mirror of
https://github.com/kennethnym/aris.git
synced 2026-04-16 06:41:17 +01:00
Compare commits
1 Commits
feat/db-tr
...
kn/admin-d
| Author | SHA1 | Date | |
|---|---|---|---|
|
987dd9e59a
|
3
.vscode/settings.json
vendored
3
.vscode/settings.json
vendored
@@ -1,3 +0,0 @@
|
|||||||
{
|
|
||||||
"js/ts.experimental.useTsgo": true
|
|
||||||
}
|
|
||||||
@@ -34,7 +34,7 @@
|
|||||||
"@types/react": "^19.2.5",
|
"@types/react": "^19.2.5",
|
||||||
"@types/react-dom": "^19.2.3",
|
"@types/react-dom": "^19.2.3",
|
||||||
"@vitejs/plugin-react": "^5.1.1",
|
"@vitejs/plugin-react": "^5.1.1",
|
||||||
"typescript": "^6",
|
"typescript": "~5.9.3",
|
||||||
"vite": "^7.2.4"
|
"vite": "^7.2.4"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -74,24 +74,19 @@ export function SourceConfigPanel({ source, onUpdate }: SourceConfigPanelProps)
|
|||||||
|
|
||||||
const saveMutation = useMutation({
|
const saveMutation = useMutation({
|
||||||
mutationFn: async () => {
|
mutationFn: async () => {
|
||||||
|
const promises: Promise<void>[] = [
|
||||||
|
replaceSource(source.id, { enabled, config: getUserConfig() }),
|
||||||
|
]
|
||||||
|
|
||||||
const credentialFields = getCredentialFields()
|
const credentialFields = getCredentialFields()
|
||||||
const hasCredentials = Object.values(credentialFields).some(
|
const hasCredentials = Object.values(credentialFields).some(
|
||||||
(v) => typeof v === "string" && v.length > 0,
|
(v) => typeof v === "string" && v.length > 0,
|
||||||
)
|
)
|
||||||
|
if (hasCredentials) {
|
||||||
|
promises.push(updateProviderConfig(source.id, { credentials: credentialFields }))
|
||||||
|
}
|
||||||
|
|
||||||
const body: Parameters<typeof replaceSource>[1] = {
|
await Promise.all(promises)
|
||||||
enabled,
|
|
||||||
config: getUserConfig(),
|
|
||||||
}
|
|
||||||
if (hasCredentials && source.perUserCredentials) {
|
|
||||||
body.credentials = credentialFields
|
|
||||||
}
|
|
||||||
await replaceSource(source.id, body)
|
|
||||||
|
|
||||||
// For non-per-user credentials (provider-level), still use the admin endpoint.
|
|
||||||
if (hasCredentials && !source.perUserCredentials) {
|
|
||||||
await updateProviderConfig(source.id, { credentials: credentialFields })
|
|
||||||
}
|
|
||||||
},
|
},
|
||||||
onSuccess() {
|
onSuccess() {
|
||||||
setDirty({})
|
setDirty({})
|
||||||
|
|||||||
@@ -23,8 +23,6 @@ export interface SourceDefinition {
|
|||||||
name: string
|
name: string
|
||||||
description: string
|
description: string
|
||||||
alwaysEnabled?: boolean
|
alwaysEnabled?: boolean
|
||||||
/** When true, secret fields are stored as per-user credentials via /api/sources/:id/credentials. */
|
|
||||||
perUserCredentials?: boolean
|
|
||||||
fields: Record<string, ConfigFieldDef>
|
fields: Record<string, ConfigFieldDef>
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -80,44 +78,6 @@ const sourceDefinitions: SourceDefinition[] = [
|
|||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
{
|
|
||||||
id: "aelis.caldav",
|
|
||||||
name: "CalDAV",
|
|
||||||
description: "Calendar events from any CalDAV server (Nextcloud, Radicale, Baikal, etc.).",
|
|
||||||
perUserCredentials: true,
|
|
||||||
fields: {
|
|
||||||
serverUrl: {
|
|
||||||
type: "string",
|
|
||||||
label: "Server URL",
|
|
||||||
required: true,
|
|
||||||
secret: false,
|
|
||||||
description: "CalDAV server URL (e.g. https://nextcloud.example.com/remote.php/dav)",
|
|
||||||
},
|
|
||||||
username: {
|
|
||||||
type: "string",
|
|
||||||
label: "Username",
|
|
||||||
required: true,
|
|
||||||
secret: false,
|
|
||||||
},
|
|
||||||
password: {
|
|
||||||
type: "string",
|
|
||||||
label: "Password",
|
|
||||||
required: true,
|
|
||||||
secret: true,
|
|
||||||
},
|
|
||||||
lookAheadDays: {
|
|
||||||
type: "number",
|
|
||||||
label: "Look-ahead Days",
|
|
||||||
defaultValue: 0,
|
|
||||||
description: "Number of additional days beyond today to fetch events for",
|
|
||||||
},
|
|
||||||
timeZone: {
|
|
||||||
type: "string",
|
|
||||||
label: "Timezone",
|
|
||||||
description: 'IANA timezone for determining "today" (e.g. Europe/London). Defaults to UTC.',
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
id: "aelis.tfl",
|
id: "aelis.tfl",
|
||||||
name: "TfL",
|
name: "TfL",
|
||||||
@@ -174,7 +134,7 @@ export async function fetchConfigs(): Promise<SourceConfig[]> {
|
|||||||
|
|
||||||
export async function replaceSource(
|
export async function replaceSource(
|
||||||
sourceId: string,
|
sourceId: string,
|
||||||
body: { enabled: boolean; config: unknown; credentials?: Record<string, unknown> },
|
body: { enabled: boolean; config: unknown },
|
||||||
): Promise<void> {
|
): Promise<void> {
|
||||||
const res = await fetch(`${serverBase()}/sources/${sourceId}`, {
|
const res = await fetch(`${serverBase()}/sources/${sourceId}`, {
|
||||||
method: "PUT",
|
method: "PUT",
|
||||||
@@ -204,22 +164,6 @@ export async function updateProviderConfig(
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
export async function updateSourceCredentials(
|
|
||||||
sourceId: string,
|
|
||||||
credentials: Record<string, unknown>,
|
|
||||||
): Promise<void> {
|
|
||||||
const res = await fetch(`${serverBase()}/sources/${sourceId}/credentials`, {
|
|
||||||
method: "PUT",
|
|
||||||
headers: { "Content-Type": "application/json" },
|
|
||||||
credentials: "include",
|
|
||||||
body: JSON.stringify(credentials),
|
|
||||||
})
|
|
||||||
if (!res.ok) {
|
|
||||||
const data = (await res.json()) as { error?: string }
|
|
||||||
throw new Error(data.error ?? `Failed to update credentials: ${res.status}`)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
export interface LocationInput {
|
export interface LocationInput {
|
||||||
lat: number
|
lat: number
|
||||||
lng: number
|
lng: number
|
||||||
|
|||||||
@@ -3,11 +3,12 @@
|
|||||||
"tsBuildInfoFile": "./node_modules/.tmp/tsconfig.app.tsbuildinfo",
|
"tsBuildInfoFile": "./node_modules/.tmp/tsconfig.app.tsbuildinfo",
|
||||||
"target": "ES2022",
|
"target": "ES2022",
|
||||||
"useDefineForClassFields": true,
|
"useDefineForClassFields": true,
|
||||||
"lib": ["ES2022", "DOM"],
|
"lib": ["ES2022", "DOM", "DOM.Iterable"],
|
||||||
"module": "ESNext",
|
"module": "ESNext",
|
||||||
"types": ["vite/client"],
|
"types": ["vite/client"],
|
||||||
"skipLibCheck": true,
|
"skipLibCheck": true,
|
||||||
|
|
||||||
|
/* Bundler mode */
|
||||||
"moduleResolution": "bundler",
|
"moduleResolution": "bundler",
|
||||||
"allowImportingTsExtensions": true,
|
"allowImportingTsExtensions": true,
|
||||||
"verbatimModuleSyntax": true,
|
"verbatimModuleSyntax": true,
|
||||||
@@ -15,12 +16,14 @@
|
|||||||
"noEmit": true,
|
"noEmit": true,
|
||||||
"jsx": "react-jsx",
|
"jsx": "react-jsx",
|
||||||
|
|
||||||
|
/* Linting */
|
||||||
"strict": true,
|
"strict": true,
|
||||||
"noUnusedLocals": true,
|
"noUnusedLocals": true,
|
||||||
"noUnusedParameters": true,
|
"noUnusedParameters": true,
|
||||||
"erasableSyntaxOnly": true,
|
"erasableSyntaxOnly": true,
|
||||||
"noFallthroughCasesInSwitch": true,
|
"noFallthroughCasesInSwitch": true,
|
||||||
"noUncheckedSideEffectImports": true,
|
"noUncheckedSideEffectImports": true,
|
||||||
|
"baseUrl": ".",
|
||||||
"paths": {
|
"paths": {
|
||||||
"@/*": ["./src/*"]
|
"@/*": ["./src/*"]
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -2,6 +2,7 @@
|
|||||||
"files": [],
|
"files": [],
|
||||||
"references": [{ "path": "./tsconfig.app.json" }, { "path": "./tsconfig.node.json" }],
|
"references": [{ "path": "./tsconfig.app.json" }, { "path": "./tsconfig.node.json" }],
|
||||||
"compilerOptions": {
|
"compilerOptions": {
|
||||||
|
"baseUrl": ".",
|
||||||
"paths": {
|
"paths": {
|
||||||
"@/*": ["./src/*"]
|
"@/*": ["./src/*"]
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -7,12 +7,14 @@
|
|||||||
"types": ["node"],
|
"types": ["node"],
|
||||||
"skipLibCheck": true,
|
"skipLibCheck": true,
|
||||||
|
|
||||||
|
/* Bundler mode */
|
||||||
"moduleResolution": "bundler",
|
"moduleResolution": "bundler",
|
||||||
"allowImportingTsExtensions": true,
|
"allowImportingTsExtensions": true,
|
||||||
"verbatimModuleSyntax": true,
|
"verbatimModuleSyntax": true,
|
||||||
"moduleDetection": "force",
|
"moduleDetection": "force",
|
||||||
"noEmit": true,
|
"noEmit": true,
|
||||||
|
|
||||||
|
/* Linting */
|
||||||
"strict": true,
|
"strict": true,
|
||||||
"noUnusedLocals": true,
|
"noUnusedLocals": true,
|
||||||
"noUnusedParameters": true,
|
"noUnusedParameters": true,
|
||||||
|
|||||||
@@ -5,7 +5,7 @@ DATABASE_URL=postgresql://user:password@localhost:5432/aris
|
|||||||
BETTER_AUTH_SECRET=
|
BETTER_AUTH_SECRET=
|
||||||
|
|
||||||
# Encryption key for source credentials at rest (32 bytes, generate with: openssl rand -base64 32)
|
# Encryption key for source credentials at rest (32 bytes, generate with: openssl rand -base64 32)
|
||||||
CREDENTIAL_ENCRYPTION_KEY=
|
CREDENTIALS_ENCRYPTION_KEY=
|
||||||
|
|
||||||
# Base URL of the backend
|
# Base URL of the backend
|
||||||
BETTER_AUTH_URL=http://localhost:3000
|
BETTER_AUTH_URL=http://localhost:3000
|
||||||
|
|||||||
@@ -1,85 +0,0 @@
|
|||||||
import { describe, expect, test } from "bun:test"
|
|
||||||
|
|
||||||
import { CalDavSourceProvider } from "./provider.ts"
|
|
||||||
|
|
||||||
describe("CalDavSourceProvider", () => {
|
|
||||||
const provider = new CalDavSourceProvider()
|
|
||||||
|
|
||||||
test("sourceId is aelis.caldav", () => {
|
|
||||||
expect(provider.sourceId).toBe("aelis.caldav")
|
|
||||||
})
|
|
||||||
|
|
||||||
test("throws when credentials are null", async () => {
|
|
||||||
const config = { serverUrl: "https://caldav.icloud.com", username: "user@icloud.com" }
|
|
||||||
await expect(provider.feedSourceForUser("user-1", config, null)).rejects.toThrow(
|
|
||||||
"No CalDAV credentials configured",
|
|
||||||
)
|
|
||||||
})
|
|
||||||
|
|
||||||
test("throws when credentials are missing password", async () => {
|
|
||||||
const config = { serverUrl: "https://caldav.icloud.com", username: "user@icloud.com" }
|
|
||||||
await expect(provider.feedSourceForUser("user-1", config, {})).rejects.toThrow(
|
|
||||||
"password must be a string",
|
|
||||||
)
|
|
||||||
})
|
|
||||||
|
|
||||||
test("throws when config is missing serverUrl", async () => {
|
|
||||||
const credentials = { password: "app-specific-password" }
|
|
||||||
await expect(
|
|
||||||
provider.feedSourceForUser("user-1", { username: "user@icloud.com" }, credentials),
|
|
||||||
).rejects.toThrow("Invalid CalDAV config")
