Security with cryptography (#32)

* Add some experiment code for crypto crate

* feat: add crypto crate with ssl, rsa, ed25519 for https, encryption, signing

* Implement aes encryption helper in crypto crate

* ci: add dep for CI rust test (protobuf)

* fix: try to fix window CI with next

* fix: CI

* ci: add dep for ubuntu

* ci: fix

* fix: openssl lib path in CI

* fix: CI

* update applications-rs, disable some tests

* fix: CI

* feat: add file transfer grpc proto and server setup

* CI: try to fix CI

* fix: missing proto in build.rs

* ci: add cargo build before cargo test

* fix: grpc file descriptor

* ci: fix CI by removing a redundant main.rs

* fix: disable local windows test in applications-rs which fails CI

* ci: run CI rust test only on ubuntu, windows is failing. will be handled in another PR

* fix: vue template

* fix: allow unused variable

* fix: remove node:buffer type from api shell.ts to avoid frontend build error

* try to fix test in create-kunkun

* upgrade api to 0.0.44, remove node:buffer

* upgrade next template to 15

* feat: turn the default server into a https server

* feat: make SSL certificate loadable from env

* feat: add conditional SSL cert

in debug mode, use local default cert, in production generate new self-signed cert every time app starts

* chore: add vscode debug config

* feat: add server public key

* feat: setup sqlite db encryption

* fix: settings hotkey

* chore: add .gitkeep

* ci: add node-fetch to dep for api package
This commit is contained in:
Huakun Shen 2024-11-24 00:45:36 -05:00 committed by GitHub
parent 84b82f47a4
commit da8e37c4a1
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
69 changed files with 2870 additions and 771 deletions

View File

@ -29,12 +29,39 @@ jobs:
- uses: denoland/setup-deno@v2 - uses: denoland/setup-deno@v2
with: with:
deno-version: v2.x deno-version: v2.x
- name: Install Rust stable
uses: dtolnay/rust-toolchain@stable
- name: Install Dependencies - name: Install Dependencies
run: pnpm install run: pnpm install
- name: Setup - name: Setup
run: pnpm prepare run: pnpm prepare
- name: Build - name: Build
run: pnpm build run: pnpm build
- name: Test - name: JS Test
if: matrix.os == 'ubuntu-24.04' if: matrix.os == 'ubuntu-24.04'
run: pnpm test run: pnpm test
- name: Install protobuf (Mac)
if: matrix.os == 'macos-14'
run: |
brew install protobuf
- name: Install Protobuf (Ubuntu)
if: matrix.os == 'ubuntu-24.04'
run: |
sudo apt-get update
sudo apt-get install -y protobuf-compiler libwebkit2gtk-4.1-dev libappindicator3-dev librsvg2-dev patchelf
- name: Install protoc and openssl for windows
if: matrix.os == 'windows-latest'
run: |
choco install protoc
echo "VCPKG_ROOT=$env:VCPKG_INSTALLATION_ROOT" | Out-File -FilePath $env:GITHUB_ENV -Append
vcpkg install openssl:x64-windows-static-md
# choco install openssl -y
# echo OPENSSL_DIR='"C:\\Program Files\\OpenSSL-Win64"' >> $env:GITHUB_ENV
# echo OPENSSL_INCLUDE_DIR='"C:\\Program Files\\OpenSSL-Win64\\include"' >> $env:GITHUB_ENV
# echo OPENSSL_LIB_DIR='"C:\\Program Files\\OpenSSL-Win64\\lib"' >> $env:GITHUB_ENV
# openssl version
- name: Cargo Build and Test
if: matrix.os == 'ubuntu-24.04'
run: |
cargo build
cargo test

View File

@ -52,7 +52,7 @@ jobs:
choco install openssl choco install openssl
echo OPENSSL_DIR='"C:\\Program Files\\OpenSSL-Win64"' >> $env:GITHUB_ENV echo OPENSSL_DIR='"C:\\Program Files\\OpenSSL-Win64"' >> $env:GITHUB_ENV
echo OPENSSL_INCLUDE_DIR='"C:\\Program Files\\OpenSSL-Win64\\include"' >> $env:GITHUB_ENV echo OPENSSL_INCLUDE_DIR='"C:\\Program Files\\OpenSSL-Win64\\include"' >> $env:GITHUB_ENV
echo OPENSSL_LIB_DIR='"C:\\Program Files\\OpenSSL-Win64\\lib"' >> $env:GITHUB_ENV echo OPENSSL_LIB_DIR='"C:\\Program Files\\OpenSSL-Win64\\lib\\VC\\x64\\MDd"' >> $env:GITHUB_ENV
- uses: pnpm/action-setup@v4 - uses: pnpm/action-setup@v4
- name: setup node - name: setup node
uses: actions/setup-node@v4 uses: actions/setup-node@v4

1
.gitignore vendored
View File

@ -38,3 +38,4 @@ yarn-error.log*
*.pem *.pem
stats.html stats.html
target/ target/
.idea/

32
.vscode/launch.json vendored Normal file
View File

@ -0,0 +1,32 @@
{
// Use IntelliSense to learn about possible attributes.
// Hover to view descriptions of existing attributes.
// For more information, visit: https://go.microsoft.com/fwlink/?linkid=830387
"version": "0.2.0",
"configurations": [
{
"type": "lldb",
"request": "launch",
"name": "Tauri Development Debug",
"cargo": {
"args": [
"build",
"--manifest-path=./apps/desktop/src-tauri/Cargo.toml",
"--no-default-features"
]
},
// task for the `beforeDevCommand` if used, must be configured in `.vscode/tasks.json`
"preLaunchTask": "ui:dev"
},
{
"type": "lldb",
"request": "launch",
"name": "Tauri Production Debug",
"cargo": {
"args": ["build", "--release", "--manifest-path=./apps/desktop/src-tauri/Cargo.toml"]
},
// task for the `beforeBuildCommand` if used, must be configured in `.vscode/tasks.json`
"preLaunchTask": "ui:build"
}
]
}

18
.vscode/tasks.json vendored Normal file
View File

@ -0,0 +1,18 @@
{
"version": "2.0.0",
"tasks": [
{
"label": "ui:dev",
"type": "shell",
"isBackground": true,
"command": "pnpm",
"args": ["-F", "desktop", "dev"]
},
{
"label": "ui:build",
"type": "shell",
"command": "pnpm",
"args": ["-F", "desktop", "build"]
}
]
}

