Spaces:
Paused
Paused
| // Native Node Modules | |
| const path = require('path'); | |
| const fs = require('fs'); | |
| const crypto = require('crypto'); | |
| const os = require('os'); | |
| // Express and other dependencies | |
| const storage = require('node-persist'); | |
| const express = require('express'); | |
| const mime = require('mime-types'); | |
| const archiver = require('archiver'); | |
| const { USER_DIRECTORY_TEMPLATE, DEFAULT_USER, PUBLIC_DIRECTORIES, DEFAULT_AVATAR, SETTINGS_FILE } = require('./constants'); | |
| const { getConfigValue, color, delay, setConfigValue, generateTimestamp } = require('./util'); | |
| const { readSecret, writeSecret } = require('./endpoints/secrets'); | |
| const KEY_PREFIX = 'user:'; | |
| const AVATAR_PREFIX = 'avatar:'; | |
| const ENABLE_ACCOUNTS = getConfigValue('enableUserAccounts', false); | |
| const ANON_CSRF_SECRET = crypto.randomBytes(64).toString('base64'); | |
| /** | |
| * Cache for user directories. | |
| * @type {Map<string, UserDirectoryList>} | |
| */ | |
| const DIRECTORIES_CACHE = new Map(); | |
| const STORAGE_KEYS = { | |
| csrfSecret: 'csrfSecret', | |
| cookieSecret: 'cookieSecret', | |
| }; | |
| /** | |
| * @typedef {Object} User | |
| * @property {string} handle - The user's short handle. Used for directories and other references | |
| * @property {string} name - The user's name. Displayed in the UI | |
| * @property {number} created - The timestamp when the user was created | |
| * @property {string} password - Scrypt hash of the user's password | |
| * @property {string} salt - Salt used for hashing the password | |
| * @property {boolean} enabled - Whether the user is enabled | |
| * @property {boolean} admin - Whether the user is an admin (can manage other users) | |
| */ | |
| /** | |
| * @typedef {Object} UserViewModel | |
| * @property {string} handle - The user's short handle. Used for directories and other references | |
| * @property {string} name - The user's name. Displayed in the UI | |
| * @property {string} avatar - The user's avatar image | |
| * @property {boolean} [admin] - Whether the user is an admin (can manage other users) | |
| * @property {boolean} password - Whether the user is password protected | |
| * @property {boolean} [enabled] - Whether the user is enabled | |
| * @property {number} [created] - The timestamp when the user was created | |
| */ | |
| /** | |
| * @typedef {Object} UserDirectoryList | |
| * @property {string} root - The root directory for the user | |
| * @property {string} thumbnails - The directory where the thumbnails are stored | |
| * @property {string} thumbnailsBg - The directory where the background thumbnails are stored | |
| * @property {string} thumbnailsAvatar - The directory where the avatar thumbnails are stored | |
| * @property {string} worlds - The directory where the WI are stored | |
| * @property {string} user - The directory where the user's public data is stored | |
| * @property {string} avatars - The directory where the avatars are stored | |
| * @property {string} userImages - The directory where the images are stored | |
| * @property {string} groups - The directory where the groups are stored | |
| * @property {string} groupChats - The directory where the group chats are stored | |
| * @property {string} chats - The directory where the chats are stored | |
| * @property {string} characters - The directory where the characters are stored | |
| * @property {string} backgrounds - The directory where the backgrounds are stored | |
| * @property {string} novelAI_Settings - The directory where the NovelAI settings are stored | |
| * @property {string} koboldAI_Settings - The directory where the KoboldAI settings are stored | |
| * @property {string} openAI_Settings - The directory where the OpenAI settings are stored | |
| * @property {string} textGen_Settings - The directory where the TextGen settings are stored | |
| * @property {string} themes - The directory where the themes are stored | |
| * @property {string} movingUI - The directory where the moving UI data is stored | |
| * @property {string} extensions - The directory where the extensions are stored | |
