style: undefined -> null return types & log source prefix

This commit is contained in:
ae 2025-04-21 13:53:15 +03:00
parent 8e8f5b8faf
commit 337157327c
Signed by: ae
GPG Key ID: 995EFD5C1B532B3E
2 changed files with 57 additions and 68 deletions

View File

@ -107,7 +107,7 @@ export const cError: Writable<string | null> = writable(null)
class ApiClient { class ApiClient {
private viewCookieName: string private viewCookieName: string
private baseUrl: string private baseUrl: string
private lastAtUpdate = new Date(0) private lastAtUpdate = new Date(0) // Refreshing the page wipes access and CSRF tokens from memory -> Rotation needed
private lastCsrfUpdate = new Date(0) private lastCsrfUpdate = new Date(0)
private refreshInProgress = false private refreshInProgress = false
private activeVersion = -1 private activeVersion = -1
@ -123,7 +123,7 @@ class ApiClient {
private async handleRequest<T>( private async handleRequest<T>(
fn: () => Promise<T>, fn: () => Promise<T>,
options: { useBearerAuth: boolean } options: { useBearerAuth: boolean }
): Promise<T | undefined> { ): Promise<T | null> {
isPending.set(true) isPending.set(true)
cError.set(null) cError.set(null)
@ -137,18 +137,21 @@ class ApiClient {
try { try {
await this.checkAndRefreshAccessToken() await this.checkAndRefreshAccessToken()
} catch (err) { } catch (err) {
console.log("refresh attempt not successful") console.log("[REQ] Refresh attempt not successful")
await this.handleLocalLogout() await this.handleLocalLogout()
throw new Error("Session expired, please authenticate again.") throw new Error("Session expired, please authenticate again.")
} }
} }
return await fn() return await fn()
} catch (err) { } catch (err) {
cError.set(err instanceof Error ? err.message : "Unknown error") cError.set(err instanceof Error ? err.message : "Unknown error")
console.log(`error: ${get(cError)}`) console.log(`[ERR] ${get(cError)}`)
} finally { } finally {
isPending.set(false) isPending.set(false)
} }
return null
} }
// Should be attached to routes that handle authentication with the bearer token (access token) // Should be attached to routes that handle authentication with the bearer token (access token)
@ -161,12 +164,13 @@ class ApiClient {
// This should never happen due to the token expiration checks we make client-side, // This should never happen due to the token expiration checks we make client-side,
// but it's still good to have as a fallback // but it's still good to have as a fallback
try { try {
console.log("unexpected 401 caught, attempting refresh") console.log("[RES] Unexpected 401 caught, attempting to refresh...")
await this.checkAndRefreshAccessToken() await this.checkAndRefreshAccessToken()
} catch (err) { } catch (err) {
console.log("refresh attempt not successful") const errMsg = err instanceof Error ? err.message : "Unknown error"
console.log(`[ERR] ${errMsg}`)
await this.handleLocalLogout() await this.handleLocalLogout()
throw new Error("Session expired, please authenticate again.") throw new Error(errMsg)
} }
} }
@ -192,20 +196,16 @@ class ApiClient {
const timeSinceUpdate = Date.now() - this.lastAtUpdate.getTime() const timeSinceUpdate = Date.now() - this.lastAtUpdate.getTime()
const needsRefresh = timeSinceUpdate > AT_EXP_MS - REFRESH_BUF const needsRefresh = timeSinceUpdate > AT_EXP_MS - REFRESH_BUF
console.log(`timeSinceUpdate: ${timeSinceUpdate}`)
if (needsRefresh) { if (needsRefresh) {
console.log("running token refresh attempt") console.log(`[AUTH] Running token refresh attempt (timeSinceUpdate=${timeSinceUpdate})`)
this.refreshInProgress = true this.refreshInProgress = true
await this.refreshAccessToken() await this.refreshAccessToken()
this.refreshInProgress = false this.refreshInProgress = false
} else {
console.log("no need to rotate tokens")
} }
} }
private async refreshAccessToken(): Promise<void> { private async refreshAccessToken(): Promise<void | null> {
return this.handleRequest( return this.handleRequest(
async () => { async () => {
const response = await fetch(`${this.baseUrl}/auth/cookie/refresh`, { const response = await fetch(`${this.baseUrl}/auth/cookie/refresh`, {