|
|
||||||
})
|
|
||||||
|
|
||||||
test("throws when config is missing username", async () => {
|
|
||||||
const credentials = { password: "app-specific-password" }
|
|
||||||
await expect(
|
|
||||||
provider.feedSourceForUser("user-1", { serverUrl: "https://caldav.icloud.com" }, credentials),
|
|
||||||
).rejects.toThrow("Invalid CalDAV config")
|
|
||||||
})
|
|
||||||
|
|
||||||
test("throws when config has extra keys", async () => {
|
|
||||||
const config = {
|
|
||||||
serverUrl: "https://caldav.icloud.com",
|
|
||||||
username: "user@icloud.com",
|
|
||||||
extra: true,
|
|
||||||
}
|
|
||||||
const credentials = { password: "app-specific-password" }
|
|
||||||
await expect(provider.feedSourceForUser("user-1", config, credentials)).rejects.toThrow(
|
|
||||||
"Invalid CalDAV config",
|
|
||||||
)
|
|
||||||
})
|
|
||||||
|
|
||||||
test("throws when credentials have extra keys", async () => {
|
|
||||||
const config = { serverUrl: "https://caldav.icloud.com", username: "user@icloud.com" }
|
|
||||||
const credentials = { password: "app-specific-password", extra: true }
|
|
||||||
await expect(provider.feedSourceForUser("user-1", config, credentials)).rejects.toThrow(
|
|
||||||
"extra must be removed",
|
|
||||||
)
|
|
||||||
})
|
|
||||||
|
|
||||||
test("returns CalDavSource with valid config and credentials", async () => {
|
|
||||||
const config = {
|
|
||||||
serverUrl: "https://caldav.icloud.com",
|
|
||||||
username: "user@icloud.com",
|
|
||||||
lookAheadDays: 3,
|
|
||||||
timeZone: "Europe/London",
|
|
||||||
}
|
|
||||||
const credentials = { password: "app-specific-password" }
|
|
||||||
|
|
||||||
const source = await provider.feedSourceForUser("user-1", config, credentials)
|
|
||||||
expect(source).toBeDefined()
|
|
||||||
expect(source.id).toBe("aelis.caldav")
|
|
||||||
})
|
|
||||||
|
|
||||||
test("returns CalDavSource with minimal config", async () => {
|
|
||||||
const config = {
|
|
||||||
serverUrl: "https://caldav.icloud.com",
|
|
||||||
username: "user@icloud.com",
|
|
||||||
}
|
|
||||||
const credentials = { password: "app-specific-password" }
|
|
||||||
|
|
||||||
const source = await provider.feedSourceForUser("user-1", config, credentials)
|
|
||||||
expect(source).toBeDefined()
|
|
||||||
expect(source.id).toBe("aelis.caldav")
|
|
||||||
})
|
|
||||||
})
|
|
||||||
@@ -1,53 +0,0 @@
|
|||||||
import { CalDavSource } from "@aelis/source-caldav"
|
|
||||||
import { type } from "arktype"
|
|
||||||
|
|
||||||
import type { FeedSourceProvider } from "../session/feed-source-provider.ts"
|
|
||||||
|
|
||||||
import { InvalidSourceCredentialsError } from "../sources/errors.ts"
|
|
||||||
|
|
||||||
const caldavConfig = type({
|
|
||||||
"+": "reject",
|
|
||||||
serverUrl: "string",
|
|
||||||
username: "string",
|
|
||||||
"lookAheadDays?": "number",
|
|
||||||
"timeZone?": "string",
|
|
||||||
})
|
|
||||||
|
|
||||||
const caldavCredentials = type({
|
|
||||||
"+": "reject",
|
|
||||||
password: "string",
|
|
||||||
})
|
|
||||||
|
|
||||||
export class CalDavSourceProvider implements FeedSourceProvider {
|
|
||||||
readonly sourceId = "aelis.caldav"
|
|
||||||
readonly configSchema = caldavConfig
|
|
||||||
|
|
||||||
async feedSourceForUser(
|
|
||||||
_userId: string,
|
|
||||||
config: unknown,
|
|
||||||
credentials: unknown,
|
|
||||||
): Promise<CalDavSource> {
|
|
||||||
const parsed = caldavConfig(config)
|
|
||||||
if (parsed instanceof type.errors) {
|
|
||||||
throw new Error(`Invalid CalDAV config: ${parsed.summary}`)
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!credentials) {
|
|
||||||
throw new InvalidSourceCredentialsError("aelis.caldav", "No CalDAV credentials configured")
|
|
||||||
}
|
|
||||||
|
|
||||||
const creds = caldavCredentials(credentials)
|
|
||||||
if (creds instanceof type.errors) {
|
|
||||||
throw new InvalidSourceCredentialsError("aelis.caldav", creds.summary)
|
|
||||||
}
|
|
||||||
|
|
||||||
return new CalDavSource({
|
|
||||||
serverUrl: parsed.serverUrl,
|
|
||||||
authMethod: "basic",
|
|
||||||
username: parsed.username,
|
|
||||||
password: creds.password,
|
|
||||||
lookAheadDays: parsed.lookAheadDays,
|
|
||||||
timeZone: parsed.timeZone,
|
|
||||||
})
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@@ -1,12 +1,9 @@
|
|||||||
import type { PgDatabase } from "drizzle-orm/pg-core"
|
|
||||||
|
|
||||||
import { SQL } from "bun"
|
import { SQL } from "bun"
|
||||||
import { drizzle, type BunSQLQueryResultHKT } from "drizzle-orm/bun-sql"
|
import { drizzle, type BunSQLDatabase } from "drizzle-orm/bun-sql"
|
||||||
|
|
||||||
import * as schema from "./schema.ts"
|
import * as schema from "./schema.ts"
|
||||||
|
|
||||||
/** Covers both the top-level drizzle instance and transaction handles. */
|
export type Database = BunSQLDatabase<typeof schema>
|
||||||
export type Database = PgDatabase<BunSQLQueryResultHKT, typeof schema>
|
|
||||||
|
|
||||||
export interface DatabaseConnection {
|
export interface DatabaseConnection {
|
||||||
db: Database
|
db: Database
|
||||||
|
|||||||
@@ -5,11 +5,7 @@ import type { FeedSourceProvider } from "../session/feed-source-provider.ts"
|
|||||||
export class LocationSourceProvider implements FeedSourceProvider {
|
export class LocationSourceProvider implements FeedSourceProvider {
|
||||||
readonly sourceId = "aelis.location"
|
readonly sourceId = "aelis.location"
|
||||||
|
|
||||||
async feedSourceForUser(
|
async feedSourceForUser(_userId: string, _config: unknown): Promise<LocationSource> {
|
||||||
_userId: string,
|
|
||||||
_config: unknown,
|
|
||||||
_credentials: unknown,
|
|
||||||
): Promise<LocationSource> {
|
|
||||||
return new LocationSource()
|
return new LocationSource()
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -6,12 +6,10 @@ import { createRequireAdmin } from "./auth/admin-middleware.ts"
|
|||||||
import { registerAuthHandlers } from "./auth/http.ts"
|
import { registerAuthHandlers } from "./auth/http.ts"
|
||||||
import { createAuth } from "./auth/index.ts"
|
import { createAuth } from "./auth/index.ts"
|
||||||
import { createRequireSession } from "./auth/session-middleware.ts"
|
import { createRequireSession } from "./auth/session-middleware.ts"
|
||||||
import { CalDavSourceProvider } from "./caldav/provider.ts"
|
|
||||||
import { createDatabase } from "./db/index.ts"
|
import { createDatabase } from "./db/index.ts"
|
||||||
import { registerFeedHttpHandlers } from "./engine/http.ts"
|
import { registerFeedHttpHandlers } from "./engine/http.ts"
|
||||||
import { createFeedEnhancer } from "./enhancement/enhance-feed.ts"
|
import { createFeedEnhancer } from "./enhancement/enhance-feed.ts"
|
||||||
import { createLlmClient } from "./enhancement/llm-client.ts"
|
import { createLlmClient } from "./enhancement/llm-client.ts"
|
||||||
import { CredentialEncryptor } from "./lib/crypto.ts"
|
|
||||||
import { registerLocationHttpHandlers } from "./location/http.ts"
|
import { registerLocationHttpHandlers } from "./location/http.ts"
|
||||||
import { LocationSourceProvider } from "./location/provider.ts"
|
import { LocationSourceProvider } from "./location/provider.ts"
|
||||||
import { UserSessionManager } from "./session/index.ts"
|
import { UserSessionManager } from "./session/index.ts"
|
||||||
@@ -36,20 +34,9 @@ function main() {
|
|||||||
console.warn("[enhancement] OPENROUTER_API_KEY not set — feed enhancement disabled")
|
console.warn("[enhancement] OPENROUTER_API_KEY not set — feed enhancement disabled")
|
||||||
}
|
}
|
||||||
|
|
||||||
const credentialEncryptionKey = process.env.CREDENTIAL_ENCRYPTION_KEY
|
|
||||||
const credentialEncryptor = credentialEncryptionKey
|
|
||||||
? new CredentialEncryptor(credentialEncryptionKey)
|
|
||||||
: null
|
|
||||||
if (!credentialEncryptor) {
|
|
||||||
console.warn(
|
|
||||||
"[credentials] CREDENTIAL_ENCRYPTION_KEY not set — per-user credential storage disabled",
|
|
||||||
)
|
|
||||||
}
|
|
||||||
|
|
||||||
const sessionManager = new UserSessionManager({
|
const sessionManager = new UserSessionManager({
|
||||||
db,
|
db,
|
||||||
providers: [
|
providers: [
|
||||||
new CalDavSourceProvider(),
|
|
||||||
new LocationSourceProvider(),
|
new LocationSourceProvider(),
|
||||||
new WeatherSourceProvider({
|
new WeatherSourceProvider({
|
||||||
credentials: {
|
credentials: {
|
||||||
@@ -62,7 +49,6 @@ function main() {
|
|||||||
new TflSourceProvider({ apiKey: process.env.TFL_API_KEY! }),
|
new TflSourceProvider({ apiKey: process.env.TFL_API_KEY! }),
|
||||||
],
|
],
|
||||||
feedEnhancer,
|
feedEnhancer,
|
||||||
credentialEncryptor,
|
|
||||||
})
|
})
|
||||||
|
|
||||||
const app = new Hono()
|
const app = new Hono()
|
||||||
|
|||||||
@@ -8,5 +8,5 @@ export interface FeedSourceProvider {
|
|||||||
readonly sourceId: string
|
readonly sourceId: string
|
||||||
/** Arktype schema for validating user-provided config. Omit if the source has no config. */
|
/** Arktype schema for validating user-provided config. Omit if the source has no config. */
|
||||||
readonly configSchema?: ConfigSchema
|
readonly configSchema?: ConfigSchema
|
||||||
feedSourceForUser(userId: string, config: unknown, credentials: unknown): Promise<FeedSource>
|
feedSourceForUser(userId: string, config: unknown): Promise<FeedSource>
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -7,12 +7,6 @@ import { beforeEach, describe, expect, mock, spyOn, test } from "bun:test"
|
|||||||
import type { Database } from "../db/index.ts"
|
import type { Database } from "../db/index.ts"
|
||||||
import type { FeedSourceProvider } from "./feed-source-provider.ts"
|
import type { FeedSourceProvider } from "./feed-source-provider.ts"
|
||||||
|
|
||||||
import { CredentialEncryptor } from "../lib/crypto.ts"
|
|
||||||
import {
|
|
||||||
CredentialStorageUnavailableError,
|
|
||||||
InvalidSourceCredentialsError,
|
|
||||||
} from "../sources/errors.ts"
|
|
||||||
import { SourceNotFoundError } from "../sources/errors.ts"
|
|
||||||
import { UserSessionManager } from "./user-session-manager.ts"
|
import { UserSessionManager } from "./user-session-manager.ts"
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -44,13 +38,6 @@ function getEnabledSourceIds(userId: string): string[] {
|
|||||||
*/
|
*/
|
||||||
let mockFindResult: unknown | undefined
|
let mockFindResult: unknown | undefined
|
||||||
|
|
||||||
/**
|
|
||||||
* Spy for `updateCredentials` calls. Tests can inspect calls via
|
|
||||||
* `mockUpdateCredentialsCalls` or override behavior.
