Compare commits
15 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
f7cd514997
|
||
|
|
3a4f6624fc
|
||
|
|
8a146a2e1d
|
||
|
|
1ab6e1a969
|
||
|
|
e27a98ca89
|
||
|
|
7b22fd9a4e
|
||
|
|
0706c47a33
|
||
|
|
378c41ddb2
|
||
|
|
65b161dfc6
|
||
|
|
75dca88164
|
||
|
|
fe7683f5b1
|
||
|
|
22c753d1e7
|
||
|
|
1f7bd51a7b
|
||
|
|
f34fd644b8
|
||
|
|
c827c2e58d
|
@@ -42,6 +42,7 @@ DOMAIN_NAME=localhost
|
||||
|
||||
ENABLE_CORS=false
|
||||
CORS_DOMAIN_NAME=localhost
|
||||
SENTRY_DSN=
|
||||
|
||||
# Media Limits (in KB)
|
||||
MAX_IMAGE_SIZE_KB=512
|
||||
|
||||
2
backend/.migrations/0009_add_privacy_settings.sql
Normal file
2
backend/.migrations/0009_add_privacy_settings.sql
Normal file
@@ -0,0 +1,2 @@
|
||||
ALTER TABLE "users" ADD COLUMN "show_online_status" boolean DEFAULT true NOT NULL;--> statement-breakpoint
|
||||
ALTER TABLE "users" ADD COLUMN "show_read_receipts" boolean DEFAULT true NOT NULL;
|
||||
1
backend/.migrations/0010_update_password_hash_length.sql
Normal file
1
backend/.migrations/0010_update_password_hash_length.sql
Normal file
@@ -0,0 +1 @@
|
||||
ALTER TABLE "users" ALTER COLUMN "password_hash" SET DATA TYPE varchar(255);
|
||||
2094
backend/.migrations/meta/0009_snapshot.json
Normal file
2094
backend/.migrations/meta/0009_snapshot.json
Normal file
File diff suppressed because it is too large
Load Diff
2094
backend/.migrations/meta/0010_snapshot.json
Normal file
2094
backend/.migrations/meta/0010_snapshot.json
Normal file
File diff suppressed because it is too large
Load Diff
@@ -64,6 +64,20 @@
|
||||
"when": 1769696731978,
|
||||
"tag": "0008_bitter_darwin",
|
||||
"breakpoints": true
|
||||
},
|
||||
{
|
||||
"idx": 9,
|
||||
"version": "7",
|
||||
"when": 1769717126917,
|
||||
"tag": "0009_add_privacy_settings",
|
||||
"breakpoints": true
|
||||
},
|
||||
{
|
||||
"idx": 10,
|
||||
"version": "7",
|
||||
"when": 1769718997591,
|
||||
"tag": "0010_update_password_hash_length",
|
||||
"breakpoints": true
|
||||
}
|
||||
]
|
||||
}
|
||||
@@ -1,6 +1,6 @@
|
||||
{
|
||||
"name": "@memegoat/backend",
|
||||
"version": "1.9.4",
|
||||
"version": "1.10.2",
|
||||
"description": "",
|
||||
"author": "",
|
||||
"private": true,
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
import { CacheModule } from "@nestjs/cache-manager";
|
||||
import { MiddlewareConsumer, Module, NestModule } from "@nestjs/common";
|
||||
import { Logger, MiddlewareConsumer, Module, NestModule } from "@nestjs/common";
|
||||
import { ConfigModule, ConfigService } from "@nestjs/config";
|
||||
import { ScheduleModule } from "@nestjs/schedule";
|
||||
import { ThrottlerModule } from "@nestjs/throttler";
|
||||
@@ -70,12 +70,24 @@ import { UsersModule } from "./users/users.module";
|
||||
isGlobal: true,
|
||||
imports: [ConfigModule],
|
||||
inject: [ConfigService],
|
||||
useFactory: async (config: ConfigService) => ({
|
||||
store: await redisStore({
|
||||
url: `redis://${config.get("REDIS_HOST")}:${config.get("REDIS_PORT")}`,
|
||||
}),
|
||||
ttl: 600, // 10 minutes
|
||||
}),
|
||||
useFactory: async (config: ConfigService) => {
|
||||
const logger = new Logger("RedisCache");
|
||||
return {
|
||||
store: await redisStore({
|
||||
url: `redis://${config.get("REDIS_HOST")}:${config.get("REDIS_PORT")}`,
|
||||
socket: {
|
||||
reconnectStrategy: (retries) => {
|
||||
const delay = Math.min(retries * 50, 2000);
|
||||
logger.warn(
|
||||
`Redis connection lost. Retrying in ${delay}ms (attempt ${retries})`,
|
||||
);
|
||||
return delay;
|
||||
},
|
||||
},
|
||||
}),
|
||||
ttl: 600, // 10 minutes
|
||||
};
|
||||
},
|
||||
}),
|
||||
],
|
||||
controllers: [AppController, HealthController],
|
||||
|
||||
@@ -103,10 +103,9 @@ export class AuthService {
|
||||
}
|
||||
|
||||
async login(dto: LoginDto, userAgent?: string, ip?: string) {
|
||||
this.logger.log(`Login attempt for email: ${dto.email}`);
|
||||
const { email, password } = dto;
|
||||
|
||||
const emailHash = await this.hashingService.hashEmail(email);
|
||||
const emailHash = await this.hashingService.hashEmail(dto.email);
|
||||
this.logger.log(`Login attempt for email hash: ${emailHash}`);
|
||||
const { password } = dto;
|
||||
const user = await this.usersService.findByEmailHash(emailHash);
|
||||
|
||||
if (!user) {
|
||||
|
||||
@@ -15,8 +15,12 @@ export class CategoriesService {
|
||||
) {}
|
||||
|
||||
private async clearCategoriesCache() {
|
||||
this.logger.log("Clearing categories cache");
|
||||
await this.cacheManager.del("categories/all");
|
||||
try {
|
||||
this.logger.log("Clearing categories cache");
|
||||
await this.cacheManager.del("categories/all");
|
||||
} catch (error) {
|
||||
this.logger.error(`Error clearing categories cache: ${error.message}`);
|
||||
}
|
||||
}
|
||||
|
||||
async findAll() {
|
||||
|
||||
90
backend/src/common/filters/http-exception.filter.spec.ts
Normal file
90
backend/src/common/filters/http-exception.filter.spec.ts
Normal file
@@ -0,0 +1,90 @@
|
||||
import { ArgumentsHost, HttpException, HttpStatus } from "@nestjs/common";
|
||||
import { Test, TestingModule } from "@nestjs/testing";
|
||||
import * as Sentry from "@sentry/nestjs";
|
||||
import { AllExceptionsFilter } from "./http-exception.filter";
|
||||
|
||||
jest.mock("@sentry/nestjs", () => ({