@ -235,7 +235,7 @@ class ApiClient {
const needsRefresh = timeSinceUpdate > CSRF_EXP_MS - REFRESH_BUF const needsRefresh = timeSinceUpdate > CSRF_EXP_MS - REFRESH_BUF
if (!token || needsRefresh) { if (!token || needsRefresh) {
console.log("refreshing csrf token") console.log("[AUTH] Refreshing CSRF token")
await this.refreshCsrfToken() await this.refreshCsrfToken()
token = get(csrfToken) token = get(csrfToken)
} }
@ -243,7 +243,7 @@ class ApiClient {
return { "X-Csrf-Token": token || "" } return { "X-Csrf-Token": token || "" }
} }
private async refreshCsrfToken(): Promise<void> { private async refreshCsrfToken(): Promise<void | null> {
return this.handleRequest( return this.handleRequest(
async () => { async () => {
const response = await fetch(`${this.baseUrl}/auth/cookie/csrf`, { const response = await fetch(`${this.baseUrl}/auth/cookie/csrf`, {
@ -263,7 +263,7 @@ class ApiClient {
) )
} }
private async handleLocalLogout(): Promise<void> { private async handleLocalLogout(): Promise<void | null> {
this.lastAtUpdate = new Date(0) this.lastAtUpdate = new Date(0)
this.lastCsrfUpdate = new Date(0) this.lastCsrfUpdate = new Date(0)
@ -286,7 +286,7 @@ class ApiClient {
const viewCookie = this.getCookieValue(this.viewCookieName) const viewCookie = this.getCookieValue(this.viewCookieName)
if (!viewCookie) { if (!viewCookie) {
console.log("view cookie not found") console.log("[AUTH] View cookie not found")
return false return false
} }
@ -294,14 +294,11 @@ class ApiClient {
const expirationTimestamp = parseInt(value, 10) const expirationTimestamp = parseInt(value, 10)
if (isNaN(expirationTimestamp)) { if (isNaN(expirationTimestamp)) {
console.log(`invalid expiration timestamp: ${value}`) console.log(`[ERR] Invalid view cookie expiration timestamp: ${value}`)
return false return false
} }
const expirationDate = new Date(expirationTimestamp * 1000) return now < new Date(expirationTimestamp * 1000)
console.log(`auth cookie expiration: ${expirationDate}`)
return now < expirationDate
} }
private deleteViewCookie() { private deleteViewCookie() {
@ -378,12 +375,12 @@ class ApiClient {
private joinDeserializedVersion( private joinDeserializedVersion(
noteID: string, noteID: string,
apiResponse: ApiFullVersionResponse apiResponse: ApiFullVersionResponse
): FullNote | undefined { ): FullNote | null {
// Cache lookups are safe here due to this always being called *after* fetching the actual `FullNote` // Cache lookups are safe here due to this always being called *after* fetching the actual `FullNote`
const cachedNote = this.loadedNotesCache.get(noteID) const cachedNote = this.loadedNotesCache.get(noteID)
if (!cachedNote) { if (!cachedNote) {
return return null
} }
return { return {
@ -399,7 +396,7 @@ class ApiClient {
} }
} }
public async register(username: string, password: string): Promise<void> { public async register(username: string, password: string): Promise<void | null> {
return this.handleRequest( return this.handleRequest(
async () => { async () => {
const response = await fetch(`${this.baseUrl}/auth/signup`, { const response = await fetch(`${this.baseUrl}/auth/signup`, {
@ -408,20 +405,21 @@ class ApiClient {
body: JSON.stringify({ username, password }) body: JSON.stringify({ username, password })
}) })
// Can't overwrite `username` parameter // Can't overwrite the function parameter
const data = await this.handleResponse<{ const data = await this.handleResponse<{
id: string id: string
username: string username: string
}>(response, { useBearerAuth: false }) }>(response, { useBearerAuth: false })
console.log(`${data.username} -> ${data.id}`) console.log(`[USER] Registration of user '${data.username}' successful`)
await goto("/login") await goto("/login")
}, },
{ useBearerAuth: false } { useBearerAuth: false }
) )
} }
public async login(username: string, password: string): Promise<void> { public async login(username: string, password: string): Promise<void | null> {
return this.handleRequest( return this.handleRequest(
async () => { async () => {