|
|
||||||
*/
|
|
||||||
const mockUpdateCredentialsCalls: Array<{ sourceId: string; credentials: Buffer }> = []
|
|
||||||
let mockUpdateCredentialsError: Error | null = null
|
|
||||||
|
|
||||||
// Mock the sources module so UserSessionManager's DB query returns controlled data.
|
// Mock the sources module so UserSessionManager's DB query returns controlled data.
|
||||||
mock.module("../sources/user-sources.ts", () => ({
|
mock.module("../sources/user-sources.ts", () => ({
|
||||||
sources: (_db: Database, userId: string) => ({
|
sources: (_db: Database, userId: string) => ({
|
||||||
@@ -81,39 +68,10 @@ mock.module("../sources/user-sources.ts", () => ({
|
|||||||
updatedAt: now,
|
updatedAt: now,
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
async findForUpdate(sourceId: string) {
|
|
||||||
// Delegates to find — row locking is a no-op in tests.
|
|
||||||
if (mockFindResult !== undefined) return mockFindResult
|
|
||||||
const now = new Date()
|
|
||||||
return {
|
|
||||||
id: crypto.randomUUID(),
|
|
||||||
userId,
|
|
||||||
sourceId,
|
|
||||||
enabled: true,
|
|
||||||
config: {},
|
|
||||||
credentials: null,
|
|
||||||
createdAt: now,
|
|
||||||
updatedAt: now,
|
|
||||||
}
|
|
||||||
},
|
|
||||||
async updateConfig(_sourceId: string, _update: { enabled?: boolean; config?: unknown }) {
|
|
||||||
// no-op for tests
|
|
||||||
},
|
|
||||||
async upsertConfig(_sourceId: string, _data: { enabled: boolean; config: unknown }) {
|
|
||||||
// no-op for tests
|
|
||||||
},
|
|
||||||
async updateCredentials(sourceId: string, credentials: Buffer) {
|
|
||||||
if (mockUpdateCredentialsError) {
|
|
||||||
throw mockUpdateCredentialsError
|
|
||||||
}
|
|
||||||
mockUpdateCredentialsCalls.push({ sourceId, credentials })
|
|
||||||
},
|
|
||||||
}),
|
}),
|
||||||
}))
|
}))
|
||||||
|
|
||||||
const fakeDb = {
|
const fakeDb = {} as Database
|
||||||
transaction: <T>(fn: (tx: unknown) => Promise<T>) => fn(fakeDb),
|
|
||||||
} as unknown as Database
|
|
||||||
|
|
||||||
function createStubSource(id: string, items: FeedItem[] = []): FeedSource {
|
function createStubSource(id: string, items: FeedItem[] = []): FeedSource {
|
||||||
return {
|
return {
|
||||||
@@ -135,11 +93,8 @@ function createStubSource(id: string, items: FeedItem[] = []): FeedSource {
|
|||||||
|
|
||||||
function createStubProvider(
|
function createStubProvider(
|
||||||
sourceId: string,
|
sourceId: string,
|
||||||
factory: (
|
factory: (userId: string, config: Record<string, unknown>) => Promise<FeedSource> = async () =>
|
||||||
userId: string,
|
createStubSource(sourceId),
|
||||||
config: Record<string, unknown>,
|
|
||||||
credentials: unknown,
|
|
||||||
) => Promise<FeedSource> = async () => createStubSource(sourceId),
|
|
||||||
): FeedSourceProvider {
|
): FeedSourceProvider {
|
||||||
return { sourceId, feedSourceForUser: factory }
|
return { sourceId, feedSourceForUser: factory }
|
||||||
}
|
}
|
||||||
@@ -161,8 +116,6 @@ const weatherProvider: FeedSourceProvider = {
|
|||||||
beforeEach(() => {
|
beforeEach(() => {
|
||||||
enabledByUser.clear()
|
enabledByUser.clear()
|
||||||
mockFindResult = undefined
|
mockFindResult = undefined
|
||||||
mockUpdateCredentialsCalls.length = 0
|
|
||||||
mockUpdateCredentialsError = null
|
|
||||||
})
|
})
|
||||||
|
|
||||||
describe("UserSessionManager", () => {
|
describe("UserSessionManager", () => {
|
||||||
@@ -728,240 +681,3 @@ describe("UserSessionManager.replaceProvider", () => {
|
|||||||
expect(feedAfter.items[0]!.data.version).toBe(1)
|
expect(feedAfter.items[0]!.data.version).toBe(1)
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
|
|
||||||
const TEST_ENCRYPTION_KEY = "/bv1nbzC4ozZkT/pcv5oQfl+JAMuMZDUSVDesG2dur8="
|
|
||||||
const testEncryptor = new CredentialEncryptor(TEST_ENCRYPTION_KEY)
|
|
||||||
|
|
||||||
describe("UserSessionManager.updateSourceCredentials", () => {
|
|
||||||
test("encrypts and persists credentials", async () => {
|
|
||||||
setEnabledSources(["test"])
|
|
||||||
const provider = createStubProvider("test")
|
|
||||||
const manager = new UserSessionManager({
|
|
||||||
db: fakeDb,
|
|
||||||
providers: [provider],
|
|
||||||
credentialEncryptor: testEncryptor,
|
|
||||||
})
|
|
||||||
|
|
||||||
await manager.updateSourceCredentials("user-1", "test", { token: "secret-123" })
|
|
||||||
|
|
||||||
expect(mockUpdateCredentialsCalls).toHaveLength(1)
|
|
||||||
expect(mockUpdateCredentialsCalls[0]!.sourceId).toBe("test")
|
|
||||||
|
|
||||||
// Verify the persisted buffer decrypts to the original credentials
|
|
||||||
const decrypted = JSON.parse(testEncryptor.decrypt(mockUpdateCredentialsCalls[0]!.credentials))
|
|
||||||
expect(decrypted).toEqual({ token: "secret-123" })
|
|
||||||
})
|
|
||||||
|
|
||||||
test("throws CredentialStorageUnavailableError when encryptor is not configured", async () => {
|
|
||||||
setEnabledSources(["test"])
|
|
||||||
const provider = createStubProvider("test")
|
|
||||||
const manager = new UserSessionManager({
|
|
||||||
db: fakeDb,
|
|
||||||
providers: [provider],
|
|
||||||
// no credentialEncryptor
|
|
||||||
})
|
|
||||||
|
|
||||||
await expect(
|
|
||||||
manager.updateSourceCredentials("user-1", "test", { token: "x" }),
|
|
||||||
).rejects.toBeInstanceOf(CredentialStorageUnavailableError)
|
|
||||||
})
|
|
||||||
|
|
||||||
test("throws SourceNotFoundError for unknown source", async () => {
|
|
||||||
setEnabledSources([])
|
|
||||||
const manager = new UserSessionManager({
|
|
||||||
db: fakeDb,
|
|
||||||
providers: [],
|
|
||||||
credentialEncryptor: testEncryptor,
|
|
||||||
})
|
|
||||||
|
|
||||||
await expect(
|
|
||||||
manager.updateSourceCredentials("user-1", "unknown", { token: "x" }),
|
|
||||||
).rejects.toBeInstanceOf(SourceNotFoundError)
|
|
||||||
})
|
|
||||||
|
|
||||||
test("propagates InvalidSourceCredentialsError from provider", async () => {
|
|
||||||
setEnabledSources(["test"])
|
|
||||||
let callCount = 0
|
|
||||||
const provider: FeedSourceProvider = {
|
|
||||||
sourceId: "test",
|
|
||||||
async feedSourceForUser(_userId: string, _config: unknown, _credentials: unknown) {
|
|
||||||
callCount++
|
|
||||||
// Succeed on first call (session creation), throw on refresh
|
|
||||||
if (callCount > 1) {
|
|
||||||
throw new InvalidSourceCredentialsError("test", "bad credentials")
|
|
||||||
}
|
|
||||||
return createStubSource("test")
|
|
||||||
},
|
|
||||||
}
|
|
||||||
const manager = new UserSessionManager({
|
|
||||||
db: fakeDb,
|
|
||||||
providers: [provider],
|
|
||||||
credentialEncryptor: testEncryptor,
|
|
||||||
})
|
|
||||||
|
|
||||||
// Create a session first so the refresh path is exercised
|
|
||||||
await manager.getOrCreate("user-1")
|
|
||||||
|
|
||||||
await expect(
|
|
||||||
manager.updateSourceCredentials("user-1", "test", { token: "bad" }),
|
|
||||||
).rejects.toBeInstanceOf(InvalidSourceCredentialsError)
|
|
||||||
|
|
||||||
// Credentials should still have been persisted before the provider threw
|
|
||||||
expect(mockUpdateCredentialsCalls).toHaveLength(1)
|
|
||||||
})
|
|
||||||
|
|
||||||
test("refreshes source in active session after credential update", async () => {
|
|
||||||
setEnabledSources(["test"])
|
|
||||||
let receivedCredentials: unknown = null
|
|
||||||
const provider = createStubProvider("test", async (_userId, _config, credentials) => {
|
|
||||||
receivedCredentials = credentials
|
|
||||||
return createStubSource("test")
|
|
||||||
})
|
|
||||||
const manager = new UserSessionManager({
|
|
||||||
db: fakeDb,
|
|
||||||
providers: [provider],
|
|
||||||
credentialEncryptor: testEncryptor,
|
|
||||||
})
|
|
||||||
|
|
||||||
await manager.getOrCreate("user-1")
|
|
||||||
await manager.updateSourceCredentials("user-1", "test", { token: "refreshed" })
|
|
||||||
|
|
||||||
expect(receivedCredentials).toEqual({ token: "refreshed" })
|
|
||||||
})
|
|
||||||
|
|
||||||
test("persists credentials without session refresh when no active session", async () => {
|
|
||||||
setEnabledSources(["test"])
|
|
||||||
const factory = mock(async () => createStubSource("test"))
|
|
||||||
const provider: FeedSourceProvider = { sourceId: "test", feedSourceForUser: factory }
|
|
||||||
const manager = new UserSessionManager({
|
|
||||||
db: fakeDb,
|
|
||||||
providers: [provider],
|
|
||||||
credentialEncryptor: testEncryptor,
|
|
||||||
})
|
|
||||||
|
|
||||||
// No session created — just update credentials
|
|
||||||
await manager.updateSourceCredentials("user-1", "test", { token: "stored" })
|
|
||||||
|
|
||||||
expect(mockUpdateCredentialsCalls).toHaveLength(1)
|
|
||||||
// feedSourceForUser should not have been called (no session to refresh)
|
|
||||||
expect(factory).not.toHaveBeenCalled()
|
|
||||||
})
|
|
||||||
})
|
|
||||||
|
|
||||||
describe("UserSessionManager.saveSourceConfig", () => {
|
|
||||||
test("upserts config without credentials (existing behavior)", async () => {
|
|
||||||
setEnabledSources(["test"])
|
|
||||||
const factory = mock(async () => createStubSource("test"))
|
|
||||||
const provider: FeedSourceProvider = { sourceId: "test", feedSourceForUser: factory }
|
|
||||||
const manager = new UserSessionManager({
|
|
||||||
db: fakeDb,
|
|
||||||
providers: [provider],
|
|
||||||
credentialEncryptor: testEncryptor,
|
|
||||||
})
|
|
||||||
|
|
||||||
// Create a session first so we can verify the source is refreshed
|
|
||||||
await manager.getOrCreate("user-1")
|
|
||||||
|
|
||||||
await manager.saveSourceConfig("user-1", "test", {
|
|
||||||
enabled: true,
|
|
||||||
config: { key: "value" },
|
|
||||||
})
|
|
||||||
|
|
||||||
// feedSourceForUser called once for session creation, once for upsert refresh
|
|
||||||
expect(factory).toHaveBeenCalledTimes(2)
|
|
||||||
// No credentials should have been persisted
|
|
||||||
expect(mockUpdateCredentialsCalls).toHaveLength(0)
|
|
||||||
})
|
|
||||||
|
|
||||||
test("upserts config with credentials — persists both and passes credentials to source", async () => {
|
|
||||||
setEnabledSources(["test"])
|
|
||||||
let receivedCredentials: unknown = null
|
|
||||||
const factory = mock(async (_userId: string, _config: unknown, creds: unknown) => {
|
|
||||||
receivedCredentials = creds
|
|
||||||
return createStubSource("test")
|
|
||||||
})
|
|
||||||
const provider: FeedSourceProvider = { sourceId: "test", feedSourceForUser: factory }
|
|
||||||
const manager = new UserSessionManager({
|
|
||||||
db: fakeDb,
|
|
||||||
providers: [provider],
|
|
||||||
credentialEncryptor: testEncryptor,
|
|
||||||
})
|
|
||||||
|
|
||||||
// Create a session so the source refresh path runs
|
|
||||||
await manager.getOrCreate("user-1")
|
|
||||||
|
|
||||||