|
||||
captureException: jest.fn(),
|
||||
withScope: jest.fn((callback) => {
|
||||
const scope = {
|
||||
setUser: jest.fn(),
|
||||
setTag: jest.fn(),
|
||||
setExtra: jest.fn(),
|
||||
};
|
||||
callback(scope);
|
||||
return scope;
|
||||
}),
|
||||
}));
|
||||
|
||||
describe("AllExceptionsFilter", () => {
|
||||
let filter: AllExceptionsFilter;
|
||||
|
||||
beforeEach(async () => {
|
||||
const module: TestingModule = await Test.createTestingModule({
|
||||
providers: [AllExceptionsFilter],
|
||||
}).compile();
|
||||
|
||||
filter = module.get<AllExceptionsFilter>(AllExceptionsFilter);
|
||||
});
|
||||
|
||||
it("should hash the IP address and send it to Sentry for 500 errors", () => {
|
||||
const mockResponse = {
|
||||
status: jest.fn().mockReturnThis(),
|
||||
json: jest.fn().mockReturnThis(),
|
||||
};
|
||||
const mockRequest = {
|
||||
url: "/test",
|
||||
method: "GET",
|
||||
ip: "127.0.0.1",
|
||||
user: { sub: "user-123" },
|
||||
};
|
||||
const mockArgumentsHost = {
|
||||
switchToHttp: () => ({
|
||||
getResponse: () => mockResponse,
|
||||
getRequest: () => mockRequest,
|
||||
}),
|
||||
} as ArgumentsHost;
|
||||
|
||||
const exception = new Error("Internal Server Error");
|
||||
|
||||
filter.catch(exception, mockArgumentsHost);
|
||||
|
||||
expect(mockResponse.status).toHaveBeenCalledWith(
|
||||
HttpStatus.INTERNAL_SERVER_ERROR,
|
||||
);
|
||||
expect(Sentry.withScope).toHaveBeenCalled();
|
||||
|
||||
// Vérifier que captureException a été appelé (via withScope)
|
||||
expect(Sentry.captureException).toHaveBeenCalledWith(exception);
|
||||
});
|
||||
|
||||
it("should include hashed IP in logs", () => {
|
||||
const loggerSpy = jest.spyOn((filter as any).logger, "warn");
|
||||
const mockResponse = {
|
||||
status: jest.fn().mockReturnThis(),
|
||||
json: jest.fn().mockReturnThis(),
|
||||
};
|
||||
const mockRequest = {
|
||||
url: "/test",
|
||||
method: "GET",
|
||||
ip: "1.2.3.4",
|
||||
};
|
||||
const mockArgumentsHost = {
|
||||
switchToHttp: () => ({
|
||||
getResponse: () => mockResponse,
|
||||
getRequest: () => mockRequest,
|
||||
}),
|
||||
} as ArgumentsHost;
|
||||
|
||||
const exception = new HttpException("Bad Request", HttpStatus.BAD_REQUEST);
|
||||
|
||||
filter.catch(exception, mockArgumentsHost);
|
||||
|
||||
expect(mockResponse.status).toHaveBeenCalledWith(HttpStatus.BAD_REQUEST);
|
||||
|
||||
// L'IP 1.2.3.4 hachée en SHA256 contient un hash de 64 caractères
|
||||
const logCall = loggerSpy.mock.calls[0][0];
|
||||
expect(logCall).toMatch(/[a-f0-9]{64}/);
|
||||
expect(logCall).not.toContain("1.2.3.4");
|
||||
});
|
||||
});
|
||||
@@ -1,3 +1,4 @@
|
||||
import { createHash } from "node:crypto";
|
||||
import {
|
||||
ArgumentsHost,
|
||||
Catch,
|
||||
@@ -39,6 +40,11 @@ export class AllExceptionsFilter implements ExceptionFilter {
|
||||
const userId = request.user?.sub || request.user?.id;
|
||||
const userPart = userId ? `[User: ${userId}] ` : "";
|
||||
|
||||
const ip = request.ip || "unknown";
|
||||
const hashedIp = createHash("sha256")
|
||||
.update(ip as string)
|
||||
.digest("hex");
|
||||
|
||||
const errorResponse = {
|
||||
statusCode: status,
|
||||
timestamp: new Date().toISOString(),
|
||||
@@ -51,14 +57,20 @@ export class AllExceptionsFilter implements ExceptionFilter {
|
||||
};
|
||||
|
||||
if (status === HttpStatus.INTERNAL_SERVER_ERROR) {
|
||||
Sentry.captureException(exception);
|
||||
Sentry.withScope((scope) => {
|
||||
scope.setUser({
|
||||
id: userId,
|
||||
ip_address: hashedIp,
|
||||
});
|
||||
Sentry.captureException(exception);
|
||||
});
|
||||
this.logger.error(
|
||||
`${userPart}${request.method} ${request.url} - Error: ${exception instanceof Error ? exception.message : "Unknown error"}`,
|
||||
`${userPart}${hashedIp} ${request.method} ${request.url} - Error: ${exception instanceof Error ? exception.message : "Unknown error"}`,
|
||||
exception instanceof Error ? exception.stack : "",
|
||||
);
|
||||
} else {
|
||||
this.logger.warn(
|
||||
`${userPart}${request.method} ${request.url} - Status: ${status} - Message: ${JSON.stringify(message)}`,
|
||||
`${userPart}${hashedIp} ${request.method} ${request.url} - Status: ${status} - Message: ${JSON.stringify(message)}`,
|
||||
);
|
||||
}
|
||||
|
||||
|
||||
@@ -1,3 +1,4 @@
|
||||
import { createHash } from "node:crypto";
|
||||
import { CACHE_MANAGER } from "@nestjs/cache-manager";
|
||||
import { Inject, Injectable, Logger, NestMiddleware } from "@nestjs/common";
|
||||
import type { Cache } from "cache-manager";
|
||||
@@ -48,14 +49,25 @@ export class CrawlerDetectionMiddleware implements NestMiddleware {
|
||||
const { method, url, ip } = req;
|
||||
const userAgent = req.get("user-agent") || "unknown";
|
||||
|
||||
const hashedIp = createHash("sha256")
|
||||
.update(ip as string)
|
||||
.digest("hex");
|
||||
|
||||
// Vérifier si l'IP est bannie
|
||||
const isBanned = await this.cacheManager.get(`banned_ip:${ip}`);
|
||||
if (isBanned) {
|
||||
this.logger.warn(`Banned IP attempt: ${ip} -> ${method} ${url}`);
|
||||
res.status(403).json({
|
||||
message: "Access denied: Your IP has been temporarily banned.",
|
||||
});
|
||||
return;
|
||||
try {
|
||||
const isBanned = await this.cacheManager.get(`banned_ip:${ip}`);
