|
|
import fs from 'node:fs'; |
|
|
import path from 'node:path'; |
|
|
|
|
|
import express from 'express'; |
|
|
import { sync as writeFileAtomicSync } from 'write-file-atomic'; |
|
|
import { color, getConfigValue, uuidv4 } from '../util.js'; |
|
|
|
|
|
export const SECRETS_FILE = 'secrets.json'; |
|
|
export const SECRET_KEYS = { |
|
|
_MIGRATED: '_migrated', |
|
|
HORDE: 'api_key_horde', |
|
|
MANCER: 'api_key_mancer', |
|
|
VLLM: 'api_key_vllm', |
|
|
APHRODITE: 'api_key_aphrodite', |
|
|
TABBY: 'api_key_tabby', |
|
|
OPENAI: 'api_key_openai', |
|
|
NOVEL: 'api_key_novel', |
|
|
CLAUDE: 'api_key_claude', |
|
|
DEEPL: 'deepl', |
|
|
LIBRE: 'libre', |
|
|
LIBRE_URL: 'libre_url', |
|
|
LINGVA_URL: 'lingva_url', |
|
|
OPENROUTER: 'api_key_openrouter', |
|
|
AI21: 'api_key_ai21', |
|
|
ONERING_URL: 'oneringtranslator_url', |
|
|
DEEPLX_URL: 'deeplx_url', |
|
|
MAKERSUITE: 'api_key_makersuite', |
|
|
VERTEXAI: 'api_key_vertexai', |
|
|
SERPAPI: 'api_key_serpapi', |
|
|
TOGETHERAI: 'api_key_togetherai', |
|
|
MISTRALAI: 'api_key_mistralai', |
|
|
CUSTOM: 'api_key_custom', |
|
|
OOBA: 'api_key_ooba', |
|
|
INFERMATICAI: 'api_key_infermaticai', |
|
|
DREAMGEN: 'api_key_dreamgen', |
|
|
NOMICAI: 'api_key_nomicai', |
|
|
KOBOLDCPP: 'api_key_koboldcpp', |
|
|
LLAMACPP: 'api_key_llamacpp', |
|
|
COHERE: 'api_key_cohere', |
|
|
PERPLEXITY: 'api_key_perplexity', |
|
|
GROQ: 'api_key_groq', |
|
|
AZURE_TTS: 'api_key_azure_tts', |
|
|
FEATHERLESS: 'api_key_featherless', |
|
|
HUGGINGFACE: 'api_key_huggingface', |
|
|
STABILITY: 'api_key_stability', |
|
|
CUSTOM_OPENAI_TTS: 'api_key_custom_openai_tts', |
|
|
TAVILY: 'api_key_tavily', |
|
|
ELECTRONHUB: 'api_key_electronhub', |
|
|
NANOGPT: 'api_key_nanogpt', |
|
|
BFL: 'api_key_bfl', |
|
|
FALAI: 'api_key_falai', |
|
|
GENERIC: 'api_key_generic', |
|
|
DEEPSEEK: 'api_key_deepseek', |
|
|
SERPER: 'api_key_serper', |
|
|
AIMLAPI: 'api_key_aimlapi', |
|
|
XAI: 'api_key_xai', |
|
|
FIREWORKS: 'api_key_fireworks', |
|
|
VERTEXAI_SERVICE_ACCOUNT: 'vertexai_service_account_json', |
|
|
MINIMAX: 'api_key_minimax', |
|
|
MINIMAX_GROUP_ID: 'minimax_group_id', |
|
|
MOONSHOT: 'api_key_moonshot', |
|
|
COMETAPI: 'api_key_cometapi', |
|
|
AZURE_OPENAI: 'api_key_azure_openai', |
|
|
ZAI: 'api_key_zai', |
|
|
SILICONFLOW: 'api_key_siliconflow', |
|
|
}; |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
const EXPORTABLE_KEYS = [ |
|
|
SECRET_KEYS.LIBRE_URL, |
|
|
SECRET_KEYS.LINGVA_URL, |
|
|
SECRET_KEYS.ONERING_URL, |
|
|
SECRET_KEYS.DEEPLX_URL, |
|
|
]; |
|
|
|
|
|
const allowKeysExposure = !!getConfigValue('allowKeysExposure', false, 'boolean'); |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
export class SecretManager { |
|
|
|
|
|
|
|
|
|
|
|
constructor(directories) { |
|
|
this.directories = directories; |
|
|
this.filePath = path.join(directories.root, SECRETS_FILE); |
|
|
this.defaultSecrets = {}; |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
_ensureSecretsFile() { |
|
|
if (!fs.existsSync(this.filePath)) { |
|
|
writeFileAtomicSync(this.filePath, JSON.stringify(this.defaultSecrets), 'utf-8'); |
|
|
} |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
_readSecretsFile() { |
|
|
this._ensureSecretsFile(); |
|
|
const fileContents = fs.readFileSync(this.filePath, 'utf-8'); |
|
|
return (JSON.parse(fileContents)); |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
_writeSecretsFile(secrets) { |
|
|
writeFileAtomicSync(this.filePath, JSON.stringify(secrets, null, 4), 'utf-8'); |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
_deactivateAllSecrets(secretArray) { |
|
|
secretArray.forEach(secret => { |
|
|
secret.active = false; |
|
|
}); |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
_validateSecretKey(secrets, key) { |
|
|
