret)\n const decryptSigneture = await crypto.decrypt(signeture, clientInfo.secret) as any\n await this.isValidSigneture(decryptSigneture.signeture, clientInfo.hash)\n const upload = this.config.upload\n\n if (!upload?.chunk || !upload?.complete) {\n throw new Response(\"Upload not supported\", { status: 403 })\n }\n\n if (data?.type === 'failed') {\n const meta = this.uploadMeta.get(data.fileid)\n if (meta && upload.failed) {\n await upload.failed(meta, metadata)\n this.uploadMeta.delete(data.fileid)\n throw { success: true }\n } else {\n throw new Response(\"Invalid upload\", { status: 400 })\n }\n } else if (data.type === 'meta') {\n if (upload?.maxFilesize && data.filesize > upload.maxFilesize * 1024) {\n throw new Response(`File size exceeds the limit of ${upload.maxFilesize} KB`, { status: 413 })\n }\n this.uploadMeta.set(data.fileid, {\n ...data,\n expire: Date.now() + 3600000 // 1 hour\n })\n this.uploadMeta.forEach((meta, key) => {\n if (meta.expire < Date.now()) {\n this.uploadMeta.delete(key)\n }\n })\n\n throw data\n } else {\n const { chunk, fileId, chunkIndex } = data;\n const meta = this.uploadMeta.get(fileId)\n if (!meta) {\n throw new Response(\"Invalid upload meta\", { status: 400 })\n }\n if (upload.checkFileType && chunkIndex === 0) {\n let fileType = fileScaner(chunk);\n if (!fileType) {\n throw new Error(\"Unknown or unsupported file type\");\n }\n }\n\n if (this.config.upload?.maxFilesize && data.filesize > this.config.upload.maxFilesize * 1024) {\n throw new Response(`File size exceeds the limit of ${this.config.upload.maxFilesize / 1024} MB`, { status: 413 })\n }\n await upload.chunk(chunk, {\n filename: meta.filename,\n filesize: meta.filesize,\n filetype: meta.filetype,\n fileid: meta.fileid,\n totalChunks: meta.totalChunks,\n chunkIndex,\n }, metadata)\n if (chunkIndex + 1 === meta.totalChunks) {\n const filepath = await upload.complete(meta, metadata)\n this.uploadMeta.delete(fileId)\n throw filepath\n }\n throw data\n }\n }\n\n async listen(url: string, { body, headers, metadata }: ListenerInfo): Promise<ServerResponse> {\n\n const signeture = headers['x-signeture'] || '';\n const origin = headers['x-origin'] || '';\n const method: HTTPMethods = headers['x-method'] || 'POST' as any\n\n let clientInfo = await this.clientInfo(url, origin)\n if (!clientInfo) {\n return {\n status: 403,\n content: \"Client not allowed\"\n }\n }\n let path = clientInfo.path\n const isDev = path !== '/' && this.config.mode === 'development'\n try {\n if (path === '/') {\n if (!['POST', 'PUT'].includes(method)) throw new Response(\"Invalid method\", { status: 405 });\n method === \"POST\"\n ? await this.handshake(body, clientInfo)\n : await this.upload(body, clientInfo, signeture, metadata);\n }\n\n const decryptSigneture = await crypto.decrypt(signeture, clientInfo.secret) as any\n await this.isValidSigneture(decryptSigneture.signeture, clientInfo.hash)\n\n // if reques is expired\n if (decryptSigneture.expire < Date.now()) throw new Response(\"Request expired\", { status: 403 });\n let data: any = null\n if (body) {\n if (isDev) {\n const decoder = new TextDecoder();\n const text = decoder.decode(body);\n data = JSON.parse(text)\n } else {\n data = await crypto.decryptBuffer(body, clientInfo.secret)\n }\n }\n\n await this.handleRequest({\n method,\n path,\n body: data,\n searchParams: clientInfo.searchParams,\n params: {}\n }, metadata);\n } catch (info: any) {\n const isError = info instanceof Error\n const isResponse = info instanceof Response\n let content = isError ? info.message : (isResponse ? await info.text() : info);\n if (isDev) {\n return {\n status: isError ? 404 : (info?.status || 200),\n content: JSON.stringify(content)\n };\n }\n return {\n status: isError ? 404 : (info?.status || 200),\n content: await crypto.encryptBuffer(content, clientInfo.secret)\n };\n }\n\n if (isDev) {\n return {\n status: 404,\n content: \"Not found\"\n };\n }\n\n return {\n status: 404,\n content: await crypto.encryptBuffer(\"Not found\", clientInfo.secret)\n };\n }\n\n}\n\nexport default SecurequServer;"],"names":["SecurequServer","SecurequServerBase","handshake","body","clientInfo","data","crypto","decryptBuffer","secret","serverSecret","this","getSecret","Error","hash","Date","now","clientTime","serverTime","timeDiffarenc","getTime","maxFileSize","_a","config","upload","maxFilesize","dev","mode","checkFileType","_b","signeture","encrypt","expire","metadata","decryptSigneture","decrypt","isValidSigneture","chunk","complete","Response","status","type","meta","uploadMeta","get","fileid","failed","delete","success","filesize","set","Object","assign","forEach","key","fileId","chunkIndex","fileScaner","filename","filetype","totalChunks","filepath","listen","url","headers","origin","method","content","path","isDev","includes","text","TextDecoder","decode","JSON","parse","handleRequest","searchParams","params","info","isError","isResponse","message","stringify","encryptBuffer","exports","default"],"mappings":"uKAMA,MAAMA,UAAuBC,EAAAA,QAE1B,eAAMC,CAAUC,EAAWC,WACxB,MAAMC,QAAkBC,EAAAA,QAAOC,cAAcJ,EAAMC,EAAWI,QACxDC,QAAqBC,KAAKC,YAChC,IAAKN,EAAM,MAAM,IAAIO,MAAM,0BAC3B,GAAIP,EAAKQ,OAAST,EAAWS,KAC1B,MAAM,IAAID,MAAM,qBACZ,GAAIP,EAAKG,SAAWJ,EAAWI,OACnC,MAAM,IAAII,MAAM,4BACZ,GAAIE,KAAKC,MAAQV,EAAKW,WAAa,IACvC,MAAM,IAAIJ,MAAM,qBAGnB,MAAMK,EAAa,IAAIH,KAcvB,KAVW,CACRI,cAJgB,IAAIJ,KAAKT,EAAKW,YACLG,UAAYF,EAAWE,UAIhDC,aAA+B,QAAlBC,EAAAX,KAAKY,OAAOC,cAAM,IAAAF,OAAA,EAAAA,EAAEG,cAAe,KAChDC,IAA0B,gBAArBf,KAAKY,OAAOI,KACjBC,eAAiC,QAAlBC,EAAAlB,KAAKY,OAAOC,cAAM,IAAAK,OAAA,EAAAA,EAAED,iBAAiB,EACpDE,gBAAiBvB,EAAAA,QAAOwB,QAAQ,CAC7BC,OAAQjB,KAAKC,MAAQ,IACrBF,KAAMT,EAAWS,MACjBJ,GAGT,CAEA,YAAMc,CAAOpB,EAAWC,EAAiByB,EAAmBG,SACzD,MAAM3B,QAAkBC,EAAAA,QAAOC,cAAcJ,EAAMC,EAAWI,QACxDyB,QAAyB3B,EAAAA,QAAO4B,QAAQL,EAAWzB,EAAWI,cAC9DE