const creds = { username: "alice", password: "s3cret" }
|
|
||||||
await manager.saveSourceConfig("user-1", "test", {
|
|
||||||
enabled: true,
|
|
||||||
config: { serverUrl: "https://example.com" },
|
|
||||||
credentials: creds,
|
|
||||||
})
|
|
||||||
|
|
||||||
// Credentials were encrypted and persisted
|
|
||||||
expect(mockUpdateCredentialsCalls).toHaveLength(1)
|
|
||||||
const decrypted = JSON.parse(testEncryptor.decrypt(mockUpdateCredentialsCalls[0]!.credentials))
|
|
||||||
expect(decrypted).toEqual(creds)
|
|
||||||
|
|
||||||
// feedSourceForUser received the provided credentials (not null)
|
|
||||||
expect(receivedCredentials).toEqual(creds)
|
|
||||||
})
|
|
||||||
|
|
||||||
test("upserts config with credentials adds source to session when not already present", async () => {
|
|
||||||
// Start with no enabled sources so the session is empty
|
|
||||||
setEnabledSources([])
|
|
||||||
const factory = mock(async () => createStubSource("test"))
|
|
||||||
const provider: FeedSourceProvider = { sourceId: "test", feedSourceForUser: factory }
|
|
||||||
const manager = new UserSessionManager({
|
|
||||||
db: fakeDb,
|
|
||||||
providers: [provider],
|
|
||||||
credentialEncryptor: testEncryptor,
|
|
||||||
})
|
|
||||||
|
|
||||||
const session = await manager.getOrCreate("user-1")
|
|
||||||
expect(session.hasSource("test")).toBe(false)
|
|
||||||
|
|
||||||
// Set mockFindResult to undefined so find() returns a row (simulating the row was just created by upsertConfig)
|
|
||||||
await manager.saveSourceConfig("user-1", "test", {
|
|
||||||
enabled: true,
|
|
||||||
config: {},
|
|
||||||
credentials: { token: "abc" },
|
|
||||||
})
|
|
||||||
|
|
||||||
// Source should now be in the session
|
|
||||||
expect(session.hasSource("test")).toBe(true)
|
|
||||||
expect(mockUpdateCredentialsCalls).toHaveLength(1)
|
|
||||||
})
|
|
||||||
|
|
||||||
test("throws CredentialStorageUnavailableError when credentials provided without encryptor", async () => {
|
|
||||||
setEnabledSources(["test"])
|
|
||||||
const provider = createStubProvider("test")
|
|
||||||
const manager = new UserSessionManager({
|
|
||||||
db: fakeDb,
|
|
||||||
providers: [provider],
|
|
||||||
// No credentialEncryptor
|
|
||||||
})
|
|
||||||
|
|
||||||
await expect(
|
|
||||||
manager.saveSourceConfig("user-1", "test", {
|
|
||||||
enabled: true,
|
|
||||||
config: {},
|
|
||||||
credentials: { token: "abc" },
|
|
||||||
}),
|
|
||||||
).rejects.toBeInstanceOf(CredentialStorageUnavailableError)
|
|
||||||
})
|
|
||||||
|
|
||||||
test("throws SourceNotFoundError for unknown provider", async () => {
|
|
||||||
const manager = new UserSessionManager({
|
|
||||||
db: fakeDb,
|
|
||||||
providers: [],
|
|
||||||
credentialEncryptor: testEncryptor,
|
|
||||||
})
|
|
||||||
|
|
||||||
await expect(
|
|
||||||
manager.saveSourceConfig("user-1", "unknown", {
|
|
||||||
enabled: true,
|
|
||||||
config: {},
|
|
||||||
}),
|
|
||||||
).rejects.toBeInstanceOf(SourceNotFoundError)
|
|
||||||
})
|
|
||||||
})
|
|
||||||
|
|||||||
@@ -5,14 +5,9 @@ import merge from "lodash.merge"
|
|||||||
|
|
||||||
import type { Database } from "../db/index.ts"
|
import type { Database } from "../db/index.ts"
|
||||||
import type { FeedEnhancer } from "../enhancement/enhance-feed.ts"
|
import type { FeedEnhancer } from "../enhancement/enhance-feed.ts"
|
||||||
import type { CredentialEncryptor } from "../lib/crypto.ts"
|
|
||||||
import type { FeedSourceProvider } from "./feed-source-provider.ts"
|
import type { FeedSourceProvider } from "./feed-source-provider.ts"
|
||||||
|
|
||||||
import {
|
import { InvalidSourceConfigError, SourceNotFoundError } from "../sources/errors.ts"
|
||||||
CredentialStorageUnavailableError,
|
|
||||||
InvalidSourceConfigError,
|
|
||||||
SourceNotFoundError,
|
|
||||||
} from "../sources/errors.ts"
|
|
||||||
import { sources } from "../sources/user-sources.ts"
|
import { sources } from "../sources/user-sources.ts"
|
||||||
import { UserSession } from "./user-session.ts"
|
import { UserSession } from "./user-session.ts"
|
||||||
|
|
||||||
@@ -20,7 +15,6 @@ export interface UserSessionManagerConfig {
|
|||||||
db: Database
|
db: Database
|
||||||
providers: FeedSourceProvider[]
|
providers: FeedSourceProvider[]
|
||||||
feedEnhancer?: FeedEnhancer | null
|
feedEnhancer?: FeedEnhancer | null
|
||||||
credentialEncryptor?: CredentialEncryptor | null
|
|
||||||
}
|
}
|
||||||
|
|
||||||
export class UserSessionManager {
|
export class UserSessionManager {
|
||||||
@@ -29,7 +23,7 @@ export class UserSessionManager {
|
|||||||
private readonly db: Database
|
private readonly db: Database
|
||||||
private readonly providers = new Map<string, FeedSourceProvider>()
|
private readonly providers = new Map<string, FeedSourceProvider>()
|
||||||
private readonly feedEnhancer: FeedEnhancer | null
|
private readonly feedEnhancer: FeedEnhancer | null
|
||||||
private readonly encryptor: CredentialEncryptor | null
|
private readonly db: Database
|
||||||
|
|
||||||
constructor(config: UserSessionManagerConfig) {
|
constructor(config: UserSessionManagerConfig) {
|
||||||
this.db = config.db
|
this.db = config.db
|
||||||
@@ -37,7 +31,7 @@ export class UserSessionManager {
|
|||||||
this.providers.set(provider.sourceId, provider)
|
this.providers.set(provider.sourceId, provider)
|
||||||
}
|
}
|
||||||
this.feedEnhancer = config.feedEnhancer ?? null
|
this.feedEnhancer = config.feedEnhancer ?? null
|
||||||
this.encryptor = config.credentialEncryptor ?? null
|
this.db = config.db
|
||||||
}
|
}
|
||||||
|
|
||||||
getProvider(sourceId: string): FeedSourceProvider | undefined {
|
getProvider(sourceId: string): FeedSourceProvider | undefined {
|
||||||
@@ -126,29 +120,26 @@ export class UserSessionManager {
|
|||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
// Use a transaction with SELECT FOR UPDATE to prevent lost updates
|
// When config is provided, fetch existing to deep-merge before validating.
|
||||||
// when concurrent PATCH requests merge config against the same base.
|
// NOTE: find + updateConfig is not atomic. A concurrent update could
|
||||||
const { existingRow, mergedConfig } = await this.db.transaction(async (tx) => {
|
// read stale config. Use SELECT FOR UPDATE or atomic jsonb merge if
|
||||||
const existingRow = await sources(tx, userId).findForUpdate(sourceId)
|
// this becomes a problem.
|
||||||
|
let mergedConfig: Record<string, unknown> | undefined
|
||||||
|
if (update.config !== undefined && provider.configSchema) {
|
||||||
|
const existing = await sources(this.db, userId).find(sourceId)
|
||||||
|
const existingConfig = (existing?.config ?? {}) as Record<string, unknown>
|
||||||
|
mergedConfig = merge({}, existingConfig, update.config)
|
||||||
|
|
||||||
let mergedConfig: Record<string, unknown> | undefined
|
const validated = provider.configSchema(mergedConfig)
|
||||||
if (update.config !== undefined && provider.configSchema) {
|
if (validated instanceof type.errors) {
|
||||||
const existingConfig = (existingRow?.config ?? {}) as Record<string, unknown>
|
throw new InvalidSourceConfigError(sourceId, validated.summary)
|
||||||
mergedConfig = merge({}, existingConfig, update.config)
|
|
||||||
|
|
||||||
const validated = provider.configSchema(mergedConfig)
|
|
||||||
if (validated instanceof type.errors) {
|
|
||||||
throw new InvalidSourceConfigError(sourceId, validated.summary)
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// Throws SourceNotFoundError if the row doesn't exist
|
// Throws SourceNotFoundError if the row doesn't exist
|
||||||
await sources(tx, userId).updateConfig(sourceId, {
|
await sources(this.db, userId).updateConfig(sourceId, {
|
||||||
enabled: update.enabled,
|
enabled: update.enabled,
|
||||||
config: mergedConfig,
|
config: mergedConfig,
|
||||||
})
|
|
||||||
|
|
||||||
return { existingRow, mergedConfig }
|
|
||||||
})
|
})
|
||||||
|
|
||||||
// Refresh the specific source in the active session instead of
|
// Refresh the specific source in the active session instead of
|
||||||
@@ -158,10 +149,7 @@ export class UserSessionManager {
|
|||||||
if (update.enabled === false) {
|
if (update.enabled === false) {
|
||||||
session.removeSource(sourceId)
|
session.removeSource(sourceId)
|
||||||
} else {
|
} else {
|
||||||
const credentials = existingRow?.credentials
|
const source = await provider.feedSourceForUser(userId, mergedConfig ?? {})
|
||||||
? this.decryptCredentials(existingRow.credentials)
|
|
||||||
: null
|
|
||||||
const source = await provider.feedSourceForUser(userId, mergedConfig ?? {}, credentials)
|
|
||||||
session.replaceSource(sourceId, source)
|
session.replaceSource(sourceId, source)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -173,18 +161,13 @@ export class UserSessionManager {
|
|||||||
* inserts a new row if one doesn't exist and fully replaces config
|
* inserts a new row if one doesn't exist and fully replaces config
|
||||||
* (no merge).
|
* (no merge).
|
||||||
*
|
*
|
||||||
* When `credentials` is provided, they are encrypted and persisted
|
|
||||||
* alongside the config in the same flow, avoiding the race condition
|
|
||||||
* of separate config + credential requests.
|
|
||||||
*
|
|
||||||
* @throws {SourceNotFoundError} if the sourceId has no registered provider
|
* @throws {SourceNotFoundError} if the sourceId has no registered provider
|
||||||
* @throws {InvalidSourceConfigError} if config fails schema validation
|
* @throws {InvalidSourceConfigError} if config fails schema validation
|
||||||
* @throws {CredentialStorageUnavailableError} if credentials are provided but no encryptor is configured
|
|
||||||
*/
|
*/
|
||||||
async saveSourceConfig(
|
async upsertSourceConfig(
|
||||||
userId: string,
|
userId: string,
|
||||||
sourceId: string,
|
sourceId: string,
|
||||||
data: { enabled: boolean; config?: unknown; credentials?: unknown },
|
data: { enabled: boolean; config?: unknown },
|
||||||
): Promise<void> {
|
): Promise<void> {
|
||||||
const provider = this.providers.get(sourceId)
|
const provider = this.providers.get(sourceId)
|
||||||
if (!provider) {
|
if (!provider) {
|
||||||
@@ -198,28 +181,10 @@ export class UserSessionManager {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if (data.credentials !== undefined && !this.encryptor) {
|
|
||||||
throw new CredentialStorageUnavailableError()
|
|
||||||
}
|
|
||||||
|
|
||||||
const config = data.config ?? {}
|
const config = data.config ?? {}
|
||||||
|
await sources(this.db, userId).upsertConfig(sourceId, {
|
||||||
// Run the upsert + credential update atomically so a failure in
|
enabled: data.enabled,
|
||||||
// either step doesn't leave the row in an inconsistent state.
