mirror of
https://github.com/danny-avila/LibreChat.git
synced 2025-12-17 00:40:14 +01:00
* WIP: initial logging changes add several transports in ~/config/winston omit messages in logs, truncate long strings add short blurb in dotenv for debug logging GoogleClient: using logger OpenAIClient: using logger, handleOpenAIErrors Adding typedef for payload message bumped winston and using winston-daily-rotate-file moved config for server paths to ~/config dir Added `DEBUG_LOGGING=true` to .env.example * WIP: Refactor logging statements in code * WIP: Refactor logging statements and import configurations * WIP: Refactor logging statements and import configurations * refactor: broadcast Redis initialization message with `info` not `debug` * refactor: complete Refactor logging statements and import configurations * chore: delete unused tools * fix: circular dependencies due to accessing logger * refactor(handleText): handle booleans and write tests * refactor: redact sensitive values, better formatting * chore: improve log formatting, avoid passing strings to 2nd arg * fix(ci): fix jest tests due to logger changes * refactor(getAvailablePluginsController): cache plugins as they are static and avoids async addOpenAPISpecs call every time * chore: update docs * chore: update docs * chore: create separate meiliSync logger, clean up logs to avoid being unnecessarily verbose * chore: spread objects where they are commonly logged to allow string truncation * chore: improve error log formatting
75 lines
2.4 KiB
JavaScript
75 lines
2.4 KiB
JavaScript
const fs = require('fs');
|
|
const path = require('path');
|
|
const nodemailer = require('nodemailer');
|
|
const handlebars = require('handlebars');
|
|
const logger = require('~/config/winston');
|
|
|
|
const sendEmail = async (email, subject, payload, template) => {
|
|
try {
|
|
const transporterOptions = {
|
|
// Use STARTTLS by default instead of obligatory TLS
|
|
secure: process.env.EMAIL_ENCRYPTION === 'tls',
|
|
// If explicit STARTTLS is set, require it when connecting
|
|
requireTls: process.env.EMAIL_ENCRYPTION === 'starttls',
|
|
tls: {
|
|
// Whether to accept unsigned certificates
|
|
rejectUnauthorized: process.env.EMAIL_ALLOW_SELFSIGNED === 'true',
|
|
},
|
|
auth: {
|
|
user: process.env.EMAIL_USERNAME,
|
|
pass: process.env.EMAIL_PASSWORD,
|
|
},
|
|
};
|
|
|
|
if (process.env.EMAIL_ENCRYPTION_HOSTNAME) {
|
|
// Check the certificate against this name explicitly
|
|
transporterOptions.tls.servername = process.env.EMAIL_ENCRYPTION_HOSTNAME;
|
|
}
|
|
|
|
// Mailer service definition has precedence
|
|
if (process.env.EMAIL_SERVICE) {
|
|
transporterOptions.service = process.env.EMAIL_SERVICE;
|
|
} else {
|
|
transporterOptions.host = process.env.EMAIL_HOST;
|
|
transporterOptions.port = process.env.EMAIL_PORT ?? 25;
|
|
}
|
|
|
|
const transporter = nodemailer.createTransport(transporterOptions);
|
|
|
|
const source = fs.readFileSync(path.join(__dirname, 'emails', template), 'utf8');
|
|
const compiledTemplate = handlebars.compile(source);
|
|
const options = () => {
|
|
return {
|
|
// Header address should contain name-addr
|
|
from:
|
|
`"${process.env.EMAIL_FROM_NAME || process.env.APP_TITLE}"` +
|
|
`<${process.env.EMAIL_FROM}>`,
|
|
to: `"${payload.name}" <${email}>`,
|
|
envelope: {
|
|
// Envelope from should contain addr-spec
|
|
// Mistake in the Nodemailer documentation?
|
|
from: process.env.EMAIL_FROM,
|
|
to: email,
|
|
},
|
|
subject: subject,
|
|
html: compiledTemplate(payload),
|
|
};
|
|
};
|
|
|
|
// Send email
|
|
transporter.sendMail(options(), (error, info) => {
|
|
if (error) {
|
|
logger.error('[sendEmail]', error);
|
|
return error;
|
|
} else {
|
|
logger.debug('[sendEmail]', info);
|
|
return info;
|
|
}
|
|
});
|
|
} catch (error) {
|
|
logger.error('[sendEmail]', error);
|
|
return error;
|
|
}
|
|
};
|
|
|
|
module.exports = sendEmail;
|