320
Cargo.lock generated
View File

@ -468,6 +468,33 @@ dependencies = [
"arrayvec", "arrayvec",
] ]
[[package]]
name = "aws-lc-rs"
version = "1.11.0"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "fe7c2840b66236045acd2607d5866e274380afd87ef99d6226e961e2cb47df45"
dependencies = [
"aws-lc-sys",
"mirai-annotations",
"paste",
"zeroize",
]
[[package]]
name = "aws-lc-sys"
version = "0.23.0"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "ad3a619a9de81e1d7de1f1186dcba4506ed661a0e483d84410fdef0ee87b2f96"
dependencies = [
"bindgen",
"cc",
"cmake",
"dunce",
"fs_extra",
"libc",
"paste",
]
[[package]] [[package]]
name = "axum" name = "axum"
version = "0.6.20" version = "0.6.20"
@ -585,6 +612,35 @@ version = "0.22.1"
source = "registry+https://github.com/rust-lang/crates.io-index" source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "72b3254f16251a8381aa12e40e3c4d2f0199f8c6508fbecb9d91f575e0fbb8c6" checksum = "72b3254f16251a8381aa12e40e3c4d2f0199f8c6508fbecb9d91f575e0fbb8c6"
[[package]]
name = "base64ct"
version = "1.6.0"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "8c3c1a368f70d6cf7302d78f8f7093da241fb8e8807c05cc9e51a125895a6d5b"
[[package]]
name = "bindgen"
version = "0.69.5"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "271383c67ccabffb7381723dea0672a673f292304fcb45c01cc648c7a8d58088"
dependencies = [
"bitflags 2.6.0",
"cexpr",
"clang-sys",
"itertools",
"lazy_static",
"lazycell",
"log",
"prettyplease",
"proc-macro2",
"quote",
"regex",
"rustc-hash 1.1.0",
"shlex",
"syn 2.0.87",
"which",
]
[[package]] [[package]]
name = "bit_field" name = "bit_field"
version = "0.10.2" version = "0.10.2"
@ -639,6 +695,15 @@ dependencies = [
"generic-array", "generic-array",
] ]
[[package]]
name = "block-padding"
version = "0.3.3"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "a8894febbff9f758034a5b8e12d87918f56dfc64a8e1fe757d65e29041538d93"
dependencies = [
"generic-array",
]
[[package]] [[package]]
name = "block2" name = "block2"
version = "0.5.1" version = "0.5.1"
@ -876,6 +941,15 @@ dependencies = [
"toml 0.8.2", "toml 0.8.2",
] ]
[[package]]
name = "cbc"
version = "0.1.2"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "26b52a9543ae338f279b96b0b9fed9c8093744685043739079ce85cd58f289a6"
dependencies = [
"cipher",
]
[[package]] [[package]]
name = "cc" name = "cc"
version = "1.1.33" version = "1.1.33"
@ -893,6 +967,15 @@ version = "1.1.0"
source = "registry+https://github.com/rust-lang/crates.io-index" source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "6d43a04d8753f35258c91f8ec639f792891f748a1edbd759cf1dcea3382ad83c" checksum = "6d43a04d8753f35258c91f8ec639f792891f748a1edbd759cf1dcea3382ad83c"
[[package]]
name = "cexpr"
version = "0.6.0"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "6fac387a98bb7c37292057cffc56d62ecb629900026402633ae9160df93a8766"
dependencies = [
"nom",
]
[[package]] [[package]]
name = "cfb" name = "cfb"
version = "0.7.3" version = "0.7.3"
@ -957,6 +1040,17 @@ dependencies = [
"inout", "inout",
] ]
[[package]]
name = "clang-sys"
version = "1.8.1"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "0b023947811758c97c59bf9d1c188fd619ad4718dcaa767947df1cadb14f39f4"
dependencies = [
"glob",
"libc",
"libloading 0.8.5",
]
[[package]] [[package]]
name = "clap" name = "clap"
version = "4.5.20" version = "4.5.20"
@ -1141,6 +1235,12 @@ version = "1.0.0"
source = "registry+https://github.com/rust-lang/crates.io-index" source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "fe1d7dcda7d1da79e444bdfba1465f2f849a58b07774e1df473ee77030cb47a7" checksum = "fe1d7dcda7d1da79e444bdfba1465f2f849a58b07774e1df473ee77030cb47a7"
[[package]]
name = "const-oid"
version = "0.9.6"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "c2459377285ad874054d797f3ccebf984978aa39129f6eafde5cdc8315b612f8"
[[package]] [[package]]
name = "const-random" name = "const-random"
version = "0.1.18" version = "0.1.18"
@ -1361,6 +1461,27 @@ version = "0.2.2"
source = "registry+https://github.com/rust-lang/crates.io-index" source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "7a81dae078cea95a014a339291cec439d2f232ebe854a9d672b796c6afafa9b7" checksum = "7a81dae078cea95a014a339291cec439d2f232ebe854a9d672b796c6afafa9b7"
[[package]]
name = "crypto"
version = "0.1.0"
dependencies = [
"aes",
"anyhow",
"axum",
"axum-server",
"block-padding",
"cbc",
"hex",
"openssl",
"rand 0.8.5",
"reqwest 0.12.9",
"ring",
"rsa",
"rustls 0.23.16",
"sha2",
"tokio",
]
[[package]] [[package]]
name = "crypto-common" name = "crypto-common"
version = "0.1.6" version = "0.1.6"
@ -1468,6 +1589,17 @@ version = "0.1.9"
source = "registry+https://github.com/rust-lang/crates.io-index" source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "da692b8d1080ea3045efaab14434d40468c3d8657e42abddfffca87b428f4c1b" checksum = "da692b8d1080ea3045efaab14434d40468c3d8657e42abddfffca87b428f4c1b"
[[package]]
name = "der"
version = "0.7.9"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "f55bf8e7b65898637379c1b74eb1551107c8294ed26d855ceb9fd1a09cfc9bc0"
dependencies = [
"const-oid",
"pem-rfc7468",
"zeroize",
]
[[package]] [[package]]
name = "deranged" name = "deranged"
version = "0.3.11" version = "0.3.11"
@ -1520,6 +1652,7 @@ source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "9ed9a281f7bc9b7576e61468ba615a66a5c8cfdff42420a70aa82701a3b1e292" checksum = "9ed9a281f7bc9b7576e61468ba615a66a5c8cfdff42420a70aa82701a3b1e292"
dependencies = [ dependencies = [
"block-buffer", "block-buffer",
"const-oid",
"crypto-common", "crypto-common",
"subtle", "subtle",
] ]
@ -1970,6 +2103,12 @@ dependencies = [
"percent-encoding", "percent-encoding",
] ]
[[package]]
name = "fs_extra"
version = "1.3.0"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "42703706b716c37f96a77aea830392ad231f44c9e9a67872fa5548707e11b11c"
[[package]] [[package]]
name = "funty" name = "funty"
version = "2.0.0" version = "2.0.0"
@ -2562,6 +2701,15 @@ dependencies = [
"digest", "digest",
] ]
[[package]]
name = "home"
version = "0.5.9"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "e3d1354bf6b7235cb4a0576c2619fd4ed18183f689b12b006a0ee7329eeff9a5"
dependencies = [
"windows-sys 0.52.0",
]
[[package]] [[package]]
name = "html5ever" name = "html5ever"
version = "0.26.0" version = "0.26.0"
@ -2737,6 +2885,22 @@ dependencies = [
"tokio-native-tls", "tokio-native-tls",
] ]
[[package]]
name = "hyper-tls"
version = "0.6.0"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "70206fc6890eaca9fde8a0bf71caa2ddfc9fe045ac9e5c70df101a7dbde866e0"
dependencies = [
"bytes",
"http-body-util",
"hyper 1.5.0",
"hyper-util",
"native-tls",
"tokio",
"tokio-native-tls",
"tower-service",
]
[[package]] [[package]]
name = "hyper-util" name = "hyper-util"
version = "0.1.10" version = "0.1.10"
@ -2936,6 +3100,7 @@ version = "0.1.3"
source = "registry+https://github.com/rust-lang/crates.io-index" source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "a0c10553d664a4d0bcff9f4215d0aac67a639cc68ef660840afe309b807bc9f5" checksum = "a0c10553d664a4d0bcff9f4215d0aac67a639cc68ef660840afe309b807bc9f5"
dependencies = [ dependencies = [
"block-padding",
"generic-array", "generic-array",
] ]
@ -3156,6 +3321,7 @@ dependencies = [
"log", "log",
"mac-security-rs", "mac-security-rs",
"mdns-sd", "mdns-sd",
"obfstr",
"objc", "objc",
"serde", "serde",
"serde_json", "serde_json",
@ -3192,6 +3358,9 @@ name = "lazy_static"
version = "1.5.0" version = "1.5.0"
source = "registry+https://github.com/rust-lang/crates.io-index" source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "bbd2bcb4c963f2ddae06a2efc7e9f3591312473c50c6685e1f298068316e66fe" checksum = "bbd2bcb4c963f2ddae06a2efc7e9f3591312473c50c6685e1f298068316e66fe"
dependencies = [
"spin",
]
[[package]] [[package]]
name = "lazycell" name = "lazycell"
@ -3266,6 +3435,12 @@ dependencies = [
"windows-targets 0.52.6", "windows-targets 0.52.6",
] ]
[[package]]
name = "libm"
version = "0.2.11"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "8355be11b20d696c8f18f6cc018c4e372165b1fa8126cef092399c9951984ffa"
[[package]] [[package]]
name = "libredox" name = "libredox"
version = "0.1.3" version = "0.1.3"
@ -3531,6 +3706,12 @@ dependencies = [
"windows-sys 0.52.0", "windows-sys 0.52.0",
] ]
[[package]]
name = "mirai-annotations"
version = "1.12.0"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "c9be0862c1b3f26a88803c4a49de6889c10e608b3ee9344e6ef5b45fb37ad3d1"
[[package]] [[package]]
name = "muda" name = "muda"
version = "0.15.2" version = "0.15.2"
@ -3701,6 +3882,23 @@ dependencies = [
"num-traits", "num-traits",
] ]
[[package]]
name = "num-bigint-dig"
version = "0.8.4"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "dc84195820f291c7697304f3cbdadd1cb7199c0efc917ff5eafd71225c136151"
dependencies = [
"byteorder",
"lazy_static",
"libm",
"num-integer",
"num-iter",
"num-traits",
"rand 0.8.5",
"smallvec",
"zeroize",
]
[[package]] [[package]]
name = "num-conv" name = "num-conv"
version = "0.1.0" version = "0.1.0"
@ -3738,6 +3936,17 @@ dependencies = [
"num-traits", "num-traits",
] ]
[[package]]
name = "num-iter"
version = "0.1.45"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "1429034a0490724d0075ebb2bc9e875d6503c3cf69e235a8941aa757d83ef5bf"
dependencies = [
"autocfg",
"num-integer",
"num-traits",
]
[[package]] [[package]]
name = "num-rational" name = "num-rational"
version = "0.4.2" version = "0.4.2"
@ -3756,6 +3965,7 @@ source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "071dfc062690e90b734c0b2273ce72ad0ffa95f0c74596bc250dcfd960262841" checksum = "071dfc062690e90b734c0b2273ce72ad0ffa95f0c74596bc250dcfd960262841"
dependencies = [ dependencies = [
"autocfg", "autocfg",
"libm",
] ]
[[package]] [[package]]
@ -3798,6 +4008,12 @@ dependencies = [
"libc", "libc",
] ]
[[package]]
name = "obfstr"
version = "0.4.4"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "d0d354e9a302760d07e025701d40534f17dd1fe4c4db955b4e3bd2907c63bdee"
[[package]] [[package]]
name = "objc" name = "objc"
version = "0.2.7" version = "0.2.7"
@ -4252,6 +4468,15 @@ dependencies = [
"hmac", "hmac",
] ]
[[package]]
name = "pem-rfc7468"
version = "0.7.0"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "88b39c9bfcfc231068454382784bb460aae594343fb030d46e9f50a645418412"
dependencies = [
"base64ct",
]
[[package]] [[package]]
name = "percent-encoding" name = "percent-encoding"
version = "2.3.1" version = "2.3.1"
@ -4445,6 +4670,27 @@ dependencies = [
"futures-io", "futures-io",
] ]
[[package]]
name = "pkcs1"
version = "0.7.5"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "c8ffb9f10fa047879315e6625af03c164b16962a5368d724ed16323b68ace47f"
dependencies = [
"der",
"pkcs8",
"spki",
]
[[package]]
name = "pkcs8"
version = "0.10.2"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "f950b2377845cebe5cf8b5165cb3cc1a5e0fa5cfa3e1f7f55707d8fd82e0a7b7"
dependencies = [
"der",
"spki",
]
[[package]] [[package]]
name = "pkg-config" name = "pkg-config"
version = "0.3.31" version = "0.3.31"
@ -4758,7 +5004,7 @@ dependencies = [
"pin-project-lite", "pin-project-lite",
"quinn-proto", "quinn-proto",
"quinn-udp", "quinn-udp",
"rustc-hash", "rustc-hash 2.0.0",
"rustls 0.23.16", "rustls 0.23.16",
"socket2", "socket2",
"thiserror 1.0.66", "thiserror 1.0.66",
@ -4775,7 +5021,7 @@ dependencies = [
"bytes", "bytes",
"rand 0.8.5", "rand 0.8.5",
"ring", "ring",
"rustc-hash", "rustc-hash 2.0.0",
"rustls 0.23.16", "rustls 0.23.16",
"slab", "slab",
"thiserror 1.0.66", "thiserror 1.0.66",
@ -5052,7 +5298,7 @@ dependencies = [
"http 0.2.12", "http 0.2.12",
"http-body 0.4.6", "http-body 0.4.6",
"hyper 0.14.31", "hyper 0.14.31",
"hyper-tls", "hyper-tls 0.5.0",
"ipnet", "ipnet",
"js-sys", "js-sys",
"log", "log",
@ -5096,11 +5342,13 @@ dependencies = [
"http-body-util", "http-body-util",
"hyper 1.5.0", "hyper 1.5.0",
"hyper-rustls", "hyper-rustls",
"hyper-tls 0.6.0",
"hyper-util", "hyper-util",
"ipnet", "ipnet",
"js-sys", "js-sys",
"log", "log",
"mime", "mime",
"native-tls",
"once_cell", "once_cell",
"percent-encoding", "percent-encoding",
"pin-project-lite", "pin-project-lite",
@ -5114,6 +5362,7 @@ dependencies = [
"sync_wrapper 1.0.1", "sync_wrapper 1.0.1",
"system-configuration 0.6.1", "system-configuration 0.6.1",
"tokio", "tokio",
"tokio-native-tls",
"tokio-rustls 0.26.0", "tokio-rustls 0.26.0",
"tokio-util", "tokio-util",
"tower-service", "tower-service",
@ -5199,6 +5448,27 @@ dependencies = [
"syn 1.0.109", "syn 1.0.109",
] ]
[[package]]
name = "rsa"
version = "0.9.6"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "5d0e5124fcb30e76a7e79bfee683a2746db83784b86289f6251b54b7950a0dfc"
dependencies = [
"const-oid",
"digest",
"num-bigint-dig",
"num-integer",
"num-traits",
"pkcs1",
"pkcs8",
"rand_core 0.6.4",
"sha2",
"signature",
"spki",
"subtle",
"zeroize",
]
[[package]] [[package]]
name = "rusqlite" name = "rusqlite"
version = "0.31.0" version = "0.31.0"
@ -5259,6 +5529,12 @@ version = "0.1.24"
source = "registry+https://github.com/rust-lang/crates.io-index" source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "719b953e2095829ee67db738b3bfa9fa368c94900df327b3f07fe6e794d2fe1f" checksum = "719b953e2095829ee67db738b3bfa9fa368c94900df327b3f07fe6e794d2fe1f"
[[package]]
name = "rustc-hash"
version = "1.1.0"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "08d43f7aa6b08d49f382cde6a7982047c3426db949b1424bc4b7ec9ae12c6ce2"
[[package]] [[package]]
name = "rustc-hash" name = "rustc-hash"
version = "2.0.0" version = "2.0.0"
@ -5305,6 +5581,8 @@ version = "0.23.16"
source = "registry+https://github.com/rust-lang/crates.io-index" source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "eee87ff5d9b36712a58574e12e9f0ea80f915a5b0ac518d322b24a465617925e" checksum = "eee87ff5d9b36712a58574e12e9f0ea80f915a5b0ac518d322b24a465617925e"
dependencies = [ dependencies = [
"aws-lc-rs",
"log",
"once_cell", "once_cell",
"ring", "ring",
"rustls-pki-types", "rustls-pki-types",
@ -5353,6 +5631,7 @@ version = "0.102.8"
source = "registry+https://github.com/rust-lang/crates.io-index" source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "64ca1bc8749bd4cf37b5ce386cc146580777b4e8572c7b97baf22c83f444bee9" checksum = "64ca1bc8749bd4cf37b5ce386cc146580777b4e8572c7b97baf22c83f444bee9"
dependencies = [ dependencies = [
"aws-lc-rs",
"ring", "ring",
"rustls-pki-types", "rustls-pki-types",
"untrusted", "untrusted",
@ -5700,6 +5979,16 @@ dependencies = [
"libc", "libc",
] ]
[[package]]
name = "signature"
version = "2.2.0"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "77549399552de45a898a580c1b41d445bf730df867cc44e6c0233bbc4b8329de"
dependencies = [
"digest",
"rand_core 0.6.4",
]
[[package]] [[package]]
name = "simd-adler32" name = "simd-adler32"
version = "0.3.7" version = "0.3.7"
@ -5809,6 +6098,16 @@ dependencies = [
"lock_api", "lock_api",
] ]
[[package]]
name = "spki"
version = "0.7.3"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "d91ed6c858b01f942cd56b37a94b3e0a1798290327d1236e4d9cf4eaca44d29d"
dependencies = [
"base64ct",
"der",
]
[[package]] [[package]]
name = "stable_deref_trait" name = "stable_deref_trait"
version = "1.2.0" version = "1.2.0"
@ -6398,13 +6697,16 @@ dependencies = [
"axum", "axum",
"axum-extra", "axum-extra",
"axum-server", "axum-server",
"base64 0.22.1",
"chrono", "chrono",
"crypto",
"db", "db",
"flate2", "flate2",
"ico", "ico",
"log", "log",
"mac-security-rs", "mac-security-rs",
"mdns-sd", "mdns-sd",
"obfstr",
"plist", "plist",
"prost", "prost",
"rust_search", "rust_search",
@ -7757,6 +8059,18 @@ version = "0.1.8"
source = "registry+https://github.com/rust-lang/crates.io-index" source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "53a85b86a771b1c87058196170769dd264f66c0782acf1ae6cc51bfd64b39082" checksum = "53a85b86a771b1c87058196170769dd264f66c0782acf1ae6cc51bfd64b39082"
[[package]]
name = "which"
version = "4.4.2"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "87ba24419a2078cd2b0f2ede2691b6c66d8e47836da3b6db8265ebad47afbfc7"
dependencies = [
"either",
"home",
"once_cell",
"rustix",
]
[[package]] [[package]]
name = "widestring" name = "widestring"
version = "0.4.3" version = "0.4.3"

View File

@ -7,6 +7,7 @@ members = [
"packages/db", "packages/db",
"packages/mac-security-rs", "packages/mac-security-rs",
"packages/tauri-plugins/jarvis", "packages/tauri-plugins/jarvis",
"packages/crypto",
] ]
[workspace.dependencies] [workspace.dependencies]
@ -26,3 +27,11 @@ applications = { path = "./vendors/applications-rs" }
tauri-plugin-jarvis = { path = "./packages/tauri-plugins/jarvis" } tauri-plugin-jarvis = { path = "./packages/tauri-plugins/jarvis" }
tauri-plugin-system-info = { path = "./vendors/tauri-plugin-system-info" } tauri-plugin-system-info = { path = "./vendors/tauri-plugin-system-info" }
db = { path = "./packages/db" } db = { path = "./packages/db" }
axum = { version = "0.6.20" }
axum-extra = { version = "0.8.0" }
axum-server = { version = "0.5", features = ["tls-rustls"] }
rustls = { version = "0.23", features = ["ring"] }
reqwest = { version = "0.12", features = ["json", "rustls-tls"] }
crypto = { path = "./packages/crypto" }
base64 = "0.22.1"
obfstr = "0.4.4"

View File

@ -22,9 +22,9 @@ await Promise.all(
const folderName = `${templateName}-ext` const folderName = `${templateName}-ext`
await $`node ${indexjsPath} --outdir ${testDir} --name ${folderName} --template ${templateName}` await $`node ${indexjsPath} --outdir ${testDir} --name ${folderName} --template ${templateName}`
const templateDir = path.join(testDir, folderName) const templateDir = path.join(testDir, folderName)
await $`rm -rf node_modules`.cwd(templateDir).text() // this doesn't work within bun test await $`rm -rf node_modules`.cwd(templateDir) // this doesn't work within bun test
await $`pnpm install`.cwd(templateDir).text() // this doesn't work within bun test await $`pnpm install`.cwd(templateDir) // this doesn't work within bun test
await $`pnpm run build`.cwd(templateDir).text() await $`pnpm run build`.cwd(templateDir)
}) })
) )

