mirror of
https://github.com/danny-avila/LibreChat.git
synced 2025-12-17 08:50:15 +01:00
* feat: password reset disable option; fix: account email leak * fix(LoginSpec): typo * test: fixed LoginForm test * fix: disable password reset when undefined * refactor: use a helper function * fix: tests * feat: Remove unused error message in password reset process * chore: Update password reset email message * refactor: only allow password reset if explicitly allowed * feat: Add password reset email service configuration check The code changes in `checks.js` add a new function `checkPasswordReset()` that checks if the email service is configured when password reset is enabled. If the email service is not configured, a warning message is logged. This change ensures secure password reset functionality by prompting the user to configure the email service. Co-authored-by: Berry-13 <root@Berry> Co-authored-by: Danny Avila <messagedaniel@protonmail.com> Co-authored-by: Danny Avila <danny@librechat.ai> * chore: remove import order rules * refactor: simplify password reset logic and align against Observable Response Discrepancy * chore: make password reset warning more prominent * chore(AuthService): better logging for password resets, refactor requestPasswordReset to use req object, fix sendEmail error when email config is not present * refactor: fix styling of password reset email message * chore: add missing type for passwordResetEnabled, TStartupConfig * fix(LoginForm): prevent login form flickering * fix(ci): Update login form to use mocked startupConfig for rendering correctly * refactor: Improve password reset UI, applies DRY * chore: Add logging to password reset validation middleware * chore(CONTRIBUTING): Update import order conventions --------- Co-authored-by: Danny Avila <danny@librechat.ai> Co-authored-by: Berry-13 <root@Berry> Co-authored-by: Danny Avila <messagedaniel@protonmail.com>
44 lines
1.2 KiB
JavaScript
44 lines
1.2 KiB
JavaScript
const express = require('express');
|
|
const {
|
|
resetPasswordRequestController,
|
|
resetPasswordController,
|
|
refreshController,
|
|
registrationController,
|
|
} = require('../controllers/AuthController');
|
|
const { loginController } = require('../controllers/auth/LoginController');
|
|
const { logoutController } = require('../controllers/auth/LogoutController');
|
|
const {
|
|
checkBan,
|
|
loginLimiter,
|
|
registerLimiter,
|
|
requireJwtAuth,
|
|
requireLdapAuth,
|
|
requireLocalAuth,
|
|
validateRegistration,
|
|
validatePasswordReset,
|
|
} = require('../middleware');
|
|
|
|
const router = express.Router();
|
|
|
|
const ldapAuth =
|
|
!!process.env.LDAP_URL && !!process.env.LDAP_BIND_DN && !!process.env.LDAP_USER_SEARCH_BASE;
|
|
//Local
|
|
router.post('/logout', requireJwtAuth, logoutController);
|
|
router.post(
|
|
'/login',
|
|
loginLimiter,
|
|
checkBan,
|
|
ldapAuth ? requireLdapAuth : requireLocalAuth,
|
|
loginController,
|
|
);
|
|
router.post('/refresh', refreshController);
|
|
router.post('/register', registerLimiter, checkBan, validateRegistration, registrationController);
|
|
router.post(
|
|
'/requestPasswordReset',
|
|
checkBan,
|
|
validatePasswordReset,
|
|
resetPasswordRequestController,
|
|
);
|
|
router.post('/resetPassword', checkBan, validatePasswordReset, resetPasswordController);
|
|
|
|
module.exports = router;
|