AnnotatedSharedVaultFilesController.ts 7.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224
  1. import { BaseHttpController, controller, httpDelete, httpGet, httpPost, results } from 'inversify-express-utils'
  2. import { Request, Response } from 'express'
  3. import { inject } from 'inversify'
  4. import { Writable } from 'stream'
  5. import { SharedVaultValetTokenData, ValetTokenOperation } from '@standardnotes/security'
  6. import { Logger } from 'winston'
  7. import TYPES from '../../Bootstrap/Types'
  8. import { CreateUploadSession } from '../../Domain/UseCase/CreateUploadSession/CreateUploadSession'
  9. import { FinishUploadSession } from '../../Domain/UseCase/FinishUploadSession/FinishUploadSession'
  10. import { GetFileMetadata } from '../../Domain/UseCase/GetFileMetadata/GetFileMetadata'
  11. import { MoveFile } from '../../Domain/UseCase/MoveFile/MoveFile'
  12. import { RemoveFile } from '../../Domain/UseCase/RemoveFile/RemoveFile'
  13. import { StreamDownloadFile } from '../../Domain/UseCase/StreamDownloadFile/StreamDownloadFile'
  14. import { UploadFileChunk } from '../../Domain/UseCase/UploadFileChunk/UploadFileChunk'
  15. @controller('/v1/shared-vault/files', TYPES.Files_SharedVaultValetTokenAuthMiddleware)
  16. export class AnnotatedSharedVaultFilesController extends BaseHttpController {
  17. constructor(
  18. @inject(TYPES.Files_UploadFileChunk) private uploadFileChunk: UploadFileChunk,
  19. @inject(TYPES.Files_CreateUploadSession) private createUploadSession: CreateUploadSession,
  20. @inject(TYPES.Files_FinishUploadSession) private finishUploadSession: FinishUploadSession,
  21. @inject(TYPES.Files_StreamDownloadFile) private streamDownloadFile: StreamDownloadFile,
  22. @inject(TYPES.Files_GetFileMetadata) private getFileMetadata: GetFileMetadata,
  23. @inject(TYPES.Files_RemoveFile) private removeFile: RemoveFile,
  24. @inject(TYPES.Files_MoveFile) private moveFile: MoveFile,
  25. @inject(TYPES.Files_MAX_CHUNK_BYTES) private maxChunkBytes: number,
  26. @inject(TYPES.Files_Logger) private logger: Logger,
  27. ) {
  28. super()
  29. }
  30. @httpPost('/move')
  31. async moveFileRequest(
  32. _request: Request,
  33. response: Response,
  34. ): Promise<results.BadRequestErrorMessageResult | results.JsonResult> {
  35. const locals = response.locals as SharedVaultValetTokenData
  36. if (locals.permittedOperation !== ValetTokenOperation.Move) {
  37. return this.badRequest('Not permitted for this operation')
  38. }
  39. const moveOperation = locals.moveOperation
  40. if (!moveOperation) {
  41. return this.badRequest('Missing move operation data')
  42. }
  43. const result = await this.moveFile.execute({
  44. moveType: moveOperation.type,
  45. fromUuid: moveOperation.fromUuid,
  46. toUuid: moveOperation.toUuid,
  47. resourceRemoteIdentifier: locals.remoteIdentifier,
  48. })
  49. if (result.isFailed()) {
  50. return this.badRequest(result.getError())
  51. }
  52. return this.json({ success: true })
  53. }
  54. @httpPost('/upload/create-session')
  55. async startUpload(
  56. _request: Request,
  57. response: Response,
  58. ): Promise<results.BadRequestErrorMessageResult | results.JsonResult> {
  59. const locals = response.locals as SharedVaultValetTokenData
  60. if (locals.permittedOperation !== ValetTokenOperation.Write) {
  61. return this.badRequest('Not permitted for this operation')
  62. }
  63. const result = await this.createUploadSession.execute({
  64. ownerUuid: locals.sharedVaultUuid,
  65. resourceRemoteIdentifier: locals.remoteIdentifier,
  66. })
  67. if (!result.success) {
  68. return this.badRequest(result.message)
  69. }
  70. return this.json({ success: true, uploadId: result.uploadId })
  71. }
  72. @httpPost('/upload/chunk')
  73. async uploadChunk(
  74. request: Request,
  75. response: Response,
  76. ): Promise<results.BadRequestErrorMessageResult | results.JsonResult> {
  77. const locals = response.locals as SharedVaultValetTokenData
  78. if (locals.permittedOperation !== ValetTokenOperation.Write) {
  79. return this.badRequest('Not permitted for this operation')
  80. }
  81. const chunkId = +(request.headers['x-chunk-id'] as string)
  82. if (!chunkId) {
  83. return this.badRequest('Missing x-chunk-id header in request.')