,KAAKyB,iBAAiBF,EAAiBJ,UAAWzB,EAAWS,MACnE,MAAMU,EAASb,KAAKY,OAAOC,OAE3B,KAAKA,aAAM,EAANA,EAAQa,UAAUb,eAAAA,EAAQc,UAC5B,MAAM,IAAIC,SAAS,uBAAwB,CAAEC,OAAQ,MAGxD,GAAmB,YAAflC,aAAI,EAAJA,EAAMmC,MAAmB,CAC1B,MAAMC,EAAO/B,KAAKgC,WAAWC,IAAItC,EAAKuC,QACtC,MAAIH,GAAQlB,EAAOsB,cACVtB,EAAOsB,OAAOJ,EAAMT,GAC1BtB,KAAKgC,WAAWI,OAAOzC,EAAKuC,QACtB,CAAEG,SAAS,IAEX,IAAIT,SAAS,iBAAkB,CAAEC,OAAQ,KAEpD,CAAM,GAAkB,SAAdlC,EAAKmC,KAAiB,CAC9B,IAAIjB,aAAM,EAANA,EAAQC,cAAenB,EAAK2C,SAAgC,KAArBzB,EAAOC,YAC/C,MAAM,IAAIc,SAAS,kCAAkCf,EAAOC,iBAAkB,CAAEe,OAAQ,MAY3F,MAVA7B,KAAKgC,WAAWO,IAAI5C,EAAKuC,OAAMM,OAAAC,OAAAD,OAAAC,OAAA,CAAA,EACzB9C,IACH0B,OAAQjB,KAAKC,MAAQ,QAExBL,KAAKgC,WAAWU,QAAQ,CAACX,EAAMY,KACxBZ,EAAKV,OAASjB,KAAKC,OACpBL,KAAKgC,WAAWI,OAAOO,KAIvBhD,CACR,CAAM,CACJ,MAAM+B,MAAEA,EAAKkB,OAAEA,EAAMC,WAAEA,GAAelD,EAChCoC,EAAO/B,KAAKgC,WAAWC,IAAIW,GACjC,IAAKb,EACF,MAAM,IAAIH,SAAS,sBAAuB,CAAEC,OAAQ,MAEvD,GAAIhB,EAAOI,eAAgC,IAAf4B,EAAkB,CAE3C,IADeC,EAAAA,WAAWpB,GAEvB,MAAM,IAAIxB,MAAM,mCAErB,CAED,IAAsB,UAAlBF,KAAKY,OAAOC,cAAM,IAAAF,OAAA,EAAAA,EAAEG,cAAenB,EAAK2C,SAA4C,KAAjCtC,KAAKY,OAAOC,OAAOC,YACvE,MAAM,IAAIc,SAAS,kCAAkC5B,KAAKY,OAAOC,OAAOC,YAAc,UAAW,CAAEe,OAAQ,MAU9G,SARMhB,EAAOa,MAAMA,EAAO,CACvBqB,SAAUhB,EAAKgB,SACfT,SAAUP,EAAKO,SACfU,SAAUjB,EAAKiB,SACfd,OAAQH,EAAKG,OACbe,YAAalB,EAAKkB,YAClBJ,cACAvB,GACCuB,EAAa,IAAMd,EAAKkB,YAAa,CACtC,MAAMC,QAAiBrC,EAAOc,SAASI,EAAMT,GAE7C,MADAtB,KAAKgC,WAAWI,OAAOQ,GACjBM,CACR,CACD,MAAMvD,CACR,CACJ,CAEA,YAAMwD,CAAOC,GAAa3D,KAAEA,EAAI4D,QAAEA,EAAO/B,SAAEA,IAExC,MAAMH,EAAYkC,EAAQ,gBAAkB,GACtCC,EAASD,EAAQ,aAAe,GAChCE,EAAsBF,EAAQ,aAAe,OAEnD,IAAI3D,QAAmBM,KAAKN,WAAW0D,EAAKE,GAC5C,IAAK5D,EACF,MAAO,CACJmC,OAAQ,IACR2B,QAAS,sBAGf,IAAIC,EAAO/D,EAAW+D,KACtB,MAAMC,EAAiB,MAATD,GAAqC,gBAArBzD,KAAKY,OAAOI,KAC1C,IACG,GAAa,MAATyC,EAAc,CACf,IAAK,CAAC,OAAQ,OAAOE,SAASJ,GAAS,MAAM,IAAI3B,SAAS,iBAAkB,CAAEC,OAAQ,MAC3E,SAAX0B,QACWvD,KAAKR,UAAUC,EAAMC,SACrBM,KAAKa,OAAOpB,EAAMC,EAAYyB,EAAWG,EACtD,CAED,MAAMC,QAAyB3B,EAAAA,QAAO4B,QAAQL,EAAWzB,EAAWI,QAIpE,SAHME,KAAKyB,iBAAiBF,EAAiBJ,UAAWzB,EAAWS,MAG/DoB,EAAiBF,OAASjB,KAAKC,MAAO,MAAM,IAAIuB,SAAS,kBAAmB,CAAEC,OAAQ,MAC1F,IAAIlC,EAAY,KAChB,GAAIF,EACD,GAAIiE,EAAO,CACR,MACME,GADU,IAAIC,aACCC,OAAOrE,GAC5BE,EAAOoE,KAAKC,MAAMJ,EACpB,MACEjE,QAAaC,EAAAA,QAAOC,cAAcJ,EAAMC,EAAWI,cAInDE,KAAKiE,cAAc,CACtBV,SACAE,OACAhE,KAAME,EACNuE,aAAcxE,EAAWwE,aACzBC,OAAQ,CAAA,GACR7C,EACL,CAAC,MAAO8C,GACN,MAAMC,EAAUD,aAAgBlE,MAC1BoE,EAAaF,aAAgBxC,SACnC,IAAI4B,EAAUa,EAAUD,EAAKG,QAAWD,QAAmBF,EAAKR,OAASQ,EACzE,OAAIV,EACM,CACJ7B,OAAQwC,EAAU,KAAOD,aAAI,EAAJA,EAAMvC,SAAU,IACzC2B,QAASO,KAAKS,UAAUhB,IAGvB,CACJ3B,OAAQwC,EAAU,KAAOD,aAAI,EAAJA,EAAMvC,SAAU,IACzC2B,cAAe5D,EAAAA,QAAO6E,cAAcjB,EAAS9D,EAAWI,QAE7D,CAED,OAAI4D,EACM,CACJ7B,OAAQ,IACR2B,QAAS,aAIR,CACJ3B,OAAQ,IACR2B,cAAe5D,EAAAA,QAAO6E,cAAc,YAAa/E,EAAWI,QAElE,EAEF4E,QAAAC,QAAArF"}
1
+ {"version":3,"file":"index.js","sources":["../../src/server/index.ts"],"sourcesContent":["import crypto from \"../include/crypto\";\nimport { Metadata, ListenerInfo, ServerResponse, UploadFileMeta } from \"./types\";\nimport SecurequServerBase from \"./Base\";\nimport fileScaner from \"../include/FileScaner\";\nimport { HTTPMethods } from \"../client/types\";\nimport { chunkFile, getFileId, totalChunks } from \"../include/File\";\n\nclass SecurequServer extends SecurequServerBase {\n\n async handshake(body: any, clientInfo: any) {\n const data: any = await crypto.decryptBuffer(body, clientInfo.secret)\n const serverSecret = await this.getSecret()\n if (!data) throw new Error(\"Invalid handshake data\");\n if (data.hash !== clientInfo.hash) {\n throw new Error(\"Invalid handshake\");\n } else if (data.secret !== clientInfo.secret) {\n throw new Error(\"Invalid handshake secret\");\n } else if (Date.now() - data.clientTime > 30000) { // 30 seconds\n throw new Error(\"Handshake expired\");\n }\n\n const serverTime = new Date();\n const clientDate = new Date(data.clientTime);\n const offsetMs = clientDate.getTime() - serverTime.getTime();\n\n let info = {\n dev: this.config.mode === 'development',\n timeDiffarenc: offsetMs,\n maxFileSize: this.config.file?.maxFilesize || null,\n checkFileType: this.config.file?.checkFileType || false,\n signeture: await crypto.encrypt({\n expire: Date.now() + 30000, // 30 seconds\n hash: clientInfo.hash\n }, serverSecret)\n }\n throw info\n }\n\n async uploadFile(file: File, onProgress?: (p: number) => void): Promise<UploadFileMeta> {\n if (!this.config.file?.upload) throw new Response(\"Upload not supported\", { status: 403 });\n\n const fileId = await getFileId(file);\n const chunkSize = this.config.file.chunkSize\n const filemeta: UploadFileMeta = {\n fileId: fileId,\n name: file.name,\n size: file.size,\n type: file.type,\n totalChunks: totalChunks(file, chunkSize),\n chunkIndex: 0,\n isFinish: false\n }\n\n for await (let { chunk, chunkIndex } of chunkFile(file, chunkSize)) {\n if (this.config.file.checkFileType && chunkIndex === 0) {\n let fileType = fileScaner(chunk);\n if (!fileType) throw new Error(\"Unknown or unsupported file type\");\n }\n filemeta.chunkIndex = chunkIndex;\n filemeta.isFinish = chunkIndex + 1 === filemeta.totalChunks;\n await this.config.file.upload(chunk, filemeta);\n if (onProgress) {\n const progress = Math.floor(((chunkIndex + 1) / filemeta.totalChunks) * 100)\n onProgress(progress);\n }\n }\n return filemeta\n }\n\n async deleteFile(fileId: string): Promise<void> {\n if (!this.config.file?.delete) throw new Response(\"Delete not supported\", { status: 403 })\n await this.config.file.delete(fileId);\n }\n\n async listen(url: string, { body, headers, metadata }: ListenerInfo): Promise<ServerResponse> {\n\n const signeture = headers['x-signeture'] || '';\n const origin = headers['x-origin'] || '';\n const method: HTTPMethods = headers['x-method'] || 'POST' as any\n\n let clientInfo = await this.clientInfo(url, origin)\n if (!clientInfo) {\n return {\n status: 403,\n content: \"Client not allowed\"\n }\n }\n let path = clientInfo.path\n const isDev = path !