hudik/hoodik

By hudik

β€’Updated 6 days ago

Self hosted, easy to install end to end encrypted storage drive

Image
Databases & storage
0

10K+

hudik/hoodik repository overview

⁠Hoodik

Hoodik

CI Docker Hub CC BY-NC 4.0 License

Hoodik is a lightweight, self-hosted, end-to-end encrypted cloud storage server. All encryption and decryption happens in your browser β€” the server never sees your plaintext data. Built with Rust (Actix-web) on the backend and Vue 3 on the frontend.

🌐 hoodik.io⁠ β€” Website Β |Β  πŸ“± Android App⁠ Β |Β  ⚑ VPS Setup Guide⁠

Hoodik screenshot


⁠Features

  • End-to-end encryption β€” files are encrypted in the browser before upload and decrypted after download using a hybrid RSA + AEGIS-128L scheme
  • Secure search β€” file metadata is tokenized and hashed so the server can match search queries without storing plaintext names
  • Encrypted notes β€” create and edit rich markdown notes with a WYSIWYG editor; content is encrypted, auto-saved, and searchable just like uploaded files
  • Public sharing links β€” share files via a link; the file key is never exposed to the recipient
  • Two-factor authentication β€” optional TOTP-based 2FA per user
  • Admin dashboard β€” manage users, sessions, invitations, and application settings
  • Chunked transfers β€” files are split into encrypted chunks for concurrent upload/download
  • SQLite or PostgreSQL β€” SQLite out of the box, PostgreSQL via a single environment variable
  • S3-compatible storage β€” store encrypted chunks on any S3-compatible service (AWS, MinIO, Backblaze B2, Wasabi) instead of local disk
  • Docker-first β€” single container deployment; multi-arch images (amd64, armv6, armv7, arm64)

⁠How encryption works

⁠File storage

Each user gets an RSA-2048 key pair on registration. The private key is stored encrypted with your passphrase β€” the server cannot read it.

⚠️ Store your private key somewhere safe (e.g. a password manager). If you forget your password, the private key is the only way to recover your account and decrypt your files.

When you upload a file:

  1. A random symmetric key is generated for the file (key size depends on the cipher).
  2. The file is encrypted chunk-by-chunk with that key using the file's cipher (default: AEGIS-128L).
  3. The cipher identifier and the encrypted key are stored in the database alongside the file, so old files can always be decrypted with the correct algorithm even after the default cipher changes.

Searchable metadata (file name, etc.) is tokenized, hashed, and stored as opaque tokens. When you search, the same operation is applied to your query and the hashes are matched server-side β€” no plaintext ever leaves the browser.

When you share a file:

  1. A random link key is generated.
  2. The file metadata and file key are encrypted with the link key.
  3. The link key itself is encrypted with your RSA public key (so you can always recover it).
  4. The link key is appended to the share URL as a fragment: https://…/links/{id}#link-key.

The recipient's browser uses the fragment to decrypt the file key locally. The server only ever sees encrypted bytes.

⁠Cryptographic primitives
PrimitiveAlgorithm
AsymmetricRSA-2048 PKCS#1
Symmetric (default)AEGIS-128L β€” hardware-accelerated AEAD via WASM SIMD128/relaxed-simd
Symmetric (supported)Ascon-128a, ChaCha20-Poly1305
Key derivationSHA-2, Blake2b

The cipher used to encrypt each file is stored in the database (files.cipher), so the correct algorithm is always used for decryption regardless of what the current default is.


⁠Getting started

⁠Docker (quickstart)
docker run --name hoodik -d \
  -e DATA_DIR='/data' \
  -e APP_URL='https://my-app.example.com' \
  --volume "$(pwd)/data:/data" \
  -p 5443:5443 \
  hudik/hoodik:latest

This runs with a self-signed TLS certificate generated automatically in DATA_DIR. For production, provide your own certificate (see Configuration⁠) or put Hoodik behind a reverse proxy such as Nginx Proxy Manager⁠.

⁠Docker with email and custom TLS
docker run --name hoodik -d \
  -e DATA_DIR='/data' \
  -e APP_URL='https://my-app.example.com' \
  -e SSL_CERT_FILE='/data/my-cert.crt.pem' \
  -e SSL_KEY_FILE='/data/my-key.key.pem' \
  -e MAILER_TYPE='smtp' \
  -e SMTP_ADDRESS='smtp.gmail.com' \
  -e SMTP_USERNAME='[email protected]' \
  -e SMTP_PASSWORD='your-app-password' \
  -e SMTP_PORT='465' \
  -e SMTP_DEFAULT_FROM_EMAIL='[email protected]' \
  -e SMTP_DEFAULT_FROM_NAME='Hoodik Drive' \
  --volume "$(pwd)/data:/data" \
  -p 5443:5443 \
  hudik/hoodik:latest

Tip: Set JWT_SECRET to a stable random string so sessions survive container restarts.


⁠Configuration

All configuration is done through environment variables. A full reference is in .env.example⁠.

⁠Core
VariableDefaultDescription
DATA_DIR(required)Directory for the database and stored files
DATABASE_URL(SQLite)PostgreSQL connection string β€” omit to use SQLite
APP_URLhttps://localhost:5443Public URL of the application
APP_CLIENT_URLAPP_URLURL of the frontend (set to Vite dev server during development)
HTTP_PORT5443Port the server listens on
HTTP_ADDRESSlocalhostBind address (0.0.0.0 in Docker)

Database note: SQLite and PostgreSQL databases are not interchangeable. Switching after data has been written will result in data loss.