View File

@ -17,7 +17,8 @@ crate-type = ["staticlib", "cdylib", "rlib"]
tauri-build = { version = "2.0.2", features = [] } tauri-build = { version = "2.0.2", features = [] }
[dependencies] [dependencies]
tauri = { version = "2.0.6", features = [ "macos-private-api", tauri = { version = "2.0.6", features = [
"macos-private-api",
"image-png", "image-png",
"image-ico", "image-ico",
"tray-icon", "tray-icon",
@ -50,6 +51,7 @@ tauri-plugin-log = { version = "2.0.1", features = ["colored"] }
zip = "2.1.3" zip = "2.1.3"
uuid = "1.11.0" uuid = "1.11.0"
# tauri-plugin-devtools = "2.0.0" # tauri-plugin-devtools = "2.0.0"
obfstr = { workspace = true }
[target."cfg(target_os = \"macos\")".dependencies] [target."cfg(target_os = \"macos\")".dependencies]
cocoa = "0.24.1" cocoa = "0.24.1"

View File

@ -1,3 +1,8 @@
fn main() { fn main() {
let db_enc_key = match std::env::var("DB_ENCRYPTION_KEY") {
Ok(key) => key,
Err(_) => String::from("none"),
};
println!("cargo:rustc-env=DB_ENCRYPTION_KEY={}", db_enc_key);
tauri_build::build() tauri_build::build()
} }

View File

@ -23,6 +23,16 @@ pub fn run() {
let context = tauri::generate_context!(); let context = tauri::generate_context!();
let mut builder = tauri::Builder::default(); let mut builder = tauri::Builder::default();
let db_key = if cfg!(debug_assertions) {
None
} else {
let db_enc_key_env = obfstr::obfstr!(env!("DB_ENCRYPTION_KEY")).to_string();
match db_enc_key_env == "none" {
true => None,
false => Some(db_enc_key_env),
}
};
#[cfg(debug_assertions)] #[cfg(debug_assertions)]
{ {
println!("Install crabnebula devtools"); println!("Install crabnebula devtools");
@ -91,7 +101,7 @@ pub fn run() {
.plugin(tauri_plugin_notification::init()) .plugin(tauri_plugin_notification::init())
.plugin(tauri_plugin_fs::init()) .plugin(tauri_plugin_fs::init())
.plugin(tauri_plugin_shellx::init(shell_unlocked)) .plugin(tauri_plugin_shellx::init(shell_unlocked))
.plugin(tauri_plugin_jarvis::init()) .plugin(tauri_plugin_jarvis::init(db_key.clone()))
.plugin(tauri_plugin_clipboard::init()) .plugin(tauri_plugin_clipboard::init())
.plugin(tauri_plugin_network::init()) .plugin(tauri_plugin_network::init())
.plugin(tauri_plugin_system_info::init()); .plugin(tauri_plugin_system_info::init());
@ -127,7 +137,7 @@ pub fn run() {
.unwrap(), .unwrap(),
} }
}) })
.setup(|app| { .setup(move |app| {
setup::window::setup_window(app.handle()); setup::window::setup_window(app.handle());
setup::tray::create_tray(app.handle())?; setup::tray::create_tray(app.handle())?;
#[cfg(all(not(target_os = "macos"), debug_assertions))] #[cfg(all(not(target_os = "macos"), debug_assertions))]
@ -145,20 +155,21 @@ pub fn run() {
// Err(_) => AppSettings::default(), // Err(_) => AppSettings::default(),
// }; // };
// let dev_extension_path: Option<PathBuf> = app_settings.dev_extension_path.clone(); // let dev_extension_path: Option<PathBuf> = app_settings.dev_extension_path.clone();
let my_port = tauri_plugin_network::network::scan::find_available_port_from_list( // let my_port = tauri_plugin_network::network::scan::find_available_port_from_list(
tauri_plugin_jarvis::server::CANDIDATE_PORTS.to_vec(), // tauri_plugin_jarvis::server::CANDIDATE_PORTS.to_vec(),
) // )
.unwrap(); // .unwrap();
log::info!("Jarvis Server Port: {}", my_port); // log::info!("Jarvis Server Port: {}", my_port);
// log::info!( // log::info!(
// "App Settings Dev Extension Path: {:?}", // "App Settings Dev Extension Path: {:?}",
// app_settings.dev_extension_path.clone(), // app_settings.dev_extension_path.clone(),
// ); // );
let my_port = 9559;
app.manage(tauri_plugin_jarvis::server::http::Server::new( app.manage(tauri_plugin_jarvis::server::http::Server::new(
app.handle().clone(), app.handle().clone(),
my_port, my_port,
Protocol::Http, // Protocol::Http,
// Protocol::Https, Protocol::Https,
)); ));
app.manage(tauri_plugin_jarvis::model::app_state::AppState {}); app.manage(tauri_plugin_jarvis::model::app_state::AppState {});
tauri_plugin_jarvis::setup::server::setup_server(app.handle())?; // start the server tauri_plugin_jarvis::setup::server::setup_server(app.handle())?; // start the server
@ -173,13 +184,20 @@ pub fn run() {
// setup::db::setup_db(app)?; // setup::db::setup_db(app)?;
/* ------------------------- Clipboard History Setup ------------------------ */ /* ------------------------- Clipboard History Setup ------------------------ */
let db_path = get_kunkun_db_path(app.app_handle())?; let db_path = get_kunkun_db_path(app.app_handle())?;
let db_key: Option<String> = None;
let jarvis_db = JarvisDB::new(db_path.clone(), db_key.clone())?; // println!("DB_ENCRYPTION_KEY: {:?}", db_key);
// let jarvis_db = JarvisDB::new(db_path.clone(), db_key.clone())?;
// The clipboard extension should be created in setup_db, ext is guaranteed to be Some // The clipboard extension should be created in setup_db, ext is guaranteed to be Some
// let jarvis_db = app
// .state::<tauri_plugin_jarvis::commands::db::DBState>()
// .db
// .lock()
// .unwrap();
let jarvis_db = tauri_plugin_jarvis::utils::db::get_db(db_path, db_key)?;
let ext = jarvis_db.get_unique_extension_by_identifier( let ext = jarvis_db.get_unique_extension_by_identifier(
tauri_plugin_jarvis::constants::KUNKUN_CLIPBOARD_EXT_IDENTIFIER, tauri_plugin_jarvis::constants::KUNKUN_CLIPBOARD_EXT_IDENTIFIER,
)?; )?;
app.manage( app.manage(
tauri_plugin_jarvis::model::clipboard_history::ClipboardHistory::new( tauri_plugin_jarvis::model::clipboard_history::ClipboardHistory::new(
jarvis_db, jarvis_db,

View File

@ -3,6 +3,7 @@ import { checkUpdateAndInstall } from "@/utils/updater"
import { IconEnum } from "@kksh/api/models" import { IconEnum } from "@kksh/api/models"
import type { BuiltinCmd } from "@kksh/ui/types" import type { BuiltinCmd } from "@kksh/ui/types"
import { getVersion } from "@tauri-apps/api/app" import { getVersion } from "@tauri-apps/api/app"
import { appDataDir } from "@tauri-apps/api/path"
import { WebviewWindow } from "@tauri-apps/api/webviewWindow" import { WebviewWindow } from "@tauri-apps/api/webviewWindow"
import { exit } from "@tauri-apps/plugin-process" import { exit } from "@tauri-apps/plugin-process"
import { dev } from "$app/environment" import { dev } from "$app/environment"
@ -10,6 +11,7 @@ import { goto } from "$app/navigation"
import { toast } from "svelte-sonner" import { toast } from "svelte-sonner"
import { derived } from "svelte/store" import { derived } from "svelte/store"
import * as clipboard from "tauri-plugin-clipboard-api" import * as clipboard from "tauri-plugin-clipboard-api"
import { open } from "tauri-plugin-shellx-api"
import { v4 as uuidv4 } from "uuid" import { v4 as uuidv4 } from "uuid"
import { hexColor } from "valibot" import { hexColor } from "valibot"
@ -338,6 +340,18 @@ export const rawBuiltinCmds: BuiltinCmd[] = [
return { ...config, developerMode: !config.developerMode } return { ...config, developerMode: !config.developerMode }
}) })
} }
},
{
name: "Open App Data Dir",
icon: {
type: IconEnum.Iconify,
value: "mdi:folder-open"
},
description: "Open App Data Dir",
function: async () => {
console.log(await appDataDir())
open(await appDataDir())
}
} }
].map((cmd) => ({ ...cmd, id: uuidv4() })) ].map((cmd) => ({ ...cmd, id: uuidv4() }))

View File

@ -32,7 +32,6 @@
/* -------------------------------------------------------------------------- */ /* -------------------------------------------------------------------------- */
gsap.registerPlugin(Flip) gsap.registerPlugin(Flip)
let flipState: Flip.FlipState let flipState: Flip.FlipState
beforeNavigate(() => { beforeNavigate(() => {
flipState = Flip.getState( flipState = Flip.getState(
`.${Constants.CLASSNAMES.EXT_LOGO}, .${Constants.CLASSNAMES.BACK_BUTTON}` `.${Constants.CLASSNAMES.EXT_LOGO}, .${Constants.CLASSNAMES.BACK_BUTTON}`
@ -55,7 +54,9 @@
let { children } = $props() let { children } = $props()
const unlisteners: UnlistenFn[] = [] const unlisteners: UnlistenFn[] = []
onDestroy(() => {
unlisteners.forEach((unlistener) => unlistener())
})
onMount(async () => { onMount(async () => {
attachConsole().then((unlistener) => unlisteners.push(unlistener)) attachConsole().then((unlistener) => unlisteners.push(unlistener))
initDeeplink().then((unlistener) => unlisteners.push(unlistener)) initDeeplink().then((unlistener) => unlisteners.push(unlistener))
@ -103,10 +104,6 @@
} }
getCurrentWebviewWindow().show() getCurrentWebviewWindow().show()
}) })
onDestroy(() => {
unlisteners.forEach((unlistener) => unlistener())
})
</script> </script>
<svelte:window on:keydown={globalKeyDownHandler} /> <svelte:window on:keydown={globalKeyDownHandler} />

View File

@ -27,6 +27,8 @@
if (error) { if (error) {
toast.error("Failed to sign in with OAuth", { description: error.message }) toast.error("Failed to sign in with OAuth", { description: error.message })
} else { } else {
console.log(data.url);
data.url && open(data.url) data.url && open(data.url)
} }
} }

View File

@ -11,7 +11,7 @@
<SideBar.Provider style="--sidebar-width: 13rem;"> <SideBar.Provider style="--sidebar-width: 13rem;">
<SettingsSidebar /> <SettingsSidebar />
<main class="grow overflow-x-clip"> <main class="grow overflow-x-clip flex flex-col">
<SidebarTrigger /> <SidebarTrigger />
{@render children?.()} {@render children?.()}
</main> </main>

View File

@ -13,14 +13,14 @@
}) })
</script> </script>
<Layouts.Center class="absolute left-0 top-0 h-full w-full overflow-hidden border"> <Layouts.Center class="w-full grow -translate-y-10 overflow-hidden">
<div> <div class="">
<div class="flex w-full items-center space-x-5"> <div class="flex w-full items-center space-x-5">
<img src="/favicon.png" class="w-44" alt="Logo" /> <img src="/favicon.png" class="w-44" alt="Logo" />
<div class="flex flex-col space-y-1"> <div class="flex flex-col space-y-1">
<p class="text-3xl font-bold">KunKun Shell</p> <p class="text-3xl font-bold">KunKun Shell</p>
<p class="text-xs">Version: {appVersion}</p> <p class="text-xs">Version: {appVersion}</p>
<p> <p class="flex gap-1">
<strong class="font-bold">Author: </strong> <strong class="font-bold">Author: </strong>
<a <a
href="https://github.com/HuakunShen" href="https://github.com/HuakunShen"

View File

@ -1,7 +1,7 @@
{ {
"$schema": "https://jsr.io/schema/config-file.v1.json", "$schema": "https://jsr.io/schema/config-file.v1.json",
"name": "@kunkun/api", "name": "@kunkun/api",
"version": "0.0.41", "version": "0.0.44",
"license": "MIT", "license": "MIT",
"exports": { "exports": {
".": "./src/index.ts", ".": "./src/index.ts",

View File

@ -1,6 +1,6 @@
{ {
"name": "@kksh/api", "name": "@kksh/api",
"version": "0.0.43", "version": "0.0.44",
"type": "module", "type": "module",
"exports": { "exports": {
".": "./src/index.ts", ".": "./src/index.ts",
@ -57,6 +57,7 @@
"kkrpc": "^0.0.12", "kkrpc": "^0.0.12",
"lodash": "^4.17.21", "lodash": "^4.17.21",
"minimatch": "^10.0.1", "minimatch": "^10.0.1",
"node-fetch": "^3.3.2",
"semver": "^7.6.3", "semver": "^7.6.3",
"svelte-sonner": "^0.3.28", "svelte-sonner": "^0.3.28",
"tauri-api-adapter": "^0.3.13", "tauri-api-adapter": "^0.3.13",