| * @property {string} instruct - The directory where the instruct templates is stored | |
| * @property {string} context - The directory where the context templates is stored | |
| * @property {string} quickreplies - The directory where the quick replies are stored | |
| * @property {string} assets - The directory where the assets are stored | |
| * @property {string} comfyWorkflows - The directory where the ComfyUI workflows are stored | |
| * @property {string} files - The directory where the uploaded files are stored | |
| * @property {string} vectors - The directory where the vectors are stored | |
| * @property {string} backups - The directory where the backups are stored | |
| */ | |
| /** | |
| * Ensures that the content directories exist. | |
| * @returns {Promise<import('./users').UserDirectoryList[]>} - The list of user directories | |
| */ | |
| async function ensurePublicDirectoriesExist() { | |
| for (const dir of Object.values(PUBLIC_DIRECTORIES)) { | |
| if (!fs.existsSync(dir)) { | |
| fs.mkdirSync(dir, { recursive: true }); | |
| } | |
| } | |
| const userHandles = await getAllUserHandles(); | |
| const directoriesList = userHandles.map(handle => getUserDirectories(handle)); | |
| for (const userDirectories of directoriesList) { | |
| for (const dir of Object.values(userDirectories)) { | |
| if (!fs.existsSync(dir)) { | |
| fs.mkdirSync(dir, { recursive: true }); | |
| } | |
| } | |
| } | |
| return directoriesList; | |
| } | |
| /** | |
| * Gets a list of all user directories. | |
| * @returns {Promise<import('./users').UserDirectoryList[]>} - The list of user directories | |
| */ | |
| async function getUserDirectoriesList() { | |
| const userHandles = await getAllUserHandles(); | |
| const directoriesList = userHandles.map(handle => getUserDirectories(handle)); | |
| return directoriesList; | |
| } | |
| /** | |
| * Perform migration from the old user data format to the new one. | |
| */ | |
| async function migrateUserData() { | |
| const publicDirectory = path.join(process.cwd(), 'public'); | |
| // No need to migrate if the characters directory doesn't exists | |
| if (!fs.existsSync(path.join(publicDirectory, 'characters'))) { | |
| return; | |
| } | |
| const TIMEOUT = 10; | |
| console.log(); | |
| console.log(color.magenta('Preparing to migrate user data...')); | |
| console.log(`All public data will be moved to the ${global.DATA_ROOT} directory.`); | |
| console.log('This process may take a while depending on the amount of data to move.'); | |
| console.log(`Backups will be placed in the ${PUBLIC_DIRECTORIES.backups} directory.`); | |
| console.log(`The process will start in ${TIMEOUT} seconds. Press Ctrl+C to cancel.`); | |
| for (let i = TIMEOUT; i > 0; i--) { | |
| console.log(`${i}...`); | |
| await delay(1000); | |
| } | |
| console.log(color.magenta('Starting migration... Do not interrupt the process!')); | |
| const userDirectories = getUserDirectories(DEFAULT_USER.handle); | |
| const dataMigrationMap = [ | |
| { | |
| old: path.join(publicDirectory, 'assets'), | |
| new: userDirectories.assets, | |
| file: false, | |
| }, | |
| { | |
| old: path.join(publicDirectory, 'backgrounds'), | |
| new: userDirectories.backgrounds, | |
| file: false, | |
| }, | |
| { | |
| old: path.join(publicDirectory, 'characters'), | |
| new: userDirectories.characters, | |
| file: false, | |
| }, | |
| { | |
| old: path.join(publicDirectory, 'chats'), | |
| new: userDirectories.chats, | |
| file: false, | |
| }, | |
| { | |
| old: path.join(publicDirectory, 'context'), | |
| new: userDirectories.context, | |
| file: false, | |
| }, | |
| { | |
| old: path.join(publicDirectory, 'group chats'), | |
| new: userDirectories.groupChats, | |
| file: false, | |
| }, | |
| { | |
| old: path.join(publicDirectory, 'groups'), | |
| new: userDirectories.groups, | |
| file: false, | |
| }, | |
| { | |
| old: path.join(publicDirectory, 'instruct'), | |
| new: userDirectories.instruct, | |
| file: false, | |
| }, | |
| { | |
| old: path.join(publicDirectory, 'KoboldAI Settings'), | |
| new: userDirectories.koboldAI_Settings, | |
| file: false, | |
| }, | |
| { | |
| old: path.join(publicDirectory, 'movingUI'), | |
| new: userDirectories.movingUI, | |
| file: false, | |
| }, | |
| { | |
