2025-04-13 23:01:55 -04:00
|
|
|
// api/cache/keyvMongo.js
|
|
|
|
const mongoose = require('mongoose');
|
|
|
|
const EventEmitter = require('events');
|
|
|
|
const { GridFSBucket } = require('mongodb');
|
2023-12-14 07:49:27 -05:00
|
|
|
const { logger } = require('~/config');
|
|
|
|
|
2025-04-13 23:01:55 -04:00
|
|
|
const storeMap = new Map();
|
|
|
|
|
|
|
|
class KeyvMongoCustom extends EventEmitter {
|
|
|
|
constructor(url, options = {}) {
|
|
|
|
super();
|
|
|
|
|
|
|
|
url = url || {};
|
|
|
|
if (typeof url === 'string') {
|
|
|
|
url = { url };
|
|
|
|
}
|
|
|
|
if (url.uri) {
|
|
|
|
url = { url: url.uri, ...url };
|
|
|
|
}
|
|
|
|
|
|
|
|
this.opts = {
|
|
|
|
url: 'mongodb://127.0.0.1:27017',
|
|
|
|
collection: 'keyv',
|
|
|
|
...url,
|
|
|
|
...options,
|
|
|
|
};
|
|
|
|
|
|
|
|
this.ttlSupport = false;
|
|
|
|
|
|
|
|
// Filter valid options
|
|
|
|
const keyvMongoKeys = new Set([
|
|
|
|
'url',
|
|
|
|
'collection',
|
|
|
|
'namespace',
|
|
|
|
'serialize',
|
|
|
|
'deserialize',
|
|
|
|
'uri',
|
|
|
|
'useGridFS',
|
|
|
|
'dialect',
|
|
|
|
]);
|
|
|
|
this.opts = Object.fromEntries(Object.entries(this.opts).filter(([k]) => keyvMongoKeys.has(k)));
|
|
|
|
}
|
|
|
|
|
|
|
|
// Helper to access the store WITHOUT storing a promise on the instance
|
|
|
|
_getClient() {
|
|
|
|
const storeKey = `${this.opts.collection}:${this.opts.useGridFS ? 'gridfs' : 'collection'}`;
|
|
|
|
|
|
|
|
// If we already have the store initialized, return it directly
|
|
|
|
if (storeMap.has(storeKey)) {
|
|
|
|
return Promise.resolve(storeMap.get(storeKey));
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check mongoose connection state
|
|
|
|
if (mongoose.connection.readyState !== 1) {
|
|
|
|
return Promise.reject(
|
|
|
|
new Error('Mongoose connection not ready. Ensure connectDb() is called first.'),
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
try {
|
|
|
|
const db = mongoose.connection.db;
|
|
|
|
let client;
|
|
|
|
|
|
|
|
if (this.opts.useGridFS) {
|
|
|
|
const bucket = new GridFSBucket(db, {
|
|
|
|
readPreference: this.opts.readPreference,
|
|
|
|
bucketName: this.opts.collection,
|
|
|
|
});
|
|
|
|
const store = db.collection(`${this.opts.collection}.files`);
|
|
|
|
client = { bucket, store, db };
|
|
|
|
} else {
|
|
|
|
const collection = this.opts.collection || 'keyv';
|
|
|
|
const store = db.collection(collection);
|
|
|
|
client = { store, db };
|
|
|
|
}
|
|
|
|
|
|
|
|
storeMap.set(storeKey, client);
|
|
|
|
return Promise.resolve(client);
|
|
|
|
} catch (error) {
|
|
|
|
this.emit('error', error);
|
|
|
|
return Promise.reject(error);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
async get(key) {
|
|
|
|
const client = await this._getClient();
|
|
|
|
|
|
|
|
if (this.opts.useGridFS) {
|
|
|
|
await client.store.updateOne(
|
|
|
|
{
|
|
|
|
filename: key,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
$set: {
|
|
|
|
'metadata.lastAccessed': new Date(),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
);
|
|
|
|
|
|
|
|
const stream = client.bucket.openDownloadStreamByName(key);
|
|
|
|
|
|
|
|
return new Promise((resolve) => {
|
|
|
|
const resp = [];
|
|
|
|
stream.on('error', () => {
|
|
|
|
resolve(undefined);
|
|
|
|
});
|
|
|
|
|
|
|
|
stream.on('end', () => {
|
|
|
|
const data = Buffer.concat(resp).toString('utf8');
|
|
|
|
resolve(data);
|
|
|
|
});
|
|
|
|
|
|
|
|
stream.on('data', (chunk) => {
|
|
|
|
resp.push(chunk);
|
|
|
|
});
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
|
|
|
const document = await client.store.findOne({ key: { $eq: key } });
|
|
|
|
|
|
|
|
if (!document) {
|
|
|
|
return undefined;
|
|
|
|
}
|
|
|
|
|
|
|
|
return document.value;
|
|
|
|
}
|
|
|
|
|
|
|
|
async getMany(keys) {
|
|
|
|
const client = await this._getClient();
|
|
|
|
|
|
|
|
if (this.opts.useGridFS) {
|
|
|
|
const promises = [];
|
|
|
|
for (const key of keys) {
|
|
|
|
promises.push(this.get(key));
|
|
|
|
}
|
|
|
|
|
|
|
|
const values = await Promise.allSettled(promises);
|
|
|
|
const data = [];
|
|
|
|
for (const value of values) {
|
|
|
|
data.push(value.value);
|
|
|
|
}
|
|
|
|
|
|
|
|
return data;
|
|
|
|
}
|
|
|
|
|
|
|
|
const values = await client.store
|
|
|
|
.find({ key: { $in: keys } })
|
|
|
|
.project({ _id: 0, value: 1, key: 1 })
|
|
|
|
.toArray();
|
|
|
|
|
|
|
|
const results = [...keys];
|
|
|
|
let i = 0;
|
|
|
|
for (const key of keys) {
|
|
|
|
const rowIndex = values.findIndex((row) => row.key === key);
|
|
|
|
results[i] = rowIndex > -1 ? values[rowIndex].value : undefined;
|
|
|
|