View File

@ -1,20 +1,26 @@
import { exec } from "child_process" import { exec } from "child_process"
import https from "https"
import os from "node:os" import os from "node:os"
import fetch from "node-fetch"
import { import {
DEEP_LINK_PATH_REFRESH_DEV_EXTENSION, DEEP_LINK_PATH_REFRESH_DEV_EXTENSION,
DESKTOP_SERVICE_NAME, DESKTOP_SERVICE_NAME,
KUNKUN_DESKTOP_APP_SERVER_PORTS KUNKUN_DESKTOP_APP_SERVER_PORTS
} from "../constants" } from "../constants"
const httpsAgent = new https.Agent({
rejectUnauthorized: false // Accept self-signed certificates
})
export function checkLocalKunkunService(port: number): Promise<boolean> { export function checkLocalKunkunService(port: number): Promise<boolean> {
return fetch(`http://localhost:${port}/info`) return fetch(`https://localhost:${port}/info`, { agent: httpsAgent })
.then((res) => { .then((res) => {
if (!res.ok) { if (!res.ok) {
return false return false
} }
return res.json() return res.json()
}) })
.then((data) => { .then((data: any) => {
return data["service_name"].toLowerCase() === DESKTOP_SERVICE_NAME.toLowerCase() return data["service_name"].toLowerCase() === DESKTOP_SERVICE_NAME.toLowerCase()
}) })
.catch((err) => { .catch((err) => {
@ -45,8 +51,9 @@ export async function refreshTemplateWorkerExtensionViaServer() {
console.warn("Will Refresh Every Instance") console.warn("Will Refresh Every Instance")
} }
for (const port of ports) { for (const port of ports) {
fetch(`http://localhost:${port}/refresh-worker-extension`, { fetch(`https://localhost:${port}/refresh-worker-extension`, {
method: "POST" method: "POST",
agent: httpsAgent
}).catch((err) => { }).catch((err) => {
console.error("Failed to send refresh worker extension request", err) console.error("Failed to send refresh worker extension request", err)
}) })

View File

@ -1,7 +1,4 @@
import { type Buffer } from "node:buffer"
import { Channel, invoke } from "@tauri-apps/api/core"
import { RPCChannel, type IoInterface } from "kkrpc/browser" import { RPCChannel, type IoInterface } from "kkrpc/browser"
import { constructShellAPI as constructShellAPI1 } from "tauri-api-adapter/client"
import { import {
// Child, // Child,
EventEmitter, EventEmitter,
@ -244,7 +241,7 @@ export class TauriShellStdio implements IoInterface {
private childProcess: Child private childProcess: Child
) {} ) {}
read(): Promise<string | Buffer | Uint8Array | null> { read(): Promise<string | Uint8Array | null> {
return new Promise((resolve, reject) => { return new Promise((resolve, reject) => {
this.readStream.on("data", (chunk) => { this.readStream.on("data", (chunk) => {
resolve(chunk) resolve(chunk)

View File

@ -17,7 +17,7 @@ export const breakingChangesVersionCheckpoints = [
const checkpointVersions = breakingChangesVersionCheckpoints.map((c) => c.version) const checkpointVersions = breakingChangesVersionCheckpoints.map((c) => c.version)
const sortedCheckpointVersions = sort(checkpointVersions) const sortedCheckpointVersions = sort(checkpointVersions)
export const version = "0.0.43" export const version = "0.0.44"
export function isVersionBetween(v: string, start: string, end: string) { export function isVersionBetween(v: string, start: string, end: string) {
const vCleaned = clean(v) const vCleaned = clean(v)

View File

@ -52,3 +52,5 @@ PUBLIC_SUPABASE_PROJECT_ID=${process.env.SUPABASE_PROJECT_ID}
) )
// writeFileSync(join(__dirname, "../packages/gql/.env"), envContent) // writeFileSync(join(__dirname, "../packages/gql/.env"), envContent)
writeFileSync(join(REPO_ROOT, "packages/schema/.env"), envContent) writeFileSync(join(REPO_ROOT, "packages/schema/.env"), envContent)
writeFileSync(join(REPO_ROOT, "packages/tauri-plugins/jarvis/.env"), envContent)

View File

@ -0,0 +1,21 @@
[package]
name = "crypto"
version = "0.1.0"
edition = "2021"
[dependencies]
openssl = "0.10.68"
rand = "0.8.5"
ring = "0.17.8"
rsa = { version = "0.9.6", features = ["sha2"] }
sha2 = "0.10.8"
anyhow = { workspace = true }
hex = "0.4.3"
axum = { workspace = true }
tokio = { workspace = true }
rustls = { workspace = true }
axum-server = { workspace = true }
reqwest = { workspace = true }
aes = "0.8.4"
block-padding = "0.3.3"
cbc = { version = "0.1.2", features = ["alloc"] }

View File

@ -0,0 +1,54 @@
use aes::cipher::{BlockDecryptMut, BlockEncryptMut, KeyIvInit};
use block_padding::Pkcs7;
use cbc::Decryptor as CbcDec;
use cbc::Encryptor as CbcEnc;
type Aes256CbcEnc = CbcEnc<aes::Aes256>;
type Aes256CbcDec = CbcDec<aes::Aes256>;
pub struct Aes256Cbc {
encryptor: Aes256CbcEnc,
decryptor: Aes256CbcDec,
}
impl Aes256Cbc {
pub fn new(key: [u8; 32], iv: [u8; 16]) -> Self {
Self {
encryptor: Aes256CbcEnc::new(&key.into(), &iv.into()),
decryptor: Aes256CbcDec::new(&key.into(), &iv.into()),
}
}
pub fn encrypt(&self, data: &[u8]) -> Vec<u8> {
self.encryptor.clone().encrypt_padded_vec_mut::<Pkcs7>(data)
}
pub fn decrypt(&self, data: &[u8]) -> Vec<u8> {
// let mut buf = data.to_vec();
self.decryptor
.clone()
.decrypt_padded_vec_mut::<Pkcs7>(data)
.unwrap()
}
}
#[cfg(test)]
mod tests {
use super::*;
#[test]
fn test_encrypt_decrypt() {
let aes = Aes256Cbc::new([0; 32], [0; 16]);
let encrypted = aes.encrypt(b"kunkun");
let decrypted = aes.decrypt(&encrypted);
assert_eq!(decrypted, b"kunkun");
}
#[test]
fn test_encrypt_huge_chunk_data() {
let aes = Aes256Cbc::new([0; 32], [0; 16]);
let data = vec![0; 1024 * 1024];
let encrypted = aes.encrypt(&data);
let decrypted = aes.decrypt(&encrypted);
assert_eq!(decrypted, data);
}
}

View File

@ -0,0 +1,92 @@
//! ed25519 is a cryptographic signature algorithm.
//! It cannot be used for encryption, only for signing and verifying.
//!
//! For example, ed25519 is commonly used as SSH key.
//! When ssh login starts, the private key is used to sign a challenge message.
//! The server verifies the signature of the public key.
use openssl::{
pkey::{PKey, Private, Public},
sign::{Signer, Verifier},
};
use crate::types::Signature;
pub struct Ed25519Crypto {}
impl Ed25519Crypto {
pub fn generate_key() -> anyhow::Result<PKey<Private>> {
PKey::generate_ed25519().map_err(anyhow::Error::from)
}
pub fn generate_key_pair_pem() -> anyhow::Result<(Vec<u8>, Vec<u8>)> {
let private_key = PKey::generate_ed25519()?;
let private_pem = private_key.private_key_to_pem_pkcs8()?;
let public_pem = private_key.public_key_to_pem()?;
Ok((private_pem, public_pem))
}
pub fn private_key_from_pem(pem: &[u8]) -> anyhow::Result<PKey<Private>> {
PKey::private_key_from_pem(pem).map_err(anyhow::Error::from)
}
pub fn public_key_from_pem(pem: &[u8]) -> anyhow::Result<PKey<Public>> {
PKey::public_key_from_pem(pem).map_err(anyhow::Error::from)
}
pub fn sign(private_key: &PKey<Private>, message: &[u8]) -> anyhow::Result<Vec<u8>> {
let mut signer = Signer::new_without_digest(&private_key)?;
Ok(signer.sign_oneshot_to_vec(message)?)
}
pub fn verify(
public_key: &PKey<Public>,
message: &[u8],
signature: &[u8],
) -> anyhow::Result<bool> {
let mut verifier = Verifier::new_without_digest(public_key)?;
Ok(verifier.verify_oneshot(&signature, message)?)
}
}
impl Signature for Ed25519Crypto {
fn sign_with_pem(private_pem: &[u8], message: &[u8]) -> anyhow::Result<Vec<u8>> {
let private_key = Ed25519Crypto::private_key_from_pem(private_pem)?;
Ed25519Crypto::sign(&private_key, message)
}
fn verify_with_pem(
public_pem: &[u8],
message: &[u8],
signature: &[u8],
) -> anyhow::Result<bool> {
let public_key = Ed25519Crypto::public_key_from_pem(public_pem)?;
Ed25519Crypto::verify(&public_key, message, signature)
}
}
#[cfg(test)]
mod tests {
use super::*;
#[test]
fn test_ed25519_sign_verify() {
let (private_pem, public_pem) = Ed25519Crypto::generate_key_pair_pem().unwrap();
let message = b"hello world";
let private_key = Ed25519Crypto::private_key_from_pem(&private_pem).unwrap();
let public_key = Ed25519Crypto::public_key_from_pem(&public_pem).unwrap();
let signature = Ed25519Crypto::sign(&private_key, message).unwrap();
let verified = Ed25519Crypto::verify(&public_key, message, &signature).unwrap();
assert!(verified);
assert!(!Ed25519Crypto::verify(&public_key, b"hello world2", &signature).unwrap());
}
#[test]
fn test_ed25519_sign_verify_with_pem() {
let (private_pem, public_pem) = Ed25519Crypto::generate_key_pair_pem().unwrap();
let message = b"hello world";
let signature = Ed25519Crypto::sign_with_pem(&private_pem, message).unwrap();
let verified = Ed25519Crypto::verify_with_pem(&public_pem, message, &signature).unwrap();
assert!(verified);
}
}

View File

@ -0,0 +1,17 @@
//! This module provides simplified cryptographic interface for Kunkun.
//!
//! Features include
//! - RSA (generation/sign/verify/encrypt/decrypt)
//! - Ed25519 (generation/sign/verify).
//! - SSL/TLS (self-signed certificate generation).
pub mod aes;
pub mod ed25519;
pub mod rsa;
pub mod ssl;
pub mod types;
pub use ed25519::Ed25519Crypto;
pub use rsa::RsaCrypto;
pub use ssl::generate_self_signed_certificate;
pub use types::Signature;

View File

@ -0,0 +1,37 @@
// use crypto::{Ed25519Crypto, Signature};
// use openssl::pkey::PKey;
// use openssl::rsa::{Padding, Rsa};
// use std::str;
// fn main() {
// let (private_pem, public_pem) = Ed25519Crypto::generate_key_pair_pem().unwrap();
// let message = b"hello world";
// let signature = Ed25519Crypto::sign(&private_pem, message);
// println!("Signature: {:?}", signature);
// }
use openssl::pkey::PKey;
use openssl::sign::{Signer, Verifier};
fn main() -> Result<(), Box<dyn std::error::Error>> {
// Generate an Ed25519 private key
let private_key = PKey::generate_ed25519()?;
// The message to sign
let message = b"Hello, this is a test message!";
// Create a signer using the private key
let mut signer = Signer::new_without_digest(&private_key)?;
// Sign the message directly (no need to call update)
let signature = signer.sign_oneshot_to_vec(message)?;
println!("Message: {:?}", String::from_utf8_lossy(message));
println!("Signature: {:?}", signature);
// verify the signature
let mut verifier = Verifier::new_without_digest(&private_key)?;
verifier.update(message)?;
verifier.verify(&signature)?;
println!("Signature verified successfully!");
Ok(())
}

120
packages/crypto/src/rsa.rs Normal file
View File

@ -0,0 +1,120 @@
use openssl::{
hash::MessageDigest,
pkey::{PKey, Private, Public},
rsa::Rsa,
sign::{Signer, Verifier},
};
use crate::types::Signature;
pub struct RsaCrypto {}
impl RsaCrypto {
pub fn generate_rsa() -> anyhow::Result<Rsa<Private>> {
Rsa::generate(2048).map_err(anyhow::Error::from)
}
pub fn generate_rsa_key_pair_pem() -> anyhow::Result<(Vec<u8>, Vec<u8>)> {
let rsa = Rsa::generate(2048)?;
let private_pem = rsa.private_key_to_pem()?;
let public_pem = rsa.public_key_to_pem()?;
Ok((private_pem, public_pem))
}
pub fn private_key_from_pem(pem: &[u8]) -> anyhow::Result<Rsa<Private>> {
Rsa::private_key_from_pem(pem).map_err(anyhow::Error::from)
}
pub fn public_key_from_pem(pem: &[u8]) -> anyhow::Result<Rsa<Public>> {
Rsa::public_key_from_pem(pem).map_err(anyhow::Error::from)
}
pub fn encrypt_message(public_key: &Rsa<Public>, message: &[u8]) -> anyhow::Result<Vec<u8>> {
let mut encrypted = vec![0; public_key.size() as usize];
public_key.public_encrypt(message, &mut encrypted, openssl::rsa::Padding::PKCS1)?;
Ok(encrypted)
}
pub fn decrypt_message(
private_key: &Rsa<Private>,
encrypted: &[u8],
) -> anyhow::Result<Vec<u8>> {
let mut decrypted = vec![0; private_key.size() as usize];
private_key.private_decrypt(encrypted, &mut decrypted, openssl::rsa::Padding::PKCS1)?;
Ok(decrypted)
}
pub fn sign(private_key: &Rsa<Private>, message: &[u8]) -> anyhow::Result<Vec<u8>> {
let pkey = PKey::from_rsa(private_key.clone())?;
let mut signer = Signer::new(MessageDigest::sha256(), &pkey)?;
signer.update(message)?;
let signature = signer.sign_to_vec()?;
Ok(signature)
}
pub fn verify(
public_key: &Rsa<Public>,
message: &[u8],
signature: &[u8],
) -> anyhow::Result<bool> {
let pkey = PKey::from_rsa(public_key.clone())?;
let mut verifier = Verifier::new(MessageDigest::sha256(), &pkey)?;
verifier.update(message)?;
Ok(verifier.verify(&signature)?)
}
}
impl Signature for RsaCrypto {
fn sign_with_pem(private_pem: &[u8], message: &[u8]) -> anyhow::Result<Vec<u8>> {
let private_key = RsaCrypto::private_key_from_pem(private_pem)?;
RsaCrypto::sign(&private_key, message)
}
fn verify_with_pem(
public_pem: &[u8],
message: &[u8],
signature: &[u8],
) -> anyhow::Result<bool> {
let public_key = RsaCrypto::public_key_from_pem(public_pem)?;
RsaCrypto::verify(&public_key, message, signature)
}
}
#[cfg(test)]
mod tests {
use super::*;
#[test]
fn test_encrypt_decrypt() {
let rsa = RsaCrypto::generate_rsa().unwrap();
let public_key = rsa.public_key_to_pem().unwrap();
let private_key = rsa.private_key_to_pem().unwrap();
let public_rsa = RsaCrypto::public_key_from_pem(&public_key).unwrap();
let private_rsa = RsaCrypto::private_key_from_pem(&private_key).unwrap();
let encrypted = RsaCrypto::encrypt_message(&public_rsa, b"hello world").unwrap();
let decrypted = RsaCrypto::decrypt_message(&private_rsa, &encrypted).unwrap();
assert_eq!(b"hello world", &decrypted[..11]);
}
#[test]
fn test_rsa_sign_verify() {
let (private_pem, public_pem) = RsaCrypto::generate_rsa_key_pair_pem().unwrap();
let message = b"hello world";
let private_key = RsaCrypto::private_key_from_pem(&private_pem).unwrap();
let public_key = RsaCrypto::public_key_from_pem(&public_pem).unwrap();
let signature = RsaCrypto::sign(&private_key, message).unwrap();
let verified = RsaCrypto::verify(&public_key, message, &signature).unwrap();
assert!(verified);
assert!(!RsaCrypto::verify(&public_key, b"hello world2", &signature).unwrap());
}
#[test]
fn test_rsa_sign_verify_with_pem() {
let (private_pem, public_pem) = RsaCrypto::generate_rsa_key_pair_pem().unwrap();
let message = b"hello world";
let signature = RsaCrypto::sign_with_pem(&private_pem, message).unwrap();
let verified = RsaCrypto::verify_with_pem(&public_pem, message, &signature).unwrap();
assert!(verified);
}
}

