mirror of
https://github.com/Mintplex-Labs/anything-llm.git
synced 2024-11-19 20:50:09 +01:00
4430ddb059
* wip encrypting jwt value * Encrypt/Decrypt pass in JWT value for verification in single-user password mode
112 lines
2.9 KiB
JavaScript
112 lines
2.9 KiB
JavaScript
const { SystemSettings } = require("../../models/systemSettings");
|
|
const { User } = require("../../models/user");
|
|
const { EncryptionManager } = require("../EncryptionManager");
|
|
const { decodeJWT } = require("../http");
|
|
const EncryptionMgr = new EncryptionManager();
|
|
|
|
async function validatedRequest(request, response, next) {
|
|
const multiUserMode = await SystemSettings.isMultiUserMode();
|
|
response.locals.multiUserMode = multiUserMode;
|
|
if (multiUserMode)
|
|
return await validateMultiUserRequest(request, response, next);
|
|
|
|
// When in development passthrough auth token for ease of development.
|
|
// Or if the user simply did not set an Auth token or JWT Secret
|
|
if (
|
|
process.env.NODE_ENV === "development" ||
|
|
!process.env.AUTH_TOKEN ||
|
|
!process.env.JWT_SECRET
|
|
) {
|
|
next();
|
|
return;
|
|
}
|
|
|
|
if (!process.env.AUTH_TOKEN) {
|
|
response.status(401).json({
|
|
error: "You need to set an AUTH_TOKEN environment variable.",
|
|
});
|
|
return;
|
|
}
|
|
|
|
const auth = request.header("Authorization");
|
|
const token = auth ? auth.split(" ")[1] : null;
|
|
|
|
if (!token) {
|
|
response.status(401).json({
|
|
error: "No auth token found.",
|
|
});
|
|
return;
|
|
}
|
|
|
|
const bcrypt = require("bcrypt");
|
|
const { p } = decodeJWT(token);
|
|
|
|
if (p === null || !/\w{32}:\w{32}/.test(p)) {
|
|
response.status(401).json({
|
|
error: "Token expired or failed validation.",
|
|
});
|
|
return;
|
|
}
|
|
|
|
// Since the blame of this comment we have been encrypting the `p` property of JWTs with the persistent
|
|
// encryptionManager PEM's. This prevents us from storing the `p` unencrypted in the JWT itself, which could
|
|
// be unsafe. As a consequence, existing JWTs with invalid `p` values that do not match the regex
|
|
// in ln:44 will be marked invalid so they can be logged out and forced to log back in and obtain an encrypted token.
|
|
// This kind of methodology only applies to single-user password mode.
|
|
if (
|
|
!bcrypt.compareSync(
|
|
EncryptionMgr.decrypt(p),
|
|
bcrypt.hashSync(process.env.AUTH_TOKEN, 10)
|
|
)
|
|
) {
|
|
response.status(401).json({
|
|
error: "Invalid auth credentials.",
|
|
});
|
|
return;
|
|
}
|
|
|
|
next();
|
|
}
|
|
|
|
async function validateMultiUserRequest(request, response, next) {
|
|
const auth = request.header("Authorization");
|
|
const token = auth ? auth.split(" ")[1] : null;
|
|
|
|
if (!token) {
|
|
response.status(401).json({
|
|
error: "No auth token found.",
|
|
});
|
|
return;
|
|
}
|
|
|
|
const valid = decodeJWT(token);
|
|
if (!valid || !valid.id) {
|
|
response.status(401).json({
|
|
error: "Invalid auth token.",
|
|
});
|
|
return;
|
|
}
|
|
|
|
const user = await User.get({ id: valid.id });
|
|
if (!user) {
|
|
response.status(401).json({
|
|
error: "Invalid auth for user.",
|
|
});
|
|
return;
|
|
}
|
|
|
|
if (user.suspended) {
|
|
response.status(401).json({
|
|
error: "User is suspended from system",
|
|
});
|
|
return;
|
|
}
|
|
|
|
response.locals.user = user;
|
|
next();
|
|
}
|
|
|
|
module.exports = {
|
|
validatedRequest,
|
|
};
|