|
||||
if (isBanned) {
|
||||
this.logger.warn(`Banned IP attempt: ${hashedIp} -> ${method} ${url}`);
|
||||
res.status(403).json({
|
||||
message: "Access denied: Your IP has been temporarily banned.",
|
||||
});
|
||||
return;
|
||||
}
|
||||
} catch (error) {
|
||||
this.logger.error(
|
||||
`Error checking ban status for IP ${hashedIp}: ${error.message}`,
|
||||
);
|
||||
// On continue même en cas d'erreur Redis pour ne pas bloquer les utilisateurs légitimes
|
||||
}
|
||||
|
||||
res.on("finish", async () => {
|
||||
@@ -69,11 +81,15 @@ export class CrawlerDetectionMiddleware implements NestMiddleware {
|
||||
|
||||
if (isSuspiciousPath || isBotUserAgent) {
|
||||
this.logger.warn(
|
||||
`Potential crawler detected: [${ip}] ${method} ${url} - User-Agent: ${userAgent}`,
|
||||
`Potential crawler detected: [${hashedIp}] ${method} ${url} - User-Agent: ${userAgent}`,
|
||||
);
|
||||
|
||||
// Bannir l'IP pour 24h via Redis
|
||||
await this.cacheManager.set(`banned_ip:${ip}`, true, 86400000);
|
||||
try {
|
||||
await this.cacheManager.set(`banned_ip:${ip}`, true, 86400000);
|
||||
} catch (error) {
|
||||
this.logger.error(`Error banning IP ${hashedIp}: ${error.message}`);
|
||||
}
|
||||
}
|
||||
}
|
||||
});
|
||||
|
||||
@@ -34,8 +34,12 @@ export class ContentsService {
|
||||
) {}
|
||||
|
||||
private async clearContentsCache() {
|
||||
this.logger.log("Clearing contents cache");
|
||||
await this.cacheManager.clear();
|
||||
try {
|
||||
this.logger.log("Clearing contents cache");
|
||||
await this.cacheManager.del("contents/all");
|
||||
} catch (error) {
|
||||
this.logger.error(`Error clearing contents cache: ${error.message}`);
|
||||
}
|
||||
}
|
||||
|
||||
async getUploadUrl(userId: string, fileName: string) {
|
||||
|
||||
@@ -21,14 +21,19 @@ const getPgpKey = () => process.env.PGP_ENCRYPTION_KEY || "default-pgp-key";
|
||||
* withAutomaticPgpDecrypt(users.email);
|
||||
* ```
|
||||
*/
|
||||
export const pgpEncrypted = customType<{ data: string; driverData: Buffer }>({
|
||||
export const pgpEncrypted = customType<{
|
||||
data: string | null;
|
||||
driverData: Buffer | string | null | SQL;
|
||||
}>({
|
||||
dataType() {
|
||||
return "bytea";
|
||||
},
|
||||
toDriver(value: string): SQL {
|
||||
toDriver(value: string | null): SQL | null {
|
||||
if (value === null) return null;
|
||||
return sql`pgp_sym_encrypt(${value}, ${getPgpKey()})`;
|
||||
},
|
||||
fromDriver(value: Buffer | string): string {
|
||||
fromDriver(value: Buffer | string | null | any): string | null {
|
||||
if (value === null || value === undefined) return null;
|
||||
if (typeof value === "string") return value;
|
||||
return value.toString();
|
||||
},
|
||||
|
||||
@@ -29,7 +29,7 @@ export const users = pgTable(
|
||||
displayName: varchar("display_name", { length: 32 }),
|
||||
|
||||
username: varchar("username", { length: 32 }).notNull().unique(),
|
||||
passwordHash: varchar("password_hash", { length: 100 }).notNull(),
|
||||
passwordHash: varchar("password_hash", { length: 255 }).notNull(),
|
||||
avatarUrl: varchar("avatar_url", { length: 512 }),
|
||||
bio: varchar("bio", { length: 255 }),
|
||||
|
||||
|
||||
@@ -1,8 +1,13 @@
|
||||
import { CACHE_MANAGER } from "@nestjs/cache-manager";
|
||||
import { Test, TestingModule } from "@nestjs/testing";
|
||||
import * as Sentry from "@sentry/nestjs";
|
||||
import { DatabaseService } from "./database/database.service";
|
||||
import { HealthController } from "./health.controller";
|
||||
|
||||
jest.mock("@sentry/nestjs", () => ({
|
||||
getClient: jest.fn(),
|
||||
}));
|
||||
|
||||
describe("HealthController", () => {
|
||||
let controller: HealthController;
|
||||
|
||||
@@ -37,10 +42,15 @@ describe("HealthController", () => {
|
||||
it("should return ok if database and redis are connected", async () => {
|
||||
mockDb.execute.mockResolvedValue([]);
|
||||
mockCacheManager.set.mockResolvedValue(undefined);
|
||||
(Sentry.getClient as jest.Mock).mockReturnValue({
|
||||
getOptions: () => ({ dsn: "http://dsn" }),
|
||||
});
|
||||
|
||||
const result = await controller.check();
|
||||
expect(result.status).toBe("ok");
|
||||
expect(result.database).toBe("connected");
|
||||
expect(result.redis).toBe("connected");
|
||||
expect(result.sentry).toBe("active");
|
||||
});
|
||||
|
||||
it("should return error if database is disconnected", async () => {
|
||||
@@ -62,4 +72,19 @@ describe("HealthController", () => {
|
||||
expect(result.redis).toBe("disconnected");
|
||||
expect(result.redisError).toBe("Redis Error");
|
||||
});
|
||||
|
||||
it("should return sentry disabled if client or dsn is missing", async () => {
|
||||
mockDb.execute.mockResolvedValue([]);
|
||||
mockCacheManager.set.mockResolvedValue(undefined);
|
||||
(Sentry.getClient as jest.Mock).mockReturnValue(undefined);
|
||||
|
||||
const result = await controller.check();
|
||||
expect(result.sentry).toBe("disabled");
|
||||
|
||||
(Sentry.getClient as jest.Mock).mockReturnValue({
|
||||
getOptions: () => ({ dsn: undefined }),
|
||||
});
|
||||
const result2 = await controller.check();
|
||||
expect(result2.sentry).toBe("disabled");
|
||||
});
|
||||
});
|
||||
|
||||
@@ -1,5 +1,6 @@
|
||||
