ots/src/components/create.vue
Knut Ahlers 98268f1457
[#160] Add auto-resizing textareas
in order to prevent users from having to scroll in secrets

Signed-off-by: Knut Ahlers <knut@ahlers.me>
2023-12-15 17:13:58 +01:00

346 lines
9.6 KiB
Vue

<!-- eslint-disable vue/no-v-html -->
<template>
<!-- Creation disabled -->
<div
v-if="!canWrite"
class="card border-info-subtle mb-3"
>
<div
class="card-header bg-info-subtle"
v-html="$t('title-secret-create-disabled')"
/>
<div
class="card-body"
v-html="$t('text-secret-create-disabled')"
/>
</div>
<!-- Creation possible -->
<div
v-else
class="card border-primary-subtle mb-3"
>
<div
class="card-header bg-primary-subtle"
v-html="$t('title-new-secret')"
/>
<div class="card-body">
<form
class="row"
@submit.prevent="createSecret"
>
<div class="col-12 mb-3">
<label for="createSecretData">{{ $t('label-secret-data') }}</label>
<grow-area
id="createSecretData"
v-model="secret"
class="form-control"
:rows="2"
/>
</div>
<div
v-if="!$root.customize.disableFileAttachment"
class="col-12 mb-3"
>
<label for="createSecretFiles">{{ $t('label-secret-files') }}</label>
<input
id="createSecretFiles"
ref="createSecretFiles"
class="form-control"
type="file"
multiple
:accept="$root.customize.acceptedFileTypes"
@change="updateFileMeta"
>
<div class="form-text">
{{ $t('text-max-filesize', { maxSize: bytesToHuman(maxFileSize) }) }}
</div>
<div
v-if="invalidFilesSelected"
class="alert alert-danger"
>
{{ $t('text-invalid-files-selected') }}
</div>
<div
v-else-if="maxFileSizeExceeded"
class="alert alert-danger"
>
{{ $t('text-max-filesize-exceeded', { curSize: bytesToHuman(fileSize), maxSize: bytesToHuman(maxFileSize) }) }}
</div>
</div>
<div class="col-md-6 col-12 order-2 order-md-1">
<button
type="submit"
class="btn btn-success"
:disabled="!canCreate"
>
<template v-if="!createRunning">
{{ $t('btn-create-secret') }}
</template>
<template v-else>
<i class="fa-solid fa-spinner fa-spin-pulse" />
{{ $t('btn-create-secret-processing') }}
</template>
</button>
</div>
<div
v-if="!$root.customize.disableExpiryOverride"
class="col-md-6 col-12 order-1 order-md-2"
>
<div class="row mb-3 justify-content-end">
<label
class="col-md-6 col-form-label text-md-end"
for="createSecretExpiry"
>{{ $t('label-expiry') }}</label>
<div class="col-md-6">
<select
v-model="selectedExpiry"
class="form-select"
>
<option
v-for="opt in expiryChoices"
:key="opt.value"
:value="opt.value"
>
{{ opt.text }}
</option>
</select>
</div>
</div>
</div>
</form>
</div>
</div>
</template>
<script>
/* global maxSecretExpire */
import appCrypto from '../crypto.js'
import { bytesToHuman } from '../helpers'
import GrowArea from './growarea.vue'
import OTSMeta from '../ots-meta'
const defaultExpiryChoices = [
90 * 86400, // 90 days
30 * 86400, // 30 days
7 * 86400, // 7 days
3 * 86400, // 3 days
24 * 3600, // 1 day
12 * 3600, // 12 hours
4 * 3600, // 4 hours
60 * 60, // 1 hour
30 * 60, // 30 minutes
5 * 60, // 5 minutes
]
/*
* We define an internal max file-size which cannot get exceeded even
* though the server might accept more: at around 70 MiB the base64
* encoding broke and nothing works anymore. This might be fixed by
* changing how the base64 implementation works (maybe use a WASM
* object?) or switching to a browser-native implementation in case
* that will appear somewhen in the future but for now we just "fix"
* the issue by disallowing bigger files.
*/
const internalMaxFileSize = 64 * 1024 * 1024 // 64 MiB
const passwordCharset = '0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ'
const passwordLength = 20
export default {
components: { GrowArea },
computed: {
canCreate() {
return (this.secret.trim().length > 0 || this.selectedFileMeta.length > 0) && !this.maxFileSizeExceeded && !this.invalidFilesSelected
},
expiryChoices() {
const choices = [{ text: this.$t('expire-default'), value: null }]