| old: path.join(publicDirectory, 'NovelAI Settings'), | |
| new: userDirectories.novelAI_Settings, | |
| file: false, | |
| }, | |
| { | |
| old: path.join(publicDirectory, 'OpenAI Settings'), | |
| new: userDirectories.openAI_Settings, | |
| file: false, | |
| }, | |
| { | |
| old: path.join(publicDirectory, 'QuickReplies'), | |
| new: userDirectories.quickreplies, | |
| file: false, | |
| }, | |
| { | |
| old: path.join(publicDirectory, 'TextGen Settings'), | |
| new: userDirectories.textGen_Settings, | |
| file: false, | |
| }, | |
| { | |
| old: path.join(publicDirectory, 'themes'), | |
| new: userDirectories.themes, | |
| file: false, | |
| }, | |
| { | |
| old: path.join(publicDirectory, 'user'), | |
| new: userDirectories.user, | |
| file: false, | |
| }, | |
| { | |
| old: path.join(publicDirectory, 'User Avatars'), | |
| new: userDirectories.avatars, | |
| file: false, | |
| }, | |
| { | |
| old: path.join(publicDirectory, 'worlds'), | |
| new: userDirectories.worlds, | |
| file: false, | |
| }, | |
| { | |
| old: path.join(publicDirectory, 'scripts/extensions/third-party'), | |
| new: userDirectories.extensions, | |
| file: false, | |
| }, | |
| { | |
| old: path.join(process.cwd(), 'thumbnails'), | |
| new: userDirectories.thumbnails, | |
| file: false, | |
| }, | |
| { | |
| old: path.join(process.cwd(), 'vectors'), | |
| new: userDirectories.vectors, | |
| file: false, | |
| }, | |
| { | |
| old: path.join(process.cwd(), 'secrets.json'), | |
| new: path.join(userDirectories.root, 'secrets.json'), | |
| file: true, | |
| }, | |
| { | |
| old: path.join(publicDirectory, 'settings.json'), | |
| new: path.join(userDirectories.root, 'settings.json'), | |
| file: true, | |
| }, | |
| { | |
| old: path.join(publicDirectory, 'stats.json'), | |
| new: path.join(userDirectories.root, 'stats.json'), | |
| file: true, | |
| }, | |
| ]; | |
| const currentDate = new Date().toISOString().split('T')[0]; | |
| const backupDirectory = path.join(process.cwd(), PUBLIC_DIRECTORIES.backups, '_migration', currentDate); | |
| if (!fs.existsSync(backupDirectory)) { | |
| fs.mkdirSync(backupDirectory, { recursive: true }); | |
| } | |
| const errors = []; | |
| for (const migration of dataMigrationMap) { | |
| console.log(`Migrating ${migration.old} to ${migration.new}...`); | |
| try { | |
| if (!fs.existsSync(migration.old)) { | |
| console.log(color.yellow(`Skipping migration of ${migration.old} as it does not exist.`)); | |
| continue; | |
| } | |
| if (migration.file) { | |
| // Copy the file to the new location | |
| fs.cpSync(migration.old, migration.new, { force: true }); | |
| // Move the file to the backup location | |
| fs.cpSync( | |
| migration.old, | |
| path.join(backupDirectory, path.basename(migration.old)), | |
| { recursive: true, force: true }, | |
| ); | |
| fs.rmSync(migration.old, { recursive: true, force: true }); | |
| } else { | |
| // Copy the directory to the new location | |
| fs.cpSync(migration.old, migration.new, { recursive: true, force: true }); | |
| // Move the directory to the backup location | |
| fs.cpSync( | |
| migration.old, | |
| path.join(backupDirectory, path.basename(migration.old)), | |
| { recursive: true, force: true }, | |
| ); | |
| fs.rmSync(migration.old, { recursive: true, force: true }); | |
| } | |
| } catch (error) { | |
| console.error(color.red(`Error migrating ${migration.old} to ${migration.new}:`), error.message); | |
| errors.push(migration.old); | |
| } | |
| } | |
| if (errors.length > 0) { | |
| console.log(color.red('Migration completed with errors. Move the following files manually:')); | |
| errors.forEach(error => console.error(error)); | |
| } | |
| console.log(color.green('Migration completed!')); | |
| } | |
| /** | |
| * Converts a user handle to a storage key. | |
| * @param {string} handle User handle | |
| * @returns {string} The key for the user storage | |
| */ | |
| function toKey(handle) { | |
| return `${KEY_PREFIX}${handle}`; | |
| } | |
| /** | |
| * Converts a user handle to a storage key for avatars. | |
| * @param {string} handle User handle | |
| * @returns {string} The key for the avatar storage | |
| */ | |
| function toAvatarKey(handle) { | |