import { CACHE_MANAGER } from "@nestjs/cache-manager";
|
||||
import { Controller, Get, Inject } from "@nestjs/common";
|
||||
import * as Sentry from "@sentry/nestjs";
|
||||
import type { Cache } from "cache-manager";
|
||||
import { sql } from "drizzle-orm";
|
||||
import { DatabaseService } from "./database/database.service";
|
||||
@@ -39,6 +40,14 @@ export class HealthController {
|
||||
health.redisError = error.message;
|
||||
}
|
||||
|
||||
// Check Sentry status
|
||||
const sentryClient = Sentry.getClient();
|
||||
if (sentryClient?.getOptions().dsn) {
|
||||
health.sentry = "active";
|
||||
} else {
|
||||
health.sentry = "disabled";
|
||||
}
|
||||
|
||||
return health;
|
||||
}
|
||||
}
|
||||
|
||||
@@ -1,6 +1,8 @@
|
||||
import { createHash } from "node:crypto";
|
||||
import { Logger, ValidationPipe } from "@nestjs/common";
|
||||
import { ConfigService } from "@nestjs/config";
|
||||
import { NestFactory } from "@nestjs/core";
|
||||
import { NestExpressApplication } from "@nestjs/platform-express";
|
||||
import * as Sentry from "@sentry/nestjs";
|
||||
import { nodeProfilingIntegration } from "@sentry/profiling-node";
|
||||
import helmet from "helmet";
|
||||
@@ -8,19 +10,44 @@ import { AppModule } from "./app.module";
|
||||
import { AllExceptionsFilter } from "./common/filters/http-exception.filter";
|
||||
|
||||
async function bootstrap() {
|
||||
const app = await NestFactory.create(AppModule);
|
||||
const app = await NestFactory.create<NestExpressApplication>(AppModule);
|
||||
const configService = app.get(ConfigService);
|
||||
const logger = new Logger("Bootstrap");
|
||||
|
||||
// Activer trust proxy pour récupérer l'IP réelle derrière un reverse proxy
|
||||
app.set("trust proxy", true);
|
||||
|
||||
const sentryDsn = configService.get<string>("SENTRY_DSN");
|
||||
if (sentryDsn) {
|
||||
Sentry.init({
|
||||
dsn: sentryDsn,
|
||||
integrations: [nodeProfilingIntegration()],
|
||||
tracesSampleRate: 1.0,
|
||||
profilesSampleRate: 1.0,
|
||||
sendDefaultPii: false, // RGPD
|
||||
});
|
||||
try {
|
||||
Sentry.init({
|
||||
dsn: sentryDsn,
|
||||
integrations: [Sentry.nestIntegration(), nodeProfilingIntegration()],
|
||||
tracesSampleRate: 1.0,
|
||||
profilesSampleRate: 1.0,
|
||||
sendDefaultPii: false, // RGPD
|
||||
beforeSend(event) {
|
||||
// Hachage de l'IP utilisateur pour Sentry si elle est présente
|
||||
if (event.user?.ip_address) {
|
||||
event.user.ip_address = createHash("sha256")
|
||||
.update(event.user.ip_address)
|
||||
.digest("hex");
|
||||
}
|
||||
return event;
|
||||
},
|
||||
});
|
||||
|
||||
const client = Sentry.getClient();
|
||||
if (client?.getOptions().dsn) {
|
||||
logger.log("Sentry is initialized and connection is active");
|
||||
} else {
|
||||
logger.warn("Sentry initialized but DSN is missing");
|
||||
}
|
||||
} catch (error) {
|
||||
logger.error(`Failed to initialize Sentry: ${error.message}`);
|
||||
}
|
||||
} else {
|
||||
logger.warn("Sentry is disabled (SENTRY_DSN not configured)");
|
||||
}
|
||||
|
||||
// Sécurité
|
||||
|
||||
@@ -33,8 +33,12 @@ export class UsersService {
|
||||
) {}
|
||||
|
||||
private async clearUserCache(username?: string) {
|
||||
if (username) {
|
||||
await this.cacheManager.del(`users/profile/${username}`);
|
||||
try {
|
||||
if (username) {
|
||||
await this.cacheManager.del(`users/profile/${username}`);
|
||||
}
|
||||
} catch (error) {
|
||||
this.logger.error(`Error clearing user cache: ${error.message}`);
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
@@ -104,6 +104,7 @@ services:
|
||||
ENABLE_CORS: ${ENABLE_CORS:-true}
|
||||
CLAMAV_HOST: memegoat-clamav
|
||||
CLAMAV_PORT: 3310
|
||||
SENTRY_DSN: ${SENTRY_DSN}
|
||||
MAX_IMAGE_SIZE_KB: 1024
|
||||
MAX_GIF_SIZE_KB: 4096
|
||||
|
||||
|
||||
@@ -98,6 +98,7 @@ services:
|
||||
ENABLE_CORS: ${ENABLE_CORS:-true}
|
||||
CLAMAV_HOST: clamav
|
||||
CLAMAV_PORT: 3310
|
||||
SENTRY_DSN: ${SENTRY_DSN}
|
||||
|
||||
clamav:
|
||||
image: clamav/clamav:1.4
|
||||
|
||||
@@ -7,6 +7,7 @@
|
||||
"features": "Fonctionnalités",
|
||||
"stack": "Stack Technologique",
|
||||
"database": "Modèle de Données",
|
||||
"flows": "Flux Métiers",
|
||||
"---security---": {
|
||||
"type": "separator",
|
||||
"label": "Sécurité & Conformité"
|
||||
|
||||
@@ -216,6 +216,16 @@ Cette page documente tous les points de terminaison disponibles sur l'API Memego
|
||||
- `200 OK` : 2FA désactivée.
|
||||
</Accordion>
|
||||
|
||||
<Accordion title="GET /users/search">
|
||||
Recherche des utilisateurs par leur nom d'utilisateur ou nom d'affichage. Requiert l'authentification.
|
||||
|
||||
**Query Params :**
|
||||
- `q` (string) : Terme de recherche.
|
||||
|
||||
**Réponses :**
|
||||
- `200 OK` : Liste des utilisateurs correspondants.
|
||||
</Accordion>
|
||||
|
||||
<Accordion title="GET /users/admin">
|
||||
Liste tous les utilisateurs. **Réservé aux administrateurs.**
|
||||
|
||||
@@ -406,6 +416,92 @@ Cette page documente tous les points de terminaison disponibles sur l'API Memego
|
||||
</Accordion>
|
||||
</Accordions>
|
||||
|
||||
### 💬 Commentaires (`/comments` & `/contents/:id/comments`)
|
||||
|
||||
<Accordions>
|
||||
<Accordion title="GET /contents/:contentId/comments">
|
||||
Liste les commentaires d'un contenu.