const response = await fetch(`${this.baseUrl}/auth/login`, { const response = await fetch(`${this.baseUrl}/auth/login`, {
@ -444,7 +442,7 @@ class ApiClient {
) )
} }
public async logout(): Promise<void> { public async logout(): Promise<void | null> {
return this.handleRequest( return this.handleRequest(
async () => { async () => {
const response = await fetch(`${this.baseUrl}/auth/logout`, { const response = await fetch(`${this.baseUrl}/auth/logout`, {
@ -456,7 +454,7 @@ class ApiClient {
}) })
if (response.status === 204) { if (response.status === 204) {
console.log("logout successful") console.log("[USER] Logout successful")
await this.handleLocalLogout() await this.handleLocalLogout()
return return
} }
@ -468,7 +466,7 @@ class ApiClient {
) )
} }
public async getCurrentUser(): Promise<void> { public async getCurrentUser(): Promise<void | null> {
return this.handleRequest( return this.handleRequest(
async () => { async () => {
const response = await fetch(`${this.baseUrl}/auth/me`, { const response = await fetch(`${this.baseUrl}/auth/me`, {
@ -479,15 +477,16 @@ class ApiClient {
const data = await this.handleResponse<ApiUserResponse>(response, { useBearerAuth: false }) const data = await this.handleResponse<ApiUserResponse>(response, { useBearerAuth: false })
const user = this.deserializeUser(data) const user = this.deserializeUser(data)
console.log(user)
currentUser.set(user) currentUser.set(user)
}, },
{ useBearerAuth: true } { useBearerAuth: true }
) )
} }
public async updateCurrentUserPassword(oldPassword: string, newPassword: string): Promise<void> { public async updateCurrentUserPassword(
oldPassword: string,
newPassword: string
): Promise<void | null> {
return this.handleRequest( return this.handleRequest(
async () => { async () => {
const data = { const data = {
@ -502,21 +501,21 @@ class ApiClient {
}, },
body: JSON.stringify(data) body: JSON.stringify(data)
}) })
const { accessToken: token, user } = await this.handleResponse<{ const { accessToken: token, user } = await this.handleResponse<{
accessToken: string accessToken: string
user: User user: User
}>(response, { useBearerAuth: false }) }>(response, { useBearerAuth: false })
accessToken.set(token) accessToken.set(token)
currentUser.set(user || null) currentUser.set(user || null)
this.lastAtUpdate = new Date() this.lastAtUpdate = new Date()
console.log(user)
}, },
{ useBearerAuth: true } { useBearerAuth: true }
) )
} }
public async deleteCurrentUser(password: string): Promise<void> { public async deleteCurrentUser(password: string): Promise<void | null> {
return this.handleRequest( return this.handleRequest(
async () => { async () => {
const response = await fetch(`${this.baseUrl}/auth/owner`, { const response = await fetch(`${this.baseUrl}/auth/owner`, {
@ -529,7 +528,7 @@ class ApiClient {
}) })
if (response.status === 204) { if (response.status === 204) {
console.log("deletion successful") console.log("[USER] Deletion successful")
await this.handleLocalLogout() await this.handleLocalLogout()
return return
} }
@ -541,7 +540,7 @@ class ApiClient {
) )
} }
public async adminListAll(): Promise<User[] | undefined> { public async adminListAll(): Promise<User[] | null> {
const user = get(currentUser) const user = get(currentUser)
if (!user || !user.isAdmin) { if (!user || !user.isAdmin) {
throw new Error("Admin privileges required.") throw new Error("Admin privileges required.")
@ -559,7 +558,7 @@ class ApiClient {
}) })
const users = await this.handleResponse<User[]>(response, { useBearerAuth: false }) const users = await this.handleResponse<User[]>(response, { useBearerAuth: false })
console.log(`admin: got ${users.length} user results`) console.log(`[ADMIN] Got ${users.length} user results`)
return users return users
}, },
@ -567,7 +566,7 @@ class ApiClient {
) )
} }
public async adminDeleteUser(userID: string): Promise<void> { public async adminDeleteUser(userID: string): Promise<void | null> {
const user = get(currentUser) const user = get(currentUser)
if (!user || !user.isAdmin) { if (!user || !user.isAdmin) {
throw new Error("Admin privileges required.") throw new Error("Admin privileges required.")
