mirror of
https://github.com/danny-avila/LibreChat.git
synced 2025-09-22 06:00:56 +02:00

* server-side JWT auth implementation * move oauth routes and strategies, fix bugs * backend modifications for wiring up the frontend login and reg forms * Add frontend data services for login and registration * Add login and registration forms * Implment auth context, functional client side auth * protect routes with jwt auth * finish local strategy (using local storage) * Start setting up google auth * disable token refresh, remove old auth middleware * refactor client, add ApiErrorBoundary context * disable google and facebook strategies * fix: fix presets not displaying specific to user * fix: fix issue with browser refresh * fix: casing issue with User.js (#11) * delete user.js to be renamed * fix: fix casing issue with User.js * comment out api error watcher temporarily * fix: issue with api error watcher (#12) * delete user.js to be renamed * fix: fix casing issue with User.js * comment out api error watcher temporarily * feat: add google auth social login * fix: make google login url dynamic based on dev/prod * fix: bug where UI is briefly displayed before redirecting to login * fix: fix cookie expires value for local auth * Update README.md * Update LOCAL_INSTALL structure * Add local testing instructions * Only load google strategy if client id and secret are provided * Update .env.example files with new params * fix issue with not redirecting to register form * only show google login button if value is set in .env * cleanup log messages * Add label to button for google login on login form * doc: fix client/server url values in .env.example * feat: add error message details to registration failure * Restore preventing paste on confirm password * auto-login user after registering * feat: forgot password (#24) * make login/reg pages look like openai's * add password reset data services * new form designs similar to openai, add password reset pages * add api's for password reset * email utils for password reset * remove bcrypt salt rounds from process.env * refactor: restructure api auth code, consolidate routes (#25) * add api's for password reset * remove bcrypt salt rounds from process.env * refactor: consolidate auth routes, use controller pattern * refactor: code cleanup * feat: migrate data to first user (#26) * refactor: use /api for auth routes * fix: use user id instead of username * feat: migrate data to first user on register * fix: fix social login routes after refactor (#27) * refactor: use /api for auth routes * fix: use user id instead of username * feat: migrate data to first user on register * fix: fix social login routes * fix: issue with auto-login when logging out then logging in with new browser window (#28) * refactor: use /api for auth routes * fix: use user id instead of username * feat: migrate data to first user on register * fix: fix social login routes * fix: fix issue with auto-login in new tab * doc: Update README and .env.example files with user system information (#29) * refactor: use /api for auth routes * fix: use user id instead of username * feat: migrate data to first user on register * fix: fix social login routes * fix: fix issue with auto-login in new tab * doc: update README and .env.example files * Fixup: LOCAL_INSTALL.md PS instructions (#200) (#30) Co-authored-by: alfredo-f <alfredo.fomitchenko@mail.polimi.it> * feat: send user with completion to protect against abuse (#31) * Fixup: LOCAL_INSTALL.md PS instructions (#200) * server-side JWT auth implementation * move oauth routes and strategies, fix bugs * backend modifications for wiring up the frontend login and reg forms * Add frontend data services for login and registration * Add login and registration forms * Implment auth context, functional client side auth * protect routes with jwt auth * finish local strategy (using local storage) * Start setting up google auth * disable token refresh, remove old auth middleware * refactor client, add ApiErrorBoundary context * disable google and facebook strategies * fix: fix presets not displaying specific to user * fix: fix issue with browser refresh * fix: casing issue with User.js (#11) * delete user.js to be renamed * fix: fix casing issue with User.js * comment out api error watcher temporarily * feat: add google auth social login * fix: make google login url dynamic based on dev/prod * fix: bug where UI is briefly displayed before redirecting to login * fix: fix cookie expires value for local auth * Only load google strategy if client id and secret are provided * Update .env.example files with new params * fix issue with not redirecting to register form * only show google login button if value is set in .env * cleanup log messages * Add label to button for google login on login form * doc: fix client/server url values in .env.example * feat: add error message details to registration failure * Restore preventing paste on confirm password * auto-login user after registering * feat: forgot password (#24) * make login/reg pages look like openai's * add password reset data services * new form designs similar to openai, add password reset pages * add api's for password reset * email utils for password reset * remove bcrypt salt rounds from process.env * refactor: restructure api auth code, consolidate routes (#25) * add api's for password reset * remove bcrypt salt rounds from process.env * refactor: consolidate auth routes, use controller pattern * refactor: code cleanup * feat: migrate data to first user (#26) * refactor: use /api for auth routes * fix: use user id instead of username * feat: migrate data to first user on register * fix: fix social login routes after refactor (#27) * refactor: use /api for auth routes * fix: use user id instead of username * feat: migrate data to first user on register * fix: fix social login routes * fix: issue with auto-login when logging out then logging in with new browser window (#28) * refactor: use /api for auth routes * fix: use user id instead of username * feat: migrate data to first user on register * fix: fix social login routes * fix: fix issue with auto-login in new tab * doc: Update README and .env.example files with user system information (#29) * refactor: use /api for auth routes * fix: use user id instead of username * feat: migrate data to first user on register * fix: fix social login routes * fix: fix issue with auto-login in new tab * doc: update README and .env.example files * Send user id to openai to protect against abuse * add meilisearch to gitignore * Remove webpack --------- Co-authored-by: alfredo-f <alfredo.fomitchenko@mail.polimi.it> --------- Co-authored-by: Danny Avila <110412045+danny-avila@users.noreply.github.com> Co-authored-by: Alfredo Fomitchenko <alfredo.fomitchenko@mail.polimi.it>
197 lines
5.3 KiB
JavaScript
197 lines
5.3 KiB
JavaScript
const User = require('../../models/User');
|
|
const Token = require('../../models/schema/tokenSchema');
|
|
const sendEmail = require('../../utils/sendEmail');
|
|
const crypto = require('crypto');
|
|
const bcrypt = require('bcrypt');
|
|
const DebugControl = require('../../utils/debug.js');
|
|
const Joi = require('joi');
|
|
const { registerSchema } = require('../../strategies/validators');
|
|
const migrateDataToFirstUser = require('../../utils/migrateDataToFirstUser');
|
|
|
|
function log({ title, parameters }) {
|
|
DebugControl.log.functionName(title);
|
|
DebugControl.log.parameters(parameters);
|
|
}
|
|
|
|
const isProduction = process.env.NODE_ENV === 'production';
|
|
const clientUrl = isProduction ? process.env.CLIENT_URL_PROD : process.env.CLIENT_URL_DEV;
|
|
|
|
const loginUser = async (user) => {
|
|
// const refreshToken = req.user.generateRefreshToken();
|
|
const dbUser = await User.findById(user._id);
|
|
//todo: save refresh token
|
|
|
|
return dbUser;
|
|
};
|
|
|
|
const logoutUser = async (user, refreshToken) => {
|
|
User.findById(user._id).then((user) => {
|
|
const tokenIndex = user.refreshToken.findIndex(item => item.refreshToken === refreshToken);
|
|
|
|
if (tokenIndex !== -1) {
|
|
user.refreshToken.id(user.refreshToken[tokenIndex]._id).remove();
|
|
}
|
|
|
|
user.save((err) => {
|
|
if (err) {
|
|
