mirror of
https://github.com/danny-avila/LibreChat.git
synced 2025-12-17 17:00:15 +01:00
* feat: verification email * chore: email verification invalid; localize: update * fix: redirect to login when signup: fix: save emailVerified correctly * docs: update ALLOW_UNVERIFIED_EMAIL_LOGIN; fix: don't accept login only when ALLOW_UNVERIFIED_EMAIL_LOGIN = true * fix: user needs to be authenticated * style: update * fix: registration success message and redirect logic * refactor: use `isEnabled` in ALLOW_UNVERIFIED_EMAIL_LOGIN * refactor: move checkEmailConfig to server/utils * refactor: use req as param for verifyEmail function * chore: jsdoc * chore: remove console log * refactor: rename `createNewUser` to `createSocialUser` * refactor: update typing and add expiresAt field to userSchema * refactor: begin use of user methods over direct model access for User * refactor: initial email verification rewrite * chore: typing * refactor: registration flow rewrite * chore: remove help center text * refactor: update getUser to getUserById and add findUser methods. general fixes from recent changes * refactor: Update updateUser method to remove expiresAt field and use $set and $unset operations, createUser now returns Id only * refactor: Update openidStrategy to use optional chaining for avatar check, move saveBuffer init to buffer condition * refactor: logout on deleteUser mutatation * refactor: Update openidStrategy login success message format * refactor: Add emailVerified field to Discord and Facebook profile details * refactor: move limiters to separate middleware dir * refactor: Add limiters for email verification and password reset * refactor: Remove getUserController and update routes and controllers accordingly * refactor: Update getUserById method to exclude password and version fields * refactor: move verification to user route, add resend verification option * refactor: Improve email verification process and resend option * refactor: remove more direct model access of User and remove unused code * refactor: replace user authentication methods and token generation * fix: add user.id to jwt user * refactor: Update AuthContext to include setError function, add resend link to Login Form, make registration redirect shorter * fix(updateUserPluginsService): ensure userPlugins variable is defined * refactor: Delete all shared links for a specific user * fix: remove use of direct User.save() in handleExistingUser * fix(importLibreChatConvo): handle missing createdAt field in messages --------- Co-authored-by: Danny Avila <danny@librechat.ai>
68 lines
2 KiB
JavaScript
68 lines
2 KiB
JavaScript
const rateLimit = require('express-rate-limit');
|
|
const { ViolationTypes } = require('librechat-data-provider');
|
|
const logViolation = require('~/cache/logViolation');
|
|
|
|
const getEnvironmentVariables = () => {
|
|
const STT_IP_MAX = parseInt(process.env.STT_IP_MAX) || 100;
|
|
const STT_IP_WINDOW = parseInt(process.env.STT_IP_WINDOW) || 1;
|
|
const STT_USER_MAX = parseInt(process.env.STT_USER_MAX) || 50;
|
|
const STT_USER_WINDOW = parseInt(process.env.STT_USER_WINDOW) || 1;
|
|
|
|
const sttIpWindowMs = STT_IP_WINDOW * 60 * 1000;
|
|
const sttIpMax = STT_IP_MAX;
|
|
const sttIpWindowInMinutes = sttIpWindowMs / 60000;
|
|
|
|
const sttUserWindowMs = STT_USER_WINDOW * 60 * 1000;
|
|
const sttUserMax = STT_USER_MAX;
|
|
const sttUserWindowInMinutes = sttUserWindowMs / 60000;
|
|
|
|
return {
|
|
sttIpWindowMs,
|
|
sttIpMax,
|
|
sttIpWindowInMinutes,
|
|
sttUserWindowMs,
|
|
sttUserMax,
|
|
sttUserWindowInMinutes,
|
|
};
|
|
};
|
|
|
|
const createSTTHandler = (ip = true) => {
|
|
const { sttIpMax, sttIpWindowInMinutes, sttUserMax, sttUserWindowInMinutes } =
|
|
getEnvironmentVariables();
|
|
|
|
return async (req, res) => {
|
|
const type = ViolationTypes.STT_LIMIT;
|
|
const errorMessage = {
|
|
type,
|
|
max: ip ? sttIpMax : sttUserMax,
|
|
limiter: ip ? 'ip' : 'user',
|
|
windowInMinutes: ip ? sttIpWindowInMinutes : sttUserWindowInMinutes,
|
|
};
|
|
|
|
await logViolation(req, res, type, errorMessage);
|
|
res.status(429).json({ message: 'Too many STT requests. Try again later' });
|
|
};
|
|
};
|
|
|
|
const createSTTLimiters = () => {
|
|
const { sttIpWindowMs, sttIpMax, sttUserWindowMs, sttUserMax } = getEnvironmentVariables();
|
|
|
|
const sttIpLimiter = rateLimit({
|
|
windowMs: sttIpWindowMs,
|
|
max: sttIpMax,
|
|
handler: createSTTHandler(),
|
|
});
|
|
|
|
const sttUserLimiter = rateLimit({
|
|
windowMs: sttUserWindowMs,
|
|
max: sttUserMax,
|
|
handler: createSTTHandler(false),
|
|
keyGenerator: function (req) {
|
|
return req.user?.id; // Use the user ID or NULL if not available
|
|
},
|
|
});
|
|
|
|
return { sttIpLimiter, sttUserLimiter };
|
|
};
|
|
|
|
module.exports = createSTTLimiters;
|