mirror of
https://github.com/Mintplex-Labs/anything-llm.git
synced 2025-04-09 14:18:14 +00:00
* WIP converted all sqlite models into prisma calls * modify db setup and fix ApiKey model calls in admin.js * renaming function params to be consistent * converted adminEndpoints to utilize prisma orm * converted chatEndpoints to utilize prisma orm * converted inviteEndpoints to utilize prisma orm * converted systemEndpoints to utilize prisma orm * converted workspaceEndpoints to utilize prisma orm * converting sql queries to prisma calls * fixed default param bug for orderBy and limit * fixed typo for workspace chats * fixed order of deletion to account for sql relations * fix invite CRUD and workspace management CRUD * fixed CRUD for api keys * created prisma setup scripts/docs for understanding how to use prisma * prisma dependency change * removing unneeded console.logs * removing unneeded sql escape function * linting and creating migration script * migration from depreciated sqlite script update * removing unneeded migrations in prisma folder * create backup of old sqlite db and use transactions to ensure all operations complete successfully * adding migrations to gitignore * updated PRISMA.md docs for info on how to use sqlite migration script * comment changes * adding back migrations folder to repo * Reviewing SQL and prisma integraiton on fresh repo * update inline key replacement * ensure migration script executes and maps foreign_keys regardless of db ordering * run migration endpoint * support new prisma backend * bump version * change migration call --------- Co-authored-by: timothycarambat <rambat1010@gmail.com>
62 lines
1.4 KiB
JavaScript
62 lines
1.4 KiB
JavaScript
process.env.NODE_ENV === "development"
|
|
? require("dotenv").config({ path: `.env.${process.env.NODE_ENV}` })
|
|
: require("dotenv").config();
|
|
const JWT = require("jsonwebtoken");
|
|
const { User } = require("../../models/user");
|
|
|
|
function reqBody(request) {
|
|
return typeof request.body === "string"
|
|
? JSON.parse(request.body)
|
|
: request.body;
|
|
}
|
|
|
|
function queryParams(request) {
|
|
return request.query;
|
|
}
|
|
|
|
function makeJWT(info = {}, expiry = "30d") {
|
|
if (!process.env.JWT_SECRET)
|
|
throw new Error("Cannot create JWT as JWT_SECRET is unset.");
|
|
return JWT.sign(info, process.env.JWT_SECRET, { expiresIn: expiry });
|
|
}
|
|
|
|
async function userFromSession(request, response = null) {
|
|
if (!!response && !!response.locals?.user) {
|
|
return response.locals.user;
|
|
}
|
|
|
|
const auth = request.header("Authorization");
|
|
const token = auth ? auth.split(" ")[1] : null;
|
|
|
|
if (!token) {
|
|
return null;
|
|
}
|
|
|
|
const valid = decodeJWT(token);
|
|
if (!valid || !valid.id) {
|
|
return null;
|
|
}
|
|
|
|
const user = await User.get({ id: valid.id });
|
|
return user;
|
|
}
|
|
|
|
function decodeJWT(jwtToken) {
|
|
try {
|
|
return JWT.verify(jwtToken, process.env.JWT_SECRET);
|
|
} catch {}
|
|
return { p: null, id: null, username: null };
|
|
}
|
|
|
|
function multiUserMode(response) {
|
|
return response?.locals?.multiUserMode;
|
|
}
|
|
|
|
module.exports = {
|
|
reqBody,
|
|
multiUserMode,
|
|
queryParams,
|
|
makeJWT,
|
|
decodeJWT,
|
|
userFromSession,
|
|
};
|