|
config,
|
||||||
const existingRow = await this.db.transaction(async (tx) => {
|
|
||||||
const existing = await sources(tx, userId).find(sourceId)
|
|
||||||
|
|
||||||
await sources(tx, userId).upsertConfig(sourceId, {
|
|
||||||
enabled: data.enabled,
|
|
||||||
config,
|
|
||||||
})
|
|
||||||
|
|
||||||
if (data.credentials !== undefined && this.encryptor) {
|
|
||||||
const encrypted = this.encryptor.encrypt(JSON.stringify(data.credentials))
|
|
||||||
await sources(tx, userId).updateCredentials(sourceId, encrypted)
|
|
||||||
}
|
|
||||||
|
|
||||||
return existing
|
|
||||||
})
|
})
|
||||||
|
|
||||||
const session = this.sessions.get(userId)
|
const session = this.sessions.get(userId)
|
||||||
@@ -227,14 +192,7 @@ export class UserSessionManager {
|
|||||||
if (!data.enabled) {
|
if (!data.enabled) {
|
||||||
session.removeSource(sourceId)
|
session.removeSource(sourceId)
|
||||||
} else {
|
} else {
|
||||||
// Prefer the just-provided credentials over what was in the DB.
|
const source = await provider.feedSourceForUser(userId, config)
|
||||||
let credentials: unknown = null
|
|
||||||
if (data.credentials !== undefined) {
|
|
||||||
credentials = data.credentials
|
|
||||||
} else if (existingRow?.credentials) {
|
|
||||||
credentials = this.decryptCredentials(existingRow.credentials)
|
|
||||||
}
|
|
||||||
const source = await provider.feedSourceForUser(userId, config, credentials)
|
|
||||||
if (session.hasSource(sourceId)) {
|
if (session.hasSource(sourceId)) {
|
||||||
session.replaceSource(sourceId, source)
|
session.replaceSource(sourceId, source)
|
||||||
} else {
|
} else {
|
||||||
@@ -244,44 +202,6 @@ export class UserSessionManager {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
|
||||||
* Validates, encrypts, and persists per-user credentials for a source,
|
|
||||||
* then refreshes the active session.
|
|
||||||
*
|
|
||||||
* @throws {SourceNotFoundError} if the source row doesn't exist or has no registered provider
|
|
||||||
* @throws {CredentialStorageUnavailableError} if no CredentialEncryptor is configured
|
|
||||||
*/
|
|
||||||
async updateSourceCredentials(
|
|
||||||
userId: string,
|
|
||||||
sourceId: string,
|
|
||||||
credentials: unknown,
|
|
||||||
): Promise<void> {
|
|
||||||
const provider = this.providers.get(sourceId)
|
|
||||||
if (!provider) {
|
|
||||||
throw new SourceNotFoundError(sourceId, userId)
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!this.encryptor) {
|
|
||||||
throw new CredentialStorageUnavailableError()
|
|
||||||
}
|
|
||||||
|
|
||||||
const encrypted = this.encryptor.encrypt(JSON.stringify(credentials))
|
|
||||||
await sources(this.db, userId).updateCredentials(sourceId, encrypted)
|
|
||||||
|
|
||||||
// Refresh the source in the active session.
|
|
||||||
// If feedSourceForUser throws (e.g. provider rejects the credentials),
|
|
||||||
// the DB already has the new credentials but the session keeps the old
|
|
||||||
// source. The next session creation will pick up the persisted credentials.
|
|
||||||
const session = this.sessions.get(userId)
|
|
||||||
if (session && session.hasSource(sourceId)) {
|
|
||||||
const row = await sources(this.db, userId).find(sourceId)
|
|
||||||
if (row?.enabled) {
|
|
||||||
const source = await provider.feedSourceForUser(userId, row.config ?? {}, credentials)
|
|
||||||
session.replaceSource(sourceId, source)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Replaces a provider and updates all active sessions.
|
* Replaces a provider and updates all active sessions.
|
||||||
* The new provider must have the same sourceId as an existing one.
|
* The new provider must have the same sourceId as an existing one.
|
||||||
@@ -334,12 +254,7 @@ export class UserSessionManager {
|
|||||||
const row = await sources(this.db, session.userId).find(provider.sourceId)
|
const row = await sources(this.db, session.userId).find(provider.sourceId)
|
||||||
if (!row?.enabled) return
|
if (!row?.enabled) return
|
||||||
|
|
||||||
const credentials = row.credentials ? this.decryptCredentials(row.credentials) : null
|
const newSource = await provider.feedSourceForUser(session.userId, row.config ?? {})
|
||||||
const newSource = await provider.feedSourceForUser(
|
|
||||||
session.userId,
|
|
||||||
row.config ?? {},
|
|
||||||
credentials,
|
|
||||||
)
|
|
||||||
session.replaceSource(provider.sourceId, newSource)
|
session.replaceSource(provider.sourceId, newSource)
|
||||||
} catch (err) {
|
} catch (err) {
|
||||||
console.error(
|
console.error(
|
||||||
@@ -356,8 +271,7 @@ export class UserSessionManager {
|
|||||||
for (const row of enabledRows) {
|
for (const row of enabledRows) {
|
||||||
const provider = this.providers.get(row.sourceId)
|
const provider = this.providers.get(row.sourceId)
|
||||||
if (provider) {
|
if (provider) {
|
||||||
const credentials = row.credentials ? this.decryptCredentials(row.credentials) : null
|
promises.push(provider.feedSourceForUser(userId, row.config ?? {}))
|
||||||
promises.push(provider.feedSourceForUser(userId, row.config ?? {}, credentials))
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -388,19 +302,4 @@ export class UserSessionManager {
|
|||||||
|
|
||||||
return new UserSession(userId, feedSources, this.feedEnhancer)
|
return new UserSession(userId, feedSources, this.feedEnhancer)
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
|
||||||
* Decrypts a credentials buffer from the DB, returning parsed JSON or null.
|
|
||||||
* Returns null (with a warning) if decryption or parsing fails — e.g. due to
|
|
||||||
* key rotation, data corruption, or malformed JSON.
|
|
||||||
*/
|
|
||||||
private decryptCredentials(credentials: Buffer): unknown {
|
|
||||||
if (!this.encryptor) return null
|
|
||||||
try {
|
|
||||||
return JSON.parse(this.encryptor.decrypt(credentials))
|
|
||||||
} catch (err) {
|
|
||||||
console.warn("[UserSessionManager] Failed to decrypt credentials:", err)
|
|
||||||
return null
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -24,26 +24,3 @@ export class InvalidSourceConfigError extends Error {
|
|||||||
this.sourceId = sourceId
|
this.sourceId = sourceId
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
|
||||||
* Thrown by providers when credentials fail validation.
|
|
||||||
*/
|
|
||||||
export class InvalidSourceCredentialsError extends Error {
|
|
||||||
readonly sourceId: string
|
|
||||||
|
|
||||||
constructor(sourceId: string, summary: string) {
|
|
||||||
super(summary)
|
|
||||||
this.name = "InvalidSourceCredentialsError"
|
|
||||||
this.sourceId = sourceId
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Thrown when credential storage is not configured (missing encryption key).
|
|
||||||
*/
|
|
||||||
export class CredentialStorageUnavailableError extends Error {
|
|
||||||
constructor() {
|
|
||||||
super("Credential storage is not configured")
|
|
||||||
this.name = "CredentialStorageUnavailableError"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|||||||
@@ -7,11 +7,10 @@ import type { Database } from "../db/index.ts"
|
|||||||
import type { ConfigSchema, FeedSourceProvider } from "../session/feed-source-provider.ts"
|
import type { ConfigSchema, FeedSourceProvider } from "../session/feed-source-provider.ts"
|
||||||
|
|
||||||
import { mockAuthSessionMiddleware } from "../auth/session-middleware.ts"
|
import { mockAuthSessionMiddleware } from "../auth/session-middleware.ts"
|
||||||
import { CredentialEncryptor } from "../lib/crypto.ts"
|
|
||||||
import { UserSessionManager } from "../session/user-session-manager.ts"
|
import { UserSessionManager } from "../session/user-session-manager.ts"
|
||||||
import { tflConfig } from "../tfl/provider.ts"
|
import { tflConfig } from "../tfl/provider.ts"
|
||||||
import { weatherConfig } from "../weather/provider.ts"
|
import { weatherConfig } from "../weather/provider.ts"
|
||||||
import { InvalidSourceCredentialsError, SourceNotFoundError } from "./errors.ts"
|
import { SourceNotFoundError } from "./errors.ts"
|
||||||
import { registerSourcesHttpHandlers } from "./http.ts"
|
import { registerSourcesHttpHandlers } from "./http.ts"
|
||||||
|
|
||||||
// ---------------------------------------------------------------------------
|
// ---------------------------------------------------------------------------
|
||||||
@@ -40,7 +39,7 @@ function createStubProvider(sourceId: string, configSchema?: ConfigSchema): Feed
|
|||||||
return {
|
return {
|
||||||
sourceId,
|
sourceId,
|
||||||
configSchema,
|
configSchema,
|
||||||
async feedSourceForUser(_userId: string, _config: unknown, _credentials: unknown) {
|
async feedSourceForUser() {
|
||||||
return createStubSource(sourceId)
|
return createStubSource(sourceId)
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
@@ -80,9 +79,6 @@ function createInMemoryStore() {
|
|||||||
async find(sourceId: string) {
|
async find(sourceId: string) {
|
||||||
return rows.get(key(userId, sourceId))
|
return rows.get(key(userId, sourceId))
|
||||||
},
|
},
|
||||||
async findForUpdate(sourceId: string) {
|
|
||||||
return rows.get(key(userId, sourceId))
|
|
||||||
},
|
|
||||||
async updateConfig(sourceId: string, update: { enabled?: boolean; config?: unknown }) {
|
async updateConfig(sourceId: string, update: { enabled?: boolean; config?: unknown }) {
|
||||||
const existing = rows.get(key(userId, sourceId))
|
const existing = rows.get(key(userId, sourceId))
|
||||||
if (!existing) {
|
if (!existing) {
|
||||||
@@ -109,12 +105,6 @@ function createInMemoryStore() {
|
|||||||
})
|
})
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
async updateCredentials(sourceId: string, _credentials: Buffer) {
|
|
||||||
const existing = rows.get(key(userId, sourceId))
|
|
||||||
if (!existing) {
|
|
||||||
throw new SourceNotFoundError(sourceId, userId)
|
|
||||||
}
|
|
||||||
},
|
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
@@ -128,9 +118,7 @@ mock.module("../sources/user-sources.ts", () => ({
|
|||||||
},
|
},
|
||||||
}))
|
}))
|
||||||
|
|
||||||
const fakeDb = {
|
const fakeDb = {} as Database
|
||||||
transaction: <T>(fn: (tx: unknown) => Promise<T>) => fn(fakeDb),
|
|
||||||
} as unknown as Database
|
|
||||||
|
|
||||||
function createApp(providers: FeedSourceProvider[], userId?: string) {
|
function createApp(providers: FeedSourceProvider[], userId?: string) {
|
||||||
const sessionManager = new UserSessionManager({ providers, db: fakeDb })
|
const sessionManager = new UserSessionManager({ providers, db: fakeDb })
|
||||||
@@ -154,30 +142,6 @@ function get(app: Hono, sourceId: string) {
|
|||||||
return app.request(`/api/sources/${sourceId}`, { method: "GET" })
|
return app.request(`/api/sources/${sourceId}`, { method: "GET" })
|
||||||
}
|
}
|
||||||
|
|
||||||
const TEST_ENCRYPTION_KEY = "/bv1nbzC4ozZkT/pcv5oQfl+JAMuMZDUSVDesG2dur8="
|
|
||||||
|
|
||||||
function createAppWithEncryptor(providers: FeedSourceProvider[], userId?: string) {