| return `${AVATAR_PREFIX}${handle}`; | |
| } | |
| /** | |
| * Initializes the user storage. | |
| * @param {string} dataRoot The root directory for user data | |
| * @returns {Promise<void>} | |
| */ | |
| async function initUserStorage(dataRoot) { | |
| global.DATA_ROOT = dataRoot; | |
| console.log('Using data root:', color.green(global.DATA_ROOT)); | |
| console.log(); | |
| await storage.init({ | |
| dir: path.join(global.DATA_ROOT, '_storage'), | |
| ttl: false, // Never expire | |
| }); | |
| const keys = await getAllUserHandles(); | |
| // If there are no users, create the default user | |
| if (keys.length === 0) { | |
| await storage.setItem(toKey(DEFAULT_USER.handle), DEFAULT_USER); | |
| } | |
| } | |
| /** | |
| * Get the cookie secret from the config. If it doesn't exist, generate a new one. | |
| * @returns {string} The cookie secret | |
| */ | |
| function getCookieSecret() { | |
| let secret = getConfigValue(STORAGE_KEYS.cookieSecret); | |
| if (!secret) { | |
| console.warn(color.yellow('Cookie secret is missing from config.yaml. Generating a new one...')); | |
| secret = crypto.randomBytes(64).toString('base64'); | |
| setConfigValue(STORAGE_KEYS.cookieSecret, secret); | |
| } | |
| return secret; | |
| } | |
| /** | |
| * Generates a random password salt. | |
| * @returns {string} The password salt | |
| */ | |
| function getPasswordSalt() { | |
| return crypto.randomBytes(16).toString('base64'); | |
| } | |
| /** | |
| * Get the session name for the current server. | |
| * @returns {string} The session name | |
| */ | |
| function getCookieSessionName() { | |
| // Get server hostname and hash it to generate a session suffix | |
| const suffix = crypto.createHash('sha256').update(os.hostname()).digest('hex').slice(0, 8); | |
| return `session-${suffix}`; | |
| } | |
| /** | |
| * Hashes a password using scrypt with the provided salt. | |
| * @param {string} password Password to hash | |
| * @param {string} salt Salt to use for hashing | |
| * @returns {string} Hashed password | |
| */ | |
| function getPasswordHash(password, salt) { | |
| return crypto.scryptSync(password.normalize(), salt, 64).toString('base64'); | |
| } | |
| /** | |
| * Get the CSRF secret from the storage. | |
| * @param {import('express').Request} [request] HTTP request object | |
| * @returns {string} The CSRF secret | |
| */ | |
| function getCsrfSecret(request) { | |
| if (!request || !request.user) { | |
| return ANON_CSRF_SECRET; | |
| } | |
| let csrfSecret = readSecret(request.user.directories, STORAGE_KEYS.csrfSecret); | |
| if (!csrfSecret) { | |
| csrfSecret = crypto.randomBytes(64).toString('base64'); | |
| writeSecret(request.user.directories, STORAGE_KEYS.csrfSecret, csrfSecret); | |
| } | |
| return csrfSecret; | |
| } | |
| /** | |
| * Gets a list of all user handles. | |
| * @returns {Promise<string[]>} - The list of user handles | |
| */ | |
| async function getAllUserHandles() { | |
| const keys = await storage.keys(x => x.key.startsWith(KEY_PREFIX)); | |
| const handles = keys.map(x => x.replace(KEY_PREFIX, '')); | |
| return handles; | |
| } | |
| /** | |
| * Gets the directories listing for the provided user. | |
| * @param {string} handle User handle | |
| * @returns {UserDirectoryList} User directories | |
| */ | |
| function getUserDirectories(handle) { | |
| if (DIRECTORIES_CACHE.has(handle)) { | |
| const cache = DIRECTORIES_CACHE.get(handle); | |
| if (cache) { | |
| return cache; | |
| } | |
| } | |
| const directories = structuredClone(USER_DIRECTORY_TEMPLATE); | |
| for (const key in directories) { | |
| directories[key] = path.join(global.DATA_ROOT, handle, USER_DIRECTORY_TEMPLATE[key]); | |
| } | |
| DIRECTORIES_CACHE.set(handle, directories); | |
| return directories; | |
| } | |
| /** | |
| * Gets the avatar URL for the provided user. | |
| * @param {string} handle User handle | |
| * @returns {Promise<string>} User avatar URL | |
| */ | |
| async function getUserAvatar(handle) { | |
| try { | |
| // Check if the user has a custom avatar | |
| const avatarKey = toAvatarKey(handle); | |
| const avatar = await storage.getItem(avatarKey); | |
| if (avatar) { | |
| return avatar; | |
| } | |
| // Fallback to reading from files if custom avatar is not set | |