i++;
|
|
|
|
}
|
|
|
|
|
|
|
|
return results;
|
|
|
|
}
|
|
|
|
|
|
|
|
async set(key, value, ttl) {
|
|
|
|
const client = await this._getClient();
|
|
|
|
const expiresAt = typeof ttl === 'number' ? new Date(Date.now() + ttl) : null;
|
|
|
|
|
|
|
|
if (this.opts.useGridFS) {
|
|
|
|
const stream = client.bucket.openUploadStream(key, {
|
|
|
|
metadata: {
|
|
|
|
expiresAt,
|
|
|
|
lastAccessed: new Date(),
|
|
|
|
},
|
|
|
|
});
|
|
|
|
|
|
|
|
return new Promise((resolve) => {
|
|
|
|
stream.on('finish', () => {
|
|
|
|
resolve(stream);
|
|
|
|
});
|
|
|
|
stream.end(value);
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
|
|
|
await client.store.updateOne(
|
|
|
|
{ key: { $eq: key } },
|
|
|
|
{ $set: { key, value, expiresAt } },
|
|
|
|
{ upsert: true },
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
async delete(key) {
|
|
|
|
if (typeof key !== 'string') {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
const client = await this._getClient();
|
|
|
|
|
|
|
|
if (this.opts.useGridFS) {
|
|
|
|
try {
|
|
|
|
const bucket = new GridFSBucket(client.db, {
|
|
|
|
bucketName: this.opts.collection,
|
|
|
|
});
|
|
|
|
const files = await bucket.find({ filename: key }).toArray();
|
|
|
|
await client.bucket.delete(files[0]._id);
|
|
|
|
return true;
|
|
|
|
} catch {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
const object = await client.store.deleteOne({ key: { $eq: key } });
|
|
|
|
return object.deletedCount > 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
async deleteMany(keys) {
|
|
|
|
const client = await this._getClient();
|
|
|
|
|
|
|
|
if (this.opts.useGridFS) {
|
|
|
|
const bucket = new GridFSBucket(client.db, {
|
|
|
|
bucketName: this.opts.collection,
|
|
|
|
});
|
|
|
|
const files = await bucket.find({ filename: { $in: keys } }).toArray();
|
|
|
|
if (files.length === 0) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
await Promise.all(files.map(async (file) => client.bucket.delete(file._id)));
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
const object = await client.store.deleteMany({ key: { $in: keys } });
|
|
|
|
return object.deletedCount > 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
async clear() {
|
|
|
|
const client = await this._getClient();
|
|
|
|
|
|
|
|
if (this.opts.useGridFS) {
|
|
|
|
try {
|
|
|
|
await client.bucket.drop();
|
|
|
|
} catch (error) {
|
|
|
|
// Throw error if not "namespace not found" error
|
|
|
|
if (!(error.code === 26)) {
|
|
|
|
throw error;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
await client.store.deleteMany({
|
|
|
|
key: { $regex: this.namespace ? `^${this.namespace}:*` : '' },
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
|
|
|
async has(key) {
|
|
|
|
const client = await this._getClient();
|
|
|
|
const filter = { [this.opts.useGridFS ? 'filename' : 'key']: { $eq: key } };
|
|
|
|
const document = await client.store.countDocuments(filter, { limit: 1 });
|
|
|
|
return document !== 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
// No-op disconnect
|
|
|
|
async disconnect() {
|
|
|
|
// This is a no-op since we don't want to close the shared mongoose connection
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
const keyvMongo = new KeyvMongoCustom({
|
|
|
|
collection: 'logs',
|
|
|
|
});
|
feat: Message Rate Limiters, Violation Logging, & Ban System 🔨 (#903)
* refactor: require Auth middleware in route index files
* feat: concurrent message limiter
* feat: complete concurrent message limiter with caching
* refactor: SSE response methods separated from handleText
* fix(abortMiddleware): fix req and res order to standard, use endpointOption in req.body
* chore: minor name changes
* refactor: add isUUID condition to saveMessage
* fix(concurrentLimiter): logic correctly handles the max number of concurrent messages and res closing/finalization
* chore: bump keyv and remove console.log from Message
* fix(concurrentLimiter): ensure messages are only saved in later message children
* refactor(concurrentLimiter): use KeyvFile instead, could make other stores configurable in the future
* feat: add denyRequest function for error responses
* feat(utils): add isStringTruthy function
Introduce the isStringTruthy function to the utilities module to check if a string value is a case-insensitive match for 'true'
* feat: add optional message rate limiters by IP and userId
* feat: add optional message rate limiters by IP and userId to edit route
* refactor: rename isStringTruthy to isTrue for brevity
* refactor(getError): use map to make code cleaner