== '/' && this.config.mode === 'development'\n try {\n if (path === '/' && method === \"POST\") {\n await this.handshake(body, clientInfo)\n }\n\n if (path === '/' && method === 'GET') throw new Response(\"Invalid method\", { status: 405 })\n\n const decryptSigneture = await crypto.decrypt(signeture, clientInfo.secret) as any\n if (decryptSigneture.expire < Date.now()) throw new Response(\"Request expired\", { status: 403 });\n\n await this.isValidSigneture(decryptSigneture.signeture, clientInfo.hash)\n\n let data: any = null\n if (body) {\n if (isDev) {\n const decoder = new TextDecoder();\n const text = decoder.decode(body);\n data = JSON.parse(text)\n } else {\n data = await crypto.decryptBuffer(body, clientInfo.secret)\n }\n }\n\n if (path === '/') {\n\n const fileConfig = this.config.file\n\n // handle file upload\n if (method === \"PUT\") {\n if (!fileConfig?.upload) throw new Response(\"Upload not supported\", { status: 403 })\n\n const filemeta: UploadFileMeta = data.filemeta\n const chunk: Uint8Array = data.chunk\n\n if (filemeta.chunkIndex === 0 && fileConfig.checkFileType && !fileScaner(chunk)) {\n throw new Error(\"Unknown or unsupported file type\");\n }\n\n await fileConfig.upload(chunk, filemeta)\n throw { success: true }\n } else if (method === \"DELETE\") {\n await this.deleteFile(data.fileId)\n throw { success: true }\n } else {\n throw new Response(\"Invalid method\", { status: 405 });\n }\n }\n\n await this.handleRequest({\n method,\n path,\n body: data,\n searchParams: clientInfo.searchParams,\n params: {}\n }, metadata);\n\n } catch (info: any) {\n const isError = info instanceof Error\n const isResponse = info instanceof Response\n let content = isError ? info.message : (isResponse ? await info.text() : info);\n if (isDev) {\n return {\n status: isError ? 404 : (info?.status || 200),\n content: JSON.stringify(content)\n };\n }\n return {\n status: isError ? 404 : (info?.status || 200),\n content: await crypto.encryptBuffer(content, clientInfo.secret)\n };\n }\n\n if (isDev) {\n return {\n status: 404,\n content: \"Not found\"\n };\n }\n\n return {\n status: 404,\n content: await crypto.encryptBuffer(\"Not found\", clientInfo.secret)\n };\n }\n\n}\n\nexport default SecurequServer;"],"names":["SecurequServer","SecurequServerBase","handshake","body","clientInfo","data","crypto","decryptBuffer","secret","serverSecret","this","getSecret","Error","hash","Date","now","clientTime","serverTime","offsetMs","getTime","dev","config","mode","timeDiffarenc","maxFileSize","_a","file","maxFilesize","checkFileType","_b","signeture","encrypt","expire","uploadFile","onProgress","_d","upload","Response","status","fileId","getFileId","chunkSize","filemeta","name","size","type","totalChunks","chunkIndex","isFinish","_g","_e","_f","__asyncValues","chunkFile","next","done","_c","value","chunk","fileScaner","Math","floor","deleteFile","delete","listen","url","headers","metadata","origin","method","content","path","isDev","decryptSigneture","decrypt","isValidSigneture","text","TextDecoder","decode","JSON","parse","fileConfig","success","handleRequest","searchParams","params","info","isError","isResponse","message","stringify","encryptBuffer","exports","default"],"mappings":"0NAOA,MAAMA,UAAuBC,EAAAA,QAE1B,eAAMC,CAAUC,EAAWC,WACxB,MAAMC,QAAkBC,EAAAA,QAAOC,cAAcJ,EAAMC,EAAWI,QACxDC,QAAqBC,KAAKC,YAChC,IAAKN,EAAM,MAAM,IAAIO,MAAM,0BAC3B,GAAIP,EAAKQ,OAAST,EAAWS,KAC1B,MAAM,IAAID,MAAM,qBACZ,GAAIP,EAAKG,SAAWJ,EAAWI,OACnC,MAAM,IAAII,MAAM,4BACZ,GAAIE,KAAKC,MAAQV,EAAKW,WAAa,IACvC,MAAM,IAAIJ,MAAM,qBAGnB,MAAMK,EAAa,IAAIH,KAEjBI,EADa,IAAIJ,KAAKT,EAAKW,YACLG,UAAYF,EAAWE,UAYnD,KAVW,CACRC,IAA0B,gBAArBV,KAAKW,OAAOC,KACjBC,cAAeL,EACfM,aAA6B,QAAhBC,EAAAf,KAAKW,OAAOK,YAAI,IAAAD,OAAA,EAAAA,EAAEE,cAAe,KAC9CC,eAA+B,QAAhBC,EAAAnB,KAAKW,OAAOK,YAAI,IAAAG,OAAA,EAAAA,EAAED,iBAAiB,EAClDE,gBAAiBxB,EAAAA,QAAOyB,QAAQ,CAC7BC,OAAQlB,KAAKC,MAAQ,IACrBF,KAAMT,EAAWS,MACjBJ,GAGT,CAEA,gBAAMwB,CAAWP,EAAYQ,iBAC1B,KAAqB,QAAhBC,EAAAzB,KAAKW,OAAOK,YAAI,IAAAS,OAAA,EAAAA,EAAEC,QAAQ,MAAM,IAAIC,SAAS,uBAAwB,CAAEC,OAAQ,MAEpF,MAAMC,QAAeC,EAAAA,UAAUd,GACzBe,EAAY/B,KAAKW,OAAOK,KAAKe,UAC7BC,EAA2B,CAC9BH,OAAQA,EACRI,KAAMjB,EAAKiB,KACXC,KAAMlB,EAAKkB,KACXC,KAAMnB,EAAKmB,KACXC,YAAaA,EAAAA,YAAYpB,EAAMe,GAC/BM,WAAY,EACZC,UAAU,OAGb,IAAwC,IAA0BC,EAA1BC,GAAA,EAAAC,EAAAC,EAAAA,cAAAC,YAAU3B,EAAMe,MAAUhB,GAAAwB,QAAAE,EAAAG,QAAAC,OAAA,CAA1BC,EAAAP,EAAAQ,MAAAP,GAAA,MAA7B,IAAIQ,MAAEA,EAAKX,WAAEA,KACrB,GAAIrC,KAAKW,OAAOK,KAAKE,eAAgC,IAAfmB,EAAkB,CAErD,IADeY,EAAAA,WAAWD,GACX,MAAM,IAAI9C,MAAM,mCACjC,CAID,GAHA8B,EAASK,WAAaA,EACtBL,EAASM,SAAWD,EAAa,IAAML,EAASI,kBAC1CpC,KAAKW,OAAOK,KAAKU,OAAOsB,EAAOhB,GACjCR,EAAY,CAEbA,EADiB0B,KAAKC,OAAQd,EAAa,GAAKL,EAASI,YAAe,KAE1E,eACH,oGACD,OAAOJ,CACV,CAEA,gBAAMoB,CAAWvB,SACd,KAAqB,QAAhBd,EAAAf,KAAKW,OAAOK,YAAI,IAAAD,OAAA,EAAAA,EAAEsC,QAAQ,MAAM,IAAI1B,SAAS,uBAAwB,CAAEC,OAAQ,YAC9E5B,KAAKW,OAAOK,KAAKqC,OAAOxB,EACjC,CAEA,YAAMyB,CAAOC,GAAa9D,KAAEA,EAAI+D,QAAEA,EAAOC,SAAEA,IAExC,MAAMrC,EAAYoC,EAAQ,gBAAkB,GACtCE,EAASF,EAAQ,aAAe,GAChCG,EAAsBH,EAAQ,aAAe,OAEnD,IAAI9D,QAAmBM,KAAKN,WAAW6D,EAAKG,GAC5C,IAAKhE,EACF,MAAO,CACJkC,OAAQ,IACRgC,QAAS,sBAGf,IAAIC,EAAOnE,EAAWmE,KACtB,MAAMC,EAAiB,MAATD,GAAqC,gBAArB7D,KAAKW,OAAOC,KAC1C,IAKG,GAJa,MAATiD,GAA2B,SAAXF,SACX3D,KAAKR,UAAUC,EAAMC,GAGjB,MAATmE,GAA2B,QAAXF,EAAkB,MAAM,IAAIhC,SAAS,iBAAkB,CAAEC,OAAQ,MAErF,MAAMmC,QAAyBnE,EAAAA,QAAOoE,QAAQ5C,EAAW1B,EAAWI,QACpE,GAAIiE,EAAiBzC,OAASlB,KAAKC,MAAO,MAAM,IAAIsB,SAAS,kBAAmB,CAAEC,OAAQ,YAEpF5B,KAAKiE,iBAAiBF,EAAiB3C,UAAW1B,EAAWS,MAEnE,IAAIR,EAAY,KAChB,GAAIF,EACD,GAAIqE,EAAO,CACR,MACMI,GADU,IAAIC,aACCC,OAAO3E,GAC5BE,EAAO0E,KAAKC,MAAMJ,EACpB,MACEvE,QAAaC,EAAAA,QAAOC,cAAcJ,EAAMC,EAAWI,QAIzD,GAAa,MAAT+D,EAAc,CAEf,MAAMU,EAAavE,KAAKW,