@ -587,7 +586,7 @@ class ApiClient {
}) })
if (response.status === 204) { if (response.status === 204) {
console.log("admin: deletion successful") console.log(`[ADMIN] Deletion of user '${userID}' successful`)
return return
} }
@ -597,7 +596,7 @@ class ApiClient {
) )
} }
public async listNotes(): Promise<NoteMetadata[] | undefined> { public async listNotes(): Promise<NoteMetadata[] | null> {
return this.handleRequest( return this.handleRequest(
async () => { async () => {
const params = new URLSearchParams() const params = new URLSearchParams()
@ -618,7 +617,7 @@ class ApiClient {
notes = this.deserializeNoteMetadatas(data) notes = this.deserializeNoteMetadatas(data)
} }
console.log(`got ${notes.length} note metadata results`) console.log(`[NOTE] Got ${notes.length} note metadata results`)
return notes return notes
}, },
@ -626,7 +625,7 @@ class ApiClient {
) )
} }
public async createNote(): Promise<NewNoteResponse | undefined> { public async createNote(): Promise<NewNoteResponse | null> {
// NOTE: The initial note version doesn't allow any user input, the first user-made modification // NOTE: The initial note version doesn't allow any user input, the first user-made modification
// is applied through the version creation endpoint // is applied through the version creation endpoint
@ -644,10 +643,7 @@ class ApiClient {
) )
} }
public async getActiveFullNote( public async getActiveFullNote(noteID: string, fetchRemote: boolean): Promise<FullNote | null> {
noteID: string,
fetchRemote: boolean
): Promise<FullNote | undefined> {
if (!UUID_REGEX.test(noteID)) { if (!UUID_REGEX.test(noteID)) {
throw new Error("Invalid note ID format.") throw new Error("Invalid note ID format.")
} }
@ -656,7 +652,6 @@ class ApiClient {
if (!fetchRemote) { if (!fetchRemote) {
const cachedNote = this.loadedNotesCache.get(noteID) const cachedNote = this.loadedNotesCache.get(noteID)
if (cachedNote != null) { if (cachedNote != null) {
// console.log(`full note cache hit ${noteID}`)
this.activeVersion = cachedNote.versionNumber this.activeVersion = cachedNote.versionNumber
return cachedNote return cachedNote
} }
@ -675,7 +670,7 @@ class ApiClient {
}) })
const note = this.deserializeFullNote(data) const note = this.deserializeFullNote(data)
console.log(`caching ${noteID}`) console.log(`[CACHE] Storing ${noteID}`)
this.loadedNotesCache.set(noteID, note) this.loadedNotesCache.set(noteID, note)
this.activeVersion = note.versionNumber this.activeVersion = note.versionNumber
@ -685,7 +680,7 @@ class ApiClient {
) )
} }
public async deleteNote(noteID: string): Promise<void> { public async deleteNote(noteID: string): Promise<void | null> {
if (!UUID_REGEX.test(noteID)) { if (!UUID_REGEX.test(noteID)) {
throw new Error("Invalid note ID format.") throw new Error("Invalid note ID format.")
} }
@ -700,7 +695,7 @@ class ApiClient {
}) })
if (response.status === 204) { if (response.status === 204) {
console.log("deletion successful") console.log("[NOTE] Deletion successful")
return return
} }
@ -713,7 +708,7 @@ class ApiClient {
public async getNoteHistory( public async getNoteHistory(
noteID: string, noteID: string,
fetchRemote: boolean fetchRemote: boolean
): Promise<VersionMetadata[] | undefined> { ): Promise<VersionMetadata[] | null> {
if (!UUID_REGEX.test(noteID)) { if (!UUID_REGEX.test(noteID)) {
throw new Error("Invalid note ID format.") throw new Error("Invalid note ID format.")