|
|
||||||
const sessionManager = new UserSessionManager({
|
|
||||||
providers,
|
|
||||||
db: fakeDb,
|
|
||||||
credentialEncryptor: new CredentialEncryptor(TEST_ENCRYPTION_KEY),
|
|
||||||
})
|
|
||||||
const app = new Hono()
|
|
||||||
registerSourcesHttpHandlers(app, {
|
|
||||||
sessionManager,
|
|
||||||
authSessionMiddleware: mockAuthSessionMiddleware(userId),
|
|
||||||
})
|
|
||||||
return { app, sessionManager }
|
|
||||||
}
|
|
||||||
|
|
||||||
function putCredentials(app: Hono, sourceId: string, body: unknown) {
|
|
||||||
return app.request(`/api/sources/${sourceId}/credentials`, {
|
|
||||||
method: "PUT",
|
|
||||||
headers: { "Content-Type": "application/json" },
|
|
||||||
body: JSON.stringify(body),
|
|
||||||
})
|
|
||||||
}
|
|
||||||
|
|
||||||
function put(app: Hono, sourceId: string, body: unknown) {
|
function put(app: Hono, sourceId: string, body: unknown) {
|
||||||
return app.request(`/api/sources/${sourceId}`, {
|
return app.request(`/api/sources/${sourceId}`, {
|
||||||
method: "PUT",
|
method: "PUT",
|
||||||
@@ -743,123 +707,4 @@ describe("PUT /api/sources/:sourceId", () => {
|
|||||||
|
|
||||||
expect(res.status).toBe(204)
|
expect(res.status).toBe(204)
|
||||||
})
|
})
|
||||||
|
|
||||||
test("returns 204 when credentials are included alongside config", async () => {
|
|
||||||
activeStore = createInMemoryStore()
|
|
||||||
const { app } = createAppWithEncryptor(
|
|
||||||
[createStubProvider("aelis.weather", weatherConfig)],
|
|
||||||
MOCK_USER_ID,
|
|
||||||
)
|
|
||||||
|
|
||||||
const res = await put(app, "aelis.weather", {
|
|
||||||
enabled: true,
|
|
||||||
config: { units: "metric" },
|
|
||||||
credentials: { apiKey: "secret123" },
|
|
||||||
})
|
|
||||||
|
|
||||||
expect(res.status).toBe(204)
|
|
||||||
const row = activeStore.rows.get(`${MOCK_USER_ID}:aelis.weather`)
|
|
||||||
expect(row).toBeDefined()
|
|
||||||
expect(row!.enabled).toBe(true)
|
|
||||||
expect(row!.config).toEqual({ units: "metric" })
|
|
||||||
})
|
|
||||||
|
|
||||||
test("returns 503 when credentials are provided but no encryptor is configured", async () => {
|
|
||||||
activeStore = createInMemoryStore()
|
|
||||||
// createApp does NOT configure an encryptor
|
|
||||||
const { app } = createApp([createStubProvider("aelis.weather", weatherConfig)], MOCK_USER_ID)
|
|
||||||
|
|
||||||
const res = await put(app, "aelis.weather", {
|
|
||||||
enabled: true,
|
|
||||||
config: { units: "metric" },
|
|
||||||
credentials: { apiKey: "secret123" },
|
|
||||||
})
|
|
||||||
|
|
||||||
expect(res.status).toBe(503)
|
|
||||||
const body = (await res.json()) as { error: string }
|
|
||||||
expect(body.error).toContain("not configured")
|
|
||||||
})
|
|
||||||
})
|
|
||||||
|
|
||||||
describe("PUT /api/sources/:sourceId/credentials", () => {
|
|
||||||
test("returns 401 without auth", async () => {
|
|
||||||
activeStore = createInMemoryStore()
|
|
||||||
const { app } = createAppWithEncryptor([createStubProvider("aelis.location")])
|
|
||||||
|
|
||||||
const res = await putCredentials(app, "aelis.location", { token: "x" })
|
|
||||||
|
|
||||||
expect(res.status).toBe(401)
|
|
||||||
})
|
|
||||||
|
|
||||||
test("returns 404 for unknown source", async () => {
|
|
||||||
activeStore = createInMemoryStore()
|
|
||||||
const { app } = createAppWithEncryptor([createStubProvider("aelis.location")], MOCK_USER_ID)
|
|
||||||
|
|
||||||
const res = await putCredentials(app, "unknown.source", { token: "x" })
|
|
||||||
|
|
||||||
expect(res.status).toBe(404)
|
|
||||||
})
|
|
||||||
|
|
||||||
test("returns 400 for invalid JSON", async () => {
|
|
||||||
activeStore = createInMemoryStore()
|
|
||||||
activeStore.seed(MOCK_USER_ID, "aelis.location")
|
|
||||||
const { app } = createAppWithEncryptor([createStubProvider("aelis.location")], MOCK_USER_ID)
|
|
||||||
|
|
||||||
const res = await app.request("/api/sources/aelis.location/credentials", {
|
|
||||||
method: "PUT",
|
|
||||||
headers: { "Content-Type": "application/json" },
|
|
||||||
body: "not-json",
|
|
||||||
})
|
|
||||||
|
|
||||||
expect(res.status).toBe(400)
|
|
||||||
const body = (await res.json()) as { error: string }
|
|
||||||
expect(body.error).toBe("Invalid JSON")
|
|
||||||
})
|
|
||||||
|
|
||||||
test("returns 204 and persists credentials", async () => {
|
|
||||||
activeStore = createInMemoryStore()
|
|
||||||
activeStore.seed(MOCK_USER_ID, "aelis.location")
|
|
||||||
const { app } = createAppWithEncryptor([createStubProvider("aelis.location")], MOCK_USER_ID)
|
|
||||||
|
|
||||||
const res = await putCredentials(app, "aelis.location", { token: "secret" })
|
|
||||||
|
|
||||||
expect(res.status).toBe(204)
|
|
||||||
})
|
|
||||||
|
|
||||||
test("returns 400 when provider throws InvalidSourceCredentialsError", async () => {
|
|
||||||
activeStore = createInMemoryStore()
|
|
||||||
activeStore.seed(MOCK_USER_ID, "test.creds")
|
|
||||||
let callCount = 0
|
|
||||||
const provider: FeedSourceProvider = {
|
|
||||||
sourceId: "test.creds",
|
|
||||||
async feedSourceForUser(_userId: string, _config: unknown, _credentials: unknown) {
|
|
||||||
callCount++
|
|
||||||
if (callCount > 1) {
|
|
||||||
throw new InvalidSourceCredentialsError("test.creds", "invalid token format")
|
|
||||||
}
|
|
||||||
return createStubSource("test.creds")
|
|
||||||
},
|
|
||||||
}
|
|
||||||
const { app, sessionManager } = createAppWithEncryptor([provider], MOCK_USER_ID)
|
|
||||||
|
|
||||||
await sessionManager.getOrCreate(MOCK_USER_ID)
|
|
||||||
|
|
||||||
const res = await putCredentials(app, "test.creds", { token: "bad" })
|
|
||||||
|
|
||||||
expect(res.status).toBe(400)
|
|
||||||
const body = (await res.json()) as { error: string }
|
|
||||||
expect(body.error).toContain("invalid token format")
|
|
||||||
})
|
|
||||||
|
|
||||||
test("returns 503 when credential encryption is not configured", async () => {
|
|
||||||
activeStore = createInMemoryStore()
|
|
||||||
activeStore.seed(MOCK_USER_ID, "aelis.location")
|
|
||||||
const { app } = createApp([createStubProvider("aelis.location")], MOCK_USER_ID)
|
|
||||||
|
|
||||||
const res = await putCredentials(app, "aelis.location", { token: "x" })
|
|
||||||
|
|
||||||
expect(res.status).toBe(503)
|
|
||||||
const body = (await res.json()) as { error: string }
|
|
||||||
expect(body.error).toContain("not configured")
|
|
||||||
})
|
|
||||||
})
|
})
|
||||||
|
|||||||
@@ -6,12 +6,7 @@ import { createMiddleware } from "hono/factory"
|
|||||||
import type { AuthSessionMiddleware } from "../auth/session-middleware.ts"
|
import type { AuthSessionMiddleware } from "../auth/session-middleware.ts"
|
||||||
import type { UserSessionManager } from "../session/index.ts"
|
import type { UserSessionManager } from "../session/index.ts"
|
||||||
|
|
||||||
import {
|
import { InvalidSourceConfigError, SourceNotFoundError } from "./errors.ts"
|
||||||
CredentialStorageUnavailableError,
|
|
||||||
InvalidSourceConfigError,
|
|
||||||
InvalidSourceCredentialsError,
|
|
||||||
SourceNotFoundError,
|
|
||||||
} from "./errors.ts"
|
|
||||||
|
|
||||||
type Env = {
|
type Env = {
|
||||||
Variables: {
|
Variables: {
|
||||||
@@ -34,13 +29,11 @@ const ReplaceSourceConfigRequestBody = type({
|
|||||||
"+": "reject",
|
"+": "reject",
|
||||||
enabled: "boolean",
|
enabled: "boolean",
|
||||||
config: "unknown",
|
config: "unknown",
|
||||||
"credentials?": "unknown",
|
|
||||||
})
|
})
|
||||||
|
|
||||||
const ReplaceSourceConfigNoConfigRequestBody = type({
|
const ReplaceSourceConfigNoConfigRequestBody = type({
|
||||||
"+": "reject",
|
"+": "reject",
|
||||||
enabled: "boolean",
|
enabled: "boolean",
|
||||||
"credentials?": "unknown",
|
|
||||||
})
|
})
|
||||||
|
|
||||||
export function registerSourcesHttpHandlers(
|
export function registerSourcesHttpHandlers(
|
||||||
@@ -55,12 +48,6 @@ export function registerSourcesHttpHandlers(
|
|||||||
app.get("/api/sources/:sourceId", inject, authSessionMiddleware, handleGetSource)
|
app.get("/api/sources/:sourceId", inject, authSessionMiddleware, handleGetSource)
|
||||||
app.patch("/api/sources/:sourceId", inject, authSessionMiddleware, handleUpdateSource)
|
app.patch("/api/sources/:sourceId", inject, authSessionMiddleware, handleUpdateSource)
|
||||||
app.put("/api/sources/:sourceId", inject, authSessionMiddleware, handleReplaceSource)
|
app.put("/api/sources/:sourceId", inject, authSessionMiddleware, handleReplaceSource)
|
||||||
app.put(
|
|
||||||
"/api/sources/:sourceId/credentials",
|
|
||||||
inject,
|
|
||||||
authSessionMiddleware,
|
|
||||||
handleUpdateCredentials,
|
|
||||||
)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
async function handleGetSource(c: Context<Env>) {
|
async function handleGetSource(c: Context<Env>) {
|
||||||
@@ -163,15 +150,14 @@ async function handleReplaceSource(c: Context<Env>) {
|
|||||||
return c.json({ error: parsed.summary }, 400)
|
return c.json({ error: parsed.summary }, 400)
|
||||||
}
|
}
|
||||||
|
|
||||||
const { enabled, credentials } = parsed
|
const { enabled } = parsed
|
||||||
const config = "config" in parsed ? parsed.config : undefined
|
const config = "config" in parsed ? parsed.config : undefined
|
||||||
const user = c.get("user")!
|
const user = c.get("user")!
|
||||||
|
|
||||||
try {
|
try {
|
||||||
await sessionManager.saveSourceConfig(user.id, sourceId, {
|
await sessionManager.upsertSourceConfig(user.id, sourceId, {
|
||||||
enabled,
|
enabled,
|
||||||
config,
|
config,
|
||||||
credentials,
|
|
||||||
})
|
})
|
||||||
} catch (err) {
|
} catch (err) {
|
||||||
if (err instanceof SourceNotFoundError) {
|
if (err instanceof SourceNotFoundError) {
|
||||||
@@ -180,49 +166,6 @@ async function handleReplaceSource(c: Context<Env>) {
|
|||||||
if (err instanceof InvalidSourceConfigError) {
|
if (err instanceof InvalidSourceConfigError) {
|
||||||
return c.json({ error: err.message }, 400)
|
return c.json({ error: err.message }, 400)
|
||||||
}
|
}
|
||||||
if (err instanceof CredentialStorageUnavailableError) {
|
|
||||||
return c.json({ error: err.message }, 503)
|
|
||||||
}
|
|
||||||
throw err
|
|
||||||
}
|
|
||||||
|
|
||||||
return c.body(null, 204)
|
|
||||||
}
|
|
||||||
|
|
||||||
async function handleUpdateCredentials(c: Context<Env>) {
|
|
||||||
const sourceId = c.req.param("sourceId")
|
|
||||||
if (!sourceId) {
|
|
||||||
return c.body(null, 404)
|
|
||||||
}
|
|
||||||
|
|
||||||
const sessionManager = c.get("sessionManager")
|
|
||||||
|
|
||||||
const provider = sessionManager.getProvider(sourceId)
|
|
||||||
if (!provider) {
|
|
||||||
return c.json({ error: `Source "${sourceId}" not found` }, 404)
|
|
||||||
}
|
|
||||||
|
|
||||||
let body: unknown
|
|
||||||
try {
|
|
||||||
body = await c.req.json()
|
|
||||||
} catch {
|
|
||||||
return c.json({ error: "Invalid JSON" }, 400)
|
|
||||||
}
|
|
||||||
|
|
||||||
const user = c.get("user")!