OAAOK,KAG/B,GAAe,QAAX2C,EAAkB,CACnB,KAAKY,aAAU,EAAVA,EAAY7C,QAAQ,MAAM,IAAIC,SAAS,uBAAwB,CAAEC,OAAQ,MAE9E,MAAMI,EAA2BrC,EAAKqC,SAChCgB,EAAoBrD,EAAKqD,MAE/B,GAA4B,IAAxBhB,EAASK,YAAoBkC,EAAWrD,gBAAkB+B,EAAAA,WAAWD,GACtE,MAAM,IAAI9C,MAAM,oCAInB,YADMqE,EAAW7C,OAAOsB,EAAOhB,GACzB,CAAEwC,SAAS,EACnB,CAAM,KAAe,WAAXb,SACF3D,KAAKoD,WAAWzD,EAAKkC,QACrB,CAAE2C,SAAS,IAEX,IAAI7C,SAAS,iBAAkB,CAAEC,OAAQ,KAEpD,OAEK5B,KAAKyE,cAAc,CACtBd,SACAE,OACApE,KAAME,EACN+E,aAAchF,EAAWgF,aACzBC,OAAQ,CAAA,GACRlB,EAEL,CAAC,MAAOmB,GACN,MAAMC,EAAUD,aAAgB1E,MAC1B4E,EAAaF,aAAgBjD,SACnC,IAAIiC,EAAUiB,EAAUD,EAAKG,QAAWD,QAAmBF,EAAKV,OAASU,EACzE,OAAId,EACM,CACJlC,OAAQiD,EAAU,KAAOD,aAAI,EAAJA,EAAMhD,SAAU,IACzCgC,QAASS,KAAKW,UAAUpB,IAGvB,CACJhC,OAAQiD,EAAU,KAAOD,aAAI,EAAJA,EAAMhD,SAAU,IACzCgC,cAAehE,EAAAA,QAAOqF,cAAcrB,EAASlE,EAAWI,QAE7D,CAED,OAAIgE,EACM,CACJlC,OAAQ,IACRgC,QAAS,aAIR,CACJhC,OAAQ,IACRgC,cAAehE,EAAAA,QAAOqF,cAAc,YAAavF,EAAWI,QAElE,EAEFoF,QAAAC,QAAA7F"}
package/server/index.mjs CHANGED
@@ -1 +1 @@
1
- import e from"../include/crypto.mjs";import t from"./Base.mjs";import{fileScaner as i}from"../include/FileScaner.mjs";class a extends t{async handshake(t,i){var a,s;const n=await e.decryptBuffer(t,i.secret),o=await this.getSecret();if(!n)throw new Error("Invalid handshake data");if(n.hash!==i.hash)throw new Error("Invalid handshake");if(n.secret!==i.secret)throw new Error("Invalid handshake secret");if(Date.now()-n.clientTime>3e4)throw new Error("Handshake expired");const l=new Date;throw{timeDiffarenc:new Date(n.clientTime).getTime()-l.getTime(),maxFileSize:(null===(a=this.config.upload)||void 0===a?void 0:a.maxFilesize)||null,dev:"development"===this.config.mode,checkFileType:(null===(s=this.config.upload)||void 0===s?void 0:s.checkFileType)||!1,signeture:await e.encrypt({expire:Date.now()+3e4,hash:i.hash},o)}}async upload(t,a,s,n){var o;const l=await e.decryptBuffer(t,a.secret),r=await e.decrypt(s,a.secret);await this.isValidSigneture(r.signeture,a.hash);const d=this.config.upload;if(!(null==d?void 0:d.chunk)||!(null==d?void 0:d.complete))throw new Response("Upload not supported",{status:403});if("failed"===(null==l?void 0:l.type)){const e=this.uploadMeta.get(l.fileid);throw e&&d.failed?(await d.failed(e,n),this.uploadMeta.delete(l.fileid),{success:!0}):new Response("Invalid upload",{status:400})}if("meta"===l.type){if((null==d?void 0:d.maxFilesize)&&l.filesize>1024*d.maxFilesize)throw new Response(`File size exceeds the limit of ${d.maxFilesize} KB`,{status:413});throw this.uploadMeta.set(l.fileid,Object.assign(Object.assign({},l),{expire:Date.now()+36e5})),this.uploadMeta.forEach((e,t)=>{e.expire<Date.now()&&this.uploadMeta.delete(t)}),l}{const{chunk:e,fileId:t,chunkIndex:a}=l,s=this.uploadMeta.get(t);if(!s)throw new Response("Invalid upload meta",{status:400});if(d.checkFileType&&0===a){if(!i(e))throw new Error("Unknown or unsupported file type")}if((null===(o=this.config.upload)||void 0===o?void 0:o.maxFilesize)&&l.filesize>1024*this.config.upload.maxFilesize)throw new Response(`File size exceeds the limit of ${this.config.upload.maxFilesize/1024} MB`,{status:413});if(await d.chunk(e,{filename:s.filename,filesize:s.filesize,filetype:s.filetype,fileid:s.fileid,totalChunks:s.totalChunks,chunkIndex:a},n),a+1===s.totalChunks){const e=await d.complete(s,n);throw this.uploadMeta.delete(t),e}throw l}}async listen(t,{body:i,headers:a,metadata:s}){const n=a["x-signeture"]||"",o=a["x-origin"]||"",l=a["x-method"]||"POST";let r=await this.clientInfo(t,o);if(!r)return{status:403,content:"Client not allowed"};let d=r.path;const c="/"!==d&&"development"===this.config.mode;try{if("/"===d){if(!["POST","PUT"].includes(l))throw new Response("Invalid method",{status:405});"POST"===l?await this.handshake(i,r):await this.upload(i,r,n,s)}const t=await e.decrypt(n,r.secret);if(await this.isValidSigneture(t.signeture,r.hash),t.expire<Date.now())throw new Response("Request expired",{status:403});let a=null;if(i)if(c){const e=(new TextDecoder).decode(i);a=JSON.parse(e)}else a=await e.decryptBuffer(i,r.secret);await this.handleRequest({method:l,path:d,body:a,searchParams:r.searchParams,params:{}},s)}catch(t){const i=t instanceof Error,a=t instanceof Response;let s=i?t.message:a?await t.text():t;return c?{status:i?404:(null==t?void 0:t.status)||200,content:JSON.stringify(s)}:{status:i?404:(null==t?void 0:t.status)||200,content:await e.encryptBuffer(s,r.secret)}}return c?{status:404,content:"Not found"}:{status:404,content:await e.encryptBuffer("Not found",r.secret)}}}export{a as default};//# sourceMappingURL=index.mjs.map
1
+ import{__asyncValues as e}from"tslib";import t from"../include/crypto.mjs";import i from"./Base.mjs";import{fileScaner as n}from"../include/FileScaner.mjs";import{getFileId as s,totalChunks as a,chunkFile as o}from"../include/File.mjs";class r extends i{async handshake(e,i){var n,s;const a=await t.decryptBuffer(e,i.secret),o=await this.getSecret();if(!a)throw new Error("Invalid handshake data");if(a.hash!==i.hash)throw new Error("Invalid handshake");if(a.secret!==i.secret)throw new Error("Invalid handshake secret");if(Date.now()-a.clientTime>3e4)throw new Error("Handshake expired");const r=new Date,l=new Date(a.clientTime).getTime()-r.getTime();throw{dev:"development"===this.config.mode,timeDiffarenc:l,maxFileSize:(null===(n=this.config.file)||void 0===n?void 0:n.maxFilesize)||null,checkFileType:(null===(s=this.config.file)||void 0===s?void 0:s.checkFileType)||!1,signeture:await t.encrypt({expire:Date.now()+3e4,hash:i.hash},o)}}async uploadFile(t,i){var r,l,c,h,d;if(!(null===(d=this.config.file)||void 0===d?void 0:d.upload))throw new Response("Upload not supported",{status:403});const f=await s(t),u=this.config.file.chunkSize,p={fileId:f,name:t.name,size:t.size,type:t.type,totalChunks:a(t,u),chunkIndex:0,isFinish:!1};try{for(var w,m=!0,y=e(o(t,u));!