View File

@ -0,0 +1,89 @@
use openssl::{
hash::MessageDigest,
pkey::{PKey, Private},
rsa::Rsa,
x509::{extension::SubjectAlternativeName, X509NameBuilder, X509},
};
pub fn generate_self_signed_certificate(
rsa: &Rsa<Private>,
days: u32,
) -> anyhow::Result<(Vec<u8>, Vec<u8>)> {
let private_key = PKey::from_rsa(rsa.to_owned())?;
let mut x509_name_builder = X509NameBuilder::new()?;
x509_name_builder.append_entry_by_text("C", "US")?; // Country
x509_name_builder.append_entry_by_text("ST", "Localhost")?; // State/Province
x509_name_builder.append_entry_by_text("L", "Localhost")?; // Locality
x509_name_builder.append_entry_by_text("O", "Localhost Development")?; // Organization
x509_name_builder.append_entry_by_text("CN", "localhost")?; // Common Name
let x509_name = x509_name_builder.build();
let mut builder = X509::builder()?;
builder.set_version(2)?; // X.509 v3
builder.set_subject_name(&x509_name)?;
builder.set_issuer_name(&x509_name)?; // Self-signed
builder.set_pubkey(&private_key)?;
// Set certificate validity
let not_before = openssl::asn1::Asn1Time::days_from_now(0)?; // Start now
let not_after = openssl::asn1::Asn1Time::days_from_now(days)?; // Valid for 1 year
builder.set_not_before(&not_before)?;
builder.set_not_after(&not_after)?;
// Add Subject Alternative Name (SAN) for localhost
let subject_alt_name = SubjectAlternativeName::new()
.dns("localhost") // Ensures the certificate is valid for "localhost"
.build(&builder.x509v3_context(None, None))?;
builder.append_extension(subject_alt_name)?;
builder.sign(&private_key, MessageDigest::sha256())?;
let x509 = builder.build();
let private_key_pem = private_key.private_key_to_pem_pkcs8()?;
let certificate_pem = x509.to_pem()?;
Ok((private_key_pem, certificate_pem))
}
#[cfg(test)]
mod tests {
use axum::{routing::get, Router};
use axum_server::tls_rustls::RustlsConfig;
use reqwest;
use std::{net::SocketAddr, time::Duration};
use super::*;
#[tokio::test]
async fn test_generate_self_signed_certificate() -> anyhow::Result<()> {
let rsa = Rsa::generate(2048)?;
let (private_key_pem, certificate_pem) = generate_self_signed_certificate(&rsa, 365)?;
let config = RustlsConfig::from_pem(certificate_pem, private_key_pem)
.await
.unwrap();
async fn handler() -> &'static str {
"Hello, World!"
}
let handle = axum_server::Handle::new();
let app = Router::new().route("/", get(handler));
// run https server
let addr = SocketAddr::from(([127, 0, 0, 1], 8080));
let server = axum_server::bind_rustls(addr, config)
.handle(handle.clone())
.serve(app.into_make_service());
let server_handle = tokio::spawn(server);
// send a request to server, trust the certificate
let client = reqwest::Client::builder()
.danger_accept_invalid_certs(true)
.build()?;
let response = client.get("https://localhost:8080").send().await?;
assert_eq!(response.status().is_success(), true);
// read the response body
let body = response.text().await?;
assert_eq!(body, "Hello, World!");
println!("shutting down server");
handle.graceful_shutdown(Some(Duration::from_secs(10)));
println!("server shutdown");
server_handle.abort();
Ok(())
}
}

View File

@ -0,0 +1,5 @@
pub trait Signature {
fn sign_with_pem(private_pem: &[u8], message: &[u8]) -> anyhow::Result<Vec<u8>>;
fn verify_with_pem(public_pem: &[u8], message: &[u8], signature: &[u8])
-> anyhow::Result<bool>;
}

1
packages/db/.gitignore vendored Normal file
View File

@ -0,0 +1 @@
*.db

View File

@ -4,10 +4,7 @@ version = "0.1.0"
edition = "2021" edition = "2021"
[dependencies] [dependencies]
rusqlite = { version = "0.31.0", features = [ rusqlite = { version = "0.31.0", features = ["bundled", "bundled-sqlcipher"] }
"bundled",
# "bundled-sqlcipher"
] }
serde = { workspace = true, features = ["derive"] } serde = { workspace = true, features = ["derive"] }
serde_json = { workspace = true } serde_json = { workspace = true }
tempfile = "3.10.1" tempfile = "3.10.1"

View File

@ -32,15 +32,33 @@ const allItems: List.Item[] = itemsTitle.map(
}) })
) )
const files = [
"/Users/hacker/Dev/projects/photographer-lib-deno/data/DSC03635.JPG",
"/Users/hacker/Dev/projects/photographer-lib-deno/data/IMG_3181.HEIC",
"/Users/hacker/Dev/projects/photographer-lib-deno/data/DJI_20241002175820_0054_D.JPG",
"/Users/hacker/Dev/projects/photographer-lib-deno/data/DJI_20241002175651_0051_D.DNG",
"/Users/hacker/Dev/projects/photographer-lib-deno/data/DSC03635.ARW"
]
class ExtensionTemplate extends WorkerExtension { class ExtensionTemplate extends WorkerExtension {
async onBeforeGoBack() {
console.log("onBeforeGoBack")
// console.log(`Try killing pid: ${this.apiProcess?.pid}`)
// await this.apiProcess?.kill()
// console.log("apiProcess killed")
}
async onFormSubmit(value: Record<string, any>): Promise<void> {
console.log("Form submitted", value)
}
async onEnterPressedOnSearchBar(): Promise<void> {
console.log("Enter pressed on search bar")
}
async load() { async load() {
clipboard.readText().then((text) => {
console.log("Clipboard text:", text)
})
// console.log("Check screen capture permission:", await security.mac.checkScreenCapturePermission())
// await security.mac.revealSecurityPane("AllFiles")
// console.log(await security.mac.verifyFingerprint())
ui.setSearchBarPlaceholder("Search for items")
ui.showLoadingBar(true)
setTimeout(() => {
ui.showLoadingBar(false)
}, 2000)
const { rpcChannel, process, command } = await shell.createDenoRpcChannel< const { rpcChannel, process, command } = await shell.createDenoRpcChannel<
{}, {},
{ {
@ -64,196 +82,134 @@ class ExtensionTemplate extends WorkerExtension {
}, },
{} {}
) )
const api = rpcChannel.getAPI() // const child = new Child(process.pid)
const metadata = await api.batchReadImageMetadata(files) command.stdout.on("data", (data) => {
console.log(metadata) console.log("stdout", data.toString())
})
command.stderr.on("data", (data) => {
console.log("stderr", data.toString())
})
// await api
// .readImageMetadata("/Users/hacker/Pictures/3D-Image/pics/IMG_0767.jpeg")
// .then((data) => {
// console.log("metadata", data)
// })
// .catch((err) => {
// console.error("error", err)
// })
// await api.add(1, 2).then(console.log)
// await api.subtract(1, 2).then(console.log)
await process.kill()
const extPath = await path.extensionDir()
// console.log("Extension path:", extPath)
const tagList = new List.ItemDetailMetadataTagList({
title: "Tag List Title",
tags: [
new List.ItemDetailMetadataTagListItem({
text: "red",
color: "#ff0000"
}),
new List.ItemDetailMetadataTagListItem({
text: "yellow",
color: "#ffff00"
})
]
})
const list = new List.List({
items: allItems,
defaultAction: "Top Default Action",
detail: new List.ItemDetail({
children: [
new List.ItemDetailMetadata([
new List.ItemDetailMetadataLabel({
title: "Label Title",
text: "Label Text"
}),
new List.ItemDetailMetadataLabel({
title: "Label Title",
text: "Label Text",
icon: new Icon({
type: IconType.enum.Iconify,
value: "mingcute:appstore-fill"
})
}),
new List.ItemDetailMetadataSeparator(),
new List.ItemDetailMetadataLabel({
title: "Label Title",
text: "Label Text"
}),
new List.ItemDetailMetadataLink({
title: "Link Title",
text: "Link Text",
url: "https://github.com/huakunshen"
}),
new List.ItemDetailMetadataLabel({
title: "Label Title",
text: "Label Text"
}),
tagList
]),
new Markdown(`
# Hello World
<img src="https://github.com/huakunshen.png" />
<img src="https://github.com/huakunshen.png" />
<img src="https://github.com/huakunshen.png" />
`)
],
width: 50
}),
actions: new Action.ActionPanel({
items: [
new Action.Action({
title: "Action 1",
value: "action 1",
icon: new Icon({ type: IconType.enum.Iconify, value: "material-symbols:add-reaction" })
}),
new Action.Action({ title: "Action 2", value: "action 2" }),
new Action.Action({ title: "Action 3", value: "action 3" }),
new Action.Action({ title: "Action 4", value: "action 4" })
]
})
})
return ui.render(list)
}
async onSearchTermChange(term: string): Promise<void> {
return ui.render(
new List.List({
// items: allItems.filter((item) => item.title.toLowerCase().includes(term.toLowerCase())),
inherits: ["items", "sections"],
defaultAction: "Top Default Action",
detail: new List.ItemDetail({
children: [
new List.ItemDetailMetadata([
new List.ItemDetailMetadataLabel({
title: "Label Title",
text: "Label Text"
})
])
// new Markdown(`
// ## Search results for "${term}"
// <img src="https://github.com/huakunshen.png" />
// <img src="https://github.com/huakunshen.png" />
// <img src="https://github.com/huakunshen.png" />
// `)
],
width: term.length > 3 ? 70 : 30
})
})
)
}
async onListItemSelected(value: string): Promise<void> {
console.log("Item selected:", value)
}
async onActionSelected(value: string): Promise<void> {
console.log("Action selected:", value)
} }
} }
// class ExtensionTemplate extends WorkerExtension {
// async onBeforeGoBack() {
// console.log("onBeforeGoBack")
// // console.log(`Try killing pid: ${this.apiProcess?.pid}`)
// // await this.apiProcess?.kill()
// // console.log("apiProcess killed")
// }
// async onFormSubmit(value: Record<string, any>): Promise<void> {
// console.log("Form submitted", value)
// }
// async onEnterPressedOnSearchBar(): Promise<void> {
// console.log("Enter pressed on search bar")
// }
// async load() {
// clipboard.readText().then((text) => {
// console.log("Clipboard text:", text)
// })
// // console.log("Check screen capture permission:", await security.mac.checkScreenCapturePermission())
// // await security.mac.revealSecurityPane("AllFiles")
// // console.log(await security.mac.verifyFingerprint())
// ui.setSearchBarPlaceholder("Search for items")
// ui.showLoadingBar(true)
// setTimeout(() => {
// ui.showLoadingBar(false)
// }, 2000)
// const { rpcChannel, process, command } = await shell.createDenoRpcChannel<
// {},
// {
// add(a: number, b: number): Promise<number>
// subtract(a: number, b: number): Promise<number>
// readImageMetadata(path: string): Promise<any>
// batchReadImageMetadata: (paths: string[]) => Promise<any[]>
// }
// >(
// "$EXTENSION/deno-src/rpc.ts",
// [],
// {
// // allowEnv: ["npm_package_config_libvips"],
// allowAllEnv: true,
// // allowFfi: ["*sharp-darwin-arm64.node"],
// allowAllFfi: true,
// allowAllRead: true,
// allowAllSys: true,
// // allowRun: ["*exiftool"]
// allowAllRun: true
// },
// {}
// )
// // const child = new Child(process.pid)
// command.stdout.on("data", (data) => {
// console.log("stdout", data.toString())
// })
// command.stderr.on("data", (data) => {
// console.log("stderr", data.toString())
// })
// const api = rpcChannel.getAPI()
// await api
// .batchReadImageMetadata(files)
// .then((metadata) => {
// console.log("metadata", metadata)
// })
// .catch(console.error)
// // await api
// // .readImageMetadata("/Users/hacker/Pictures/3D-Image/pics/IMG_0767.jpeg")
// // .then((data) => {
// // console.log("metadata", data)
// // })
// // .catch((err) => {
// // console.error("error", err)
// // })
// // await api.add(1, 2).then(console.log)
// // await api.subtract(1, 2).then(console.log)
// await process.kill()
// const extPath = await path.extensionDir()
// // console.log("Extension path:", extPath)
// const tagList = new List.ItemDetailMetadataTagList({
// title: "Tag List Title",
// tags: [
// new List.ItemDetailMetadataTagListItem({
// text: "red",
// color: "#ff0000"
// }),
// new List.ItemDetailMetadataTagListItem({
// text: "yellow",
// color: "#ffff00"
// })
// ]
// })
// const list = new List.List({
// items: allItems,
// defaultAction: "Top Default Action",
// detail: new List.ItemDetail({
// children: [
// new List.ItemDetailMetadata([
// new List.ItemDetailMetadataLabel({
// title: "Label Title",
// text: "Label Text"
// }),
// new List.ItemDetailMetadataLabel({
// title: "Label Title",
// text: "Label Text",
// icon: new Icon({
// type: IconType.enum.Iconify,
// value: "mingcute:appstore-fill"
// })
// }),
// new List.ItemDetailMetadataSeparator(),
// new List.ItemDetailMetadataLabel({
// title: "Label Title",
// text: "Label Text"
// }),
// new List.ItemDetailMetadataLink({
// title: "Link Title",
// text: "Link Text",
// url: "https://github.com/huakunshen"
// }),
// new List.ItemDetailMetadataLabel({
// title: "Label Title",
// text: "Label Text"
// }),
// tagList
// ]),
// new Markdown(`
// # Hello World
// <img src="https://github.com/huakunshen.png" />
// <img src="https://github.com/huakunshen.png" />
// <img src="https://github.com/huakunshen.png" />
// `)
// ],
// width: 50
// }),
// actions: new Action.ActionPanel({
// items: [
// new Action.Action({
// title: "Action 1",
// value: "action 1",
// icon: new Icon({ type: IconType.enum.Iconify, value: "material-symbols:add-reaction" })
// }),
// new Action.Action({ title: "Action 2", value: "action 2" }),
// new Action.Action({ title: "Action 3", value: "action 3" }),
// new Action.Action({ title: "Action 4", value: "action 4" })
// ]
// })
// })
// return ui.render(list)
// }
// async onSearchTermChange(term: string): Promise<void> {
// return ui.render(
// new List.List({
// // items: allItems.filter((item) => item.title.toLowerCase().includes(term.toLowerCase())),
// inherits: ["items", "sections"],
// defaultAction: "Top Default Action",
// detail: new List.ItemDetail({
// children: [
// new List.ItemDetailMetadata([
// new List.ItemDetailMetadataLabel({
// title: "Label Title",
// text: "Label Text"
// })
// ])
// // new Markdown(`
// // ## Search results for "${term}"
// // <img src="https://github.com/huakunshen.png" />
// // <img src="https://github.com/huakunshen.png" />
// // <img src="https://github.com/huakunshen.png" />
// // `)
// ],
// width: term.length > 3 ? 70 : 30
// })
// })
// )
// }
// async onListItemSelected(value: string): Promise<void> {
// console.log("Item selected:", value)
// }
// async onActionSelected(value: string): Promise<void> {
// console.log("Action selected:", value)
// }
// }
expose(new ExtensionTemplate()) expose(new ExtensionTemplate())

