2024-04-11 02:50:57 -04:00
|
|
|
const cookies = require('cookie');
|
|
|
|
const jwt = require('jsonwebtoken');
|
2025-08-26 12:10:18 -04:00
|
|
|
const { logger } = require('@librechat/data-schemas');
|
|
|
|
const { getAppConfig } = require('~/server/services/Config/app');
|
2024-04-11 02:50:57 -04:00
|
|
|
|
2024-10-24 15:50:48 -04:00
|
|
|
const OBJECT_ID_LENGTH = 24;
|
|
|
|
const OBJECT_ID_PATTERN = /^[0-9a-f]{24}$/i;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Validates if a string is a valid MongoDB ObjectId
|
|
|
|
* @param {string} id - String to validate
|
|
|
|
* @returns {boolean} - Whether string is a valid ObjectId format
|
|
|
|
*/
|
|
|
|
function isValidObjectId(id) {
|
|
|
|
if (typeof id !== 'string') {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
if (id.length !== OBJECT_ID_LENGTH) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
return OBJECT_ID_PATTERN.test(id);
|
|
|
|
}
|
|
|
|
|
2024-04-11 02:50:57 -04:00
|
|
|
/**
|
2024-04-14 19:34:13 -04:00
|
|
|
* Middleware to validate image request.
|
|
|
|
* Must be set by `secureImageLinks` via custom config file.
|
2024-04-11 02:50:57 -04:00
|
|
|
*/
|
2025-08-26 12:10:18 -04:00
|
|
|
async function validateImageRequest(req, res, next) {
|
|
|
|
const appConfig = await getAppConfig({ role: req.user?.role });
|
|
|
|
if (!appConfig.secureImageLinks) {
|
2024-04-14 19:34:13 -04:00
|
|
|
return next();
|
|
|
|
}
|
|
|
|
|
2024-04-11 02:50:57 -04:00
|
|
|
const refreshToken = req.headers.cookie ? cookies.parse(req.headers.cookie).refreshToken : null;
|
|
|
|
if (!refreshToken) {
|
|
|
|
logger.warn('[validateImageRequest] Refresh token not provided');
|
|
|
|
return res.status(401).send('Unauthorized');
|
|
|
|
}
|
|
|
|
|
|
|
|
let payload;
|
|
|
|
try {
|
|
|
|
payload = jwt.verify(refreshToken, process.env.JWT_REFRESH_SECRET);
|
|
|
|
} catch (err) {
|
|
|
|
logger.warn('[validateImageRequest]', err);
|
|
|
|
return res.status(403).send('Access Denied');
|
|
|
|
}
|
|
|
|
|
2024-10-24 15:50:48 -04:00
|
|
|
if (!isValidObjectId(payload.id)) {
|
|
|
|
logger.warn('[validateImageRequest] Invalid User ID');
|
|
|
|
return res.status(403).send('Access Denied');
|
|
|
|
}
|
|
|
|
|
2024-04-11 02:50:57 -04:00
|
|
|
const currentTimeInSeconds = Math.floor(Date.now() / 1000);
|
|
|
|
if (payload.exp < currentTimeInSeconds) {
|
|
|
|
logger.warn('[validateImageRequest] Refresh token expired');
|
|
|
|
return res.status(403).send('Access Denied');
|
|
|
|
}
|
|
|
|
|
2024-07-17 09:51:03 -04:00
|
|
|
const fullPath = decodeURIComponent(req.originalUrl);
|
|
|
|
const pathPattern = new RegExp(`^/images/${payload.id}/[^/]+$`);
|
|
|
|
|
|
|
|
if (pathPattern.test(fullPath)) {
|
2024-04-11 02:50:57 -04:00
|
|
|
logger.debug('[validateImageRequest] Image request validated');
|
|
|
|
next();
|
|
|
|
} else {
|
2024-07-17 09:51:03 -04:00
|
|
|
logger.warn('[validateImageRequest] Invalid image path');
|
2024-04-11 02:50:57 -04:00
|
|
|
res.status(403).send('Access Denied');
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
module.exports = validateImageRequest;
|