(r=(w=await y.next()).done);){h=w.value,m=!1;try{let{chunk:e,chunkIndex:t}=h;if(this.config.file.checkFileType&&0===t){if(!n(e))throw new Error("Unknown or unsupported file type")}if(p.chunkIndex=t,p.isFinish=t+1===p.totalChunks,await this.config.file.upload(e,p),i){i(Math.floor((t+1)/p.totalChunks*100))}}finally{m=!0}}}catch(e){l={error:e}}finally{try{m||r||!(c=y.return)||await c.call(y)}finally{if(l)throw l.error}}return p}async deleteFile(e){var t;if(!(null===(t=this.config.file)||void 0===t?void 0:t.delete))throw new Response("Delete not supported",{status:403});await this.config.file.delete(e)}async listen(e,{body:i,headers:s,metadata:a}){const o=s["x-signeture"]||"",r=s["x-origin"]||"",l=s["x-method"]||"POST";let c=await this.clientInfo(e,r);if(!c)return{status:403,content:"Client not allowed"};let h=c.path;const d="/"!==h&&"development"===this.config.mode;try{if("/"===h&&"POST"===l&&await this.handshake(i,c),"/"===h&&"GET"===l)throw new Response("Invalid method",{status:405});const e=await t.decrypt(o,c.secret);if(e.expire<Date.now())throw new Response("Request expired",{status:403});await this.isValidSigneture(e.signeture,c.hash);let s=null;if(i)if(d){const e=(new TextDecoder).decode(i);s=JSON.parse(e)}else s=await t.decryptBuffer(i,c.secret);if("/"===h){const e=this.config.file;if("PUT"===l){if(!(null==e?void 0:e.upload))throw new Response("Upload not supported",{status:403});const t=s.filemeta,i=s.chunk;if(0===t.chunkIndex&&e.checkFileType&&!n(i))throw new Error("Unknown or unsupported file type");throw await e.upload(i,t),{success:!0}}throw"DELETE"===l?(await this.deleteFile(s.fileId),{success:!0}):new Response("Invalid method",{status:405})}await this.handleRequest({method:l,path:h,body:s,searchParams:c.searchParams,params:{}},a)}catch(e){const i=e instanceof Error,n=e instanceof Response;let s=i?e.message:n?await e.text():e;return d?{status:i?404:(null==e?void 0:e.status)||200,content:JSON.stringify(s)}:{status:i?404:(null==e?void 0:e.status)||200,content:await t.encryptBuffer(s,c.secret)}}return d?{status:404,content:"Not found"}:{status:404,content:await t.encryptBuffer("Not found",c.secret)}}}export{r as default};//# sourceMappingURL=index.mjs.map
@@ -1 +1 @@
1
- {"version":3,"file":"index.mjs","sources":["../../src/server/index.ts"],"sourcesContent":["import crypto from \"../include/crypto\";\nimport { Metadata, ListenerInfo, ServerResponse } from \"./types\";\nimport SecurequServerBase from \"./Base\";\nimport fileScaner from \"../include/FileScaner\";\nimport { HTTPMethods } from \"../client/types\";\n\nclass SecurequServer extends SecurequServerBase {\n\n async handshake(body: any, clientInfo: any) {\n const data: any = await crypto.decryptBuffer(body, clientInfo.secret)\n const serverSecret = await this.getSecret()\n if (!data) throw new Error(\"Invalid handshake data\");\n if (data.hash !== clientInfo.hash) {\n throw new Error(\"Invalid handshake\");\n } else if (data.secret !== clientInfo.secret) {\n throw new Error(\"Invalid handshake secret\");\n } else if (Date.now() - data.clientTime > 30000) { // 30 seconds\n throw new Error(\"Handshake expired\");\n }\n\n const serverTime = new Date();\n const clientDate = new Date(data.clientTime);\n const offsetMs = clientDate.getTime() - serverTime.getTime();\n\n let info = {\n timeDiffarenc: offsetMs,\n maxFileSize: this.config.upload?.maxFilesize || null,\n dev: this.config.mode === 'development',\n checkFileType: this.config.upload?.checkFileType || false,\n signeture: await crypto.encrypt({\n expire: Date.now() + 30000, // 30 seconds\n hash: clientInfo.hash\n }, serverSecret)\n }\n throw info\n }\n\n async upload(body: any, clientInfo: any, signeture: string, metadata?: Metadata) {\n const data: any = await crypto.decryptBuffer(body, clientInfo.secret)\n const decryptSigneture = await crypto.decrypt(signeture, clientInfo.secret) as any\n await this.isValidSigneture(decryptSigneture.signeture, clientInfo.hash)\n const upload = this.config.upload\n\n if (!upload?.chunk || !upload?.complete) {\n throw new Response(\"Upload not supported\", { status: 403 })\n }\n\n if (data?.type === 'failed') {\n const meta = this.uploadMeta.get(data.fileid)\n if (meta && upload.failed) {\n await upload.failed(meta, metadata)\n this.uploadMeta.delete(data.fileid)\n throw { success: true }\n } else {\n throw new Response(\"Invalid upload\", { status: 400 })\n }\n } else if (data.type === 'meta') {\n if (upload?.maxFilesize && data.filesize > upload.maxFilesize * 1024) {\n throw new Response(`File size exceeds the limit of ${upload.maxFilesize} KB`, { status: 413 })\n }\n this.uploadMeta.set(data.fileid, {\n ...data,\n expire: Date.now() + 3600000 // 1 hour\n })\n this.uploadMeta.forEach((meta, key) => {\n if (meta.expire < Date.now()) {\n this.uploadMeta.delete(key)\n }\n })\n\n throw data\n } else {\n const { chunk, fileId, chunkIndex } = data;\n const meta = this.uploadMeta.get(fileId)\n if (!meta) {\n throw new Response(\"Invalid upload meta\", { status: 400 })\n }\n if (upload.checkFileType && chunkIndex === 0) {\n let fileType = fileScaner(chunk);\n if (!fileType) {\n throw new Error(\"Unknown or unsupported file type\");\n }\n }\n\n if (this.config.upload?.maxFilesize && data.filesize > this.config.upload.maxFilesize * 1024) {\n throw new Response(`File size exceeds the limit of ${this.config.upload.maxFilesize / 1024} MB`, { status: 413 })\n }\n await upload.chunk(chunk, {\n filename: meta.filename,\n filesize: meta.filesize,\n filetype: meta.filetype,\n fileid: meta.fileid,\n totalChunks: meta.totalChunks,\n chunkIndex,\n }, metadata)\n if (chunkIndex + 1 === meta.totalChunks) {\n const filepath = await upload.complete(meta, metadata)\n this.uploadMeta.delete(fileId)\n throw filepath\n }\n throw data\n }\n }\n\n async listen(url: string, { body, headers, metadata }: ListenerInfo): Promise<ServerResponse> {\n\n const signeture = headers['x-signeture'] || '';\n const origin = headers['x-origin'] || '';\n const method: HTTPMethods = headers['x-method'] || 'POST' as any\n\n let clientInfo = await this.clientInfo(url, origin)\n if (!clientInfo) {\n return {\n status: 403,\n content: \"Client not allowed\"\n }\n }\n let path = clientInfo.path\n const isDev = path !