} }
@ -721,7 +716,6 @@ class ApiClient {
if (!fetchRemote) { if (!fetchRemote) {
const cachedVersions = this.loadedHistoryCache.get(noteID) const cachedVersions = this.loadedHistoryCache.get(noteID)
if (cachedVersions != null) { if (cachedVersions != null) {
// console.log(`full version cache hit ${noteID}`)
return cachedVersions return cachedVersions
} }
} }
@ -739,8 +733,8 @@ class ApiClient {
}) })
const versions = this.deserializeVersionMetadatas(data) const versions = this.deserializeVersionMetadatas(data)
console.log(`got ${versions.length} version metadata results, caching ${noteID}`)
this.loadedHistoryCache.set(noteID, versions) this.loadedHistoryCache.set(noteID, versions)
console.log(`[VER] Got and cached ${versions.length} version metadata results`)
return versions return versions
}, },
@ -748,7 +742,7 @@ class ApiClient {
) )
} }
public async createVersion(noteID: string, title: string, content: string): Promise<void> { public async createVersion(noteID: string, title: string, content: string): Promise<void | null> {
if (!UUID_REGEX.test(noteID)) { if (!UUID_REGEX.test(noteID)) {
throw new Error("Invalid note ID format.") throw new Error("Invalid note ID format.")
} }
@ -767,7 +761,7 @@ class ApiClient {
}) })
if (response.status === 204) { if (response.status === 204) {
console.log("creation successful") console.log("[VER] Creation successful")
return return
} }
@ -777,7 +771,7 @@ class ApiClient {
) )
} }
public async getFullVersion(noteID: string, versionID: string): Promise<FullNote | undefined> { public async getFullVersion(noteID: string, versionID: string): Promise<FullNote | null> {
if (!UUID_REGEX.test(noteID)) { if (!UUID_REGEX.test(noteID)) {
throw new Error("Invalid note ID format.") throw new Error("Invalid note ID format.")
} }
@ -786,18 +780,13 @@ class ApiClient {
throw new Error("Invalid version ID format.") throw new Error("Invalid version ID format.")
} }
// NOTE: Versions aren't editable so we don't need to prevent the system from attempting // NOTE: No need to explicitly prevent attempting a cache hit as versions aren't editable
// to locate each request's contents first from the cache
const cachedVersion = this.loadedVersionsCache.get(noteID + versionID) const cachedVersion = this.loadedVersionsCache.get(noteID + versionID)
if (cachedVersion != null) { if (cachedVersion != null) {
// console.log(`full version cache hit [${noteID}, ${versionID}]`)
return cachedVersion return cachedVersion
} }
// TODO: check if the requested version is the current version -> use `loadedNotesCache`
// (we probably have to modify the caching mechanism so we can look the regular note items up using versionID)
return this.handleRequest( return this.handleRequest(
async () => { async () => {
const response = await fetch(`${this.baseUrl}/notes/${noteID}/${versionID}`, { const response = await fetch(`${this.baseUrl}/notes/${noteID}/${versionID}`, {
@ -812,10 +801,10 @@ class ApiClient {
const version = this.joinDeserializedVersion(noteID, data) const version = this.joinDeserializedVersion(noteID, data)
if (!version) { if (!version) {
return return null
} }
console.log(`caching [${noteID}, ${versionID}]`) console.log(`[CACHE] Storing [${noteID}, ${versionID}]`)
this.loadedVersionsCache.set(noteID + versionID, version) this.loadedVersionsCache.set(noteID + versionID, version)
return version return version

View File

@ -2,7 +2,7 @@
// will automatically be proxied to the correct destination // will automatically be proxied to the correct destination
export const API_BASE_ADDR = import.meta.env.PROD ? "/api" : "http://localhost:8080/api" export const API_BASE_ADDR = import.meta.env.PROD ? "/api" : "http://localhost:8080/api"
// Lifetimes of *in-memory* authentication tokens // Lifetimes of *in-memory* authentication tokens in milliseconds
export const AT_EXP_MS = 15 * 60 * 1000 // 15 min. export const AT_EXP_MS = 15 * 60 * 1000 // 15 min.
export const CSRF_EXP_MS = 12 * 60 * 60 * 1000 // 12 h. export const CSRF_EXP_MS = 12 * 60 * 60 * 1000 // 12 h.
export const REFRESH_BUF = 30 * 1000 // 30 s. export const REFRESH_BUF = 30 * 1000 // 30 s.