mirror of
https://github.com/danny-avila/LibreChat.git
synced 2025-09-21 21:50:49 +02:00

* 🔧 Overhauled caching feature:
- Refactored caching logic.
- Fixed redis prefix, namespace, tls, ttl, and cluster.
- Added REDIS_KEY_PREFIX_VAR
* # refactor: Rename redisCache to standardCache
* # Add Redis pinging mechanism to maintain connection.
* # docs: Add warning about Keyv Redis client prefix support
84 lines
2.4 KiB
JavaScript
84 lines
2.4 KiB
JavaScript
const passport = require('passport');
|
|
const session = require('express-session');
|
|
const {
|
|
setupOpenId,
|
|
googleLogin,
|
|
githubLogin,
|
|
discordLogin,
|
|
facebookLogin,
|
|
appleLogin,
|
|
setupSaml,
|
|
openIdJwtLogin,
|
|
} = require('~/strategies');
|
|
const { isEnabled } = require('~/server/utils');
|
|
const { logger } = require('~/config');
|
|
const { getLogStores } = require('~/cache');
|
|
const { CacheKeys } = require('librechat-data-provider');
|
|
|
|
/**
|
|
*
|
|
* @param {Express.Application} app
|
|
*/
|
|
const configureSocialLogins = async (app) => {
|
|
logger.info('Configuring social logins...');
|
|
|
|
if (process.env.GOOGLE_CLIENT_ID && process.env.GOOGLE_CLIENT_SECRET) {
|
|
passport.use(googleLogin());
|
|
}
|
|
if (process.env.FACEBOOK_CLIENT_ID && process.env.FACEBOOK_CLIENT_SECRET) {
|
|
passport.use(facebookLogin());
|
|
}
|
|
if (process.env.GITHUB_CLIENT_ID && process.env.GITHUB_CLIENT_SECRET) {
|
|
passport.use(githubLogin());
|
|
}
|
|
if (process.env.DISCORD_CLIENT_ID && process.env.DISCORD_CLIENT_SECRET) {
|
|
passport.use(discordLogin());
|
|
}
|
|
if (process.env.APPLE_CLIENT_ID && process.env.APPLE_PRIVATE_KEY_PATH) {
|
|
passport.use(appleLogin());
|
|
}
|
|
if (
|
|
process.env.OPENID_CLIENT_ID &&
|
|
process.env.OPENID_CLIENT_SECRET &&
|
|
process.env.OPENID_ISSUER &&
|
|
process.env.OPENID_SCOPE &&
|
|
process.env.OPENID_SESSION_SECRET
|
|
) {
|
|
logger.info('Configuring OpenID Connect...');
|
|
const sessionOptions = {
|
|
secret: process.env.OPENID_SESSION_SECRET,
|
|
resave: false,
|
|
saveUninitialized: false,
|
|
store: getLogStores(CacheKeys.OPENID_SESSION),
|
|
};
|
|
app.use(session(sessionOptions));
|
|
app.use(passport.session());
|
|
const config = await setupOpenId();
|
|
if (isEnabled(process.env.OPENID_REUSE_TOKENS)) {
|
|
logger.info('OpenID token reuse is enabled.');
|
|
passport.use('openidJwt', openIdJwtLogin(config));
|
|
}
|
|
logger.info('OpenID Connect configured.');
|
|
}
|
|
if (
|
|
process.env.SAML_ENTRY_POINT &&
|
|
process.env.SAML_ISSUER &&
|
|
process.env.SAML_CERT &&
|
|
process.env.SAML_SESSION_SECRET
|
|
) {
|
|
logger.info('Configuring SAML Connect...');
|
|
const sessionOptions = {
|
|
secret: process.env.SAML_SESSION_SECRET,
|
|
resave: false,
|
|
saveUninitialized: false,
|
|
store: getLogStores(CacheKeys.SAML_SESSION),
|
|
};
|
|
app.use(session(sessionOptions));
|
|
app.use(passport.session());
|
|
setupSaml();
|
|
|
|
logger.info('SAML Connect configured.');
|
|
}
|
|
};
|
|
|
|
module.exports = configureSocialLogins;
|