feat: openapi support plus more api validation

This commit is contained in:
Huskydog9988
2025-05-10 15:16:26 -04:00
parent a0bc4bbc4c
commit 3df6818ffe
9 changed files with 100 additions and 39 deletions

View File

@@ -1,5 +1,7 @@
import tailwindcss from "@tailwindcss/vite"; import tailwindcss from "@tailwindcss/vite";
const dropVersion = "0.3";
// https://nuxt.com/docs/api/configuration/nuxt-config // https://nuxt.com/docs/api/configuration/nuxt-config
export default defineNuxtConfig({ export default defineNuxtConfig({
// Nuxt-only config // Nuxt-only config
@@ -31,24 +33,38 @@ export default defineNuxtConfig({
}, },
}, },
appConfig: {
dropVersion: dropVersion,
},
routeRules: { routeRules: {
"/api/**": { cors: true }, "/api/**": { cors: true },
}, },
nitro: { nitro: {
minify: true, minify: true,
compressPublicAssets: true,
experimental: { experimental: {
websocket: true, websocket: true,
tasks: true, tasks: true,
openAPI: true,
},
openAPI: {
// tracking for dynamic openapi schema https://github.com/nitrojs/nitro/issues/2974
meta: {
title: "Drop",
description:
"Drop is an open-source, self-hosted game distribution platform, creating a Steam-like experience for DRM-free games.",
version: dropVersion,
},
}, },
scheduledTasks: { scheduledTasks: {
"0 * * * *": ["cleanup:invitations", "cleanup:sessions"], "0 * * * *": ["cleanup:invitations", "cleanup:sessions"],
}, },
compressPublicAssets: true,
storage: { storage: {
appCache: { appCache: {
driver: "lru-cache", driver: "lru-cache",

View File

@@ -1,20 +1,30 @@
import { type } from "arktype";
import aclManager from "~/server/internal/acls"; import aclManager from "~/server/internal/acls";
import prisma from "~/server/internal/db/database"; import prisma from "~/server/internal/db/database";
export default defineEventHandler(async (h3) => { const DeleteInvite = type({
id: "string",
});
export default defineEventHandler<{
body: typeof DeleteInvite.infer;
}>(async (h3) => {
const allowed = await aclManager.allowSystemACL(h3, [ const allowed = await aclManager.allowSystemACL(h3, [
"auth:simple:invitation:delete", "auth:simple:invitation:delete",
]); ]);
if (!allowed) throw createError({ statusCode: 403 }); if (!allowed) throw createError({ statusCode: 403 });
const body = await readBody(h3); const body = DeleteInvite(await readBody(h3));
const id = body.id; if (body instanceof type.errors) {
if (!id) // hover out.summary to see validation errors
console.error(body.summary);
throw createError({ throw createError({
statusCode: 400, statusCode: 400,
statusMessage: "id required for deletion", statusMessage: body.summary,
}); });
}
await prisma.invitation.delete({ where: { id: id } }); await prisma.invitation.delete({ where: { id: body.id } });
return {}; return {};
}); });

View File

@@ -1,40 +1,35 @@
import { type } from "arktype";
import aclManager from "~/server/internal/acls"; import aclManager from "~/server/internal/acls";
import prisma from "~/server/internal/db/database"; import prisma from "~/server/internal/db/database";
export default defineEventHandler(async (h3) => { const CreateInvite = type({
isAdmin: "boolean",
username: "string",
email: "string.email",
expires: "string.date.iso.parse",
});
export default defineEventHandler<{
body: typeof CreateInvite.infer;
}>(async (h3) => {
const allowed = await aclManager.allowSystemACL(h3, [ const allowed = await aclManager.allowSystemACL(h3, [
"auth:simple:invitation:new", "auth:simple:invitation:new",
]); ]);
if (!allowed) throw createError({ statusCode: 403 }); if (!allowed) throw createError({ statusCode: 403 });
const body = await readBody(h3); const body = CreateInvite(await readBody(h3));
const isAdmin = body.isAdmin; if (body instanceof type.errors) {
const username = body.username; // hover out.summary to see validation errors
const email = body.email; console.error(body.summary);
const expires = body.expires;
if (!expires)
throw createError({ statusCode: 400, statusMessage: "No expires field." });
if (isAdmin !== undefined && typeof isAdmin !== "boolean")
throw createError({ throw createError({
statusCode: 400, statusCode: 400,
statusMessage: "isAdmin must be a boolean", statusMessage: body.summary,
});
const expiresDate = new Date(expires);
if (!(expiresDate instanceof Date && !isNaN(expiresDate.getTime())))
throw createError({
statusCode: 400,
statusMessage: "Invalid expires date",
}); });
}
const invitation = await prisma.invitation.create({ const invitation = await prisma.invitation.create({
data: { data: body,
isAdmin: isAdmin,
username: username,
email: email,
expires: expiresDate,
},
}); });
return invitation; return invitation;