for (const choice of this.$root.customize.expiryChoices || defaultExpiryChoices) {
if (maxSecretExpire > 0 && choice > maxSecretExpire) {
continue
}
const option = { value: choice }
if (choice >= 86400) {
option.text = this.$tc('expire-n-days', Math.round(choice / 86400))
} else if (choice >= 3600) {
option.text = this.$tc('expire-n-hours', Math.round(choice / 3600))
} else if (choice >= 60) {
option.text = this.$tc('expire-n-minutes', Math.round(choice / 60))
} else {
option.text = this.$tc('expire-n-seconds', choice)
}
choices.push(option)
}
return choices
},
invalidFilesSelected() {
if (this.$root.customize.acceptedFileTypes === '') {
// No limitation configured, no need to check
return false
}
const accepted = this.$root.customize.acceptedFileTypes.split(',')
for (const fm of this.selectedFileMeta) {
let isAccepted = false
for (const a of accepted) {
isAccepted ||= this.isAcceptedBy(fm, a)
}
if (!isAccepted) {
// Well we only needed one rejected
return true
}
}
// We found no reason to reject: This is fine!
return false
},
maxFileSize() {
return this.$root.customize.maxAttachmentSizeTotal === 0 ? internalMaxFileSize : Math.min(internalMaxFileSize, this.$root.customize.maxAttachmentSizeTotal)
},
maxFileSizeExceeded() {
return this.fileSize > this.maxFileSize
},
},
created() {
this.checkWriteAccess()
},
data() {
return {
canWrite: null,
createRunning: false,
fileSize: 0,
secret: '',
securePassword: null,
selectedExpiry: null,
selectedFileMeta: [],
}
},
methods: {
bytesToHuman,
checkWriteAccess() {
fetch('api/isWritable', {
credentials: 'same-origin',
method: 'GET',
redirect: 'error',
})
.then(resp => {
if (resp.status !== 204) {
throw new Error(`unexpected status: ${resp.status}`)
}
this.canWrite = true
})
.catch(() => {
this.canWrite = false
})
},
// createSecret executes the secret creation after encrypting the secret
createSecret() {
if (!this.canCreate) {
return false
}
// Encoding large files takes a while, prevent duplicate click on "create"
this.createRunning = true
this.securePassword = [...window.crypto.getRandomValues(new Uint8Array(passwordLength))]
.map(n => passwordCharset[n % passwordCharset.length])
.join('')
const meta = new OTSMeta()
meta.secret = this.secret
if (this.$refs.createSecretFiles) {
for (const f of [...this.$refs.createSecretFiles.files]) {
meta.files.push(f)
}
}
meta.serialize()
.then(secret => appCrypto.enc(secret, this.securePassword))
.then(secret => {
let reqURL = 'api/create'
if (this.selectedExpiry !== null) {
reqURL = `api/create?expire=${this.selectedExpiry}`
}
return fetch(reqURL, {
body: JSON.stringify({ secret }),
headers: {
'content-type': 'application/json',
},
method: 'POST',
})
.then(resp => {
if (resp.status !== 201) {
// Server says "no"
this.$emit('error', this.$t('alert-something-went-wrong'))
return
}
resp.json()
.then(data => {
this.$root.navigate({
path: '/display-secret-url',
query: {
expiresAt: data.expires_at,
secretId: data.secret_id,
securePassword: this.securePassword,
},
})
})
})
.catch(() => {
// Network error
this.$emit('error', this.$t('alert-something-went-wrong'))
})
})
return false
},
isAcceptedBy(fileMeta, accept) {
if (/^(?:[a-z]+|\*)\/(?:[a-zA-Z0-9.+_-]+|\*)$/.test(accept)) {
// That's likely supposed to be a mime-type
return RegExp(`^${accept.replaceAll('*', '.*')}$`).test(fileMeta.type)
} else if (/^\.[a-z.]+$/.test(accept)) {
// That should be a file extension
return fileMeta.name.endsWith(accept)
}
// What exactly is it then? At least it can't accept anything.
return false
},
updateFileMeta() {
let cumSize = 0
for (const f of [...this.$refs.createSecretFiles.files]) {
cumSize += f.size
}
this.fileSize = cumSize
this.selectedFileMeta = [...this.$refs.createSecretFiles.files].map(file => ({
name: file.name,
type: file.type,
}))
},
},
name: 'AppCreate',
}
</script>