mirror of
https://github.com/danny-avila/LibreChat.git
synced 2025-09-21 21:50:49 +02:00

- Introduced new violation scores for TTS, STT, Fork, Import, and File Upload actions in the .env.example file. - Updated logViolation function to accept a score parameter, allowing for dynamic severity levels based on the action type. - Modified limiters for Fork, Import, Message, STT, TTS, Tool Call, and File Upload to utilize the new violation scores when logging violations.
96 lines
3.1 KiB
JavaScript
96 lines
3.1 KiB
JavaScript
const rateLimit = require('express-rate-limit');
|
|
const { isEnabled } = require('@librechat/api');
|
|
const { RedisStore } = require('rate-limit-redis');
|
|
const { logger } = require('@librechat/data-schemas');
|
|
const { ViolationTypes } = require('librechat-data-provider');
|
|
const ioredisClient = require('~/cache/ioredisClient');
|
|
const logViolation = require('~/cache/logViolation');
|
|
|
|
const getEnvironmentVariables = () => {
|
|
const IMPORT_IP_MAX = parseInt(process.env.IMPORT_IP_MAX) || 100;
|
|
const IMPORT_IP_WINDOW = parseInt(process.env.IMPORT_IP_WINDOW) || 15;
|
|
const IMPORT_USER_MAX = parseInt(process.env.IMPORT_USER_MAX) || 50;
|
|
const IMPORT_USER_WINDOW = parseInt(process.env.IMPORT_USER_WINDOW) || 15;
|
|
const IMPORT_VIOLATION_SCORE = process.env.IMPORT_VIOLATION_SCORE;
|
|
|
|
const importIpWindowMs = IMPORT_IP_WINDOW * 60 * 1000;
|
|
const importIpMax = IMPORT_IP_MAX;
|
|
const importIpWindowInMinutes = importIpWindowMs / 60000;
|
|
|
|
const importUserWindowMs = IMPORT_USER_WINDOW * 60 * 1000;
|
|
const importUserMax = IMPORT_USER_MAX;
|
|
const importUserWindowInMinutes = importUserWindowMs / 60000;
|
|
|
|
return {
|
|
importIpWindowMs,
|
|
importIpMax,
|
|
importIpWindowInMinutes,
|
|
importUserWindowMs,
|
|
importUserMax,
|
|
importUserWindowInMinutes,
|
|
importViolationScore: IMPORT_VIOLATION_SCORE,
|
|
};
|
|
};
|
|
|
|
const createImportHandler = (ip = true) => {
|
|
const {
|
|
importIpMax,
|
|
importUserMax,
|
|
importViolationScore,
|
|
importIpWindowInMinutes,
|
|
importUserWindowInMinutes,
|
|
} = getEnvironmentVariables();
|
|
|
|
return async (req, res) => {
|
|
const type = ViolationTypes.FILE_UPLOAD_LIMIT;
|
|
const errorMessage = {
|
|
type,
|
|
max: ip ? importIpMax : importUserMax,
|
|
limiter: ip ? 'ip' : 'user',
|
|
windowInMinutes: ip ? importIpWindowInMinutes : importUserWindowInMinutes,
|
|
};
|
|
|
|
await logViolation(req, res, type, errorMessage, importViolationScore);
|
|
res.status(429).json({ message: 'Too many conversation import requests. Try again later' });
|
|
};
|
|
};
|
|
|
|
const createImportLimiters = () => {
|
|
const { importIpWindowMs, importIpMax, importUserWindowMs, importUserMax } =
|
|
getEnvironmentVariables();
|
|
|
|
const ipLimiterOptions = {
|
|
windowMs: importIpWindowMs,
|
|
max: importIpMax,
|
|
handler: createImportHandler(),
|
|
};
|
|
const userLimiterOptions = {
|
|
windowMs: importUserWindowMs,
|
|
max: importUserMax,
|
|
handler: createImportHandler(false),
|
|
keyGenerator: function (req) {
|
|
return req.user?.id; // Use the user ID or NULL if not available
|
|
},
|
|
};
|
|
|
|
if (isEnabled(process.env.USE_REDIS) && ioredisClient) {
|
|
logger.debug('Using Redis for import rate limiters.');
|
|
const sendCommand = (...args) => ioredisClient.call(...args);
|
|
const ipStore = new RedisStore({
|
|
sendCommand,
|
|
prefix: 'import_ip_limiter:',
|
|
});
|
|
const userStore = new RedisStore({
|
|
sendCommand,
|
|
prefix: 'import_user_limiter:',
|
|
});
|
|
ipLimiterOptions.store = ipStore;
|
|
userLimiterOptions.store = userStore;
|
|
}
|
|
|
|
const importIpLimiter = rateLimit(ipLimiterOptions);
|
|
const importUserLimiter = rateLimit(userLimiterOptions);
|
|
return { importIpLimiter, importUserLimiter };
|
|
};
|
|
|
|
module.exports = { createImportLimiters };
|