* refactor: use memory for concurrent rate limiter to prevent clearing on startup/exit, add multiple log files, fix error message for concurrent violation
* feat: check if errorMessage is object, stringify if so
* chore: send object to denyRequest which will stringify it
* feat: log excessive requests
* fix(getError): correctly pluralize messages
* refactor(limiters): make type consistent between logs and errorMessage
* refactor(cache): move files out of lib/db into separate cache dir
>> feat: add getLogStores function so Keyv instance is not redundantly created on every violation
feat: separate violation logging to own function with logViolation
* fix: cache/index.js export, properly record userViolations
* refactor(messageLimiters): use new logging method, add logging to registrations
* refactor(logViolation): make userLogs an array of logs per user
* feat: add logging to login limiter
* refactor: pass req as first param to logViolation and record offending IP
* refactor: rename isTrue helper fn to isEnabled
* feat: add simple non_browser check and log violation
* fix: open handles in unit tests, remove KeyvMongo as not used and properly mock global fetch
* chore: adjust nodemon ignore paths to properly ignore logs
* feat: add math helper function for safe use of eval
* refactor(api/convos): use middleware at top of file to avoid redundancy
* feat: add delete all static method for Sessions
* fix: redirect to login on refresh if user is not found, or the session is not found but hasn't expired (ban case)
* refactor(getLogStores): adjust return type
* feat: add ban violation and check ban logic
refactor(logViolation): pass both req and res objects
* feat: add removePorts helper function
* refactor: rename getError to getMessageError and add getLoginError for displaying different login errors
* fix(AuthContext): fix type issue and remove unused code
* refactor(bans): ban by ip and user id, send response based on origin
* chore: add frontend ban messages
* refactor(routes/oauth): add ban check to handler, also consolidate logic to avoid redundancy
* feat: add ban check to AI messaging routes
* feat: add ban check to login/registration
* fix(ci/api): mock KeyvMongo to avoid tests hanging
* docs: update .env.example
> refactor(banViolation): calculate interval rate crossover, early return if duration is invalid
ci(banViolation): add tests to ensure users are only banned when expected
* docs: improve wording for mod system
* feat: add configurable env variables for violation scores
* chore: add jsdoc for uaParser.js
* chore: improve ban text log
* chore: update bun test scripts
* refactor(math.js): add fallback values
* fix(KeyvMongo/banLogs): refactor keyv instances to top of files to avoid memory leaks, refactor ban logic to use getLogStores instead
refactor(getLogStores): get a single log store by type
* fix(ci): refactor tests due to banLogs changes, also make sure to clear and revoke sessions even if ban duration is 0
* fix(banViolation.js): getLogStores import
* feat: handle 500 code error at login
* fix(middleware): handle case where user.id is _id and not just id
* ci: add ban secrets for backend unit tests
* refactor: logout user upon ban
* chore: log session delete message only if deletedCount > 0
* refactor: change default ban duration (2h) and make logic more clear in JSDOC
* fix: login and registration limiters will now return rate limiting error
* fix: userId not parsable as non ObjectId string
* feat: add useTimeout hook to properly clear timeouts when invoking functions within them
refactor(AuthContext): cleanup code by using new hook and defining types in ~/common
* fix: login error message for rate limits
* docs: add info for automated mod system and rate limiters, update other docs accordingly
* chore: bump data-provider version
2023-09-13 10:57:07 -04:00
|
|
|
|
2023-12-14 07:49:27 -05:00
|
|
|
keyvMongo.on('error', (err) => logger.error('KeyvMongo connection error:', err));
|
feat: Message Rate Limiters, Violation Logging, & Ban System 🔨 (#903)
* refactor: require Auth middleware in route index files
* feat: concurrent message limiter
* feat: complete concurrent message limiter with caching
* refactor: SSE response methods separated from handleText
* fix(abortMiddleware): fix req and res order to standard, use endpointOption in req.body
* chore: minor name changes
* refactor: add isUUID condition to saveMessage
* fix(concurrentLimiter): logic correctly handles the max number of concurrent messages and res closing/finalization
* chore: bump keyv and remove console.log from Message