View File

@ -1,13 +0,0 @@
#![cfg(target_os = "macos")]
use mac_security_rs::{
preflight_screen_capture_access, request_screen_capture_access, verify_auth, AuthPolicy,
};
fn main() {
#[cfg(target_os = "macos")]
// println!("{}", request_screen_capture_access());
println!("{}", verify_auth(AuthPolicy::Biometrics));
}
#[cfg(not(target_os = "macos"))]
fn main() {}

View File

@ -19,9 +19,9 @@ tar = "0.4.40"
flate2 = "1.0.30" flate2 = "1.0.30"
window-vibrancy = "0.5.0" window-vibrancy = "0.5.0"
tauri-plugin-store = "2.0.1" tauri-plugin-store = "2.0.1"
axum = { version = "0.6.20" } axum = { workspace = true }
axum-extra = { version = "0.8.0" } axum-extra = { workspace = true }
axum-server = { version = "0.5", features = ["tls-rustls"] } axum-server = { workspace = true }
tower = { version = "0.4", features = ["util"] } tower = { version = "0.4", features = ["util"] }
tower-http = { version = "0.4.0", features = ["fs", "trace", "cors"] } tower-http = { version = "0.4.0", features = ["fs", "trace", "cors"] }
tonic = "0.11" tonic = "0.11"
@ -41,6 +41,9 @@ mac-security-rs = { workspace = true }
zip = "1.1.4" zip = "1.1.4"
rust_search = "2.1.0" rust_search = "2.1.0"
plist = "1.7.0" plist = "1.7.0"
crypto = { workspace = true }
base64 = { workspace = true }
obfstr = { workspace = true }
[target.'cfg(target_os = "macos")'.dependencies] [target.'cfg(target_os = "macos")'.dependencies]
tauri-icns = "0.1.0" tauri-icns = "0.1.0"
@ -50,5 +53,6 @@ tauri-winres = "0.1.1"
ico = "0.3.0" ico = "0.3.0"
[build-dependencies] [build-dependencies]
tauri-plugin = { version = "2.0.1", features = ["build"] } tauri-plugin = { version = "2.0.3", features = ["build"] }
tonic-build = "0.11" tonic-build = "0.11"
base64 = { workspace = true }

View File

@ -1,3 +1,5 @@
use base64::prelude::*;
const COMMANDS: &[&str] = &[ const COMMANDS: &[&str] = &[
"open_devtools", "open_devtools",
"close_devtools", "close_devtools",
@ -115,11 +117,42 @@ const COMMANDS: &[&str] = &[
]; ];
fn main() { fn main() {
// SSL Cert
let cert_pem = match std::env::var("CERT_PEM") {
Ok(cert) => cert.into_bytes(),
Err(_) => include_bytes!("./self_signed_certs/cert.pem").to_vec(),
};
let key_pem = match std::env::var("KEY_PEM") {
Ok(key) => key.into_bytes(),
Err(_) => include_bytes!("./self_signed_certs/key.pem").to_vec(),
};
println!(
"cargo:rustc-env=BASE64_CERT_PEM={}",
BASE64_STANDARD.encode(cert_pem)
);
println!(
"cargo:rustc-env=BASE64_KEY_PEM={}",
BASE64_STANDARD.encode(key_pem)
);
// GRPC
let out_dir = std::path::PathBuf::from(std::env::var("OUT_DIR").unwrap()); let out_dir = std::path::PathBuf::from(std::env::var("OUT_DIR").unwrap());
tonic_build::configure() tonic_build::configure()
.file_descriptor_set_path(out_dir.join("helloworld_descriptor.bin")) .file_descriptor_set_path(out_dir.join("kk_grpc.bin"))
.compile(&["proto/helloworld.proto"], &["proto"]) .compile(
&["proto/helloworld.proto", "proto/file-transfer.proto"],
&["proto"],
)
.expect("Failed to compile protos"); .expect("Failed to compile protos");
// Server Public Key
let raw_server_public_key = include_bytes!("./keys/server_public_key.pem").to_vec();
println!(
"cargo:rustc-env=BASE64_SERVER_PUBLIC_KEY={}",
BASE64_STANDARD.encode(raw_server_public_key)
);
tauri_plugin::Builder::new(COMMANDS) tauri_plugin::Builder::new(COMMANDS)
.android_path("android") .android_path("android")
.ios_path("ios") .ios_path("ios")

View File

@ -0,0 +1,16 @@
{
"name": "jarvis",
"module": "index.ts",
"type": "module",
"scripts": {
"prepare": "bun setup.ts"
},
"devDependencies": {
"@kksh/supabase": "workspace:*",
"@kksh/ci": "workspace:*",
"@types/bun": "latest"
},
"peerDependencies": {
"typescript": "^5.0.0"
}
}

View File

@ -0,0 +1,25 @@
syntax = "proto3";
package file_transfer;
service FileTransfer {
rpc StartTransfer (StartTransferRequest) returns (StartTransferResponse);
rpc SendTransferInfo(TransferInfo) returns (SendTransferInfoResponse);
}
message StartTransferRequest {
string ssl_cert = 1;
}
message StartTransferResponse {
string port = 1;
}
message TransferInfo {
string filename = 1;
string code = 2;
int32 port = 3;
}
message SendTransferInfoResponse {}

View File

@ -0,0 +1,16 @@
import { writeFileSync } from "fs"
import { createSB } from "@kksh/supabase"
if (!process.env.SUPABASE_URL || !process.env.SUPABASE_ANON_KEY) {
throw new Error("SUPABASE_URL and SUPABASE_ANON_KEY must be set")
}
const supabase = createSB(process.env.SUPABASE_URL, process.env.SUPABASE_ANON_KEY)
const { data, error } = await supabase.storage.from("pub").download("server_public_key.pem")
if (error) {
console.error(error)
throw error
}
writeFileSync("./keys/server_public_key.pem", await data.text())

View File

@ -5,6 +5,8 @@ use db::{
use std::{path::PathBuf, sync::Mutex}; use std::{path::PathBuf, sync::Mutex};
use tauri::{utils::acl::identifier, State}; use tauri::{utils::acl::identifier, State};
use crate::utils::db::get_db;
#[derive(Debug)] #[derive(Debug)]
pub struct DBState { pub struct DBState {
pub db: Mutex<JarvisDB>, pub db: Mutex<JarvisDB>,
@ -13,7 +15,7 @@ pub struct DBState {
impl DBState { impl DBState {
pub fn new(path: PathBuf, key: Option<String>) -> anyhow::Result<Self> { pub fn new(path: PathBuf, key: Option<String>) -> anyhow::Result<Self> {
let db = JarvisDB::new(path, key)?; let db = get_db(path, key)?;
db.init()?; db.init()?;
Ok(Self { db: Mutex::new(db) }) Ok(Self { db: Mutex::new(db) })
} }

View File

@ -1,3 +1,5 @@
use base64::prelude::*;
/* -------------------------------------------------------------------------- */ /* -------------------------------------------------------------------------- */
/* Buildin Extension Identifiers */ /* Buildin Extension Identifiers */
/* -------------------------------------------------------------------------- */ /* -------------------------------------------------------------------------- */
@ -11,3 +13,10 @@ pub const KUNKUN_DEV_EXT_IDENTIFIER: &str = "sh.kunkun.ext.dev";
/* Kunkun Builtin Events */ /* Kunkun Builtin Events */
/* -------------------------------------------------------------------------- */ /* -------------------------------------------------------------------------- */
pub const KUNKUN_REFRESH_WORKER_EXTENSION: &str = "kunkun://refresh-dev-extension"; pub const KUNKUN_REFRESH_WORKER_EXTENSION: &str = "kunkun://refresh-dev-extension";
pub static BASE64_SERVER_PUBLIC_KEY: &str = env!("BASE64_SERVER_PUBLIC_KEY");
pub static SERVER_PUBLIC_KEY: std::sync::LazyLock<Vec<u8>> = std::sync::LazyLock::new(|| {
BASE64_STANDARD
.decode(BASE64_SERVER_PUBLIC_KEY)
.expect("Failed to decode base64 encoded server public key")
});

View File

@ -54,7 +54,7 @@ impl<R: Runtime, T: Manager<R>> crate::JarvisExt<R> for T {
} }
/// Initializes the plugin. /// Initializes the plugin.
pub fn init<R: Runtime>() -> TauriPlugin<R> { pub fn init<R: Runtime>(db_key: Option<String>) -> TauriPlugin<R> {
Builder::new("jarvis") Builder::new("jarvis")
.invoke_handler(tauri::generate_handler![ .invoke_handler(tauri::generate_handler![
/* ------------------------------ dev commands ------------------------------ */ /* ------------------------------ dev commands ------------------------------ */
@ -169,7 +169,7 @@ pub fn init<R: Runtime>() -> TauriPlugin<R> {
/* -------------------------------------------------------------------------- */ /* -------------------------------------------------------------------------- */
commands::discovery::get_peers commands::discovery::get_peers
]) ])
.setup(|app, api| { .setup(move |app, api| {
// #[cfg(mobile)] // #[cfg(mobile)]
// let jarvis = mobile::init(app, api)?; // let jarvis = mobile::init(app, api)?;
#[cfg(desktop)] #[cfg(desktop)]
@ -182,7 +182,6 @@ pub fn init<R: Runtime>() -> TauriPlugin<R> {
app.manage(JarvisState::default()); app.manage(JarvisState::default());
app.manage(commands::apps::ApplicationsState::default()); app.manage(commands::apps::ApplicationsState::default());
let db_path = get_kunkun_db_path(app)?; let db_path = get_kunkun_db_path(app)?;
let db_key: Option<String> = None;
app.manage(commands::db::DBState::new(db_path.clone(), db_key.clone())?); app.manage(commands::db::DBState::new(db_path.clone(), db_key.clone())?);
setup::db::setup_db(app)?; setup::db::setup_db(app)?;
println!("Jarvis Plugin Initialized"); println!("Jarvis Plugin Initialized");