== '/' && this.config.mode === 'development'\n try {\n if (path === '/') {\n if (!['POST', 'PUT'].includes(method)) throw new Response(\"Invalid method\", { status: 405 });\n method === \"POST\"\n ? await this.handshake(body, clientInfo)\n : await this.upload(body, clientInfo, signeture, metadata);\n }\n\n const decryptSigneture = await crypto.decrypt(signeture, clientInfo.secret) as any\n await this.isValidSigneture(decryptSigneture.signeture, clientInfo.hash)\n\n // if reques is expired\n if (decryptSigneture.expire < Date.now()) throw new Response(\"Request expired\", { status: 403 });\n let data: any = null\n if (body) {\n if (isDev) {\n const decoder = new TextDecoder();\n const text = decoder.decode(body);\n data = JSON.parse(text)\n } else {\n data = await crypto.decryptBuffer(body, clientInfo.secret)\n }\n }\n\n await this.handleRequest({\n method,\n path,\n body: data,\n searchParams: clientInfo.searchParams,\n params: {}\n }, metadata);\n } catch (info: any) {\n const isError = info instanceof Error\n const isResponse = info instanceof Response\n let content = isError ? info.message : (isResponse ? await info.text() : info);\n if (isDev) {\n return {\n status: isError ? 404 : (info?.status || 200),\n content: JSON.stringify(content)\n };\n }\n return {\n status: isError ? 404 : (info?.status || 200),\n content: await crypto.encryptBuffer(content, clientInfo.secret)\n };\n }\n\n if (isDev) {\n return {\n status: 404,\n content: \"Not found\"\n };\n }\n\n return {\n status: 404,\n content: await crypto.encryptBuffer(\"Not found\", clientInfo.secret)\n };\n }\n\n}\n\nexport default SecurequServer;"],"names":["SecurequServer","SecurequServerBase","handshake","body","clientInfo","data","crypto","decryptBuffer","secret","serverSecret","this","getSecret","Error","hash","Date","now","clientTime","serverTime","timeDiffarenc","getTime","maxFileSize","_a","config","upload","maxFilesize","dev","mode","checkFileType","_b","signeture","encrypt","expire","metadata","decryptSigneture","decrypt","isValidSigneture","chunk","complete","Response","status","type","meta","uploadMeta","get","fileid","failed","delete","success","filesize","set","Object","assign","forEach","key","fileId","chunkIndex","fileScaner","filename","filetype","totalChunks","filepath","listen","url","headers","origin","method","content","path","isDev","includes","text","TextDecoder","decode","JSON","parse","handleRequest","searchParams","params","info","isError","isResponse","message","stringify","encryptBuffer"],"mappings":"sHAMA,MAAMA,UAAuBC,EAE1B,eAAMC,CAAUC,EAAWC,WACxB,MAAMC,QAAkBC,EAAOC,cAAcJ,EAAMC,EAAWI,QACxDC,QAAqBC,KAAKC,YAChC,IAAKN,EAAM,MAAM,IAAIO,MAAM,0BAC3B,GAAIP,EAAKQ,OAAST,EAAWS,KAC1B,MAAM,IAAID,MAAM,qBACZ,GAAIP,EAAKG,SAAWJ,EAAWI,OACnC,MAAM,IAAII,MAAM,4BACZ,GAAIE,KAAKC,MAAQV,EAAKW,WAAa,IACvC,MAAM,IAAIJ,MAAM,qBAGnB,MAAMK,EAAa,IAAIH,KAcvB,KAVW,CACRI,cAJgB,IAAIJ,KAAKT,EAAKW,YACLG,UAAYF,EAAWE,UAIhDC,aAA+B,QAAlBC,EAAAX,KAAKY,OAAOC,cAAM,IAAAF,OAAA,EAAAA,EAAEG,cAAe,KAChDC,IAA0B,gBAArBf,KAAKY,OAAOI,KACjBC,eAAiC,QAAlBC,EAAAlB,KAAKY,OAAOC,cAAM,IAAAK,OAAA,EAAAA,EAAED,iBAAiB,EACpDE,gBAAiBvB,EAAOwB,QAAQ,CAC7BC,OAAQjB,KAAKC,MAAQ,IACrBF,KAAMT,EAAWS,MACjBJ,GAGT,CAEA,YAAMc,CAAOpB,EAAWC,EAAiByB,EAAmBG,SACzD,MAAM3B,QAAkBC,EAAOC,cAAcJ,EAAMC,EAAWI,QACxDyB,QAAyB3B,EAAO4B,QAAQL,EAAWzB,EAAWI,cAC9DE,KAAKyB,iBAAiBF,EAAiBJ,UAAWzB,EAAWS,MACnE,MAAMU,EAASb,KAAKY,OAAOC,OAE3B,KAAKA,aAAM,EAANA,EAAQa,UAAUb,eAAAA,EAAQc,UAC5B,MAAM,IAAIC,SAAS,uBAAwB,CAAEC,OAAQ,MAGxD,GAAmB,YAAflC,aAAI,EAAJA,EAAMmC,MAAmB,CAC1B,MAAMC,EAAO/B,KAAKgC,WAAWC,IAAItC,EAAKuC,QACtC,MAAIH,GAAQlB,EAAOsB,cACVtB,EAAOsB,OAAOJ,EAAMT,GAC1BtB,KAAKgC,WAAWI,OAAOzC,EAAKuC,QACtB,CAAEG,SAAS,IAEX,IAAIT,SAAS,iBAAkB,CAAEC,OAAQ,KAEpD,CAAM,GAAkB,SAAdlC,EAAKmC,KAAiB,CAC9B,IAAIjB,aAAM,EAANA,EAAQC,cAAenB,EAAK2C,SAAgC,KAArBzB,EAAOC,YAC/C,MAAM,IAAIc,SAAS,kCAAkCf,EAAOC,iBAAkB,CAAEe,OAAQ,MAY3F,MAVA7B,KAAKgC,WAAWO,IAAI5C,EAAKuC,OAAMM,OAAAC,OAAAD,OAAAC,OAAA,CAAA,EACzB9C,IACH0B,OAAQjB,KAAKC,MAAQ,QAExBL,KAAKgC,WAAWU,QAAQ,CAACX,EAAMY,KACxBZ,EAAKV,OAASjB,KAAKC,OACpBL,KAAKgC,WAAWI,OAAOO,KAIvBhD,CACR,CAAM,CACJ,MAAM+B,MAAEA,EAAKkB,OAAEA,EAAMC,WAAEA,GAAelD,EAChCoC,EAAO/B,KAAKgC,WAAWC,IAAIW,GACjC,IAAKb,EACF,MAAM,IAAIH,SAAS,sBAAuB,CAAEC,OAAQ,MAEvD,GAAIhB,EAAOI,eAAgC,IAAf4B,EAAkB,CAE3C,IADeC,EAAWpB,GAEvB,MAAM,IAAIxB,MAAM,mCAErB,CAED,IAAsB,UAAlBF,KAAKY,OAAOC,cAAM,IAAAF,OAAA,EAAAA,EAAEG,cAAenB,EAAK2C,SAA4C,KAAjCtC,KAAKY,OAAOC,OAAOC,YACvE,MAAM,IAAIc,SAAS,kCAAkC5B,KAAKY,OAAOC,OAAOC,YAAc,UAAW,CAAEe,OAAQ,MAU9G,SARMhB,EAAOa,MAAMA,EAAO,CACvBqB,SAAUhB,EAAKgB,SACfT,SAAUP,EAAKO,SACfU,SAAUjB,EAAKiB,SACfd,OAAQH,EAAKG,OACbe,YAAalB,EAAKkB,YAClBJ,cACAvB,GACCuB,EAAa,IAAMd,EAAKkB,YAAa,CACtC,MAAMC,QAAiBrC,EAAOc,SAASI,EAAMT,GAE7C,MADAtB,KAAKgC,WAAWI,OAAOQ,GACjBM,CACR,CACD,MAAMvD,CACR,CACJ,CAEA,YAAMwD,CAAOC,GAAa3D,KAAEA,EAAI4D,QAAEA,EAAO/B,SAAEA,IAExC,MAAMH,EAAYkC,EAAQ,gBAAkB,GACtCC,EAASD,EAAQ,aAAe,GAChCE,EAAsBF,EAAQ,aAAe,OAEnD,IAAI3D,QAAmBM,KAAKN,WAAW0D,EAAKE,GAC5C,IAAK5D,EACF,MAAO,CACJmC,OAAQ,IACR2B,QAAS,sBAGf,IAAIC,EAAO/D,EAAW+D,KACtB,MAAMC,EAAiB,MAATD,GAAqC,gBAArBzD,KAAKY,OAAOI,KAC1C,IACG,GAAa,MAATyC,EAAc,CACf,IAAK,CAAC,OAAQ,OAAOE,SAASJ,GAAS,MAAM,IAAI3B,SAAS,iBAAkB,CAAEC,OAAQ,MAC3E,SAAX0B,QACWvD,KAAKR,UAAUC,EAAMC,SACrBM,KAAKa,OAAOpB,EAAMC,EAAYyB,EAAWG,EACtD,CAED,MAAMC,QAAyB3B,EAAO4B,QAAQL,EAAWzB,EAAWI,QAIpE,SAHME,KAAKyB,iBAAiBF,EAAiBJ,UAAWzB,EAAWS,MAG/DoB,EAAiBF,OAASjB,KAAKC,MAAO,MAAM,IAAIuB,SAAS,kBAAmB,CAAEC,OAAQ,MAC1F,IAAIlC,EAAY,KAChB,GAAIF,EACD,GAAIiE,EAAO,CACR,MACME,GADU,IAAIC,aACCC,OAAOrE,GAC5BE,EAAOoE,KAAKC,MAAMJ,EACpB,MACEjE,QAAaC,EAAOC,cAAcJ,EAAMC,EAAWI,cAInDE,KAAKiE,cAAc,CACtBV,SACAE,OACAhE,KAAME,EACNuE,aAAcxE,EAAWwE,aACzBC,OAAQ,CAAA,GACR7C,EACL,CAAC,MAAO8C,GACN,MAAMC,EAAUD,aAAgBlE,MAC1BoE,EAAaF,aAAgBxC,SACnC,IAAI4B,EAAUa,EAAUD,EAAKG,QAAWD,QAAmBF,EAAKR,OAASQ,EACzE,OAAIV,EACM,CACJ7B,OAAQwC,EAAU,KAAOD,aAAI,EAAJA,EAAMvC,SAAU,IACzC2B,QAASO,KAAKS,UAAUhB,IAGvB,CACJ3B,OAAQwC,EAAU,KAAOD,aAAI,EAAJA,EAAMvC,SAAU,IACzC2B,cAAe5D,EAAO6E,cAAcjB,EAAS9D,EAAWI,QAE7D,CAED,OAAI4D,EACM,CACJ7B,OAAQ,IACR2B,QAAS,aAIR,CACJ3B,OAAQ,IACR2B,cAAe5D,EAAO6E,cAAc,YAAa/E,EAAWI,QAElE,SAEFR"}