return Object.hasOwn(secrets, key) && Array.isArray(secrets[key]); |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
getMaskedValue(value, key) { |
|
|
|
|
|
if (allowKeysExposure || EXPORTABLE_KEYS.includes(key)) { |
|
|
return value; |
|
|
} |
|
|
const threshold = 10; |
|
|
const exposedChars = 3; |
|
|
const placeholder = '*'; |
|
|
if (value.length <= threshold) { |
|
|
return placeholder.repeat(threshold); |
|
|
} |
|
|
const visibleEnd = value.slice(-exposedChars); |
|
|
const maskedMiddle = placeholder.repeat(threshold - exposedChars); |
|
|
return `${maskedMiddle}${visibleEnd}`; |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
writeSecret(key, value, label = 'Unlabeled') { |
|
|
const secrets = this._readSecretsFile(); |
|
|
|
|
|
if (!Array.isArray(secrets[key])) { |
|
|
secrets[key] = []; |
|
|
} |
|
|
|
|
|
this._deactivateAllSecrets(secrets[key]); |
|
|
|
|
|
const secret = { |
|
|
id: uuidv4(), |
|
|
value: value, |
|
|
label: label, |
|
|
active: true, |
|
|
}; |
|
|
secrets[key].push(secret); |
|
|
|
|
|
this._writeSecretsFile(secrets); |
|
|
return secret.id; |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
deleteSecret(key, id) { |
|
|
if (!fs.existsSync(this.filePath)) { |
|
|
return; |
|
|
} |
|
|
|
|
|
const secrets = this._readSecretsFile(); |
|
|
|
|
|
if (!this._validateSecretKey(secrets, key)) { |
|
|
return; |
|
|
} |
|
|
|
|
|
const secretArray = secrets[key]; |
|
|
const targetIndex = secretArray.findIndex(s => id ? s.id === id : s.active); |
|
|
|
|
|
|
|
|
if (targetIndex !== -1) { |
|
|
secretArray.splice(targetIndex, 1); |
|
|
} |
|
|
|
|
|
|
|
|
if (secretArray.length && !secretArray.some(s => s.active)) { |
|
|
secretArray[0].active = true; |
|
|
} |
|
|
|
|
|
|
|
|
if (secretArray.length === 0) { |
|
|
delete secrets[key]; |
|
|
} |
|
|
|
|
|
this._writeSecretsFile(secrets); |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
readSecret(key, id) { |
|
|
if (!fs.existsSync(this.filePath)) { |
|
|
return ''; |
|
|
} |
|
|
|
|
|
const secrets = this._readSecretsFile(); |
|
|
const secretArray = secrets[key]; |
|
|
|
|
|
if (Array.isArray(secretArray) && secretArray.length > 0) { |
|
|
const activeSecret = secretArray.find(s => id ? s.id === id : s.active); |
|
|
return activeSecret?.value || ''; |
|
|
} |
|
|
|
|
|
return ''; |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
rotateSecret(key, id) { |
|
|
if (!fs.existsSync(this.filePath)) { |
|
|
return; |
|
|
} |
|
|
|
|
|
const secrets = this._readSecretsFile(); |
|
|
|
|
|
if (!this._validateSecretKey(secrets, key)) { |
|
|
return; |
|
|
} |
|
|
|
|
|
const secretArray = secrets[key]; |
|
|
const targetIndex = secretArray.findIndex(s => s.id === id); |
|
|
|
|
|
if (targetIndex === -1) { |
|
|
console.warn(`Secret with ID ${id} not found for key ${key}`); |
|
|
return; |
|
|
} |
|
|
|
|
|
this._deactivateAllSecrets(secretArray); |
|
|
secretArray[targetIndex].active = true; |
|
|
|
|
|
this._writeSecretsFile(secrets); |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
renameSecret(key, id, label) { |
|
|
const secrets = this._readSecretsFile(); |
|
|
|
|
|
if (!this._validateSecretKey(secrets, key)) { |
|
|
return; |
|
|
} |
|
|
|
|
|
const secretArray = secrets[key]; |
|
|
const targetIndex = secretArray.findIndex(s => s.id === id); |
|
|
|
|
|
if (targetIndex === -1) { |
|
|
console.warn(`Secret with ID ${id} not found for key ${key}`); |
|
|
return; |
|
|
} |
|
|
|
|
|
secretArray[targetIndex].label = label; |
|
|
this._writeSecretsFile(secrets); |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
getSecretState() { |
|
|
const secrets = this._readSecretsFile(); |
|
|
|
|
|
const state = {}; |
|
|
|
|
|
for (const key of Object.values(SECRET_KEYS)) { |
|
|
|
|
|
if (key === SECRET_KEYS._MIGRATED) { |