|
||||
|
||||
**Réponses :**
|
||||
- `200 OK` : Liste des commentaires, incluant l'auteur et si l'utilisateur actuel a aimé le commentaire.
|
||||
</Accordion>
|
||||
|
||||
<Accordion title="POST /contents/:contentId/comments">
|
||||
Ajoute un commentaire à un contenu. Requiert l'authentification.
|
||||
|
||||
**Corps de la requête :**
|
||||
- `text` (string) : Contenu du commentaire.
|
||||
- `parentId` (uuid, optional) : ID du commentaire parent pour les réponses.
|
||||
|
||||
**Réponses :**
|
||||
- `201 Created` : Commentaire ajouté.
|
||||
</Accordion>
|
||||
|
||||
<Accordion title="DELETE /comments/:id">
|
||||
Supprime un commentaire. L'utilisateur doit être l'auteur ou un modérateur/admin.
|
||||
|
||||
**Réponses :**
|
||||
- `200 OK` : Commentaire supprimé.
|
||||
</Accordion>
|
||||
|
||||
<Accordion title="POST /comments/:id/like">
|
||||
Ajoute un "like" à un commentaire. Requiert l'authentification.
|
||||
|
||||
**Réponses :**
|
||||
- `201 Created` : Like ajouté.
|
||||
</Accordion>
|
||||
|
||||
<Accordion title="DELETE /comments/:id/like">
|
||||
Retire un "like" d'un commentaire. Requiert l'authentification.
|
||||
|
||||
**Réponses :**
|
||||
- `200 OK` : Like retiré.
|
||||
</Accordion>
|
||||
</Accordions>
|
||||
|
||||
### ✉️ Messagerie (`/messages`)
|
||||
|
||||
<Accordions>
|
||||
<Accordion title="GET /messages/conversations">
|
||||
Liste les conversations de l'utilisateur connecté. Requiert l'authentification.
|
||||
|
||||
**Réponses :**
|
||||
- `200 OK` : Liste des conversations avec le dernier message et le nombre de messages non lus.
|
||||
</Accordion>
|
||||
|
||||
<Accordion title="GET /messages/unread-count">
|
||||
Récupère le nombre total de messages non lus pour l'utilisateur. Requiert l'authentification.
|
||||
|
||||
**Réponses :**
|
||||
- `200 OK` : `{ "count": number }`.
|
||||
</Accordion>
|
||||
|
||||
<Accordion title="GET /messages/conversations/with/:userId">
|
||||
Récupère ou crée une conversation avec un utilisateur spécifique. Requiert l'authentification.
|
||||
|
||||
**Réponses :**
|
||||
- `200 OK` : Objet conversation.
|
||||
</Accordion>
|
||||
|
||||
<Accordion title="GET /messages/conversations/:id">
|
||||
Récupère les messages d'une conversation. Marque les messages comme lus. Requiert l'authentification.
|
||||
|
||||
**Réponses :**
|
||||
- `200 OK` : Liste des messages.
|
||||
</Accordion>
|
||||
|
||||
<Accordion title="POST /messages">
|
||||
Envoie un message. Requiert l'authentification.
|
||||
|
||||
**Corps de la requête :**
|
||||
- `recipientId` (uuid) : ID du destinataire.
|
||||
- `text` (string) : Contenu du message.
|
||||
|
||||
**Réponses :**
|
||||
- `201 Created` : Message envoyé.
|
||||
</Accordion>
|
||||
</Accordions>
|
||||
|
||||
### ⭐ Favoris (`/favorites`)
|
||||
|
||||
<Accordions>
|
||||
|
||||
@@ -29,4 +29,4 @@ Memegoat utilise une architecture de stockage d'objets compatible S3 (MinIO). Le
|
||||
|
||||
### Notifications (Mail)
|
||||
|
||||
Le système intègre un service d'envoi d'emails (SMTP) pour les notifications critiques et la gestion des comptes.
|
||||
Le système intègre un service d'envoi d'emails (SMTP) via `@nestjs-modules/mailer` pour les notifications critiques, la validation des comptes et la réinitialisation de mots de passe.
|
||||
|
||||
@@ -19,7 +19,8 @@ Le projet Memegoat s'inscrit dans une démarche de respect de la vie privée et
|
||||
|
||||
Conformément à la section [Sécurité](/docs/security), les mesures suivantes sont appliquées :
|
||||
- **Chiffrement au repos** : Utilisation de **PGP (pgcrypto)** pour les données identifiantes.
|
||||
- **Hachage aveugle** : Pour permettre les opérations sur données chiffrées sans compromettre la confidentialité.
|
||||
- **Cryptographie Post-Quantique** : Mise en œuvre de `@noble/post-quantum` pour protéger les données contre les futures capacités de calcul quantique.
|
||||
- **Hachage aveugle (Blind Indexing)** : Pour permettre les opérations d'unicité et de recherche sur données chiffrées sans compromettre la confidentialité.
|
||||
- **Hachage des mots de passe** : Utilisation de l'algorithme **Argon2id**.
|
||||
- **Communications sécurisées** : Utilisation de **TLS 1.3** via Caddy.
|
||||
- **Suivi des Erreurs (Sentry)** : Configuration conforme avec désactivation de l'envoi des PII (Personally Identifiable Information) et masquage des données sensibles.