⁠TLS
VariableDefaultDescription
SSL_DISABLEDfalseDisable TLS entirely β€” for development/testing only
SSL_CERT_FILEDATA_DIR/hoodik.crt.pemPath to TLS certificate (auto-generated self-signed cert if missing)
SSL_KEY_FILEDATA_DIR/hoodik.key.pemPath to TLS private key (auto-generated if missing)
⁠Authentication & sessions
VariableDefaultDescription
JWT_SECRET(random)Secret for signing JWTs β€” set this or all sessions are invalidated on restart
LONG_TERM_SESSION_DURATION_DAYS30How many days an idle session stays alive
SHORT_TERM_SESSION_DURATION_SECONDS120How many seconds the short-lived access token lives; refreshed automatically while the user is active
SESSION_COOKIEhoodik_sessionName of the session cookie
REFRESH_COOKIEhoodik_refreshName of the refresh token cookie
COOKIE_HTTP_ONLYtrueHide the session cookie from JavaScript
COOKIE_SECUREtrueOnly send cookies over HTTPS
COOKIE_SAME_SITELaxSameSite policy: Lax, Strict, or None
COOKIE_DOMAIN(from APP_URL)Override the cookie domain when your setup requires it
⁠Cross-domain / multi-domain setups β€” USE_HEADERS_FOR_AUTH

By default, Hoodik uses HttpOnly cookies for authentication. If your frontend and backend are on different domains (or you want to access the API from a separate app), cookies won't work reliably. Set:

USE_HEADERS_FOR_AUTH=true

With this enabled:

  • The server issues tokens via response headers instead of cookies.
  • The browser stores the tokens in localStorage rather than HttpOnly cookies, making them accessible to JavaScript.
  • Each request must include the token in the Authorization: Bearer <token> header.

Security note: localStorage-based tokens are accessible to any JavaScript on the page (XSS risk). Only enable this when a cookie-based setup is not possible. When using a single domain, leave it at the default false.

⁠Email (SMTP)

When MAILER_TYPE=none (the default), accounts are activated automatically and no emails are sent. Set MAILER_TYPE=smtp to enable email verification and file-share notifications.

VariableDefaultDescription
MAILER_TYPEnonesmtp to enable email, none to disable
SMTP_ADDRESSSMTP server hostname
SMTP_USERNAMESMTP login
SMTP_PASSWORDSMTP password
SMTP_PORT465SMTP port (TLS mode is auto-detected from the port if SMTP_TLS_MODE is not set)
SMTP_TLS_MODE(auto)implicit (port 465), starttls (port 587), or none (port 25)
SMTP_DEFAULT_FROM_EMAILSender email address
SMTP_DEFAULT_FROM_NAMESender display name (optional, defaults to Hoodik)
⁠Storage provider

By default, encrypted file chunks are stored on the local filesystem inside DATA_DIR. Set STORAGE_PROVIDER=s3 to use any S3-compatible object storage instead.

VariableDefaultDescription
STORAGE_PROVIDERlocallocal or s3
S3_BUCKETBucket name
S3_REGIONus-east-1AWS region
S3_ENDPOINT(AWS default)Custom endpoint for S3-compatible services (MinIO, Backblaze B2, Wasabi, etc.)
S3_ACCESS_KEYAccess key ID
S3_SECRET_KEYSecret access key
S3_PATH_STYLEfalsePath-style addressing (required for MinIO)
S3_PREFIXOptional key prefix to namespace objects within a shared bucket

Note: DATA_DIR is still required when using S3 β€” it holds the SQLite database (if not using PostgreSQL) and other local state. Only the encrypted file chunks move to S3.

Example with MinIO:

docker run --name hoodik -d \
  -e DATA_DIR='/data' \
  -e APP_URL='https://my-app.example.com' \
  -e STORAGE_PROVIDER='s3' \
  -e S3_BUCKET='hoodik' \
  -e S3_ENDPOINT='http://minio:9000' \
  -e S3_ACCESS_KEY='minioadmin' \
  -e S3_SECRET_KEY='minioadmin' \
  -e S3_PATH_STYLE='true' \
  --volume "$(pwd)/data:/data" \
  -p 5443:5443 \
  hudik/hoodik:latest
⁠Migrating from local storage to S3

If you already have data stored locally and want to switch to S3:

Important: Stop the Hoodik server before running the migration to avoid data inconsistencies. If files are being uploaded while chunks are being migrated, some chunks may be missed.

  1. Stop the running Hoodik instance.

  2. Add the S3 environment variables to your docker-compose.yml (keep STORAGE_PROVIDER=local for now).

  3. Run the migration:

    docker exec hoodik hoodik migrate-storage
    

    Or as a one-off container:

    docker run --rm \
      -v hoodik-data:/data \
      -e DATA_DIR=/data \
      -e S3_BUCKET=my-bucket \
      -e S3_REGION=eu-central-1 \
      -e S3_ACCESS_KEY=... \
      -e S3_SECRET_KEY=... \
      hudik/hoodik migrate-storage
    

    The command uploads all chunk files from DATA_DIR to S3. It is idempotent β€” already-uploaded files are skipped, so it is safe to re-run if interrupted.

  4. Set STORAGE_PROVIDER=s3 and restart:

    docker compose up -d
    
  5. Verify everything works. The local chunk files can be kept as a backup until you are confident.


⁠Development

See DEVELOPMENT.md⁠ for setup instructions, available just recipes, testing, and CI.


⁠License

CC BY-NC 4.0⁠ β€” free for personal and non-commercial use. For commercial licensing, contact [email protected]⁠.


⁠Contributors

Tag summary

Content type

Image

Digest

sha256:8167466ee…

Size

23.7 MB

Last updated

6 days ago

Requires Docker Desktop 4.37.1 or later.