mirror of
https://github.com/danny-avila/LibreChat.git
synced 2025-09-22 08:12:00 +02:00

* WIP: initial logging changes add several transports in ~/config/winston omit messages in logs, truncate long strings add short blurb in dotenv for debug logging GoogleClient: using logger OpenAIClient: using logger, handleOpenAIErrors Adding typedef for payload message bumped winston and using winston-daily-rotate-file moved config for server paths to ~/config dir Added `DEBUG_LOGGING=true` to .env.example * WIP: Refactor logging statements in code * WIP: Refactor logging statements and import configurations * WIP: Refactor logging statements and import configurations * refactor: broadcast Redis initialization message with `info` not `debug` * refactor: complete Refactor logging statements and import configurations * chore: delete unused tools * fix: circular dependencies due to accessing logger * refactor(handleText): handle booleans and write tests * refactor: redact sensitive values, better formatting * chore: improve log formatting, avoid passing strings to 2nd arg * fix(ci): fix jest tests due to logger changes * refactor(getAvailablePluginsController): cache plugins as they are static and avoids async addOpenAPISpecs call every time * chore: update docs * chore: update docs * chore: create separate meiliSync logger, clean up logs to avoid being unnecessarily verbose * chore: spread objects where they are commonly logged to allow string truncation * chore: improve error log formatting
123 lines
3.8 KiB
JavaScript
123 lines
3.8 KiB
JavaScript
const crypto = require('crypto');
|
|
const cookies = require('cookie');
|
|
const jwt = require('jsonwebtoken');
|
|
const { Session, User } = require('~/models');
|
|
const {
|
|
registerUser,
|
|
resetPassword,
|
|
setAuthTokens,
|
|
requestPasswordReset,
|
|
} = require('~/server/services/AuthService');
|
|
const { logger } = require('~/config');
|
|
|
|
const registrationController = async (req, res) => {
|
|
try {
|
|
const response = await registerUser(req.body);
|
|
if (response.status === 200) {
|
|
const { status, user } = response;
|
|
let newUser = await User.findOne({ _id: user._id });
|
|
if (!newUser) {
|
|
newUser = new User(user);
|
|
await newUser.save();
|
|
}
|
|
const token = await setAuthTokens(user._id, res);
|
|
res.setHeader('Authorization', `Bearer ${token}`);
|
|
res.status(status).send({ user });
|
|
} else {
|
|
const { status, message } = response;
|
|
res.status(status).send({ message });
|
|
}
|
|
} catch (err) {
|
|
logger.error('[registrationController]', err);
|
|
return res.status(500).json({ message: err.message });
|
|
}
|
|
};
|
|
|
|
const getUserController = async (req, res) => {
|
|
return res.status(200).send(req.user);
|
|
};
|
|
|
|
const resetPasswordRequestController = async (req, res) => {
|
|
try {
|
|
const resetService = await requestPasswordReset(req.body.email);
|
|
if (resetService instanceof Error) {
|
|
return res.status(400).json(resetService);
|
|
} else {
|
|
return res.status(200).json(resetService);
|
|
}
|
|
} catch (e) {
|
|
logger.error('[resetPasswordRequestController]', e);
|
|
return res.status(400).json({ message: e.message });
|
|
}
|
|
};
|
|
|
|
const resetPasswordController = async (req, res) => {
|
|
try {
|
|
const resetPasswordService = await resetPassword(
|
|
req.body.userId,
|
|
req.body.token,
|
|
req.body.password,
|
|
);
|
|
if (resetPasswordService instanceof Error) {
|
|
return res.status(400).json(resetPasswordService);
|
|
} else {
|
|
return res.status(200).json(resetPasswordService);
|
|
}
|
|
} catch (e) {
|
|
logger.error('[resetPasswordController]', e);
|
|
return res.status(400).json({ message: e.message });
|
|
}
|
|
};
|
|
|
|
const refreshController = async (req, res) => {
|
|
const refreshToken = req.headers.cookie ? cookies.parse(req.headers.cookie).refreshToken : null;
|
|
if (!refreshToken) {
|
|
return res.status(200).send('Refresh token not provided');
|
|
}
|
|
|
|
try {
|
|
let payload;
|
|
payload = jwt.verify(refreshToken, process.env.JWT_REFRESH_SECRET);
|
|
const userId = payload.id;
|
|
const user = await User.findOne({ _id: userId });
|
|
if (!user) {
|
|
return res.status(401).redirect('/login');
|
|
}
|
|
|
|
if (process.env.NODE_ENV === 'CI') {
|
|
const token = await setAuthTokens(userId, res);
|
|
const userObj = user.toJSON();
|
|
return res.status(200).send({ token, user: userObj });
|
|
}
|
|
|
|
// Hash the refresh token
|
|
const hash = crypto.createHash('sha256');
|
|
const hashedToken = hash.update(refreshToken).digest('hex');
|
|
|
|
// Find the session with the hashed refresh token
|
|
const session = await Session.findOne({ user: userId, refreshTokenHash: hashedToken });
|
|
if (session && session.expiration > new Date()) {
|
|
const token = await setAuthTokens(userId, res, session._id);
|
|
const userObj = user.toJSON();
|
|
res.status(200).send({ token, user: userObj });
|
|
} else if (req?.query?.retry) {
|
|
// Retrying from a refresh token request that failed (401)
|
|
res.status(403).send('No session found');
|
|
} else if (payload.exp < Date.now() / 1000) {
|
|
res.status(403).redirect('/login');
|
|
} else {
|
|
res.status(401).send('Refresh token expired or not found for this user');
|
|
}
|
|
} catch (err) {
|
|
logger.error(`[refreshController] Refresh token: ${refreshToken}`, err);
|
|
res.status(403).send('Invalid refresh token');
|
|
}
|
|
};
|
|
|
|
module.exports = {
|
|
getUserController,
|
|
refreshController,
|
|
registrationController,
|
|
resetPasswordRequestController,
|
|
resetPasswordController,
|
|
};
|