|
|
continue; |
|
|
} |
|
|
const value = secrets[key]; |
|
|
if (value && Array.isArray(value) && value.length > 0) { |
|
|
state[key] = value.map(secret => ({ |
|
|
id: secret.id, |
|
|
value: this.getMaskedValue(secret.value, key), |
|
|
label: secret.label, |
|
|
active: secret.active, |
|
|
})); |
|
|
} else { |
|
|
|
|
|
state[key] = null; |
|
|
} |
|
|
} |
|
|
|
|
|
return state; |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
getAllSecrets() { |
|
|
return this._readSecretsFile(); |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
migrateFlatSecrets() { |
|
|
if (!fs.existsSync(this.filePath)) { |
|
|
return; |
|
|
} |
|
|
|
|
|
const fileContents = fs.readFileSync(this.filePath, 'utf8'); |
|
|
const secrets = (JSON.parse(fileContents)); |
|
|
const values = Object.values(secrets); |
|
|
|
|
|
|
|
|
if (secrets[SECRET_KEYS._MIGRATED] || values.length === 0 || values.some(v => Array.isArray(v))) { |
|
|
return; |
|
|
} |
|
|
|
|
|
|
|
|
const migratedSecrets = {}; |
|
|
|
|
|
for (const [key, value] of Object.entries(secrets)) { |
|
|
if (typeof value === 'string' && value.trim()) { |
|
|
migratedSecrets[key] = [{ |
|
|
id: uuidv4(), |
|
|
value: value, |
|
|
label: key, |
|
|
active: true, |
|
|
}]; |
|
|
} |
|
|
} |
|
|
|
|
|
|
|
|
migratedSecrets[SECRET_KEYS._MIGRATED] = []; |
|
|
|
|
|
|
|
|
const backupFilePath = path.join(this.directories.backups, `secrets_migration_${Date.now()}.json`); |
|
|
fs.cpSync(this.filePath, backupFilePath); |
|
|
|
|
|
this._writeSecretsFile(migratedSecrets); |
|
|
console.info(color.green('Secrets migrated successfully, old secrets backed up to:'), backupFilePath); |
|
|
} |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
export function writeSecret(directories, key, value) { |
|
|
return new SecretManager(directories).writeSecret(key, value); |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
export function deleteSecret(directories, key) { |
|
|
return new SecretManager(directories).deleteSecret(key, null); |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
export function readSecret(directories, key) { |
|
|
return new SecretManager(directories).readSecret(key, null); |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
export function readSecretState(directories) { |
|
|
const state = new SecretManager(directories).getSecretState(); |
|
|
const result = ({}); |
|
|
for (const key of Object.values(SECRET_KEYS)) { |
|
|
|
|
|
if (key === SECRET_KEYS._MIGRATED) { |
|
|
continue; |
|
|
} |
|
|
result[key] = Array.isArray(state[key]) && state[key].length > 0; |
|
|
} |
|
|
return result; |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
export function getAllSecrets(directories) { |
|
|
const secrets = new SecretManager(directories).getAllSecrets(); |
|
|
const result = ({}); |
|
|
for (const [key, values] of Object.entries(secrets)) { |
|
|
|
|
|
if (key === SECRET_KEYS._MIGRATED) { |
|
|
continue; |
|
|
} |
|
|
if (Array.isArray(values) && values.length > 0) { |
|
|
const activeSecret = values.find(secret => secret.active); |
|
|
if (activeSecret) { |
|
|
result[key] = activeSecret.value; |
|
|
} |
|
|
} |
|
|
} |
|
|
return result; |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
export function migrateFlatSecrets(directoriesList) { |
|
|
for (const directories of directoriesList) { |
|
|
try { |
|
|
const manager = new SecretManager(directories); |
|
|
manager.migrateFlatSecrets(); |
|
|
} catch (error) { |
|
|
console.warn(color.red(`Failed to migrate secrets for ${directories.root}:`), error); |
|
|
} |
|
|
} |
|
|
} |
|
|
|
|
|
export const router = express.Router(); |
|
|
|
|
|
router.post('/write', (request, response) => { |
|
|
try { |
|
|
const { key, value, label } = request.body; |
|
|
|
|
|
