2025-07-05 15:02:32 -04:00
|
|
|
const rateLimit = require('express-rate-limit');
|
|
|
|
const { isEnabled } = require('@librechat/api');
|
|
|
|
const { RedisStore } = require('rate-limit-redis');
|
|
|
|
const { logger } = require('@librechat/data-schemas');
|
|
|
|
const { ViolationTypes } = require('librechat-data-provider');
|
|
|
|
const ioredisClient = require('~/cache/ioredisClient');
|
|
|
|
const logViolation = require('~/cache/logViolation');
|
|
|
|
|
|
|
|
const getEnvironmentVariables = () => {
|
|
|
|
const FORK_IP_MAX = parseInt(process.env.FORK_IP_MAX) || 30;
|
|
|
|
const FORK_IP_WINDOW = parseInt(process.env.FORK_IP_WINDOW) || 1;
|
|
|
|
const FORK_USER_MAX = parseInt(process.env.FORK_USER_MAX) || 7;
|
|
|
|
const FORK_USER_WINDOW = parseInt(process.env.FORK_USER_WINDOW) || 1;
|
⚖️ feat: Add Violation Scores (#8304)
- Introduced new violation scores for TTS, STT, Fork, Import, and File Upload actions in the .env.example file.
- Updated logViolation function to accept a score parameter, allowing for dynamic severity levels based on the action type.
- Modified limiters for Fork, Import, Message, STT, TTS, Tool Call, and File Upload to utilize the new violation scores when logging violations.
2025-07-07 17:08:40 -04:00
|
|
|
const FORK_VIOLATION_SCORE = process.env.FORK_VIOLATION_SCORE;
|
2025-07-05 15:02:32 -04:00
|
|
|
|
|
|
|
const forkIpWindowMs = FORK_IP_WINDOW * 60 * 1000;
|
|
|
|
const forkIpMax = FORK_IP_MAX;
|
|
|
|
const forkIpWindowInMinutes = forkIpWindowMs / 60000;
|
|
|
|
|
|
|
|
const forkUserWindowMs = FORK_USER_WINDOW * 60 * 1000;
|
|
|
|
const forkUserMax = FORK_USER_MAX;
|
|
|
|
const forkUserWindowInMinutes = forkUserWindowMs / 60000;
|
|
|
|
|
|
|
|
return {
|
|
|
|
forkIpWindowMs,
|
|
|
|
forkIpMax,
|
|
|
|
forkIpWindowInMinutes,
|
|
|
|
forkUserWindowMs,
|
|
|
|
forkUserMax,
|
|
|
|
forkUserWindowInMinutes,
|
⚖️ feat: Add Violation Scores (#8304)
- Introduced new violation scores for TTS, STT, Fork, Import, and File Upload actions in the .env.example file.
- Updated logViolation function to accept a score parameter, allowing for dynamic severity levels based on the action type.
- Modified limiters for Fork, Import, Message, STT, TTS, Tool Call, and File Upload to utilize the new violation scores when logging violations.
2025-07-07 17:08:40 -04:00
|
|
|
forkViolationScore: FORK_VIOLATION_SCORE,
|
2025-07-05 15:02:32 -04:00
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
const createForkHandler = (ip = true) => {
|
⚖️ feat: Add Violation Scores (#8304)
- Introduced new violation scores for TTS, STT, Fork, Import, and File Upload actions in the .env.example file.
- Updated logViolation function to accept a score parameter, allowing for dynamic severity levels based on the action type.
- Modified limiters for Fork, Import, Message, STT, TTS, Tool Call, and File Upload to utilize the new violation scores when logging violations.
2025-07-07 17:08:40 -04:00
|
|
|
const {
|
|
|
|
forkIpMax,
|
|
|
|
forkUserMax,
|
|
|
|
forkViolationScore,
|
|
|
|
forkIpWindowInMinutes,
|
|
|
|
forkUserWindowInMinutes,
|
|
|
|
} = getEnvironmentVariables();
|
2025-07-05 15:02:32 -04:00
|
|
|
|
|
|
|
return async (req, res) => {
|
|
|
|
const type = ViolationTypes.FILE_UPLOAD_LIMIT;
|
|
|
|
const errorMessage = {
|
|
|
|
type,
|
|
|
|
max: ip ? forkIpMax : forkUserMax,
|
|
|
|
limiter: ip ? 'ip' : 'user',
|
|
|
|
windowInMinutes: ip ? forkIpWindowInMinutes : forkUserWindowInMinutes,
|
|
|
|
};
|
|
|
|
|
⚖️ feat: Add Violation Scores (#8304)
- Introduced new violation scores for TTS, STT, Fork, Import, and File Upload actions in the .env.example file.
- Updated logViolation function to accept a score parameter, allowing for dynamic severity levels based on the action type.
- Modified limiters for Fork, Import, Message, STT, TTS, Tool Call, and File Upload to utilize the new violation scores when logging violations.
2025-07-07 17:08:40 -04:00
|
|
|
await logViolation(req, res, type, errorMessage, forkViolationScore);
|
2025-07-05 15:02:32 -04:00
|
|
|
res.status(429).json({ message: 'Too many conversation fork requests. Try again later' });
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
const createForkLimiters = () => {
|
|
|
|
const { forkIpWindowMs, forkIpMax, forkUserWindowMs, forkUserMax } = getEnvironmentVariables();
|
|
|
|
|
|
|
|
const ipLimiterOptions = {
|
|
|
|
windowMs: forkIpWindowMs,
|
|
|
|
max: forkIpMax,
|
|
|
|
handler: createForkHandler(),
|
|
|
|
};
|
|
|
|
const userLimiterOptions = {
|
|
|
|
windowMs: forkUserWindowMs,
|
|
|
|
max: forkUserMax,
|
|
|
|
handler: createForkHandler(false),
|
|
|
|
keyGenerator: function (req) {
|
|
|
|
return req.user?.id;
|
|
|
|
},
|
|
|
|
};
|
|
|
|
|
|
|
|
if (isEnabled(process.env.USE_REDIS) && ioredisClient) {
|
|
|
|
logger.debug('Using Redis for fork rate limiters.');
|
|
|
|
const sendCommand = (...args) => ioredisClient.call(...args);
|
|
|
|
const ipStore = new RedisStore({
|
|
|
|
sendCommand,
|
|
|
|
prefix: 'fork_ip_limiter:',
|
|
|
|
});
|
|
|
|
const userStore = new RedisStore({
|
|
|
|
sendCommand,
|
|
|
|
prefix: 'fork_user_limiter:',
|
|
|
|
});
|
|
|
|
ipLimiterOptions.store = ipStore;
|
|
|
|
userLimiterOptions.store = userStore;
|
|
|
|
}
|
|
|
|
|
|
|
|
const forkIpLimiter = rateLimit(ipLimiterOptions);
|
|
|
|
const forkUserLimiter = rateLimit(userLimiterOptions);
|
|
|
|
return { forkIpLimiter, forkUserLimiter };
|
|
|
|
};
|
|
|
|
|
|
|
|
module.exports = { createForkLimiters };
|