| const directory = getUserDirectories(handle); | |
| const pathToSettings = path.join(directory.root, SETTINGS_FILE); | |
| const settings = fs.existsSync(pathToSettings) ? JSON.parse(fs.readFileSync(pathToSettings, 'utf8')) : {}; | |
| const avatarFile = settings?.power_user?.default_persona || settings?.user_avatar; | |
| if (!avatarFile) { | |
| return DEFAULT_AVATAR; | |
| } | |
| const avatarPath = path.join(directory.avatars, avatarFile); | |
| if (!fs.existsSync(avatarPath)) { | |
| return DEFAULT_AVATAR; | |
| } | |
| const mimeType = mime.lookup(avatarPath); | |
| const base64Content = fs.readFileSync(avatarPath, 'base64'); | |
| return `data:${mimeType};base64,${base64Content}`; | |
| } | |
| catch { | |
| // Ignore errors | |
| return DEFAULT_AVATAR; | |
| } | |
| } | |
| /** | |
| * Checks if the user should be redirected to the login page. | |
| * @param {import('express').Request} request Request object | |
| * @returns {boolean} Whether the user should be redirected to the login page | |
| */ | |
| function shouldRedirectToLogin(request) { | |
| return ENABLE_ACCOUNTS && !request.user; | |
| } | |
| /** | |
| * Tries auto-login if there is only one user and it's not password protected. | |
| * @param {import('express').Request} request Request object | |
| * @returns {Promise<boolean>} Whether auto-login was performed | |
| */ | |
| async function tryAutoLogin(request) { | |
| if (!ENABLE_ACCOUNTS || request.user || !request.session) { | |
| return false; | |
| } | |
| const userHandles = await getAllUserHandles(); | |
| if (userHandles.length === 1) { | |
| const user = await storage.getItem(toKey(userHandles[0])); | |
| if (user && !user.password) { | |
| request.session.handle = userHandles[0]; | |
| return true; | |
| } | |
| } | |
| return false; | |
| } | |
| /** | |
| * Middleware to add user data to the request object. | |
| * @param {import('express').Request} request Request object | |
| * @param {import('express').Response} response Response object | |
| * @param {import('express').NextFunction} next Next function | |
| */ | |
| async function setUserDataMiddleware(request, response, next) { | |
| // If user accounts are disabled, use the default user | |
| if (!ENABLE_ACCOUNTS) { | |
| const handle = DEFAULT_USER.handle; | |
| const directories = getUserDirectories(handle); | |
| request.user = { | |
| profile: DEFAULT_USER, | |
| directories: directories, | |
| }; | |
| return next(); | |
| } | |
| if (!request.session) { | |
| console.error('Session not available'); | |
| return response.sendStatus(500); | |
| } | |
| // If user accounts are enabled, get the user from the session | |
| let handle = request.session?.handle; | |
| // If we have the only user and it's not password protected, use it | |
| if (!handle) { | |
| return next(); | |
| } | |
| /** @type {User} */ | |
| const user = await storage.getItem(toKey(handle)); | |
| if (!user) { | |
| console.error('User not found:', handle); | |
| return next(); | |
| } | |
| if (!user.enabled) { | |
| console.error('User is disabled:', handle); | |
| return next(); | |
| } | |
| const directories = getUserDirectories(handle); | |
| request.user = { | |
| profile: user, | |
| directories: directories, | |
| }; | |
| // Touch the session if loading the home page | |
| if (request.method === 'GET' && request.path === '/') { | |
| request.session.touch = Date.now(); | |
| } | |
| return next(); | |
| } | |
| /** | |
| * Middleware to add user data to the request object. | |
| * @param {import('express').Request} request Request object | |
| * @param {import('express').Response} response Response object | |
| * @param {import('express').NextFunction} next Next function | |
| */ | |
| function requireLoginMiddleware(request, response, next) { | |
| if (!request.user) { | |
| return response.sendStatus(403); | |
| } | |
| return next(); | |
| } | |
| /** | |
| * Creates a route handler for serving files from a specific directory. | |
| * @param {(req: import('express').Request) => string} directoryFn A function that returns the directory path to serve files from | |
| * @returns {import('express').RequestHandler} | |
| */ | |
| function createRouteHandler(directoryFn) { | |
