mirror of
https://github.com/Mintplex-Labs/anything-llm.git
synced 2025-04-03 03:08:13 +00:00
* WIP converted all sqlite models into prisma calls * modify db setup and fix ApiKey model calls in admin.js * renaming function params to be consistent * converted adminEndpoints to utilize prisma orm * converted chatEndpoints to utilize prisma orm * converted inviteEndpoints to utilize prisma orm * converted systemEndpoints to utilize prisma orm * converted workspaceEndpoints to utilize prisma orm * converting sql queries to prisma calls * fixed default param bug for orderBy and limit * fixed typo for workspace chats * fixed order of deletion to account for sql relations * fix invite CRUD and workspace management CRUD * fixed CRUD for api keys * created prisma setup scripts/docs for understanding how to use prisma * prisma dependency change * removing unneeded console.logs * removing unneeded sql escape function * linting and creating migration script * migration from depreciated sqlite script update * removing unneeded migrations in prisma folder * create backup of old sqlite db and use transactions to ensure all operations complete successfully * adding migrations to gitignore * updated PRISMA.md docs for info on how to use sqlite migration script * comment changes * adding back migrations folder to repo * Reviewing SQL and prisma integraiton on fresh repo * update inline key replacement * ensure migration script executes and maps foreign_keys regardless of db ordering * run migration endpoint * support new prisma backend * bump version * change migration call --------- Co-authored-by: timothycarambat <rambat1010@gmail.com>
83 lines
1.9 KiB
JavaScript
83 lines
1.9 KiB
JavaScript
const { SystemSettings } = require("../../models/systemSettings");
|
|
const { User } = require("../../models/user");
|
|
const { decodeJWT } = require("../http");
|
|
|
|
async function validatedRequest(request, response, next) {
|
|
const multiUserMode = await SystemSettings.isMultiUserMode();
|
|
response.locals.multiUserMode = multiUserMode;
|
|
if (multiUserMode)
|
|
return await validateMultiUserRequest(request, response, next);
|
|
|
|
// When in development passthrough auth token for ease of development.
|
|
// Or if the user simply did not set an Auth token or JWT Secret
|
|
if (
|
|
process.env.NODE_ENV === "development" ||
|
|
!process.env.AUTH_TOKEN ||
|
|
!process.env.JWT_SECRET
|
|
) {
|
|
next();
|
|
return;
|
|
}
|
|
|
|
if (!process.env.AUTH_TOKEN) {
|
|
response.status(403).json({
|
|
error: "You need to set an AUTH_TOKEN environment variable.",
|
|
});
|
|
return;
|
|
}
|
|
|
|
const auth = request.header("Authorization");
|
|
const token = auth ? auth.split(" ")[1] : null;
|
|
|
|
if (!token) {
|
|
response.status(403).json({
|
|
error: "No auth token found.",
|
|
});
|
|
return;
|
|
}
|
|
|
|
const { p } = decodeJWT(token);
|
|
if (p !== process.env.AUTH_TOKEN) {
|
|
response.status(403).json({
|
|
error: "Invalid auth token found.",
|
|
});
|
|
return;
|
|
}
|
|
|
|
next();
|
|
}
|
|
|
|
async function validateMultiUserRequest(request, response, next) {
|
|
const auth = request.header("Authorization");
|
|
const token = auth ? auth.split(" ")[1] : null;
|
|
|
|
if (!token) {
|
|
response.status(403).json({
|
|
error: "No auth token found.",
|
|
});
|
|
return;
|
|
}
|
|
|
|
const valid = decodeJWT(token);
|
|
if (!valid || !valid.id) {
|
|
response.status(403).json({
|
|
error: "Invalid auth token.",
|
|
});
|
|
return;
|
|
}
|
|
|
|
const user = await User.get({ id: valid.id });
|
|
if (!user) {
|
|
response.status(403).json({
|
|
error: "Invalid auth for user.",
|
|
});
|
|
return;
|
|
}
|
|
|
|
response.locals.user = user;
|
|
next();
|
|
}
|
|
|
|
module.exports = {
|
|
validatedRequest,
|
|
};
|