return { status: 500, message: err.message };
|
|
} else {
|
|
//res.clearCookie('refreshToken', COOKIE_OPTIONS);
|
|
// removeTokenCookie(res);
|
|
return { status: 200, message: 'Logout successful' };
|
|
}
|
|
});
|
|
});
|
|
return { status: 200, message: 'Logout successful' };
|
|
};
|
|
|
|
const registerUser = async (user) => {
|
|
let response = {};
|
|
const { error } = Joi.validate(user, registerSchema);
|
|
if (error) {
|
|
log({
|
|
title: 'Route: register - Joi Validation Error',
|
|
parameters: [
|
|
{ name: 'Request params:', value: user },
|
|
{ name: 'Validation error:', value: error.details }
|
|
]
|
|
});
|
|
response = { status: 422, message: error.details[0].message };
|
|
return response;
|
|
}
|
|
|
|
const { email, password, name, username } = user;
|
|
|
|
try {
|
|
const existingUser = await User.findOne({ email });
|
|
|
|
if (existingUser) {
|
|
log({
|
|
title: 'Register User - Email in use',
|
|
parameters: [
|
|
{ name: 'Request params:', value: user },
|
|
{ name: 'Existing user:', value: existingUser }
|
|
]
|
|
});
|
|
response = { status: 422, message: 'Email is in use' };
|
|
return response;
|
|
}
|
|
|
|
//determine if this is the first registered user (not counting anonymous_user)
|
|
const isFirstRegisteredUser = await User.countDocuments({}) === 0;
|
|
|
|
try {
|
|
const newUser = await new User({
|
|
provider: 'local',
|
|
email,
|
|
password,
|
|
username,
|
|
name,
|
|
avatar: null,
|
|
role: isFirstRegisteredUser ? 'ADMIN' : 'USER',
|
|
});
|
|
|
|
// todo: implement refresh token
|
|
// const refreshToken = newUser.generateRefreshToken();
|
|
// newUser.refreshToken.push({ refreshToken });
|
|
bcrypt.genSalt(10, (err, salt) => {
|
|
bcrypt.hash(newUser.password, salt, (errh, hash) => {
|
|
if (err) {
|
|
console.log(err);
|
|
}
|
|
// set pasword to hash
|
|
newUser.password = hash;
|
|
newUser.save();
|
|
});
|
|
});
|
|
console.log('newUser', newUser)
|
|
if (isFirstRegisteredUser) {
|
|
migrateDataToFirstUser(newUser);
|
|
// console.log(migrate);
|
|
}
|
|
response = { status: 200, user: newUser };
|
|
return response;
|
|
} catch (err) {
|
|
response = { status: 500, message: err.message };
|
|
return response;
|
|
}
|
|
} catch (err) {
|
|
response = { status: 500, message: err.message };
|
|
return response;
|
|
}
|
|
};
|
|
|
|
const requestPasswordReset = async (email) => {
|
|
const user = await User.findOne({ email });
|
|
if (!user) {
|
|
return new Error('Email does not exist');
|
|
}
|
|
|
|
let token = await Token.findOne({ userId: user._id });
|
|
if (token) await token.deleteOne();
|
|
|
|
let resetToken = crypto.randomBytes(32).toString('hex');
|
|
const hash = await bcrypt.hash(resetToken, 10);
|
|
|
|
await new Token({
|
|
userId: user._id,
|
|
token: hash,
|
|
createdAt: Date.now()
|
|
}).save();
|
|
|
|
const link = `${clientUrl}/reset-password?token=${resetToken}&userId=${user._id}`;
|
|
|
|
sendEmail(
|
|
user.email,
|
|
'Password Reset Request',
|
|
{
|
|
name: user.name,
|
|
link: link
|
|
},
|
|
'./template/requestResetPassword.handlebars'
|
|
);
|
|
return { link };
|
|
};
|
|
|
|
const resetPassword = async (userId, token, password) => {
|
|
let passwordResetToken = await Token.findOne({ userId });
|
|
|
|
if (!passwordResetToken) {
|
|
return new Error('Invalid or expired password reset token');
|
|
}
|
|
|
|
const isValid = await bcrypt.compare(token, passwordResetToken.token);
|
|
|
|
if (!isValid) {
|
|
return new Error('Invalid or expired password reset token');
|
|
}
|
|
|
|
const hash = await bcrypt.hash(password, 10);
|
|
|
|
await User.updateOne({ _id: userId }, { $set: { password: hash } }, { new: true });
|
|
|
|
const user = await User.findById({ _id: userId });
|
|
|
|
sendEmail(
|
|
user.email,
|
|
'Password Reset Successfnodeully',
|
|
{
|
|
name: user.name
|
|
},
|
|
'./template/resetPassword.handlebars'
|
|
);
|
|
|
|
await passwordResetToken.deleteOne();
|
|
|
|
return { message: 'Password reset was successful' };
|
|
};
|
|
|
|
|
|
module.exports = {
|
|
// signup,
|
|
registerUser,
|
|
loginUser,
|
|
logoutUser,
|
|
requestPasswordReset,
|
|
resetPassword,
|
|
};
|