View File

@@ -1,20 +1,31 @@
import aclManager from "~/server/internal/acls"; import aclManager from "~/server/internal/acls";
import prisma from "~/server/internal/db/database"; import prisma from "~/server/internal/db/database";
import objectHandler from "~/server/internal/objects"; import objectHandler from "~/server/internal/objects";
import { type } from "arktype";
export default defineEventHandler(async (h3) => { const ModifyGameImage = type({
gameId: "string",
imageId: "string",
});
export default defineEventHandler<{
body: typeof ModifyGameImage.infer;
}>(async (h3) => {
const allowed = await aclManager.allowSystemACL(h3, ["game:image:delete"]); const allowed = await aclManager.allowSystemACL(h3, ["game:image:delete"]);
if (!allowed) throw createError({ statusCode: 403 }); if (!allowed) throw createError({ statusCode: 403 });
const body = await readBody(h3); const body = ModifyGameImage(await readBody(h3));
const gameId = body.gameId; if (body instanceof type.errors) {
const imageId = body.imageId; // hover out.summary to see validation errors
console.error(body.summary);
if (!gameId || !imageId)
throw createError({ throw createError({
statusCode: 400, statusCode: 400,
statusMessage: "Missing gameId or imageId in body", statusMessage: body.summary,
}); });
}
const gameId = body.gameId;
const imageId = body.imageId;
const game = await prisma.game.findUnique({ const game = await prisma.game.findUnique({
where: { where: {

View File

@@ -15,7 +15,9 @@ const signinValidator = type({
"rememberMe?": "boolean | undefined", "rememberMe?": "boolean | undefined",
}); });
export default defineEventHandler(async (h3) => { export default defineEventHandler<{
body: typeof signinValidator.infer;
}>(async (h3) => {
if (!enabledAuthManagers.Simple) if (!enabledAuthManagers.Simple)
throw createError({ throw createError({
statusCode: 403, statusCode: 403,

View File

@@ -7,13 +7,16 @@ import { type } from "arktype";
import { randomUUID } from "node:crypto"; import { randomUUID } from "node:crypto";
const userValidator = type({ const userValidator = type({
invitation: "string",
username: "string >= 5", username: "string >= 5",
email: "string.email", email: "string.email",
password: "string >= 14", password: "string >= 14",
"displayName?": "string | undefined", "displayName?": "string | undefined",
}); });
export default defineEventHandler(async (h3) => { export default defineEventHandler<{
body: typeof userValidator.infer;
}>(async (h3) => {
const body = await readBody(h3); const body = await readBody(h3);
const invitationId = body.invitation; const invitationId = body.invitation;

View File

@@ -1,6 +1,14 @@
import sessionHandler from "~/server/internal/session"; import sessionHandler from "~/server/internal/session";
import { enabledAuthManagers } from "~/server/plugins/04.auth-init"; import { enabledAuthManagers } from "~/server/plugins/04.auth-init";
defineRouteMeta({
openAPI: {
tags: ["Auth"],
description: "OIDC Signin callback",
parameters: [],
},
});
export default defineEventHandler(async (h3) => { export default defineEventHandler(async (h3) => {
if (!enabledAuthManagers.OpenID) return sendRedirect(h3, "/auth/signin"); if (!enabledAuthManagers.OpenID) return sendRedirect(h3, "/auth/signin");

View File

@@ -1,5 +1,13 @@
import { enabledAuthManagers } from "~/server/plugins/04.auth-init"; import { enabledAuthManagers } from "~/server/plugins/04.auth-init";
defineRouteMeta({
openAPI: {
tags: ["Auth"],
description: "OIDC Signin redirect",
parameters: [],
},
});
export default defineEventHandler((h3) => { export default defineEventHandler((h3) => {
if (!enabledAuthManagers.OpenID) return sendRedirect(h3, "/auth/signin"); if (!enabledAuthManagers.OpenID) return sendRedirect(h3, "/auth/signin");

View File

@@ -1,5 +1,13 @@
import sessionHandler from "../../internal/session"; import sessionHandler from "../../internal/session";
defineRouteMeta({
openAPI: {
tags: ["Auth"],
description: "Tells server to deauthorize this session",
parameters: [],
},
});
export default defineEventHandler(async (h3) => { export default defineEventHandler(async (h3) => {
await sessionHandler.signout(h3); await sessionHandler.signout(h3);