if (!key || typeof value !== 'string') { |
|
|
return response.status(400).send('Invalid key or value'); |
|
|
} |
|
|
|
|
|
const manager = new SecretManager(request.user.directories); |
|
|
const id = manager.writeSecret(key, value, label); |
|
|
|
|
|
return response.send({ id }); |
|
|
} catch (error) { |
|
|
console.error('Error writing secret:', error); |
|
|
return response.sendStatus(500); |
|
|
} |
|
|
}); |
|
|
|
|
|
router.post('/read', (request, response) => { |
|
|
try { |
|
|
const manager = new SecretManager(request.user.directories); |
|
|
const state = manager.getSecretState(); |
|
|
return response.send(state); |
|
|
} catch (error) { |
|
|
console.error('Error reading secret state:', error); |
|
|
return response.send({}); |
|
|
} |
|
|
}); |
|
|
|
|
|
router.post('/view', (request, response) => { |
|
|
try { |
|
|
if (!allowKeysExposure) { |
|
|
console.error('secrets.json could not be viewed unless allowKeysExposure in config.yaml is set to true'); |
|
|
return response.sendStatus(403); |
|
|
} |
|
|
|
|
|
const secrets = getAllSecrets(request.user.directories); |
|
|
|
|
|
if (!secrets) { |
|
|
return response.sendStatus(404); |
|
|
} |
|
|
|
|
|
return response.send(secrets); |
|
|
} catch (error) { |
|
|
console.error('Error viewing secrets:', error); |
|
|
return response.sendStatus(500); |
|
|
} |
|
|
}); |
|
|
|
|
|
router.post('/find', (request, response) => { |
|
|
try { |
|
|
const { key, id } = request.body; |
|
|
|
|
|
if (!key) { |
|
|
return response.status(400).send('Key is required'); |
|
|
} |
|
|
|
|
|
if (!allowKeysExposure && !EXPORTABLE_KEYS.includes(key)) { |
|
|
console.error('Cannot fetch secrets unless allowKeysExposure in config.yaml is set to true'); |
|
|
return response.sendStatus(403); |
|
|
} |
|
|
|
|
|
const manager = new SecretManager(request.user.directories); |
|
|
const state = manager.getSecretState(); |
|
|
|
|
|
if (!state[key]) { |
|
|
return response.sendStatus(404); |
|
|
} |
|
|
|
|
|
const secretValue = manager.readSecret(key, id); |
|
|
return response.send({ value: secretValue }); |
|
|
} catch (error) { |
|
|
console.error('Error finding secret:', error); |
|
|
return response.sendStatus(500); |
|
|
} |
|
|
}); |
|
|
|
|
|
router.post('/delete', (request, response) => { |
|
|
try { |
|
|
const { key, id } = request.body; |
|
|
|
|
|
if (!key) { |
|
|
return response.status(400).send('Key and ID are required'); |
|
|
} |
|
|
|
|
|
const manager = new SecretManager(request.user.directories); |
|
|
manager.deleteSecret(key, id); |
|
|
|
|
|
return response.sendStatus(204); |
|
|
} catch (error) { |
|
|
console.error('Error deleting secret:', error); |
|
|
return response.sendStatus(500); |
|
|
} |
|
|
}); |
|
|
|
|
|
router.post('/rotate', (request, response) => { |
|
|
try { |
|
|
const { key, id } = request.body; |
|
|
|
|
|
if (!key || !id) { |
|
|
return response.status(400).send('Key and ID are required'); |
|
|
} |
|
|
|
|
|
const manager = new SecretManager(request.user.directories); |
|
|
manager.rotateSecret(key, id); |
|
|
|
|
|
return response.sendStatus(204); |
|
|
} catch (error) { |
|
|
console.error('Error rotating secret:', error); |
|
|
return response.sendStatus(500); |
|
|
} |
|
|
}); |
|
|
|
|
|
router.post('/rename', (request, response) => { |
|
|
try { |
|
|
const { key, id, label } = request.body; |
|
|
|
|
|
if (!key || !id || !label) { |
|
|
return response.status(400).send('Key, ID, and label are required'); |
|
|
} |
|
|
|
|
|
const manager = new SecretManager(request.user.directories); |
|
|
manager.renameSecret(key, id, label); |
|
|
|
|
|
return response.sendStatus(204); |
|
|
} catch (error) { |
|
|
console.error('Error renaming secret:', error); |
|
|
return response.sendStatus(500); |
|
|
} |
|
|
}); |
|
|
|