View File

@ -0,0 +1,39 @@
use file_transfer::file_transfer_server::FileTransfer;
use file_transfer::{
SendTransferInfoResponse, StartTransferRequest, StartTransferResponse, TransferInfo,
};
use tauri::AppHandle;
use tonic::{Request, Response, Status};
pub mod file_transfer {
tonic::include_proto!("file_transfer"); // The string specified here must match the proto package name
pub const FILE_DESCRIPTOR_SET: &[u8] = tonic::include_file_descriptor_set!("kk_grpc");
}
#[derive(Debug)]
pub struct MyFileTransfer {
pub app_handle: AppHandle,
}
#[tonic::async_trait]
impl FileTransfer for MyFileTransfer {
async fn start_transfer(
&self,
request: Request<StartTransferRequest>, // Accept request of type StartTransferRequest
) -> Result<Response<StartTransferResponse>, Status> {
println!("Got a request: {:?}", request);
let reply = StartTransferResponse {
port: "8080".to_string(),
};
Ok(Response::new(reply)) // Send back our formatted greeting
}
async fn send_transfer_info(
&self,
request: Request<TransferInfo>,
) -> Result<Response<SendTransferInfoResponse>, Status> {
println!("Got a request: {:?}", request);
Ok(Response::new(SendTransferInfoResponse {}))
}
}

View File

@ -1,15 +1,18 @@
use hello_world::greeter_server::Greeter; use hello_world::greeter_server::Greeter;
use hello_world::{HelloReply, HelloRequest}; use hello_world::{HelloReply, HelloRequest};
use tauri::AppHandle;
use tonic::{Request, Response, Status}; use tonic::{Request, Response, Status};
pub mod hello_world { pub mod hello_world {
tonic::include_proto!("helloworld"); // The string specified here must match the proto package name tonic::include_proto!("helloworld"); // The string specified here must match the proto package name
pub const FILE_DESCRIPTOR_SET: &[u8] = pub const FILE_DESCRIPTOR_SET: &[u8] = tonic::include_file_descriptor_set!("kk_grpc");
tonic::include_file_descriptor_set!("helloworld_descriptor");
} }
#[derive(Debug, Default)] #[derive(Debug)]
pub struct MyGreeter {} pub struct MyGreeter {
pub app_handle: AppHandle,
pub name: String,
}
#[tonic::async_trait] #[tonic::async_trait]
impl Greeter for MyGreeter { impl Greeter for MyGreeter {
@ -19,7 +22,12 @@ impl Greeter for MyGreeter {
) -> Result<Response<HelloReply>, Status> { ) -> Result<Response<HelloReply>, Status> {
println!("Got a request: {:?}", request); println!("Got a request: {:?}", request);
let reply = HelloReply { let reply = HelloReply {
message: format!("Hello {}!", request.into_inner().name), // We must use .into_inner() as the fields of gRPC requests and responses are private message: format!(
"Hello {} from {} by Kunkun {}!",
request.into_inner().name,
self.name,
self.app_handle.package_info().version
), // We must use .into_inner() as the fields of gRPC requests and responses are private
}; };
Ok(Response::new(reply)) // Send back our formatted greeting Ok(Response::new(reply)) // Send back our formatted greeting

View File

@ -1 +1,2 @@
pub mod file_transfer;
pub mod greeter; pub mod greeter;

View File

@ -1,13 +1,19 @@
use super::grpc::greeter::hello_world::greeter_server::GreeterServer;
use super::grpc::greeter::MyGreeter; use super::grpc::greeter::MyGreeter;
/// This module is responsible for controlling the main server use super::grpc::{
file_transfer::file_transfer::file_transfer_server::FileTransferServer,
greeter::hello_world::greeter_server::GreeterServer,
};
use super::model::ServerState; use super::model::ServerState;
use super::Protocol; use super::Protocol;
use crate::server::grpc::file_transfer::MyFileTransfer;
use crate::server::tls::{CERT_PEM, KEY_PEM}; use crate::server::tls::{CERT_PEM, KEY_PEM};
use crate::utils::path::get_default_extensions_dir; use crate::utils::path::get_default_extensions_dir;
use axum::http::{HeaderValue, Method, StatusCode, Uri}; use axum::http::{HeaderValue, Method, StatusCode, Uri};
use axum::routing::{get, get_service, post}; use axum::routing::{get, get_service, post};
use axum_server::tls_rustls::RustlsConfig; use axum_server::tls_rustls::RustlsConfig;
use base64::prelude::*;
/// This module is responsible for controlling the main server
use obfstr::obfstr as s;
use std::sync::Mutex; use std::sync::Mutex;
use std::{net::SocketAddr, path::PathBuf, sync::Arc}; use std::{net::SocketAddr, path::PathBuf, sync::Arc};
use tauri::AppHandle; use tauri::AppHandle;
@ -23,7 +29,6 @@ async fn start_server(
shtdown_handle: axum_server::Handle, shtdown_handle: axum_server::Handle,
options: ServerOptions, options: ServerOptions,
) -> Result<(), Box<dyn std::error::Error>> { ) -> Result<(), Box<dyn std::error::Error>> {
let greeter = MyGreeter::default();
let server_state = ServerState { let server_state = ServerState {
app_handle: app_handle.clone(), app_handle: app_handle.clone(),
}; };
@ -31,13 +36,24 @@ async fn start_server(
.register_encoded_file_descriptor_set( .register_encoded_file_descriptor_set(
super::grpc::greeter::hello_world::FILE_DESCRIPTOR_SET, super::grpc::greeter::hello_world::FILE_DESCRIPTOR_SET,
) )
.register_encoded_file_descriptor_set(
super::grpc::file_transfer::file_transfer::FILE_DESCRIPTOR_SET,
)
.build() .build()
.unwrap(); .unwrap();
let greeter = MyGreeter {
app_handle: app_handle.clone(),
name: "jarvis".to_string(),
};
let file_transfer = MyFileTransfer {
app_handle: app_handle.clone(),
};
let grpc_router = TonicServer::builder() let grpc_router = TonicServer::builder()
.add_service(reflection_service) .add_service(reflection_service)
.add_service(GreeterServer::new(greeter)) .add_service(GreeterServer::new(greeter))
.add_service(FileTransferServer::new(file_transfer))
.into_router(); .into_router();
let mut rest_router = axum::Router::new() let rest_router = axum::Router::new()
.route( .route(
"/refresh-worker-extension", "/refresh-worker-extension",
post(super::rest::refresh_worker_extension), post(super::rest::refresh_worker_extension),
@ -64,12 +80,25 @@ async fn start_server(
Protocol::Https => { Protocol::Https => {
let manifest_dir = PathBuf::from(env!("CARGO_MANIFEST_DIR")); let manifest_dir = PathBuf::from(env!("CARGO_MANIFEST_DIR"));
println!("manifest_dir: {}", manifest_dir.display()); println!("manifest_dir: {}", manifest_dir.display());
let tls_config = RustlsConfig::from_pem(CERT_PEM.to_vec(), KEY_PEM.to_vec()).await?;
// let tls_config = RustlsConfig::from_pem_file( let (key_pem, cert_pem) = if cfg!(debug_assertions) {
// manifest_dir.join("self_signed_certs").join("server.crt"), // In debug mode, use the base64 encoded certs from env
// manifest_dir.join("self_signed_certs").join("server.key"), let cert_pem = BASE64_STANDARD
// ) .decode(s!(env!("BASE64_CERT_PEM")).to_string())
// .await?; .expect("Failed to decode cert_pem");
let key_pem = BASE64_STANDARD
.decode(s!(env!("BASE64_KEY_PEM")).to_string())
.expect("Failed to decode key_pem");
(key_pem, cert_pem)
} else {
// In release mode, generate new self-signed certs every time app starts for safety
let rsa =
crypto::RsaCrypto::generate_rsa().expect("Failed to generate RSA key pair");
crypto::ssl::generate_self_signed_certificate(&rsa, 365)
.expect("Failed to generate self-signed certificate")
};
let tls_config = RustlsConfig::from_pem(cert_pem, key_pem).await?;
axum_server::bind_rustls(server_addr, tls_config) axum_server::bind_rustls(server_addr, tls_config)
.handle(shtdown_handle) .handle(shtdown_handle)
.serve(combined_router.into_make_service()) .serve(combined_router.into_make_service())

View File

@ -5,6 +5,7 @@ use tauri::{AppHandle, Runtime};
pub struct ServerInfo { pub struct ServerInfo {
pub service_name: String, pub service_name: String,
pub service_version: String, pub service_version: String,
pub public_key: String,
} }
#[derive(Clone)] #[derive(Clone)]

View File

@ -1,5 +1,5 @@
use super::model::{ServerInfo, ServerState}; use super::model::{ServerInfo, ServerState};
use crate::constants::KUNKUN_REFRESH_WORKER_EXTENSION; use crate::constants::{KUNKUN_REFRESH_WORKER_EXTENSION, SERVER_PUBLIC_KEY};
use axum::extract::State; use axum::extract::State;
use tauri::Emitter; use tauri::Emitter;
@ -16,6 +16,7 @@ pub async fn get_server_info(State(state): State<ServerState>) -> axum::Json<Ser
axum::Json(ServerInfo { axum::Json(ServerInfo {
service_name: pkg_info.name.to_string(), service_name: pkg_info.name.to_string(),
service_version: pkg_info.version.to_string(), service_version: pkg_info.version.to_string(),
public_key: String::from_utf8(SERVER_PUBLIC_KEY.clone()).unwrap(),
}) })
} }

View File

@ -1,2 +1,13 @@
pub const CERT_PEM: &[u8] = include_bytes!("../../self_signed_certs/cert.pem"); pub const CERT_PEM: &[u8] = include_bytes!("../../self_signed_certs/cert.pem");
pub const KEY_PEM: &[u8] = include_bytes!("../../self_signed_certs/key.pem"); pub const KEY_PEM: &[u8] = include_bytes!("../../self_signed_certs/key.pem");
// pub const CERT_PEM: &[u8] = if option_env!("CERT_PEM").is_some() {
// env!("CERT_PEM").as_bytes()
// } else {
// include_bytes!("../../self_signed_certs/cert.pem")
// };
// pub const KEY_PEM: &[u8] = if option_env!("KEY_PEM").is_some() {
// env!("KEY_PEM").as_bytes()
// } else {
// include_bytes!("../../self_signed_certs/key.pem")
// };

View File

@ -0,0 +1,7 @@
use std::path::PathBuf;
use db::JarvisDB;
pub fn get_db(path: PathBuf, key: Option<String>) -> anyhow::Result<JarvisDB> {
JarvisDB::new(path, key).map_err(|e| anyhow::anyhow!("Failed to get db: {}", e))
}

View File

@ -1,3 +1,4 @@
pub mod db;
pub mod fs; pub mod fs;
pub mod icns; pub mod icns;
pub mod manifest; pub mod manifest;

View File

@ -16,5 +16,9 @@ pub fn get_default_extensions_storage_dir<R: Runtime>(
} }
pub fn get_kunkun_db_path<R: Runtime>(app: &AppHandle<R>) -> anyhow::Result<PathBuf> { pub fn get_kunkun_db_path<R: Runtime>(app: &AppHandle<R>) -> anyhow::Result<PathBuf> {
Ok(app.path().app_data_dir()?.join("kk.db")) Ok(app.path().app_data_dir()?.join(if cfg!(debug_assertions) {
"kk.dev.db"
} else {
"kk.db"
}))
} }

View File

@ -1,11 +1,7 @@
/** @type {import('next').NextConfig} */ /** @type {import('next').NextConfig} */
const nextConfig = { const nextConfig = {
output: "export", output: "export",
transpilePackages: ["@kksh/api"], transpilePackages: ["@kksh/api"]
experimental: {
workerThreads: false,
cpus: 1 // Limit to 1 CPU
}
} }
export default nextConfig export default nextConfig

View File

@ -42,19 +42,19 @@
"@kksh/api": "workspace:*", "@kksh/api": "workspace:*",
"@kksh/react": "0.1.1", "@kksh/react": "0.1.1",
"@radix-ui/react-icons": "^1.3.2", "@radix-ui/react-icons": "^1.3.2",
"next": "14.2.18", "react": "19.0.0-rc-66855b96-20241106",
"react": "^18", "react-dom": "19.0.0-rc-66855b96-20241106",
"react-dom": "^18" "next": "15.0.3"
}, },
"devDependencies": { "devDependencies": {
"typescript": "^5",
"@types/node": "^20", "@types/node": "^20",
"@types/react": "^18", "@types/react": "^18",
"@types/react-dom": "^18", "@types/react-dom": "^18",
"eslint": "^8",
"eslint-config-next": "14.2.7",
"postcss": "^8", "postcss": "^8",
"tailwindcss": "^3.4.1", "tailwindcss": "^3.4.1",
"typescript": "^5" "eslint": "^8",
"eslint-config-next": "15.0.3"
}, },
"files": [ "files": [
"out" "out"

View File

@ -1,15 +0,0 @@
# template-ext-vue
## 0.0.2
### Patch Changes
- Updated dependencies
- @kksh/api@0.0.4
## 0.0.1
### Patch Changes
- Updated dependencies [fba6a49]
- @kksh/vue@0.0.1

View File

@ -1,13 +1,13 @@
<!doctype html> <!doctype html>
<html lang="en"> <html lang="en">
<head> <head>
<meta charset="UTF-8" /> <meta charset="UTF-8" />
<link rel="icon" type="image/svg+xml" href="/vite.svg" /> <link rel="icon" type="image/svg+xml" href="/vite.svg" />
<meta name="viewport" content="width=device-width, initial-scale=1.0" /> <meta name="viewport" content="width=device-width, initial-scale=1.0" />
<title>Vite + Vue + TS</title> <title>Vite + Vue + TS</title>
</head> </head>
<body> <body>
<div id="app"></div> <div id="app"></div>
<script type="module" src="/src/main.ts"></script> <script type="module" src="/src/main.ts"></script>
</body> </body>
</html> </html>