| return async (req, res) => { | |
| try { | |
| const directory = directoryFn(req); | |
| const filePath = decodeURIComponent(req.params[0]); | |
| const exists = fs.existsSync(path.join(directory, filePath)); | |
| if (!exists) { | |
| return res.sendStatus(404); | |
| } | |
| return res.sendFile(filePath, { root: directory }); | |
| } catch (error) { | |
| return res.sendStatus(500); | |
| } | |
| }; | |
| } | |
| /** | |
| * Verifies that the current user is an admin. | |
| * @param {import('express').Request} request Request object | |
| * @param {import('express').Response} response Response object | |
| * @param {import('express').NextFunction} next Next function | |
| * @returns {any} | |
| */ | |
| function requireAdminMiddleware(request, response, next) { | |
| if (!request.user) { | |
| return response.sendStatus(403); | |
| } | |
| if (request.user.profile.admin) { | |
| return next(); | |
| } | |
| console.warn('Unauthorized access to admin endpoint:', request.originalUrl); | |
| return response.sendStatus(403); | |
| } | |
| /** | |
| * Creates an archive of the user's data root directory. | |
| * @param {string} handle User handle | |
| * @param {import('express').Response} response Express response object to write to | |
| * @returns {Promise<void>} Promise that resolves when the archive is created | |
| */ | |
| async function createBackupArchive(handle, response) { | |
| const directories = getUserDirectories(handle); | |
| console.log('Backup requested for', handle); | |
| const archive = archiver('zip'); | |
| archive.on('error', function (err) { | |
| response.status(500).send({ error: err.message }); | |
| }); | |
| // On stream closed we can end the request | |
| archive.on('end', function () { | |
| console.log('Archive wrote %d bytes', archive.pointer()); | |
| response.end(); // End the Express response | |
| }); | |
| const timestamp = generateTimestamp(); | |
| // Set the archive name | |
| response.attachment(`${handle}-${timestamp}.zip`); | |
| // This is the streaming magic | |
| // @ts-ignore | |
| archive.pipe(response); | |
| // Append files from a sub-directory, putting its contents at the root of archive | |
| archive.directory(directories.root, false); | |
| archive.finalize(); | |
| } | |
| /** | |
| * Gets all of the users. | |
| * @returns {Promise<User[]>} | |
| */ | |
| async function getAllUsers() { | |
| if (!ENABLE_ACCOUNTS) { | |
| return []; | |
| } | |
| /** | |
| * @type {User[]} | |
| */ | |
| const users = await storage.values(); | |
| return users; | |
| } | |
| /** | |
| * Gets all of the enabled users. | |
| * @returns {Promise<User[]>} | |
| */ | |
| async function getAllEnabledUsers() { | |
| const users = await getAllUsers(); | |
| return users.filter(x => x.enabled); | |
| } | |
| /** | |
| * Express router for serving files from the user's directories. | |
| */ | |
| const router = express.Router(); | |
| router.use('/backgrounds/*', createRouteHandler(req => req.user.directories.backgrounds)); | |
| router.use('/characters/*', createRouteHandler(req => req.user.directories.characters)); | |
| router.use('/User%20Avatars/*', createRouteHandler(req => req.user.directories.avatars)); | |
| router.use('/assets/*', createRouteHandler(req => req.user.directories.assets)); | |
| router.use('/user/images/*', createRouteHandler(req => req.user.directories.userImages)); | |
| router.use('/user/files/*', createRouteHandler(req => req.user.directories.files)); | |
| router.use('/scripts/extensions/third-party/*', createRouteHandler(req => req.user.directories.extensions)); | |
| module.exports = { | |
| KEY_PREFIX, | |
| toKey, | |
| toAvatarKey, | |
| initUserStorage, | |
| ensurePublicDirectoriesExist, | |
| getUserDirectoriesList, | |
| getAllUserHandles, | |
| getUserDirectories, | |
| setUserDataMiddleware, | |
| requireLoginMiddleware, | |
| requireAdminMiddleware, | |
| migrateUserData, | |
| getPasswordSalt, | |
| getPasswordHash, | |
| getCsrfSecret, | |
| getCookieSecret, | |
| getCookieSessionName, | |
| getUserAvatar, | |
| shouldRedirectToLogin, | |
| createBackupArchive, | |
| tryAutoLogin, | |
| getAllUsers, | |
| getAllEnabledUsers, | |
| router, | |
| }; | |