mirror of
https://github.com/danny-avila/LibreChat.git
synced 2025-12-17 08:50:15 +01:00
* refactor: move model definitions and database-related methods to packages/data-schemas * ci: update tests due to new DB structure fix: disable mocking `librechat-data-provider` feat: Add schema exports to data-schemas package - Introduced a new schema module that exports various schemas including action, agent, and user schemas. - Updated index.ts to include the new schema exports for better modularity and organization. ci: fix appleStrategy tests fix: Agent.spec.js ci: refactor handleTools tests to use MongoMemoryServer for in-memory database fix: getLogStores imports ci: update banViolation tests to use MongoMemoryServer and improve session mocking test: refactor samlStrategy tests to improve mock configurations and user handling ci: fix crypto mock in handleText tests for improved accuracy ci: refactor spendTokens tests to improve model imports and setup ci: refactor Message model tests to use MongoMemoryServer and improve database interactions * refactor: streamline IMessage interface and move feedback properties to types/message.ts * refactor: use exported initializeRoles from `data-schemas`, remove api workspace version (this serves as an example of future migrations that still need to happen) * refactor: update model imports to use destructuring from `~/db/models` for consistency and clarity * refactor: remove unused mongoose imports from model files for cleaner code * refactor: remove unused mongoose imports from Share, Prompt, and Transaction model files for cleaner code * refactor: remove unused import in Transaction model for cleaner code * ci: update deploy workflow to reference new Docker Dev Branch Images Build and add new workflow for building Docker images on dev branch * chore: cleanup imports
140 lines
4.4 KiB
JavaScript
140 lines
4.4 KiB
JavaScript
require('dotenv').config();
|
|
const crypto = require('node:crypto');
|
|
const { webcrypto } = crypto;
|
|
|
|
// Use hex decoding for both key and IV for legacy methods.
|
|
const key = Buffer.from(process.env.CREDS_KEY, 'hex');
|
|
const iv = Buffer.from(process.env.CREDS_IV, 'hex');
|
|
const algorithm = 'AES-CBC';
|
|
|
|
// --- Legacy v1/v2 Setup: AES-CBC with fixed key and IV ---
|
|
|
|
async function encrypt(value) {
|
|
const cryptoKey = await webcrypto.subtle.importKey('raw', key, { name: algorithm }, false, [
|
|
'encrypt',
|
|
]);
|
|
const encoder = new TextEncoder();
|
|
const data = encoder.encode(value);
|
|
const encryptedBuffer = await webcrypto.subtle.encrypt(
|
|
{ name: algorithm, iv: iv },
|
|
cryptoKey,
|
|
data,
|
|
);
|
|
return Buffer.from(encryptedBuffer).toString('hex');
|
|
}
|
|
|
|
async function decrypt(encryptedValue) {
|
|
const cryptoKey = await webcrypto.subtle.importKey('raw', key, { name: algorithm }, false, [
|
|
'decrypt',
|
|
]);
|
|
const encryptedBuffer = Buffer.from(encryptedValue, 'hex');
|
|
const decryptedBuffer = await webcrypto.subtle.decrypt(
|
|
{ name: algorithm, iv: iv },
|
|
cryptoKey,
|
|
encryptedBuffer,
|
|
);
|
|
const decoder = new TextDecoder();
|
|
return decoder.decode(decryptedBuffer);
|
|
}
|
|
|
|
// --- v2: AES-CBC with a random IV per encryption ---
|
|
|
|
async function encryptV2(value) {
|
|
const gen_iv = webcrypto.getRandomValues(new Uint8Array(16));
|
|