  84. }
  85. const result = await this.uploadFileChunk.execute({
  86. ownerUuid: locals.sharedVaultUuid,
  87. resourceRemoteIdentifier: locals.remoteIdentifier,
  88. resourceUnencryptedFileSize: locals.unencryptedFileSize as number,
  89. chunkId,
  90. data: request.body,
  91. })
  92. if (!result.success) {
  93. return this.badRequest(result.message)
  94. }
  95. return this.json({ success: true, message: 'Chunk uploaded successfully' })
  96. }
  97. @httpPost('/upload/close-session')
  98. public async finishUpload(
  99. _request: Request,
  100. response: Response,
  101. ): Promise<results.BadRequestErrorMessageResult | results.JsonResult> {
  102. const locals = response.locals as SharedVaultValetTokenData
  103. if (locals.permittedOperation !== ValetTokenOperation.Write) {
  104. return this.badRequest('Not permitted for this operation')
  105. }
  106. if (locals.uploadBytesLimit === undefined) {
  107. return this.badRequest('Missing upload bytes limit')
  108. }
  109. const result = await this.finishUploadSession.execute({
  110. userUuid: locals.vaultOwnerUuid,
  111. sharedVaultUuid: locals.sharedVaultUuid,
  112. resourceRemoteIdentifier: locals.remoteIdentifier,
  113. uploadBytesLimit: locals.uploadBytesLimit,
  114. uploadBytesUsed: locals.uploadBytesUsed,
  115. })
  116. if (result.isFailed()) {
  117. this.logger.error(result.getError())
  118. return this.badRequest(result.getError())
  119. }
  120. return this.json({ success: true, message: 'File uploaded successfully' })
  121. }
  122. @httpDelete('/')
  123. async remove(
  124. _request: Request,
  125. response: Response,
  126. ): Promise<results.BadRequestErrorMessageResult | results.JsonResult> {
  127. const locals = response.locals as SharedVaultValetTokenData
  128. if (locals.permittedOperation !== ValetTokenOperation.Delete) {
  129. return this.badRequest('Not permitted for this operation')
  130. }
  131. const result = await this.removeFile.execute({
  132. vaultInput: {
  133. sharedVaultUuid: locals.sharedVaultUuid,
  134. vaultOwnerUuid: locals.vaultOwnerUuid,
  135. resourceRemoteIdentifier: locals.remoteIdentifier,
  136. },
  137. })
  138. if (result.isFailed()) {
  139. return this.badRequest(result.getError())
  140. }
  141. return this.json({ success: true, message: 'File removed successfully' })
  142. }
  143. @httpGet('/')
  144. async download(
  145. request: Request,
  146. response: Response,
  147. ): Promise<results.BadRequestErrorMessageResult | (() => Writable)> {
  148. const locals = response.locals as SharedVaultValetTokenData
  149. if (locals.permittedOperation !== ValetTokenOperation.Read) {
  150. return this.badRequest('Not permitted for this operation')
  151. }
  152. const range = request.headers['range']
  153. if (!range) {
  154. return this.badRequest('File download requires range header to be set.')
  155. }
  156. let chunkSize = +(request.headers['x-chunk-size'] as string)
  157. if (!chunkSize || chunkSize > this.maxChunkBytes) {
  158. chunkSize = this.maxChunkBytes
  159. }
  160. const fileMetadata = await this.getFileMetadata.execute({
  161. ownerUuid: locals.sharedVaultUuid,
  162. resourceRemoteIdentifier: locals.remoteIdentifier,
  163. })
  164. if (!fileMetadata.success) {
  165. return this.badRequest(fileMetadata.message)
  166. }
  167. const startRange = Number(range.replace(/\D/g, ''))
  168. const endRange = Math.min(startRange + chunkSize - 1, fileMetadata.size - 1)
  169. const headers = {
  170. 'Content-Range': `bytes ${startRange}-${endRange}/${fileMetadata.size}`,
  171. 'Accept-Ranges': 'bytes',
  172. 'Content-Length': endRange - startRange + 1,
  173. 'Content-Type': 'application/octet-stream',
  174. }
  175. response.writeHead(206, headers)
  176. const result = await this.streamDownloadFile.execute({
  177. ownerUuid: locals.sharedVaultUuid,
  178. resourceRemoteIdentifier: locals.remoteIdentifier,
  179. startRange,
  180. endRange,
  181. })
  182. if (!result.success) {
  183. return this.badRequest(result.message)
  184. }
  185. return () => result.readStream.pipe(response)
  186. }
  187. }