feat: rebrand Hemmelig to paste.es for cloudhost.es
- Set Spanish as default language with ephemeral/encrypted privacy focus - Translate all user-facing strings and legal pages to Spanish - Replace Norwegian flag with Spanish flag in footer - Remove Hemmelig/terces.cloud links, add cloudhost.es sponsorship - Rewrite PrivacyPage: zero data collection, ephemeral design emphasis - Rewrite TermsPage: Spanish law, RGPD, paste.es/CloudHost.es references - Update PWA manifest, HTML meta tags, package.json branding - Rename webhook headers to X-Paste-Event / X-Paste-Signature - Update API docs title and contact to paste.es / cloudhost.es Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
This commit is contained in:
122
api/validations/secret-requests.ts
Normal file
122
api/validations/secret-requests.ts
Normal file
@@ -0,0 +1,122 @@
|
||||
import isCidr from 'is-cidr';
|
||||
import { isIP } from 'is-ip';
|
||||
import { z } from 'zod';
|
||||
import { EXPIRATION_TIMES_SECONDS } from '../lib/constants';
|
||||
|
||||
// Valid durations for request validity (how long the creator link is active)
|
||||
export const REQUEST_VALIDITY_SECONDS = [
|
||||
2592000, // 30 days
|
||||
1209600, // 14 days
|
||||
604800, // 7 days
|
||||
259200, // 3 days
|
||||
86400, // 1 day
|
||||
43200, // 12 hours
|
||||
3600, // 1 hour
|
||||
] as const;
|
||||
|
||||
export const createSecretRequestSchema = z.object({
|
||||
title: z.string().min(1).max(200),
|
||||
description: z.string().max(1000).optional(),
|
||||
maxViews: z.number().int().min(1).max(9999).default(1),
|
||||
expiresIn: z
|
||||
.number()
|
||||
.refine(
|
||||
(val) =>
|
||||
EXPIRATION_TIMES_SECONDS.includes(val as (typeof EXPIRATION_TIMES_SECONDS)[number]),
|
||||
{
|
||||
message: 'Invalid expiration time for secret',
|
||||
}
|
||||
),
|
||||
validFor: z
|
||||
.number()
|
||||
.refine(
|
||||
(val) =>
|
||||
REQUEST_VALIDITY_SECONDS.includes(val as (typeof REQUEST_VALIDITY_SECONDS)[number]),
|
||||
{
|
||||
message: 'Invalid validity period for request',
|
||||
}
|
||||
),
|
||||
|
||||
allowedIp: z
|
||||
.string()
|
||||
.refine((val) => isCidr(val) || isIP(val), {
|
||||
message: 'Must be a valid IPv4, IPv6, or CIDR',
|
||||
})
|
||||
.nullable()
|
||||
.optional(),
|
||||
preventBurn: z.boolean().default(false),
|
||||
webhookUrl: z.string().url().optional(),
|
||||
});
|
||||
|
||||
export const secretRequestIdParamSchema = z.object({
|
||||
id: z.string().uuid(),
|
||||
});
|
||||
|
||||
export const secretRequestTokenQuerySchema = z.object({
|
||||
token: z.string().length(64),
|
||||
});
|
||||
|
||||
// Max encrypted secret size: 1MB (1,048,576 bytes)
|
||||
const MAX_SECRET_SIZE = 1024 * 1024;
|
||||
// Min encrypted secret size: 28 bytes (12 IV + 16 minimum ciphertext with auth tag)
|
||||
const MIN_SECRET_SIZE = 28;
|
||||
// Max encrypted title size: 1KB (1,024 bytes)
|
||||
const MAX_TITLE_SIZE = 1024;
|
||||
|
||||
export const submitSecretRequestSchema = z.object({
|
||||
secret: z
|
||||
.preprocess((arg) => {
|
||||
if (arg && typeof arg === 'object' && !Array.isArray(arg)) {
|
||||
const values = Object.values(arg);
|
||||
return new Uint8Array(values as number[]);
|
||||
}
|
||||
return arg;
|
||||
}, z.instanceof(Uint8Array))
|
||||
.refine((arr) => arr.length >= MIN_SECRET_SIZE, {
|
||||
message: 'Secret data is too small to be valid encrypted content',
|
||||
})
|
||||
.refine((arr) => arr.length <= MAX_SECRET_SIZE, {
|
||||
message: `Secret exceeds maximum size of ${MAX_SECRET_SIZE} bytes`,
|
||||
}),
|
||||
title: z
|
||||
.preprocess((arg) => {
|
||||
if (arg && typeof arg === 'object' && !Array.isArray(arg)) {
|
||||
const values = Object.values(arg);
|
||||
return new Uint8Array(values as number[]);
|
||||
}
|
||||
return arg;
|
||||
}, z.instanceof(Uint8Array))
|
||||
.refine((arr) => arr.length <= MAX_TITLE_SIZE, {
|
||||
message: `Title exceeds maximum size of ${MAX_TITLE_SIZE} bytes`,
|
||||
})
|
||||
.optional()
|
||||
.nullable(),
|
||||
salt: z.string().min(16).max(64),
|
||||
});
|
||||
|
||||
export const secretRequestsQuerySchema = z.object({
|
||||
page: z
|
||||
.string()
|
||||
.optional()
|
||||
.refine((val) => val === undefined || /^\d+$/.test(val), {
|
||||
message: 'Page must be a positive integer string',
|
||||
}),
|
||||
limit: z
|
||||
.string()
|
||||
.optional()
|
||||
.refine((val) => val === undefined || /^\d+$/.test(val), {
|
||||
message: 'Limit must be a positive integer string',
|
||||
}),
|
||||
status: z.enum(['all', 'pending', 'fulfilled', 'expired', 'cancelled']).optional(),
|
||||
});
|
||||
|
||||
export const processSecretRequestsQueryParams = (
|
||||
query: z.infer<typeof secretRequestsQuerySchema>
|
||||
) => {
|
||||
const page = query.page ? parseInt(query.page, 10) : undefined;
|
||||
const limit = query.limit ? parseInt(query.limit, 10) : undefined;
|
||||
const take = limit && limit > 0 && limit <= 100 ? limit : 10;
|
||||
const skip = page && page > 0 ? (page - 1) * take : 0;
|
||||
|
||||
return { skip, take, status: query.status };
|
||||
};
|
||||
Reference in New Issue
Block a user