| | const { Keyv } = require('keyv'); |
| | const uap = require('ua-parser-js'); |
| | const { logger } = require('@librechat/data-schemas'); |
| | const { isEnabled, keyvMongo } = require('@librechat/api'); |
| | const { ViolationTypes } = require('librechat-data-provider'); |
| | const { removePorts } = require('~/server/utils'); |
| | const denyRequest = require('./denyRequest'); |
| | const { getLogStores } = require('~/cache'); |
| | const { findUser } = require('~/models'); |
| |
|
| | const banCache = new Keyv({ store: keyvMongo, namespace: ViolationTypes.BAN, ttl: 0 }); |
| | const message = 'Your account has been temporarily banned due to violations of our service.'; |
| |
|
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | const banResponse = async (req, res) => { |
| | const ua = uap(req.headers['user-agent']); |
| | const { baseUrl } = req; |
| | if (!ua.browser.name) { |
| | return res.status(403).json({ message }); |
| | } else if (baseUrl === '/api/ask' || baseUrl === '/api/edit') { |
| | return await denyRequest(req, res, { type: ViolationTypes.BAN }); |
| | } |
| |
|
| | return res.status(403).json({ message }); |
| | }; |
| |
|
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | const checkBan = async (req, res, next = () => {}) => { |
| | try { |
| | const { BAN_VIOLATIONS } = process.env ?? {}; |
| |
|
| | if (!isEnabled(BAN_VIOLATIONS)) { |
| | return next(); |
| | } |
| |
|
| | req.ip = removePorts(req); |
| | let userId = req.user?.id ?? req.user?._id ?? null; |
| |
|
| | if (!userId && req?.body?.email) { |
| | const user = await findUser({ email: req.body.email }, '_id'); |
| | userId = user?._id ? user._id.toString() : userId; |
| | } |
| |
|
| | if (!userId && !req.ip) { |
| | return next(); |
| | } |
| |
|
| | let cachedIPBan; |
| | let cachedUserBan; |
| |
|
| | let ipKey = ''; |
| | let userKey = ''; |
| |
|
| | if (req.ip) { |
| | ipKey = isEnabled(process.env.USE_REDIS) ? `ban_cache:ip:${req.ip}` : req.ip; |
| | cachedIPBan = await banCache.get(ipKey); |
| | } |
| |
|
| | if (userId) { |
| | userKey = isEnabled(process.env.USE_REDIS) ? `ban_cache:user:${userId}` : userId; |
| | cachedUserBan = await banCache.get(userKey); |
| | } |
| |
|
| | const cachedBan = cachedIPBan || cachedUserBan; |
| |
|
| | if (cachedBan) { |
| | req.banned = true; |
| | return await banResponse(req, res); |
| | } |
| |
|
| | const banLogs = getLogStores(ViolationTypes.BAN); |
| | const duration = banLogs.opts.ttl; |
| |
|
| | if (duration <= 0) { |
| | return next(); |
| | } |
| |
|
| | let ipBan; |
| | let userBan; |
| |
|
| | if (req.ip) { |
| | ipBan = await banLogs.get(req.ip); |
| | } |
| |
|
| | if (userId) { |
| | userBan = await banLogs.get(userId); |
| | } |
| |
|
| | const isBanned = !!(ipBan || userBan); |
| |
|
| | if (!isBanned) { |
| | return next(); |
| | } |
| |
|
| | const timeLeft = Number(isBanned.expiresAt) - Date.now(); |
| |
|
| | if (timeLeft <= 0 && ipKey) { |
| | await banLogs.delete(ipKey); |
| | } |
| |
|
| | if (timeLeft <= 0 && userKey) { |
| | await banLogs.delete(userKey); |
| | return next(); |
| | } |
| |
|
| | if (ipKey) { |
| | banCache.set(ipKey, isBanned, timeLeft); |
| | } |
| |
|
| | if (userKey) { |
| | banCache.set(userKey, isBanned, timeLeft); |
| | } |
| |
|
| | req.banned = true; |
| | return await banResponse(req, res); |
| | } catch (error) { |
| | logger.error('Error in checkBan middleware:', error); |
| | return next(error); |
| | } |
| | }; |
| |
|
| | module.exports = checkBan; |
| |
|