1
+ {"version":3,"file":"index.mjs","sources":["../../src/server/index.ts"],"sourcesContent":["import crypto from \"../include/crypto\";\nimport { Metadata, ListenerInfo, ServerResponse, UploadFileMeta } from \"./types\";\nimport SecurequServerBase from \"./Base\";\nimport fileScaner from \"../include/FileScaner\";\nimport { HTTPMethods } from \"../client/types\";\nimport { chunkFile, getFileId, totalChunks } from \"../include/File\";\n\nclass SecurequServer extends SecurequServerBase {\n\n async handshake(body: any, clientInfo: any) {\n const data: any = await crypto.decryptBuffer(body, clientInfo.secret)\n const serverSecret = await this.getSecret()\n if (!data) throw new Error(\"Invalid handshake data\");\n if (data.hash !== clientInfo.hash) {\n throw new Error(\"Invalid handshake\");\n } else if (data.secret !== clientInfo.secret) {\n throw new Error(\"Invalid handshake secret\");\n } else if (Date.now() - data.clientTime > 30000) { // 30 seconds\n throw new Error(\"Handshake expired\");\n }\n\n const serverTime = new Date();\n const clientDate = new Date(data.clientTime);\n const offsetMs = clientDate.getTime() - serverTime.getTime();\n\n let info = {\n dev: this.config.mode === 'development',\n timeDiffarenc: offsetMs,\n maxFileSize: this.config.file?.maxFilesize || null,\n checkFileType: this.config.file?.checkFileType || false,\n signeture: await crypto.encrypt({\n expire: Date.now() + 30000, // 30 seconds\n hash: clientInfo.hash\n }, serverSecret)\n }\n throw info\n }\n\n async uploadFile(file: File, onProgress?: (p: number) => void): Promise<UploadFileMeta> {\n if (!this.config.file?.upload) throw new Response(\"Upload not supported\", { status: 403 });\n\n const fileId = await getFileId(file);\n const chunkSize = this.config.file.chunkSize\n const filemeta: UploadFileMeta = {\n fileId: fileId,\n name: file.name,\n size: file.size,\n type: file.type,\n totalChunks: totalChunks(file, chunkSize),\n chunkIndex: 0,\n isFinish: false\n }\n\n for await (let { chunk, chunkIndex } of chunkFile(file, chunkSize)) {\n if (this.config.file.checkFileType && chunkIndex === 0) {\n let fileType = fileScaner(chunk);\n if (!fileType) throw new Error(\"Unknown or unsupported file type\");\n }\n filemeta.chunkIndex = chunkIndex;\n filemeta.isFinish = chunkIndex + 1 === filemeta.totalChunks;\n await this.config.file.upload(chunk, filemeta);\n if (onProgress) {\n const progress = Math.floor(((chunkIndex + 1) / filemeta.totalChunks) * 100)\n onProgress(progress);\n }\n }\n return filemeta\n }\n\n async deleteFile(fileId: string): Promise<void> {\n if (!this.config.file?.delete) throw new Response(\"Delete not supported\", { status: 403 })\n await this.config.file.delete(fileId);\n }\n\n async listen(url: string, { body, headers, metadata }: ListenerInfo): Promise<ServerResponse> {\n\n const signeture = headers['x-signeture'] || '';\n const origin = headers['x-origin'] || '';\n const method: HTTPMethods = headers['x-method'] || 'POST' as any\n\n let clientInfo = await this.clientInfo(url, origin)\n if (!clientInfo) {\n return {\n status: 403,\n content: \"Client not allowed\"\n }\n }\n let path = clientInfo.path\n const isDev = path !== '/' && this.config.mode === 'development'\n try {\n if (path === '/' && method === \"POST\") {\n await this.handshake(body, clientInfo)\n }\n\n if (path === '/' && method === 'GET') throw new Response(\"Invalid method\", { status: 405 })\n\n const decryptSigneture = await crypto.decrypt(signeture, clientInfo.secret) as any\n if (decryptSigneture.expire < Date.now()) throw new Response(\"Request expired\", { status: 403 });\n\n await this.isValidSigneture(decryptSigneture.signeture, clientInfo.hash)\n\n let data: any = null\n if (body) {\n if (isDev) {\n const decoder = new TextDecoder();\n const text = decoder.decode(body);\n data = JSON.parse(text)\n } else {\n data = await crypto.decryptBuffer(body, clientInfo.secret)\n }\n }\n\n if (path === '/') {\n\n const fileConfig = this.config.file\n\n // handle file upload\n if (method === \"PUT\") {\n if (!fileConfig?.upload) throw new Response(\"Upload not supported\", { status: 403 })\n\n const filemeta: UploadFileMeta = data.filemeta\n const chunk: Uint8Array = data.chunk\n\n if (filemeta.chunkIndex === 0 && fileConfig.checkFileType && !fileScaner(chunk)) {\n throw new Error(\"Unknown or unsupported file type\");\n }\n\n await fileConfig.upload(chunk, filemeta)\n throw { success: true }\n } else if (method === \"DELETE\") {\n await this.deleteFile(data.fileId)\n throw { success: true }\n } else {\n throw new Response(\"Invalid method\", { status: 405 });\n }\n }\n\n await this.handleRequest({\n method,\n path,\n body: data,\n searchParams: clientInfo.searchParams,\n params: {}\n }, metadata);\n\n } catch (info: any) {\n const isError = info instanceof Error\n const isResponse = info instanceof Response\n let content = isError ? info.message : (isResponse ? await info.text() : info);\n if (isDev) {\n return {\n status: isError ? 404 : (info?.status || 200),\n content: JSON.stringify(content)\n };\n }\n return {\n status: isError ? 