View File

@ -1,8 +1,7 @@
{ {
"$schema": "./node_modules/@kksh/api/dist/schema.json",
"name": "template-ext-vue", "name": "template-ext-vue",
"private": true, "private": true,
"version": "0.0.2", "version": "0.0.0",
"type": "module", "type": "module",
"scripts": { "scripts": {
"dev": "vite", "dev": "vite",
@ -18,17 +17,16 @@
"radix-vue": "^1.9.5", "radix-vue": "^1.9.5",
"tailwind-merge": "^2.4.0", "tailwind-merge": "^2.4.0",
"tailwindcss-animate": "^1.0.7", "tailwindcss-animate": "^1.0.7",
"vue": "^3.4.31" "vue": "^3.5.12"
}, },
"devDependencies": { "devDependencies": {
"@types/node": "^20.14.12", "@vitejs/plugin-vue": "^5.1.4",
"@vitejs/plugin-vue": "^5.0.5",
"autoprefixer": "^10.4.20", "autoprefixer": "^10.4.20",
"postcss": "^8.4.47", "postcss": "^8.4.49",
"tailwindcss": "^3.4.9", "tailwindcss": "^3.4.15",
"typescript": "^5.2.2", "typescript": "~5.6.2",
"vite": "^5.4.9", "vite": "^5.4.10",
"vue-tsc": "^2.0.24" "vue-tsc": "^2.1.8"
}, },
"kunkun": { "kunkun": {
"name": "TODO: Change Display Name", "name": "TODO: Change Display Name",

View File

@ -1,6 +1,6 @@
export default { export default {
plugins: { plugins: {
tailwindcss: {}, tailwindcss: {},
autoprefixer: {}, autoprefixer: {}
}, }
}; }

View File

@ -1,80 +0,0 @@
@import url("@kksh/vue/css");
@import url("@kksh/vue/themes");
@tailwind base;
@tailwind components;
@tailwind utilities;
@layer base {
:root {
--background: 0 0% 100%;
--foreground: 0 0% 3.9%;
--muted: 0 0% 96.1%;
--muted-foreground: 0 0% 45.1%;
--popover: 0 0% 100%;
--popover-foreground: 0 0% 3.9%;
--card: 0 0% 100%;
--card-foreground: 0 0% 3.9%;
--border: 0 0% 89.8%;
--input: 0 0% 89.8%;
--primary: 0 0% 9%;
--primary-foreground: 0 0% 98%;
--secondary: 0 0% 96.1%;
--secondary-foreground: 0 0% 9%;
--accent: 0 0% 96.1%;
--accent-foreground: 0 0% 9%;
--destructive: 0 84.2% 60.2%;
--destructive-foreground: 0 0% 98%;
--ring: 0 0% 3.9%;
--radius: 0.5rem;
}
.dark {
--background: 0 0% 3.9%;
--foreground: 0 0% 98%;
--muted: 0 0% 14.9%;
--muted-foreground: 0 0% 63.9%;
--popover: 0 0% 3.9%;
--popover-foreground: 0 0% 98%;
--card: 0 0% 3.9%;
--card-foreground: 0 0% 98%;
--border: 0 0% 14.9%;
--input: 0 0% 14.9%;
--primary: 0 0% 98%;
--primary-foreground: 0 0% 9%;
--secondary: 0 0% 14.9%;
--secondary-foreground: 0 0% 98%;
--accent: 0 0% 14.9%;
--accent-foreground: 0 0% 98%;
--destructive: 0 62.8% 30.6%;
--destructive-foreground: 0 0% 98%;
--ring: 0 0% 83.1%;
}
}
@layer base {
* {
@apply border-border;
}
body {
@apply bg-background text-foreground;
}
}

View File

@ -1,5 +1,5 @@
import { createApp } from "vue" import { createApp } from "vue"
import "./index.css" import "./style.css"
import App from "./App.vue" import App from "./App.vue"
createApp(App).mount("#app") createApp(App).mount("#app")

View File

@ -0,0 +1,80 @@
@import url("@kksh/vue/css");
@import url("@kksh/vue/themes");
@tailwind base;
@tailwind components;
@tailwind utilities;
@layer base {
:root {
--background: 0 0% 100%;
--foreground: 0 0% 3.9%;
--muted: 0 0% 96.1%;
--muted-foreground: 0 0% 45.1%;
--popover: 0 0% 100%;
--popover-foreground: 0 0% 3.9%;
--card: 0 0% 100%;
--card-foreground: 0 0% 3.9%;
--border: 0 0% 89.8%;
--input: 0 0% 89.8%;
--primary: 0 0% 9%;
--primary-foreground: 0 0% 98%;
--secondary: 0 0% 96.1%;
--secondary-foreground: 0 0% 9%;
--accent: 0 0% 96.1%;
--accent-foreground: 0 0% 9%;
--destructive: 0 84.2% 60.2%;
--destructive-foreground: 0 0% 98%;
--ring: 0 0% 3.9%;
--radius: 0.5rem;
}
.dark {
--background: 0 0% 3.9%;
--foreground: 0 0% 98%;
--muted: 0 0% 14.9%;
--muted-foreground: 0 0% 63.9%;
--popover: 0 0% 3.9%;
--popover-foreground: 0 0% 98%;
--card: 0 0% 3.9%;
--card-foreground: 0 0% 98%;
--border: 0 0% 14.9%;
--input: 0 0% 14.9%;
--primary: 0 0% 98%;
--primary-foreground: 0 0% 9%;
--secondary: 0 0% 14.9%;
--secondary-foreground: 0 0% 98%;
--accent: 0 0% 14.9%;
--accent-foreground: 0 0% 98%;
--destructive: 0 62.8% 30.6%;
--destructive-foreground: 0 0% 98%;
--ring: 0 0% 83.1%;
}
}
@layer base {
* {
@apply border-border;
}
body {
@apply bg-background text-foreground;
}
}

View File

@ -2,92 +2,92 @@ const animate = require("tailwindcss-animate")
/** @type {import('tailwindcss').Config} */ /** @type {import('tailwindcss').Config} */
module.exports = { module.exports = {
darkMode: ["class"], darkMode: ["class"],
safelist: ["dark"], safelist: ["dark"],
prefix: "", prefix: "",
content: [ content: [
'./pages/**/*.{ts,tsx,vue}', "./pages/**/*.{ts,tsx,vue}",
'./components/**/*.{ts,tsx,vue}', "./components/**/*.{ts,tsx,vue}",
'./app/**/*.{ts,tsx,vue}', "./app/**/*.{ts,tsx,vue}",
'./src/**/*.{ts,tsx,vue}', "./src/**/*.{ts,tsx,vue}"
], ],
theme: { theme: {
container: { container: {
center: true, center: true,
padding: "2rem", padding: "2rem",
screens: { screens: {
"2xl": "1400px", "2xl": "1400px"
}, }
}, },
extend: { extend: {
colors: { colors: {
border: "hsl(var(--border))", border: "hsl(var(--border))",
input: "hsl(var(--input))", input: "hsl(var(--input))",
ring: "hsl(var(--ring))", ring: "hsl(var(--ring))",
background: "hsl(var(--background))", background: "hsl(var(--background))",
foreground: "hsl(var(--foreground))", foreground: "hsl(var(--foreground))",
primary: { primary: {
DEFAULT: "hsl(var(--primary))", DEFAULT: "hsl(var(--primary))",
foreground: "hsl(var(--primary-foreground))", foreground: "hsl(var(--primary-foreground))"
}, },
secondary: { secondary: {
DEFAULT: "hsl(var(--secondary))", DEFAULT: "hsl(var(--secondary))",
foreground: "hsl(var(--secondary-foreground))", foreground: "hsl(var(--secondary-foreground))"
}, },
destructive: { destructive: {
DEFAULT: "hsl(var(--destructive))", DEFAULT: "hsl(var(--destructive))",
foreground: "hsl(var(--destructive-foreground))", foreground: "hsl(var(--destructive-foreground))"
}, },
muted: { muted: {
DEFAULT: "hsl(var(--muted))", DEFAULT: "hsl(var(--muted))",
foreground: "hsl(var(--muted-foreground))", foreground: "hsl(var(--muted-foreground))"
}, },
accent: { accent: {
DEFAULT: "hsl(var(--accent))", DEFAULT: "hsl(var(--accent))",
foreground: "hsl(var(--accent-foreground))", foreground: "hsl(var(--accent-foreground))"
}, },
popover: { popover: {
DEFAULT: "hsl(var(--popover))", DEFAULT: "hsl(var(--popover))",
foreground: "hsl(var(--popover-foreground))", foreground: "hsl(var(--popover-foreground))"
}, },
card: { card: {
DEFAULT: "hsl(var(--card))", DEFAULT: "hsl(var(--card))",
foreground: "hsl(var(--card-foreground))", foreground: "hsl(var(--card-foreground))"
}, }
}, },
borderRadius: { borderRadius: {
xl: "calc(var(--radius) + 4px)", xl: "calc(var(--radius) + 4px)",
lg: "var(--radius)", lg: "var(--radius)",
md: "calc(var(--radius) - 2px)", md: "calc(var(--radius) - 2px)",
sm: "calc(var(--radius) - 4px)", sm: "calc(var(--radius) - 4px)"
}, },
keyframes: { keyframes: {
"accordion-down": { "accordion-down": {
from: { height: 0 }, from: { height: 0 },
to: { height: "var(--radix-accordion-content-height)" }, to: { height: "var(--radix-accordion-content-height)" }
}, },
"accordion-up": { "accordion-up": {
from: { height: "var(--radix-accordion-content-height)" }, from: { height: "var(--radix-accordion-content-height)" },
to: { height: 0 }, to: { height: 0 }
}, },
"collapsible-down": { "collapsible-down": {
from: { height: 0 }, from: { height: 0 },
to: { height: 'var(--radix-collapsible-content-height)' }, to: { height: "var(--radix-collapsible-content-height)" }
}, },
"collapsible-up": { "collapsible-up": {
from: { height: 'var(--radix-collapsible-content-height)' }, from: { height: "var(--radix-collapsible-content-height)" },
to: { height: 0 }, to: { height: 0 }
}, }
}, },
animation: { animation: {
"accordion-down": "accordion-down 0.2s ease-out", "accordion-down": "accordion-down 0.2s ease-out",
"accordion-up": "accordion-up 0.2s ease-out", "accordion-up": "accordion-up 0.2s ease-out",
"collapsible-down": "collapsible-down 0.2s ease-in-out", "collapsible-down": "collapsible-down 0.2s ease-in-out",
"collapsible-up": "collapsible-up 0.2s ease-in-out", "collapsible-up": "collapsible-up 0.2s ease-in-out"
}, }
}, }
}, },
plugins: [animate], plugins: [animate]
} }

View File

@ -1,6 +1,5 @@
{ {
"compilerOptions": { "compilerOptions": {
"composite": true,
"tsBuildInfoFile": "./node_modules/.tmp/tsconfig.app.tsbuildinfo", "tsBuildInfoFile": "./node_modules/.tmp/tsconfig.app.tsbuildinfo",
"target": "ES2020", "target": "ES2020",
"useDefineForClassFields": true, "useDefineForClassFields": true,
@ -9,23 +8,19 @@
"skipLibCheck": true, "skipLibCheck": true,
/* Bundler mode */ /* Bundler mode */
"moduleResolution": "bundler", "moduleResolution": "Bundler",
"allowImportingTsExtensions": true, "allowImportingTsExtensions": true,
"resolveJsonModule": true,
"isolatedModules": true, "isolatedModules": true,
"moduleDetection": "force", "moduleDetection": "force",
"noEmit": true, "noEmit": true,
"jsx": "preserve", "jsx": "preserve",
"baseUrl": ".",
"paths": {
"@/*": ["./src/*"]
},
/* Linting */ /* Linting */
"strict": true, "strict": true,
"noUnusedLocals": false, "noUnusedLocals": false,
"noUnusedParameters": false, "noUnusedParameters": false,
"noFallthroughCasesInSwitch": true "noFallthroughCasesInSwitch": true,
"noUncheckedSideEffectImports": true
}, },
"include": ["src/**/*.ts", "src/**/*.tsx", "src/**/*.vue"] "include": ["src/**/*.ts", "src/**/*.tsx", "src/**/*.vue"]
} }

View File

@ -1,11 +1,4 @@
{ {
"files": [], "files": [],
"references": [ "references": [{ "path": "./tsconfig.app.json" }, { "path": "./tsconfig.node.json" }]
{
"path": "./tsconfig.app.json"
},
{
"path": "./tsconfig.node.json"
}
]
} }

View File

@ -1,13 +1,24 @@
{ {
"compilerOptions": { "compilerOptions": {
"composite": true,
"tsBuildInfoFile": "./node_modules/.tmp/tsconfig.node.tsbuildinfo", "tsBuildInfoFile": "./node_modules/.tmp/tsconfig.node.tsbuildinfo",
"skipLibCheck": true, "target": "ES2022",
"lib": ["ES2023"],
"module": "ESNext", "module": "ESNext",
"moduleResolution": "bundler", "skipLibCheck": true,
"allowSyntheticDefaultImports": true,
/* Bundler mode */
"moduleResolution": "Bundler",
"allowImportingTsExtensions": true,
"isolatedModules": true,
"moduleDetection": "force",
"noEmit": true,
/* Linting */
"strict": true, "strict": true,
"noEmit": true "noUnusedLocals": true,
"noUnusedParameters": true,
"noFallthroughCasesInSwitch": true,
"noUncheckedSideEffectImports": true
}, },
"include": ["vite.config.ts"] "include": ["vite.config.ts"]
} }

View File

@ -1,19 +1,7 @@
import path from "node:path"
import vue from "@vitejs/plugin-vue" import vue from "@vitejs/plugin-vue"
import autoprefixer from "autoprefixer"
import { defineConfig } from "vite" import { defineConfig } from "vite"
// https://vitejs.dev/config/ // https://vite.dev/config/
export default defineConfig({ export default defineConfig({
css: { plugins: [vue()]
postcss: {
plugins: [autoprefixer()]
}
},
plugins: [vue()],
resolve: {
alias: {
"@": path.resolve(__dirname, "./src")
}
}
}) })

1571
pnpm-lock.yaml generated

File diff suppressed because it is too large Load Diff

@ -1 +1 @@
Subproject commit 6b38505d8534d81d826d613527eb75fd8da4ede4 Subproject commit ac41b051f0ebeac96213c6c32621b098634219ac