* fix(concurrentLimiter): ensure messages are only saved in later message children
* refactor(concurrentLimiter): use KeyvFile instead, could make other stores configurable in the future
* feat: add denyRequest function for error responses
* feat(utils): add isStringTruthy function
Introduce the isStringTruthy function to the utilities module to check if a string value is a case-insensitive match for 'true'
* feat: add optional message rate limiters by IP and userId
* feat: add optional message rate limiters by IP and userId to edit route
* refactor: rename isStringTruthy to isTrue for brevity
* refactor(getError): use map to make code cleaner
* refactor: use memory for concurrent rate limiter to prevent clearing on startup/exit, add multiple log files, fix error message for concurrent violation
* feat: check if errorMessage is object, stringify if so
* chore: send object to denyRequest which will stringify it
* feat: log excessive requests
* fix(getError): correctly pluralize messages
* refactor(limiters): make type consistent between logs and errorMessage
* refactor(cache): move files out of lib/db into separate cache dir
>> feat: add getLogStores function so Keyv instance is not redundantly created on every violation
feat: separate violation logging to own function with logViolation
* fix: cache/index.js export, properly record userViolations
* refactor(messageLimiters): use new logging method, add logging to registrations
* refactor(logViolation): make userLogs an array of logs per user
* feat: add logging to login limiter
* refactor: pass req as first param to logViolation and record offending IP
* refactor: rename isTrue helper fn to isEnabled
* feat: add simple non_browser check and log violation
* fix: open handles in unit tests, remove KeyvMongo as not used and properly mock global fetch
* chore: adjust nodemon ignore paths to properly ignore logs
* feat: add math helper function for safe use of eval
* refactor(api/convos): use middleware at top of file to avoid redundancy
* feat: add delete all static method for Sessions
* fix: redirect to login on refresh if user is not found, or the session is not found but hasn't expired (ban case)
* refactor(getLogStores): adjust return type
* feat: add ban violation and check ban logic
refactor(logViolation): pass both req and res objects
* feat: add removePorts helper function
* refactor: rename getError to getMessageError and add getLoginError for displaying different login errors
* fix(AuthContext): fix type issue and remove unused code
* refactor(bans): ban by ip and user id, send response based on origin
* chore: add frontend ban messages
* refactor(routes/oauth): add ban check to handler, also consolidate logic to avoid redundancy
* feat: add ban check to AI messaging routes
* feat: add ban check to login/registration
* fix(ci/api): mock KeyvMongo to avoid tests hanging
* docs: update .env.example
> refactor(banViolation): calculate interval rate crossover, early return if duration is invalid
ci(banViolation): add tests to ensure users are only banned when expected
* docs: improve wording for mod system
* feat: add configurable env variables for violation scores
* chore: add jsdoc for uaParser.js
* chore: improve ban text log
* chore: update bun test scripts
* refactor(math.js): add fallback values
* fix(KeyvMongo/banLogs): refactor keyv instances to top of files to avoid memory leaks, refactor ban logic to use getLogStores instead
refactor(getLogStores): get a single log store by type
* fix(ci): refactor tests due to banLogs changes, also make sure to clear and revoke sessions even if ban duration is 0
* fix(banViolation.js): getLogStores import
* feat: handle 500 code error at login
* fix(middleware): handle case where user.id is _id and not just id
* ci: add ban secrets for backend unit tests
* refactor: logout user upon ban
* chore: log session delete message only if deletedCount > 0
* refactor: change default ban duration (2h) and make logic more clear in JSDOC
* fix: login and registration limiters will now return rate limiting error
* fix: userId not parsable as non ObjectId string
* feat: add useTimeout hook to properly clear timeouts when invoking functions within them
refactor(AuthContext): cleanup code by using new hook and defining types in ~/common
* fix: login error message for rate limits
* docs: add info for automated mod system and rate limiters, update other docs accordingly
* chore: bump data-provider version
2023-09-13 10:57:07 -04:00
|
|
|
|
|
|
|
module.exports = keyvMongo;
|