|
||||
|
||||
@@ -18,13 +18,24 @@ erDiagram
|
||||
USER ||--o{ API_KEY : "genere"
|
||||
USER ||--o{ AUDIT_LOG : "genere"
|
||||
USER ||--o{ FAVORITE : "ajoute"
|
||||
USER ||--o{ COMMENT : "rédige"
|
||||
USER ||--o{ COMMENT_LIKE : "aime"
|
||||
USER ||--o{ CONVERSATION_PARTICIPANT : "participe"
|
||||
USER ||--o{ MESSAGE : "envoie"
|
||||
|
||||
CONTENT ||--o{ CONTENT_TAG : "possede"
|
||||
TAG ||--o{ CONTENT_TAG : "est_lie_a"
|
||||
CONTENT ||--o{ REPORT : "est_signale"
|
||||
CONTENT ||--o{ FAVORITE : "est_mis_en"
|
||||
CONTENT ||--o{ COMMENT : "reçoit"
|
||||
TAG ||--o{ REPORT : "est_signale"
|
||||
|
||||
COMMENT ||--o{ COMMENT : "possède des réponses"
|
||||
COMMENT ||--o{ COMMENT_LIKE : "est aimé par"
|
||||
|
||||
CONVERSATION ||--o{ CONVERSATION_PARTICIPANT : "regroupe"
|
||||
CONVERSATION ||--o{ MESSAGE : "contient"
|
||||
|
||||
CATEGORY ||--o{ CONTENT : "catégorise"
|
||||
|
||||
ROLE ||--o{ USER_ROLE : "attribue_a"
|
||||
@@ -45,6 +56,15 @@ erDiagram
|
||||
string type
|
||||
string storage_key
|
||||
}
|
||||
COMMENT {
|
||||
string text
|
||||
}
|
||||
CONVERSATION {
|
||||
timestamp created_at
|
||||
}
|
||||
MESSAGE {
|
||||
string text
|
||||
}
|
||||
TAG {
|
||||
string name
|
||||
string slug
|
||||
@@ -140,6 +160,39 @@ erDiagram
|
||||
uuid content_id PK, FK
|
||||
uuid tag_id PK, FK
|
||||
}
|
||||
comments {
|
||||
uuid id PK
|
||||
uuid content_id FK
|
||||
uuid user_id FK
|
||||
uuid parent_id FK
|
||||
text text
|
||||
timestamp created_at
|
||||
timestamp updated_at
|
||||
timestamp deleted_at
|
||||
}
|
||||
comment_likes {
|
||||
uuid comment_id PK, FK
|
||||
uuid user_id PK, FK
|
||||
timestamp created_at
|
||||
}
|
||||
conversations {
|
||||
uuid id PK
|
||||
timestamp created_at
|
||||
timestamp updated_at
|
||||
}
|
||||
conversation_participants {
|
||||
uuid conversation_id PK, FK
|
||||
uuid user_id PK, FK
|
||||
timestamp joined_at
|
||||
}
|
||||
messages {
|
||||
uuid id PK
|
||||
uuid conversation_id FK
|
||||
uuid sender_id FK
|
||||
text text
|
||||
timestamp created_at
|
||||
timestamp read_at
|
||||
}
|
||||
roles {
|
||||
uuid id PK
|
||||
varchar name
|
||||
@@ -225,6 +278,15 @@ erDiagram
|
||||
users ||--o{ sessions : "user_id"
|
||||
users ||--o{ api_keys : "user_id"
|
||||
users ||--o{ audit_logs : "user_id"
|
||||
contents ||--o{ comments : "content_id"
|
||||
users ||--o{ comments : "user_id"
|
||||
comments ||--o{ comments : "parent_id"
|
||||
comments ||--o{ comment_likes : "comment_id"
|
||||
users ||--o{ comment_likes : "user_id"
|
||||
conversations ||--o{ conversation_participants : "conversation_id"
|
||||
users ||--o{ conversation_participants : "user_id"
|
||||
conversations ||--o{ messages : "conversation_id"
|
||||
users ||--o{ messages : "sender_id"
|
||||
```
|
||||
|
||||
### Physique (MPD)
|
||||
@@ -278,6 +340,7 @@ erDiagram
|
||||
|
||||
#### Sécurité et Chiffrement
|
||||
- **Chiffrement PGP (Native)** : Les colonnes `email` et `two_factor_secret` sont stockées au format `bytea` et chiffrées/déchiffrées via les fonctions `pgp_sym_encrypt` et `pgp_sym_decrypt` de PostgreSQL (via l'extension `pgcrypto`).
|
||||
- **Cryptographie Post-Quantique** : Utilisation de la bibliothèque `@noble/post-quantum` pour anticiper les futures menaces cryptographiques.
|
||||
- **Hachage aveugle (Blind Indexing)** : La colonne `email_hash` stocke un hash (SHA-256) de l'email pour permettre les recherches d'unicité et les recherches rapides sans déchiffrer la donnée.
|
||||
|
||||
#### Index et Optimisations
|
||||
|
||||
@@ -12,10 +12,10 @@ Un conteneur **Caddy** est utilisé en tant que reverse proxy pour fournir le TL
|
||||
### Pré-requis Système
|
||||
|
||||
<Cards>
|
||||
<Card title="Environnement" description="Node.js >= 20, pnpm >= 10." />
|
||||
<Card title="Base de données" description="PostgreSQL >= 15 + pgcrypto et Redis." />
|
||||
<Card title="Environnement" description="Node.js >= 22 (recommandé pour NestJS 11), pnpm >= 10." />
|
||||
<Card title="Base de données" description="PostgreSQL >= 16 + pgcrypto et Redis 7+." />
|
||||
<Card title="Stockage" description="MinIO ou S3 Compatible." />
|
||||
<Card title="Services" description="ClamAV (clamd) et FFmpeg." />
|
||||
<Card title="Services" description="ClamAV (clamd), FFmpeg 6+ et Serveur SMTP." />
|
||||
</Cards>
|
||||
|
||||
### Procédure de Déploiement
|
||||
|
||||
@@ -10,7 +10,7 @@ Le projet Memegoat intègre un ensemble de fonctionnalités avancées pour garan
|
||||
## 🏗️ Infrastructure & Médias
|
||||
|
||||
### 📤 Publication & Traitement
|
||||
Le coeur de la plateforme permet la publication sécurisée de mèmes et de GIFs avec un pipeline de traitement complet :
|
||||
Le coeur de la plateforme permet la publication sécurisée de mèmes et de GIFs avec un pipeline de traitement complet (voir le [Flux de Publication](/docs/flows#-publication-de-contenu-pipeline-médía)) :
|
||||
|
||||
<Cards>
|
||||
<Card icon="🛡️" title="Sécurité (Antivirus)" description="Chaque fichier uploadé est scanné en temps réel par ClamAV." />
|
||||
@@ -64,6 +64,11 @@ Un système complet de gestion de profil permet aux utilisateurs de :
|
||||
- Configurer la **Double Authentification (2FA)**.
|
||||
- Consulter leurs sessions actives et révoquer des accès.
|
||||
|
||||
### 💬 Interaction & Communauté
|
||||
Memegoat favorise l'interaction entre les utilisateurs via plusieurs fonctionnalités sociales :
|
||||
- **Système de Commentaires** : Les utilisateurs peuvent commenter les mèmes, répondre à d'autres commentaires et aimer les contributions.
|
||||
- **Messagerie Privée** : Un système de messagerie sécurisé permettant des conversations directes entre utilisateurs, avec gestion des conversations et compteurs de messages non lus.
|
||||
|
||||
<Callout type="info">
|
||||
Toutes les données sensibles du profil sont protégées par **chiffrement PGP** au repos.