const cryptoKey = await webcrypto.subtle.importKey('raw', key, { name: algorithm }, false, [
|
|
'encrypt',
|
|
]);
|
|
const encoder = new TextEncoder();
|
|
const data = encoder.encode(value);
|
|
const encryptedBuffer = await webcrypto.subtle.encrypt(
|
|
{ name: algorithm, iv: gen_iv },
|
|
cryptoKey,
|
|
data,
|
|
);
|
|
return Buffer.from(gen_iv).toString('hex') + ':' + Buffer.from(encryptedBuffer).toString('hex');
|
|
}
|
|
|
|
async function decryptV2(encryptedValue) {
|
|
const parts = encryptedValue.split(':');
|
|
if (parts.length === 1) {
|
|
return parts[0];
|
|
}
|
|
const gen_iv = Buffer.from(parts.shift(), 'hex');
|
|
const encrypted = parts.join(':');
|
|
const cryptoKey = await webcrypto.subtle.importKey('raw', key, { name: algorithm }, false, [
|
|
'decrypt',
|
|
]);
|
|
const encryptedBuffer = Buffer.from(encrypted, 'hex');
|
|
const decryptedBuffer = await webcrypto.subtle.decrypt(
|
|
{ name: algorithm, iv: gen_iv },
|
|
cryptoKey,
|
|
encryptedBuffer,
|
|
);
|
|
const decoder = new TextDecoder();
|
|
return decoder.decode(decryptedBuffer);
|
|
}
|
|
|
|
// --- v3: AES-256-CTR using Node's crypto functions ---
|
|
const algorithm_v3 = 'aes-256-ctr';
|
|
|
|
/**
|
|
* Encrypts a value using AES-256-CTR.
|
|
* Note: AES-256 requires a 32-byte key. Ensure that process.env.CREDS_KEY is a 64-character hex string.
|
|
*
|
|
* @param {string} value - The plaintext to encrypt.
|
|
* @returns {string} The encrypted string with a "v3:" prefix.
|
|
*/
|
|
function encryptV3(value) {
|
|
if (key.length !== 32) {
|
|
throw new Error(`Invalid key length: expected 32 bytes, got ${key.length} bytes`);
|
|
}
|
|
const iv_v3 = crypto.randomBytes(16);
|
|
const cipher = crypto.createCipheriv(algorithm_v3, key, iv_v3);
|
|
const encrypted = Buffer.concat([cipher.update(value, 'utf8'), cipher.final()]);
|
|
return `v3:${iv_v3.toString('hex')}:${encrypted.toString('hex')}`;
|
|
}
|
|
|
|
function decryptV3(encryptedValue) {
|
|
const parts = encryptedValue.split(':');
|
|
if (parts[0] !== 'v3') {
|
|
throw new Error('Not a v3 encrypted value');
|
|
}
|
|
const iv_v3 = Buffer.from(parts[1], 'hex');
|
|
const encryptedText = Buffer.from(parts.slice(2).join(':'), 'hex');
|
|
const decipher = crypto.createDecipheriv(algorithm_v3, key, iv_v3);
|
|
const decrypted = Buffer.concat([decipher.update(encryptedText), decipher.final()]);
|
|
return decrypted.toString('utf8');
|
|
}
|
|
|
|
async function getRandomValues(length) {
|
|
if (!Number.isInteger(length) || length <= 0) {
|
|
throw new Error('Length must be a positive integer');
|
|
}
|
|
const randomValues = new Uint8Array(length);
|
|
webcrypto.getRandomValues(randomValues);
|
|
return Buffer.from(randomValues).toString('hex');
|
|
}
|
|
|
|
/**
|
|
* Computes SHA-256 hash for the given input.
|
|
* @param {string} input
|
|
* @returns {Promise<string>}
|
|
*/
|
|
async function hashBackupCode(input) {
|
|
const encoder = new TextEncoder();
|
|
const data = encoder.encode(input);
|
|
const hashBuffer = await webcrypto.subtle.digest('SHA-256', data);
|
|
const hashArray = Array.from(new Uint8Array(hashBuffer));
|
|
return hashArray.map((b) => b.toString(16).padStart(2, '0')).join('');
|
|
}
|
|
|
|
module.exports = {
|
|
encrypt,
|
|
decrypt,
|
|
encryptV2,
|
|
decryptV2,
|
|
encryptV3,
|
|
decryptV3,
|
|
hashBackupCode,
|
|
getRandomValues,
|
|
};
|