|
|
||||||
|
|
||||||
try {
|
|
||||||
await sessionManager.updateSourceCredentials(user.id, sourceId, body)
|
|
||||||
} catch (err) {
|
|
||||||
if (err instanceof SourceNotFoundError) {
|
|
||||||
return c.json({ error: err.message }, 404)
|
|
||||||
}
|
|
||||||
if (err instanceof InvalidSourceCredentialsError) {
|
|
||||||
return c.json({ error: err.message }, 400)
|
|
||||||
}
|
|
||||||
if (err instanceof CredentialStorageUnavailableError) {
|
|
||||||
return c.json({ error: err.message }, 503)
|
|
||||||
}
|
|
||||||
throw err
|
throw err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -26,18 +26,6 @@ export function sources(db: Database, userId: string) {
|
|||||||
return rows[0]
|
return rows[0]
|
||||||
},
|
},
|
||||||
|
|
||||||
/** Like find(), but acquires a row lock to prevent concurrent modifications. Must be called inside a transaction. */
|
|
||||||
async findForUpdate(sourceId: string) {
|
|
||||||
const rows = await db
|
|
||||||
.select()
|
|
||||||
.from(userSources)
|
|
||||||
.where(and(eq(userSources.userId, userId), eq(userSources.sourceId, sourceId)))
|
|
||||||
.limit(1)
|
|
||||||
.for("update")
|
|
||||||
|
|
||||||
return rows[0]
|
|
||||||
},
|
|
||||||
|
|
||||||
/** Enables a source for the user. Throws if the source row doesn't exist. */
|
/** Enables a source for the user. Throws if the source row doesn't exist. */
|
||||||
async enableSource(sourceId: string) {
|
async enableSource(sourceId: string) {
|
||||||
const rows = await db
|
const rows = await db
|
||||||
|
|||||||
@@ -23,11 +23,7 @@ export class TflSourceProvider implements FeedSourceProvider {
|
|||||||
this.client = "client" in options ? options.client : undefined
|
this.client = "client" in options ? options.client : undefined
|
||||||
}
|
}
|
||||||
|
|
||||||
async feedSourceForUser(
|
async feedSourceForUser(_userId: string, config: unknown): Promise<TflSource> {
|
||||||
_userId: string,
|
|
||||||
config: unknown,
|
|
||||||
_credentials: unknown,
|
|
||||||
): Promise<TflSource> {
|
|
||||||
const parsed = tflConfig(config)
|
const parsed = tflConfig(config)
|
||||||
if (parsed instanceof type.errors) {
|
if (parsed instanceof type.errors) {
|
||||||
throw new Error(`Invalid TFL config: ${parsed.summary}`)
|
throw new Error(`Invalid TFL config: ${parsed.summary}`)
|
||||||
|
|||||||
@@ -26,11 +26,7 @@ export class WeatherSourceProvider implements FeedSourceProvider {
|
|||||||
this.client = options.client
|
this.client = options.client
|
||||||
}
|
}
|
||||||
|
|
||||||
async feedSourceForUser(
|
async feedSourceForUser(_userId: string, config: unknown): Promise<WeatherSource> {
|
||||||
_userId: string,
|
|
||||||
config: unknown,
|
|
||||||
_credentials: unknown,
|
|
||||||
): Promise<WeatherSource> {
|
|
||||||
const parsed = weatherConfig(config)
|
const parsed = weatherConfig(config)
|
||||||
if (parsed instanceof type.errors) {
|
if (parsed instanceof type.errors) {
|
||||||
throw new Error(`Invalid weather config: ${parsed.summary}`)
|
throw new Error(`Invalid weather config: ${parsed.summary}`)
|
||||||
|
|||||||
@@ -55,6 +55,6 @@
|
|||||||
"eas-cli": "^18.0.1",
|
"eas-cli": "^18.0.1",
|
||||||
"eslint": "^9.25.0",
|
"eslint": "^9.25.0",
|
||||||
"eslint-config-expo": "~10.0.0",
|
"eslint-config-expo": "~10.0.0",
|
||||||
"typescript": "^6"
|
"typescript": "~5.9.2"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -30,7 +30,7 @@
|
|||||||
"@types/react": "^19.2.7",
|
"@types/react": "^19.2.7",
|
||||||
"@types/react-dom": "^19.2.3",
|
"@types/react-dom": "^19.2.3",
|
||||||
"tailwindcss": "^4.1.13",
|
"tailwindcss": "^4.1.13",
|
||||||
"typescript": "^6",
|
"typescript": "^5.9.2",
|
||||||
"vite": "^7.1.7",
|
"vite": "^7.1.7",
|
||||||
"vite-tsconfig-paths": "^5.1.4"
|
"vite-tsconfig-paths": "^5.1.4"
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,16 +1,18 @@
|
|||||||
{
|
{
|
||||||
"include": ["**/*", "**/.server/**/*", "**/.client/**/*", ".react-router/types/**/*"],
|
"include": ["**/*", "**/.server/**/*", "**/.client/**/*", ".react-router/types/**/*"],
|
||||||
"compilerOptions": {
|
"compilerOptions": {
|
||||||
"lib": ["DOM", "ES2022"],
|
"lib": ["DOM", "DOM.Iterable", "ES2022"],
|
||||||
"types": ["node", "vite/client"],
|
"types": ["node", "vite/client"],
|
||||||
"target": "ES2022",
|
"target": "ES2022",
|
||||||
"module": "ES2022",
|
"module": "ES2022",
|
||||||
"moduleResolution": "bundler",
|
"moduleResolution": "bundler",
|
||||||
"jsx": "react-jsx",
|
"jsx": "react-jsx",
|
||||||
"rootDirs": [".", "./.react-router/types"],
|
"rootDirs": [".", "./.react-router/types"],
|
||||||
|
"baseUrl": ".",
|
||||||
"paths": {
|
"paths": {
|
||||||
"~/*": ["./app/*"]
|
"~/*": ["./app/*"]
|
||||||
},
|
},
|
||||||
|
"esModuleInterop": true,
|
||||||
"verbatimModuleSyntax": true,
|
"verbatimModuleSyntax": true,
|
||||||
"noEmit": true,
|
"noEmit": true,
|
||||||
"resolveJsonModule": true,
|
"resolveJsonModule": true,
|
||||||
|
|||||||
31
bun.lock
31
bun.lock
@@ -8,12 +8,11 @@
|
|||||||
"@json-render/core": "^0.12.1",
|
"@json-render/core": "^0.12.1",
|
||||||
"@nym.sh/jrx": "^0.2.0",
|
"@nym.sh/jrx": "^0.2.0",
|
||||||
"@types/bun": "latest",
|
"@types/bun": "latest",
|
||||||
"@typescript/native-preview": "^7.0.0-dev.20260412.1",
|
|
||||||
"oxfmt": "^0.24.0",
|
"oxfmt": "^0.24.0",
|
||||||
"oxlint": "^1.39.0",
|
"oxlint": "^1.39.0",
|
||||||
},
|
},
|
||||||
"peerDependencies": {
|
"peerDependencies": {
|
||||||
"typescript": "^6",
|
"typescript": "^5",
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
"apps/admin-dashboard": {
|
"apps/admin-dashboard": {
|
||||||
@@ -42,7 +41,7 @@
|
|||||||
"@types/react": "^19.2.5",
|
"@types/react": "^19.2.5",
|
||||||
"@types/react-dom": "^19.2.3",
|
"@types/react-dom": "^19.2.3",
|
||||||
"@vitejs/plugin-react": "^5.1.1",
|
"@vitejs/plugin-react": "^5.1.1",
|
||||||
"typescript": "^6",
|
"typescript": "~5.9.3",
|
||||||
"vite": "^7.2.4",
|
"vite": "^7.2.4",
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
@@ -112,7 +111,7 @@
|
|||||||
"eas-cli": "^18.0.1",
|
"eas-cli": "^18.0.1",
|
||||||
"eslint": "^9.25.0",
|
"eslint": "^9.25.0",
|
||||||
"eslint-config-expo": "~10.0.0",
|
"eslint-config-expo": "~10.0.0",
|
||||||
"typescript": "^6",
|
"typescript": "~5.9.2",
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
"apps/waitlist-website": {
|
"apps/waitlist-website": {
|
||||||
@@ -139,7 +138,7 @@
|
|||||||
"@types/react": "^19.2.7",
|
"@types/react": "^19.2.7",
|
||||||
"@types/react-dom": "^19.2.3",
|
"@types/react-dom": "^19.2.3",
|
||||||
"tailwindcss": "^4.1.13",
|
"tailwindcss": "^4.1.13",
|
||||||
"typescript": "^6",
|
"typescript": "^5.9.2",
|
||||||
"vite": "^7.1.7",
|
"vite": "^7.1.7",
|
||||||
"vite-tsconfig-paths": "^5.1.4",
|
"vite-tsconfig-paths": "^5.1.4",
|
||||||
},
|
},
|
||||||
@@ -1453,22 +1452,6 @@
|
|||||||
|
|
||||||
"@typescript-eslint/visitor-keys": ["@typescript-eslint/visitor-keys@8.57.0", "", { "dependencies": { "@typescript-eslint/types": "8.57.0", "eslint-visitor-keys": "^5.0.0" } }, "sha512-zm6xx8UT/Xy2oSr2ZXD0pZo7Jx2XsCoID2IUh9YSTFRu7z+WdwYTRk6LhUftm1crwqbuoF6I8zAFeCMw0YjwDg=="],
|
"@typescript-eslint/visitor-keys": ["@typescript-eslint/visitor-keys@8.57.0", "", { "dependencies": { "@typescript-eslint/types": "8.57.0", "eslint-visitor-keys": "^5.0.0" } }, "sha512-zm6xx8UT/Xy2oSr2ZXD0pZo7Jx2XsCoID2IUh9YSTFRu7z+WdwYTRk6LhUftm1crwqbuoF6I8zAFeCMw0YjwDg=="],
|
||||||
|
|
||||||
"@typescript/native-preview": ["@typescript/native-preview@7.0.0-dev.20260412.1", "", { "optionalDependencies": { "@typescript/native-preview-darwin-arm64": "7.0.0-dev.20260412.1", "@typescript/native-preview-darwin-x64": "7.0.0-dev.20260412.1", "@typescript/native-preview-linux-arm": "7.0.0-dev.20260412.1", "@typescript/native-preview-linux-arm64": "7.0.0-dev.20260412.1", "@typescript/native-preview-linux-x64": "7.0.0-dev.20260412.1", "@typescript/native-preview-win32-arm64": "7.0.0-dev.20260412.1", "@typescript/native-preview-win32-x64": "7.0.0-dev.20260412.1" }, "bin": { "tsgo": "bin/tsgo.js" } }, "sha512-tDw3XZt2BkjAlt/MJmnFGmbe9lgKmc5wezmrMoBIEvJcqz+/KVpVBVvjbkZoaiABnJmuG3G3b6IUFrEveTw6UQ=="],
|
|
||||||
|
|
||||||
"@typescript/native-preview-darwin-arm64": ["@typescript/native-preview-darwin-arm64@7.0.0-dev.20260412.1", "", { "os": "darwin", "cpu": "arm64" }, "sha512-sSkFG+hjtRWffg6FddF3dEkk7N3TRMEqfiUpixwcWhXgyocMdPw8wutTvQRBxQdgxeL9y01M2SO8A8YPPiEgVg=="],
|
|
||||||
|
|
||||||
"@typescript/native-preview-darwin-x64": ["@typescript/native-preview-darwin-x64@7.0.0-dev.20260412.1", "", { "os": "darwin", "cpu": "x64" }, "sha512-m2BTeaLkrHEEDg0D9snigddy01qTY+wgx+W+GpXAfx36PPvW4xWuGXNVWfSaB8bqAC9C8NeLnT/C9/G/rJ5v2w=="],
|
|
||||||