404 : (info?.status || 200),\n content: await crypto.encryptBuffer(content, clientInfo.secret)\n };\n }\n\n if (isDev) {\n return {\n status: 404,\n content: \"Not found\"\n };\n }\n\n return {\n status: 404,\n content: await crypto.encryptBuffer(\"Not found\", clientInfo.secret)\n };\n }\n\n}\n\nexport default SecurequServer;"],"names":["SecurequServer","SecurequServerBase","handshake","body","clientInfo","data","crypto","decryptBuffer","secret","serverSecret","this","getSecret","Error","hash","Date","now","clientTime","serverTime","offsetMs","getTime","dev","config","mode","timeDiffarenc","maxFileSize","_a","file","maxFilesize","checkFileType","_b","signeture","encrypt","expire","uploadFile","onProgress","_d","upload","Response","status","fileId","getFileId","chunkSize","filemeta","name","size","type","totalChunks","chunkIndex","isFinish","_g","_e","_f","__asyncValues","chunkFile","next","done","_c","value","chunk","fileScaner","Math","floor","deleteFile","delete","listen","url","headers","metadata","origin","method","content","path","isDev","decryptSigneture","decrypt","isValidSigneture","text","TextDecoder","decode","JSON","parse","fileConfig","success","handleRequest","searchParams","params","info","isError","isResponse","message","stringify","encryptBuffer"],"mappings":"4OAOA,MAAMA,UAAuBC,EAE1B,eAAMC,CAAUC,EAAWC,WACxB,MAAMC,QAAkBC,EAAOC,cAAcJ,EAAMC,EAAWI,QACxDC,QAAqBC,KAAKC,YAChC,IAAKN,EAAM,MAAM,IAAIO,MAAM,0BAC3B,GAAIP,EAAKQ,OAAST,EAAWS,KAC1B,MAAM,IAAID,MAAM,qBACZ,GAAIP,EAAKG,SAAWJ,EAAWI,OACnC,MAAM,IAAII,MAAM,4BACZ,GAAIE,KAAKC,MAAQV,EAAKW,WAAa,IACvC,MAAM,IAAIJ,MAAM,qBAGnB,MAAMK,EAAa,IAAIH,KAEjBI,EADa,IAAIJ,KAAKT,EAAKW,YACLG,UAAYF,EAAWE,UAYnD,KAVW,CACRC,IAA0B,gBAArBV,KAAKW,OAAOC,KACjBC,cAAeL,EACfM,aAA6B,QAAhBC,EAAAf,KAAKW,OAAOK,YAAI,IAAAD,OAAA,EAAAA,EAAEE,cAAe,KAC9CC,eAA+B,QAAhBC,EAAAnB,KAAKW,OAAOK,YAAI,IAAAG,OAAA,EAAAA,EAAED,iBAAiB,EAClDE,gBAAiBxB,EAAOyB,QAAQ,CAC7BC,OAAQlB,KAAKC,MAAQ,IACrBF,KAAMT,EAAWS,MACjBJ,GAGT,CAEA,gBAAMwB,CAAWP,EAAYQ,iBAC1B,KAAqB,QAAhBC,EAAAzB,KAAKW,OAAOK,YAAI,IAAAS,OAAA,EAAAA,EAAEC,QAAQ,MAAM,IAAIC,SAAS,uBAAwB,CAAEC,OAAQ,MAEpF,MAAMC,QAAeC,EAAUd,GACzBe,EAAY/B,KAAKW,OAAOK,KAAKe,UAC7BC,EAA2B,CAC9BH,OAAQA,EACRI,KAAMjB,EAAKiB,KACXC,KAAMlB,EAAKkB,KACXC,KAAMnB,EAAKmB,KACXC,YAAaA,EAAYpB,EAAMe,GAC/BM,WAAY,EACZC,UAAU,OAGb,IAAwC,IAA0BC,EAA1BC,GAAA,EAAAC,EAAAC,EAAAC,EAAU3B,EAAMe,MAAUhB,GAAAwB,QAAAE,EAAAG,QAAAC,OAAA,CAA1BC,EAAAP,EAAAQ,MAAAP,GAAA,MAA7B,IAAIQ,MAAEA,EAAKX,WAAEA,KACrB,GAAIrC,KAAKW,OAAOK,KAAKE,eAAgC,IAAfmB,EAAkB,CAErD,IADeY,EAAWD,GACX,MAAM,IAAI9C,MAAM,mCACjC,CAID,GAHA8B,EAASK,WAAaA,EACtBL,EAASM,SAAWD,EAAa,IAAML,EAASI,kBAC1CpC,KAAKW,OAAOK,KAAKU,OAAOsB,EAAOhB,GACjCR,EAAY,CAEbA,EADiB0B,KAAKC,OAAQd,EAAa,GAAKL,EAASI,YAAe,KAE1E,eACH,oGACD,OAAOJ,CACV,CAEA,gBAAMoB,CAAWvB,SACd,KAAqB,QAAhBd,EAAAf,KAAKW,OAAOK,YAAI,IAAAD,OAAA,EAAAA,EAAEsC,QAAQ,MAAM,IAAI1B,SAAS,uBAAwB,CAAEC,OAAQ,YAC9E5B,KAAKW,OAAOK,KAAKqC,OAAOxB,EACjC,CAEA,YAAMyB,CAAOC,GAAa9D,KAAEA,EAAI+D,QAAEA,EAAOC,SAAEA,IAExC,MAAMrC,EAAYoC,EAAQ,gBAAkB,GACtCE,EAASF,EAAQ,aAAe,GAChCG,EAAsBH,EAAQ,aAAe,OAEnD,IAAI9D,QAAmBM,KAAKN,WAAW6D,EAAKG,GAC5C,IAAKhE,EACF,MAAO,CACJkC,OAAQ,IACRgC,QAAS,sBAGf,IAAIC,EAAOnE,EAAWmE,KACtB,MAAMC,EAAiB,MAATD,GAAqC,gBAArB7D,KAAKW,OAAOC,KAC1C,IAKG,GAJa,MAATiD,GAA2B,SAAXF,SACX3D,KAAKR,UAAUC,EAAMC,GAGjB,MAATmE,GAA2B,QAAXF,EAAkB,MAAM,IAAIhC,SAAS,iBAAkB,CAAEC,OAAQ,MAErF,MAAMmC,QAAyBnE,EAAOoE,QAAQ5C,EAAW1B,EAAWI,QACpE,GAAIiE,EAAiBzC,OAASlB,KAAKC,MAAO,MAAM,IAAIsB,SAAS,kBAAmB,CAAEC,OAAQ,YAEpF5B,KAAKiE,iBAAiBF,EAAiB3C,UAAW1B,EAAWS,MAEnE,IAAIR,EAAY,KAChB,GAAIF,EACD,GAAIqE,EAAO,CACR,MACMI,GADU,IAAIC,aACCC,OAAO3E,GAC5BE,EAAO0E,KAAKC,MAAMJ,EACpB,MACEvE,QAAaC,EAAOC,cAAcJ,EAAMC,EAAWI,QAIzD,GAAa,MAAT+D,EAAc,CAEf,MAAMU,EAAavE,KAAKW,OAAOK,KAG/B,GAAe,QAAX2C,EAAkB,CACnB,KAAKY,aAAU,EAAVA,EAAY7C,QAAQ,MAAM,IAAIC,SAAS,uBAAwB,CAAEC,OAAQ,MAE9E,MAAMI,EAA2BrC,EAAKqC,SAChCgB,EAAoBrD,EAAKqD,MAE/B,GAA4B,IAAxBhB,EAASK,YAAoBkC,EAAWrD,gBAAkB+B,EAAWD,GACtE,MAAM,IAAI9C,MAAM,oCAInB,YADMqE,EAAW7C,OAAOsB,EAAOhB,GACzB,CAAEwC,SAAS,EACnB,CAAM,KAAe,WAAXb,SACF3D,KAAKoD,WAAWzD,EAAKkC,QACrB,CAAE2C,SAAS,IAEX,IAAI7C,SAAS,iBAAkB,CAAEC,OAAQ,KAEpD,OAEK5B,KAAKyE,cAAc,CACtBd,SACAE,OACApE,KAAME,EACN+E,aAAchF,EAAWgF,aACzBC,OAAQ,CAAA,GACRlB,EAEL,CAAC,MAAOmB,GACN,MAAMC,EAAUD,aAAgB1E,MAC1B4E,EAAaF,aAAgBjD,SACnC,IAAIiC,EAAUiB,EAAUD,EAAKG,QAAWD,QAAmBF,EAAKV,OAASU,EACzE,OAAId,EACM,CACJlC,OAAQiD,EAAU,KAAOD,aAAI,EAAJA,EAAMhD,SAAU,IACzCgC,QAASS,KAAKW,UAAUpB,IAGvB,CACJhC,OAAQiD,EAAU,KAAOD,aAAI,EAAJA,EAAMhD,SAAU,IACzCgC,cAAehE,EAAOqF,cAAcrB,EAASlE,EAAWI,QAE7D,CAED,OAAIgE,EACM,CACJlC,OAAQ,IACRgC,QAAS,aAIR,CACJhC,OAAQ,IACRgC,cAAehE,EAAOqF,cAAc,YAAavF,EAAWI,QAElE,SAEFR"}
package/server/types.d.ts CHANGED
@@ -16,12 +16,13 @@ type ServerClient = {
16
16
  secret: ServerClientSecret;
17
17
  };
18
18
  type UploadFileMeta = {
19
- filename: string;
20
- filesize: number;
21
- filetype: string;
22
- fileid: string;
19
+ fileId: string;
20
+ name: string;
21
+ size: number;
22
+ type: string;
23
23
  chunkIndex: number;
24
24
  totalChunks: number;
25
+ isFinish: boolean;
25
26
  };
26
27
  type UploadFilePath = string;
27
28
  type Metadata = {
@@ -31,12 +32,12 @@ type SecurequServerConfig = {
31
32
  mode?: "production" | "development";
32
33
  basepath: string;
33
34
  clients: ServerClient[];
34
- upload?: {
35
+ file?: {
35
36
  maxFilesize?: number;
36
37
  checkFileType?: boolean;
37
- chunk: (chunk: Uint8Array, uploadMeta: UploadFileMeta, metadata?: Metadata) => Promise<boolean>;
38
- complete: (meta: UploadFileMeta, metadata?: Metadata) => Promise<UploadFilePath>;
39
- failed?: (meta: UploadFileMeta, metadata?: Metadata) => Promise<boolean>;
38
+ chunkSize?: number;
39
+ upload: (chunk: Uint8Array, filemeta: UploadFileMeta) => Promise<void>;
40
+ delete: (filename: string) => Promise<void>;
40
41
  };
41
42
  accept?: (info: HandlerInfo, metadata?: Metadata) => boolean | Promise<boolean>;
42
43
  };