mirror of
https://github.com/danny-avila/LibreChat.git
synced 2025-09-22 08:12:00 +02:00

* feat(sharepoint): integrate SharePoint file picker and download workflow Introduces end‑to‑end SharePoint import support: * Token exchange with Microsoft Graph and scope management (`useSharePointToken`) * Re‑usable hooks: `useSharePointPicker`, `useSharePointDownload`, `useSharePointFileHandling` * FileSearch dropdown now offers **From Local Machine** / **From SharePoint** sources and gracefully falls back when SharePoint is disabled * Agent upload model, `AttachFileMenu`, and `DropdownPopup` extended for SharePoint files and sub‑menus * Blurry overlay with progress indicator and `maxSelectionCount` limit during downloads * Cache‑flush utility (`config/flush-cache.js`) supporting Redis & filesystem, with dry‑run and npm script * Updated `SharePointIcon` (uses `currentColor`) and new i18n keys * Bug fixes: placeholder syntax in progress message, picker event‑listener cleanup * Misc style and performance optimizations * Fix ESLint warnings --------- Co-authored-by: Atef Bellaaj <slalom.bellaaj@external.daimlertruck.com>
75 lines
2.1 KiB
JavaScript
75 lines
2.1 KiB
JavaScript
const express = require('express');
|
|
const {
|
|
refreshController,
|
|
registrationController,
|
|
resetPasswordController,
|
|
resetPasswordRequestController,
|
|
graphTokenController,
|
|
} = require('~/server/controllers/AuthController');
|
|
const { loginController } = require('~/server/controllers/auth/LoginController');
|
|
const { logoutController } = require('~/server/controllers/auth/LogoutController');
|
|
const { verify2FAWithTempToken } = require('~/server/controllers/auth/TwoFactorAuthController');
|
|
const {
|
|
enable2FA,
|
|
verify2FA,
|
|
disable2FA,
|
|
regenerateBackupCodes,
|
|
confirm2FA,
|
|
} = require('~/server/controllers/TwoFactorController');
|
|
const {
|
|
checkBan,
|
|
logHeaders,
|
|
loginLimiter,
|
|
requireJwtAuth,
|
|
checkInviteUser,
|
|
registerLimiter,
|
|
requireLdapAuth,
|
|
setBalanceConfig,
|
|
requireLocalAuth,
|
|
resetPasswordLimiter,
|
|
validateRegistration,
|
|
validatePasswordReset,
|
|
} = require('~/server/middleware');
|
|
|
|
const router = express.Router();
|
|
|
|
const ldapAuth = !!process.env.LDAP_URL && !!process.env.LDAP_USER_SEARCH_BASE;
|
|
//Local
|
|
router.post('/logout', requireJwtAuth, logoutController);
|
|
router.post(
|
|
'/login',
|
|
logHeaders,
|
|
loginLimiter,
|
|
checkBan,
|
|
ldapAuth ? requireLdapAuth : requireLocalAuth,
|
|
setBalanceConfig,
|
|
loginController,
|
|
);
|
|
router.post('/refresh', refreshController);
|
|
router.post(
|
|
'/register',
|
|
registerLimiter,
|
|
checkBan,
|
|
checkInviteUser,
|
|
validateRegistration,
|
|
registrationController,
|
|
);
|
|
router.post(
|
|
'/requestPasswordReset',
|
|
resetPasswordLimiter,
|
|
checkBan,
|
|
validatePasswordReset,
|
|
resetPasswordRequestController,
|
|
);
|
|
router.post('/resetPassword', checkBan, validatePasswordReset, resetPasswordController);
|
|
|
|
router.get('/2fa/enable', requireJwtAuth, enable2FA);
|
|
router.post('/2fa/verify', requireJwtAuth, verify2FA);
|
|
router.post('/2fa/verify-temp', checkBan, verify2FAWithTempToken);
|
|
router.post('/2fa/confirm', requireJwtAuth, confirm2FA);
|
|
router.post('/2fa/disable', requireJwtAuth, disable2FA);
|
|
router.post('/2fa/backup/regenerate', requireJwtAuth, regenerateBackupCodes);
|
|
|
|
router.get('/graph-token', requireJwtAuth, graphTokenController);
|
|
|
|
module.exports = router;
|