|
|
||||||
"@typescript/native-preview-linux-arm": ["@typescript/native-preview-linux-arm@7.0.0-dev.20260412.1", "", { "os": "linux", "cpu": "arm" }, "sha512-wDLekbfsfmKMWORg7CTnEnpKj8oXpU/6AEBrtVN9CEUCiQAe6yH878nZHhJNzWQXHtrtFf3lY49Yplqmdxja3w=="],
|
|
||||||
|
|
||||||
"@typescript/native-preview-linux-arm64": ["@typescript/native-preview-linux-arm64@7.0.0-dev.20260412.1", "", { "os": "linux", "cpu": "arm64" }, "sha512-JAdsG6MlVV1hoAUKPy8zxAL7xLeNxz8JgCbLCJVqW8EyH29R9FD4cFTqr7CSIRTNUEDzDTrgnXUyoRtDe1gr+w=="],
|
|
||||||
|
|
||||||
"@typescript/native-preview-linux-x64": ["@typescript/native-preview-linux-x64@7.0.0-dev.20260412.1", "", { "os": "linux", "cpu": "x64" }, "sha512-gYgppiQIqid3jZ7D8THh4k3Q+4bwidrQH6SL9Xgbk1qfP6/jwv8twuPqDOfZ+cK2OD55lQHp15fOh2lMNAC40Q=="],
|
|
||||||
|
|
||||||
"@typescript/native-preview-win32-arm64": ["@typescript/native-preview-win32-arm64@7.0.0-dev.20260412.1", "", { "os": "win32", "cpu": "arm64" }, "sha512-TOh7rH5H3jisHJqRXJSjmUGMzcbNBocS/hufhXPQIv+g3pdG5IKZoSnv3SV62I5d12FFDSS5KQon5MQPnOKAHg=="],
|
|
||||||
|
|
||||||
"@typescript/native-preview-win32-x64": ["@typescript/native-preview-win32-x64@7.0.0-dev.20260412.1", "", { "os": "win32", "cpu": "x64" }, "sha512-u+70wL89wspN1wKoX6FVNUATRGCG3BpleByP3H/UqOZvlwuMm8N7Gy8hEbM0U8bDyAuyP/daUfTBVkqXjjv9mA=="],
|
|
||||||
|
|
||||||
"@ungap/structured-clone": ["@ungap/structured-clone@1.3.0", "", {}, "sha512-WmoN8qaIAo7WTYWbAZuG8PYEhn5fkz7dZrqTBZ7dtt//lL2Gwms1IcnQ5yHqjDfX8Ft5j4YzDM23f87zBfDe9g=="],
|
"@ungap/structured-clone": ["@ungap/structured-clone@1.3.0", "", {}, "sha512-WmoN8qaIAo7WTYWbAZuG8PYEhn5fkz7dZrqTBZ7dtt//lL2Gwms1IcnQ5yHqjDfX8Ft5j4YzDM23f87zBfDe9g=="],
|
||||||
|
|
||||||
"@unrs/resolver-binding-android-arm-eabi": ["@unrs/resolver-binding-android-arm-eabi@1.11.1", "", { "os": "android", "cpu": "arm" }, "sha512-ppLRUgHVaGRWUx0R0Ut06Mjo9gBaBkg3v/8AxusGLhsIotbBLuRk51rAzqLC8gq6NyyAojEXglNjzf6R948DNw=="],
|
"@unrs/resolver-binding-android-arm-eabi": ["@unrs/resolver-binding-android-arm-eabi@1.11.1", "", { "os": "android", "cpu": "arm" }, "sha512-ppLRUgHVaGRWUx0R0Ut06Mjo9gBaBkg3v/8AxusGLhsIotbBLuRk51rAzqLC8gq6NyyAojEXglNjzf6R948DNw=="],
|
||||||
@@ -3445,7 +3428,7 @@
|
|||||||
|
|
||||||
"typed-array-length": ["typed-array-length@1.0.7", "", { "dependencies": { "call-bind": "^1.0.7", "for-each": "^0.3.3", "gopd": "^1.0.1", "is-typed-array": "^1.1.13", "possible-typed-array-names": "^1.0.0", "reflect.getprototypeof": "^1.0.6" } }, "sha512-3KS2b+kL7fsuk/eJZ7EQdnEmQoaho/r6KUef7hxvltNA5DR8NAUM+8wJMbJyZ4G9/7i3v5zPBIMN5aybAh2/Jg=="],
|
"typed-array-length": ["typed-array-length@1.0.7", "", { "dependencies": { "call-bind": "^1.0.7", "for-each": "^0.3.3", "gopd": "^1.0.1", "is-typed-array": "^1.1.13", "possible-typed-array-names": "^1.0.0", "reflect.getprototypeof": "^1.0.6" } }, "sha512-3KS2b+kL7fsuk/eJZ7EQdnEmQoaho/r6KUef7hxvltNA5DR8NAUM+8wJMbJyZ4G9/7i3v5zPBIMN5aybAh2/Jg=="],
|
||||||
|
|
||||||
"typescript": ["typescript@6.0.2", "", { "bin": { "tsc": "bin/tsc", "tsserver": "bin/tsserver" } }, "sha512-bGdAIrZ0wiGDo5l8c++HWtbaNCWTS4UTv7RaTH/ThVIgjkveJt83m74bBHMJkuCbslY8ixgLBVZJIOiQlQTjfQ=="],
|
"typescript": ["typescript@5.9.3", "", { "bin": { "tsc": "bin/tsc", "tsserver": "bin/tsserver" } }, "sha512-jl1vZzPDinLr9eUt3J/t7V6FgNEw9QjvBPdysz9KfQDD41fQrC2Y4vKQdiaUpFT4bXlb1RHhLpp8wtm6M5TgSw=="],
|
||||||
|
|
||||||
"ua-parser-js": ["ua-parser-js@1.0.41", "", { "bin": { "ua-parser-js": "script/cli.js" } }, "sha512-LbBDqdIC5s8iROCUjMbW1f5dJQTEFB1+KO9ogbvlb3nm9n4YHa5p4KTvFPWvh2Hs8gZMBuiB1/8+pdfe/tDPug=="],
|
"ua-parser-js": ["ua-parser-js@1.0.41", "", { "bin": { "ua-parser-js": "script/cli.js" } }, "sha512-LbBDqdIC5s8iROCUjMbW1f5dJQTEFB1+KO9ogbvlb3nm9n4YHa5p4KTvFPWvh2Hs8gZMBuiB1/8+pdfe/tDPug=="],
|
||||||
|
|
||||||
@@ -3921,6 +3904,8 @@
|
|||||||
|
|
||||||
"accepts/negotiator": ["negotiator@0.6.3", "", {}, "sha512-+EUsqGPLsM+j/zdChZjsnX51g4XrHFOIXwfnCVPGlQk/k5giakcKsuxCObBRu6DSm9opw/O6slWbJdghQM4bBg=="],
|
"accepts/negotiator": ["negotiator@0.6.3", "", {}, "sha512-+EUsqGPLsM+j/zdChZjsnX51g4XrHFOIXwfnCVPGlQk/k5giakcKsuxCObBRu6DSm9opw/O6slWbJdghQM4bBg=="],
|
||||||
|
|
||||||
|
"aelis-client/@tanstack/react-query": ["@tanstack/react-query@5.90.21", "", { "dependencies": { "@tanstack/query-core": "5.90.20" }, "peerDependencies": { "react": "^18 || ^19" } }, "sha512-0Lu6y5t+tvlTJMTO7oh5NSpJfpg/5D41LlThfepTixPYkJ0sE2Jj0m0f6yYqujBwIXlId87e234+MxG3D3g7kg=="],
|
||||||
|
|
||||||
"aelis-client/@types/react": ["@types/react@19.1.17", "", { "dependencies": { "csstype": "^3.0.2" } }, "sha512-Qec1E3mhALmaspIrhWt9jkQMNdw6bReVu64mjvhbhq2NFPftLPVr+l1SZgmw/66WwBNpDh7ao5AT6gF5v41PFA=="],
|
"aelis-client/@types/react": ["@types/react@19.1.17", "", { "dependencies": { "csstype": "^3.0.2" } }, "sha512-Qec1E3mhALmaspIrhWt9jkQMNdw6bReVu64mjvhbhq2NFPftLPVr+l1SZgmw/66WwBNpDh7ao5AT6gF5v41PFA=="],
|
||||||
|
|
||||||
"aelis-client/react": ["react@19.1.0", "", {}, "sha512-FS+XFBNvn3GTAWq26joslQgWNoFu08F4kl0J4CgdNKADkdSGXQyTCnKteIAJy96Br6YbpEU1LSzV5dYtjMkMDg=="],
|
"aelis-client/react": ["react@19.1.0", "", {}, "sha512-FS+XFBNvn3GTAWq26joslQgWNoFu08F4kl0J4CgdNKADkdSGXQyTCnKteIAJy96Br6YbpEU1LSzV5dYtjMkMDg=="],
|
||||||
@@ -4559,6 +4544,8 @@
|
|||||||
|
|
||||||
"@typescript-eslint/typescript-estree/minimatch/brace-expansion": ["brace-expansion@5.0.4", "", { "dependencies": { "balanced-match": "^4.0.2" } }, "sha512-h+DEnpVvxmfVefa4jFbCf5HdH5YMDXRsmKflpf1pILZWRFlTbJpxeU55nJl4Smt5HQaGzg1o6RHFPJaOqnmBDg=="],
|
"@typescript-eslint/typescript-estree/minimatch/brace-expansion": ["brace-expansion@5.0.4", "", { "dependencies": { "balanced-match": "^4.0.2" } }, "sha512-h+DEnpVvxmfVefa4jFbCf5HdH5YMDXRsmKflpf1pILZWRFlTbJpxeU55nJl4Smt5HQaGzg1o6RHFPJaOqnmBDg=="],
|
||||||
|
|
||||||
|
"aelis-client/@tanstack/react-query/@tanstack/query-core": ["@tanstack/query-core@5.90.20", "", {}, "sha512-OMD2HLpNouXEfZJWcKeVKUgQ5n+n3A2JFmBaScpNDUqSrQSjiveC7dKMe53uJUg1nDG16ttFPz2xfilz6i2uVg=="],
|
||||||
|
|
||||||
"aelis-client/react-dom/scheduler": ["scheduler@0.26.0", "", {}, "sha512-NlHwttCI/l5gCPR3D1nNXtWABUmBwvZpEQiD4IXSbIDq8BzLIK/7Ir5gTFSGZDUu37K5cMNp0hFtzO38sC7gWA=="],
|
"aelis-client/react-dom/scheduler": ["scheduler@0.26.0", "", {}, "sha512-NlHwttCI/l5gCPR3D1nNXtWABUmBwvZpEQiD4IXSbIDq8BzLIK/7Ir5gTFSGZDUu37K5cMNp0hFtzO38sC7gWA=="],
|
||||||
|
|
||||||
"better-opn/open/define-lazy-prop": ["define-lazy-prop@2.0.0", "", {}, "sha512-Ds09qNh8yw3khSjiJjiUInaGX9xlqZDY7JVryGxdxV7NPeuqQfplOpQ66yJFZut3jLa5zOwkXw1g9EI2uKh4Og=="],
|
"better-opn/open/define-lazy-prop": ["define-lazy-prop@2.0.0", "", {}, "sha512-Ds09qNh8yw3khSjiJjiUInaGX9xlqZDY7JVryGxdxV7NPeuqQfplOpQ66yJFZut3jLa5zOwkXw1g9EI2uKh4Og=="],
|
||||||
|
|||||||
@@ -17,11 +17,10 @@
|
|||||||
"@json-render/core": "^0.12.1",
|
"@json-render/core": "^0.12.1",
|
||||||
"@nym.sh/jrx": "^0.2.0",
|
"@nym.sh/jrx": "^0.2.0",
|
||||||
"@types/bun": "latest",
|
"@types/bun": "latest",
|
||||||
"@typescript/native-preview": "^7.0.0-dev.20260412.1",
|
|
||||||
"oxfmt": "^0.24.0",
|
"oxfmt": "^0.24.0",
|
||||||
"oxlint": "^1.39.0"
|
"oxlint": "^1.39.0"
|
||||||
},
|
},
|
||||||
"peerDependencies": {
|
"peerDependencies": {
|
||||||
"typescript": "^6"
|
"typescript": "^5"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,5 +1,6 @@
|
|||||||
{
|
{
|
||||||
"compilerOptions": {
|
"compilerOptions": {
|
||||||
|
// Environment setup & latest features
|
||||||
"lib": ["ESNext"],
|
"lib": ["ESNext"],
|
||||||
"target": "ESNext",
|
"target": "ESNext",
|
||||||
"module": "Preserve",
|
"module": "Preserve",
|
||||||
@@ -7,19 +8,20 @@
|
|||||||
"jsx": "react-jsx",
|
"jsx": "react-jsx",
|
||||||
"allowJs": true,
|
"allowJs": true,
|
||||||
|
|
||||||
|
// Bundler mode
|
||||||
"moduleResolution": "bundler",
|
"moduleResolution": "bundler",
|
||||||
"allowImportingTsExtensions": true,
|
"allowImportingTsExtensions": true,
|
||||||
"verbatimModuleSyntax": true,
|
"verbatimModuleSyntax": true,
|
||||||
"noEmit": true,
|
"noEmit": true,
|
||||||
|
|
||||||
"types": ["bun"],
|
// Best practices
|
||||||
|
|
||||||
"strict": true,
|
"strict": true,
|
||||||
"skipLibCheck": true,
|
"skipLibCheck": true,
|
||||||
"noFallthroughCasesInSwitch": true,
|
"noFallthroughCasesInSwitch": true,
|
||||||
"noUncheckedIndexedAccess": true,
|
"noUncheckedIndexedAccess": true,
|
||||||
"noImplicitOverride": true,
|
"noImplicitOverride": true,
|
||||||
|
|
||||||
|
// Some stricter flags (disabled by default)
|
||||||
"noUnusedLocals": false,
|
"noUnusedLocals": false,
|
||||||
"noUnusedParameters": false,
|
"noUnusedParameters": false,
|
||||||
"noPropertyAccessFromIndexSignature": false
|
"noPropertyAccessFromIndexSignature": false
|
||||||
|
|||||||
Reference in New Issue
Block a user