|
||||
</Callout>
|
||||
|
||||
177
documentation/content/docs/flows.mdx
Normal file
177
documentation/content/docs/flows.mdx
Normal file
@@ -0,0 +1,177 @@
|
||||
---
|
||||
title: Flux Métiers
|
||||
description: Diagrammes de séquence et explications des flux critiques de Memegoat.
|
||||
---
|
||||
|
||||
# 🔄 Flux Métiers
|
||||
|
||||
Cette section détaille les processus critiques de la plateforme Memegoat à travers des diagrammes de séquence et des explications techniques étape par étape.
|
||||
|
||||
## 🔐 Authentification & Sécurité
|
||||
|
||||
### Inscription & Double Authentification (2FA)
|
||||
|
||||
Le processus d'inscription intègre immédiatement les mesures de sécurité fortes (Argon2id, PGP). L'activation de la 2FA est optionnelle mais fortement recommandée.
|
||||
|
||||
```mermaid
|
||||
sequenceDiagram
|
||||
participant U as Utilisateur
|
||||
participant F as Frontend
|
||||
participant B as Backend
|
||||
participant DB as PostgreSQL
|
||||
participant M as Serveur SMTP
|
||||
|
||||
Note over U, DB: Flux d'Inscription
|
||||
U->>F: Remplir formulaire (email, password)
|
||||
F->>B: POST /auth/register
|
||||
B->>B: Hash password (Argon2id)
|
||||
B->>B: Chiffrement Email (PGP)
|
||||
B->>B: Génération Email Hash (Blind Indexing)
|
||||
B->>DB: INSERT INTO users
|
||||
B->>M: Envoi email de validation
|
||||
B-->>F: 201 Created
|
||||
F-->>U: Succès (Redirection Login)
|
||||
|
||||
Note over U, DB: Activation 2FA
|
||||
U->>F: Activer 2FA
|
||||
F->>B: POST /users/me/2fa/setup
|
||||
B->>B: Générer Secret TOTP
|
||||
B->>B: Chiffrer Secret (PGP)
|
||||
B->>DB: UPDATE users SET two_factor_secret
|
||||
B-->>F: Secret + QR Code URL
|
||||
F-->>U: Affiche QR Code
|
||||
U->>F: Saisir code TOTP
|
||||
F->>B: POST /users/me/2fa/enable (token)
|
||||
B->>B: Déchiffrer Secret (PGP)
|
||||
B->>B: Vérifier TOTP (otplib)
|
||||
B->>DB: UPDATE users SET is_two_factor_enabled = true
|
||||
B-->>F: 200 OK
|
||||
```
|
||||
|
||||
---
|
||||
|
||||
## 📤 Publication de Contenu (Pipeline Média)
|
||||
|
||||
La publication d'un mème ou d'un GIF suit un pipeline rigoureux garantissant la sécurité (Antivirus) et l'optimisation (Transcodage).
|
||||
|
||||
```mermaid
|
||||
sequenceDiagram
|
||||
participant U as Utilisateur
|
||||
participant F as Frontend
|
||||
participant B as Backend
|
||||
participant AV as ClamAV
|
||||
participant S3 as MinIO (S3)
|
||||
participant DB as PostgreSQL
|
||||
|
||||
U->>F: Sélectionner image/vidéo
|
||||
F->>B: POST /contents/upload (multipart)
|
||||
B->>B: Validation (Taille, MIME-Type)
|
||||
B->>AV: Scan Antivirus (Stream)
|
||||
AV-->>B: Verdict (Clean/Infected)
|
||||
|
||||
alt Infecté
|
||||
B-->>F: 400 Bad Request (Virus detected)
|
||||
else Sain
|
||||
B->>B: Transcodage (Sharp/FFmpeg)
|
||||
Note right of B: WebP pour images, WebM pour vidéos
|
||||
B->>S3: Upload fichier optimisé
|
||||
S3-->>B: Storage Key
|
||||
B->>DB: INSERT INTO contents
|
||||
B->>DB: INSERT INTO audit_logs (Upload action)
|
||||
B-->>F: 201 Created
|
||||
end
|
||||
```
|
||||
|
||||
---
|
||||
|
||||
## 💬 Messagerie & Temps Réel
|
||||
|
||||
Memegoat utilise **Socket.io** pour les interactions en temps réel, avec une validation de session robuste via `iron-session`.
|
||||
|
||||
```mermaid
|
||||
sequenceDiagram
|
||||
participant U1 as Utilisateur A
|
||||
participant F1 as Frontend A
|
||||
participant WS as WebSocket Gateway
|
||||
participant B as Backend (API)
|
||||
participant F2 as Frontend B
|
||||
participant U2 as Utilisateur B
|
||||
|
||||
U1->>F1: Ouvre le chat
|
||||
F1->>WS: Connexion (transports: websocket)
|
||||
Note over WS: Authentification via iron-session cookie
|
||||
WS->>WS: Vérifie Access Token (JWT)
|
||||
WS->>WS: Rejoindre room "user:A"
|
||||
WS-->>F1: Connected
|
||||
|
||||
U1->>F1: Tape un message
|
||||
F1->>WS: Event "typing" { recipientId: B, isTyping: true }
|
||||
WS->>F2: Event "user_typing" { userId: A, isTyping: true }
|
||||
F2-->>U2: Affiche "A est en train d'écrire..."
|
||||
|
||||
U1->>F1: Envoyer message
|
||||
F1->>B: POST /messages { recipientId: B, text: "Salut !" }
|
||||
B->>DB: INSERT INTO messages
|
||||
B-->>F1: 201 Created
|
||||
B->>WS: Trigger Notify(B)
|
||||
WS->>F2: Event "new_message" { senderId: A, text: "Salut !" }
|
||||
F2-->>U2: Affiche message + Notification
|
||||
```
|
||||
|
||||
---
|
||||
|
||||
## ⚖️ Cycle de Vie & Conformité (RGPD)
|
||||
|
||||
La gestion des données respecte le droit à l'oubli à travers un processus de suppression en deux étapes et une purge automatique.
|
||||
|
||||
```mermaid
|
||||
sequenceDiagram
|
||||
participant U as Utilisateur
|
||||
participant B as Backend
|
||||
participant DB as PostgreSQL
|
||||
participant S3 as MinIO (S3)
|
||||
participant C as Cron Job (PurgeService)
|
||||
|
||||
Note over U, DB: Droit à l'oubli (Phase 1)
|
||||
U->>B: DELETE /users/me
|
||||
B->>DB: UPDATE users SET deleted_at = NOW()
|
||||
B->>DB: UPDATE contents SET deleted_at = NOW() WHERE user_id = U
|
||||
B-->>U: 200 OK (Compte désactivé)
|
||||
|
||||
Note over C, S3: Purge Automatique (Phase 2 - après 30 jours)
|
||||
C->>B: Execute purgeExpiredData()
|
||||
B->>DB: SELECT users WHERE deleted_at < 30 days
|
||||
B->>DB: DELETE FROM users (Hard Delete)
|
||||
Note right of B: Cascade delete sur API keys, Sessions, etc.
|
||||
B->>DB: DELETE FROM contents (Hard Delete)
|
||||
B->>S3: DELETE objects (Storage Keys)
|
||||
B->>DB: Purge Audit Logs / Reports expirés
|
||||
```
|
||||
|
||||
---
|
||||
|
||||
## 🚩 Modération
|
||||
|
||||
Le flux de modération permet aux utilisateurs de signaler des abus, traités ensuite par les administrateurs.
|
||||
|
||||
```mermaid
|
||||
sequenceDiagram
|
||||
participant U as Utilisateur
|
||||
participant B as Backend
|
||||
participant DB as PostgreSQL
|
||||
participant A as Administrateur
|
||||
|
||||
U->>B: POST /reports { contentId, reason, description }
|
||||
B->>DB: INSERT INTO reports (status: pending)
|
||||
B-->>U: 201 Created
|
||||
|
||||
A->>B: GET /reports (Admin Panel)
|
||||
B->>DB: SELECT * FROM reports WHERE status = pending
|
||||
B-->>A: Liste des signalements
|
||||
|
||||
A->>B: PATCH /reports/:id/status { status: resolved }
|
||||
B->>DB: UPDATE reports SET status = resolved
|
||||
Note right of B: Si contenu illicite, l'admin peut supprimer le contenu
|
||||
B->>B: DELETE /contents/:id/admin (Hard Delete)
|
||||
B-->>A: 200 OK
|
||||
```
|
||||
@@ -18,10 +18,11 @@ graph TD
|
||||
User([Utilisateur])
|
||||
Caddy[Reverse Proxy: Caddy]
|
||||
Frontend[Frontend: Next.js]
|
||||
Backend[Backend: NestJS]
|
||||
Backend[Backend: NestJS 11]
|
||||
DB[(Database: PostgreSQL)]
|
||||
Storage[Storage: S3/MinIO]
|
||||
Cache[(Cache: Redis)]
|
||||
AV[Antivirus: ClamAV]
|
||||
Monitoring[Monitoring: Sentry]
|
||||
|
||||
User <--> Caddy
|
||||
@@ -30,6 +31,7 @@ graph TD
|
||||
Backend <--> DB
|
||||
Backend <--> Storage
|
||||
Backend <--> Cache
|
||||
Backend <--> AV
|
||||
Backend --> Monitoring
|
||||
```
|
||||
|
||||
@@ -43,6 +45,11 @@ Explorez les sections clés pour approfondir vos connaissances techniques :
|
||||
href="/docs/features"
|
||||
description="Détails des capacités techniques et du pipeline média haute performance."
|
||||
/>
|
||||
<Card
|
||||
title="🔄 Flux Métiers"
|
||||
href="/docs/flows"
|
||||
description="Diagrammes de séquence des processus critiques (Publication, 2FA, Chat)."
|
||||
/>
|
||||
<Card
|
||||
title="🔐 Sécurité"
|
||||
href="/docs/security"
|
||||
|
||||
@@ -7,6 +7,7 @@ description: Mesures de sécurité implémentées
|
||||
|
||||
### Protection des Données (At Rest)
|
||||
|
||||
- **Cryptographie Post-Quantique** : Utilisation de la bibliothèque `@noble/post-quantum` pour anticiper les futures menaces cryptographiques et protéger les données sensibles contre les attaques "Harvest Now, Decrypt Later".
|
||||
- **Chiffrement PGP Natif** : Les données identifiantes (PII) comme l'email, le nom d'affichage et le **secret 2FA** sont chiffrées dans PostgreSQL via `pgcrypto` (`pgp_sym_encrypt`).
|
||||
|
||||
<Callout type="warn" title="Sécurité des Clés">
|
||||
|
||||
@@ -17,9 +17,9 @@ description: Technologies utilisées dans le projet Memegoat
|
||||
### Backend
|
||||
|
||||
<Cards>
|
||||
<Card title="NestJS" description="Framework Node.js modulaire et robuste." />
|
||||
<Card title="NestJS 11" description="Framework Node.js modulaire et robuste (dernière version majeure)." />
|
||||
<Card title="PostgreSQL" description="Base de données relationnelle puissante." />
|
||||
<Card title="Redis" description="Store clé-valeur pour le cache haute performance." />
|
||||
<Card title="Redis" description="Store clé-valeur pour le cache haute performance (Cache Manager v5+)." />
|
||||
<Card title="Drizzle ORM" description="ORM TypeScript-first avec support des migrations." />
|
||||
<Card title="Sharp & FFmpeg" description="Traitement haute performance des images et vidéos." />
|
||||
</Cards>
|
||||
@@ -28,8 +28,9 @@ description: Technologies utilisées dans le projet Memegoat
|
||||
|
||||
<Cards>
|
||||
<Card title="ClamAV" description="Protection antivirus en temps réel." />
|
||||
<Card title="Sentry" description="Reporting d'erreurs et profiling de performance." />
|
||||
<Card title="Argon2id" description="Hachage de mots de passe de grade militaire." />
|
||||
<Card title="Sentry" description="Reporting d'erreurs et profiling de performance (SDK v8+)." />
|
||||
<Card title="Argon2id" description="Hachage de mots de passe de grade militaire via @node-rs/argon2." />
|
||||
<Card title="Post-Quantum Crypto" description="Algorithmes résistants aux futurs ordinateurs quantiques via @noble/post-quantum." />
|
||||
<Card title="PGP (pgcrypto)" description="Chiffrement natif des données sensibles." />
|
||||
<Card title="otplib" description="Implémentation TOTP pour la 2FA." />
|
||||
<Card title="iron-session" description="Gestion sécurisée des sessions via cookies chiffrés." />
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
{
|
||||
"name": "@memegoat/frontend",
|
||||
"version": "1.9.4",
|
||||
"version": "1.10.2",
|
||||
"private": true,
|
||||
"scripts": {
|
||||
"dev": "next dev",
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
{
|
||||
"name": "@memegoat/source",
|
||||
"version": "1.9.4",
|
||||
"version": "1.10.2",
|
||||
"description": "",
|
||||
"scripts": {
|
||||
"version:get": "cmake -P version.cmake GET",
|
||||
|
||||
Reference in New Issue
Block a user