Haay's picture
Upload 926 files
519a20c verified
import fs from 'node:fs';
import path from 'node:path';
import express from 'express';
import { sync as writeFileAtomicSync } from 'write-file-atomic';
import { color, getConfigValue, uuidv4 } from '../util.js';
export const SECRETS_FILE = 'secrets.json';
export const SECRET_KEYS = {
_MIGRATED: '_migrated',
HORDE: 'api_key_horde',
MANCER: 'api_key_mancer',
VLLM: 'api_key_vllm',
APHRODITE: 'api_key_aphrodite',
TABBY: 'api_key_tabby',
OPENAI: 'api_key_openai',
NOVEL: 'api_key_novel',
CLAUDE: 'api_key_claude',
DEEPL: 'deepl',
LIBRE: 'libre',
LIBRE_URL: 'libre_url',
LINGVA_URL: 'lingva_url',
OPENROUTER: 'api_key_openrouter',
SCALE: 'api_key_scale',
AI21: 'api_key_ai21',
SCALE_COOKIE: 'scale_cookie',
ONERING_URL: 'oneringtranslator_url',
DEEPLX_URL: 'deeplx_url',
MAKERSUITE: 'api_key_makersuite',
VERTEXAI: 'api_key_vertexai',
SERPAPI: 'api_key_serpapi',
TOGETHERAI: 'api_key_togetherai',
MISTRALAI: 'api_key_mistralai',
CUSTOM: 'api_key_custom',
OOBA: 'api_key_ooba',
INFERMATICAI: 'api_key_infermaticai',
DREAMGEN: 'api_key_dreamgen',
NOMICAI: 'api_key_nomicai',
KOBOLDCPP: 'api_key_koboldcpp',
LLAMACPP: 'api_key_llamacpp',
COHERE: 'api_key_cohere',
PERPLEXITY: 'api_key_perplexity',
GROQ: 'api_key_groq',
AZURE_TTS: 'api_key_azure_tts',
FEATHERLESS: 'api_key_featherless',
ZEROONEAI: 'api_key_01ai',
HUGGINGFACE: 'api_key_huggingface',
STABILITY: 'api_key_stability',
CUSTOM_OPENAI_TTS: 'api_key_custom_openai_tts',
TAVILY: 'api_key_tavily',
NANOGPT: 'api_key_nanogpt',
BFL: 'api_key_bfl',
FALAI: 'api_key_falai',
GENERIC: 'api_key_generic',
DEEPSEEK: 'api_key_deepseek',
SERPER: 'api_key_serper',
AIMLAPI: 'api_key_aimlapi',
XAI: 'api_key_xai',
VERTEXAI_SERVICE_ACCOUNT: 'vertexai_service_account_json',
};
/**
* @typedef {object} SecretValue
* @property {string} id The unique identifier for the secret
* @property {string} value The secret value
* @property {string} label The label for the secret
* @property {boolean} active Whether the secret is currently active
*/
/**
* @typedef {object} SecretState
* @property {string} id The unique identifier for the secret
* @property {string} value The secret value, masked for security
* @property {string} label The label for the secret
* @property {boolean} active Whether the secret is currently active
*/
/**
* @typedef {Record<string, SecretState[]|null>} SecretStateMap
*/
/**
* @typedef {{[key: string]: SecretValue[]}} SecretKeys
* @typedef {{[key: string]: string}} FlatSecretKeys
*/
// These are the keys that are safe to expose, even if allowKeysExposure is false
const EXPORTABLE_KEYS = [
SECRET_KEYS.LIBRE_URL,
SECRET_KEYS.LINGVA_URL,
SECRET_KEYS.ONERING_URL,
SECRET_KEYS.DEEPLX_URL,
];
const allowKeysExposure = !!getConfigValue('allowKeysExposure', false, 'boolean');
/**
* SecretManager class to handle all secret operations
*/
export class SecretManager {
/**
* @param {import('../users.js').UserDirectoryList} directories
*/
constructor(directories) {
this.directories = directories;
this.filePath = path.join(directories.root, SECRETS_FILE);
this.defaultSecrets = {};
}
/**
* Ensures the secrets file exists, creating an empty one if necessary
* @private
*/
_ensureSecretsFile() {
if (!fs.existsSync(this.filePath)) {
writeFileAtomicSync(this.filePath, JSON.stringify(this.defaultSecrets), 'utf-8');
}
}
/**
* Reads and parses the secrets file
* @private
* @returns {SecretKeys}
*/
_readSecretsFile() {
this._ensureSecretsFile();
const fileContents = fs.readFileSync(this.filePath, 'utf-8');
return /** @type {SecretKeys} */ (JSON.parse(fileContents));
}
/**
* Writes secrets to the file atomically
* @private
* @param {SecretKeys} secrets
*/
_writeSecretsFile(secrets) {
writeFileAtomicSync(this.filePath, JSON.stringify(secrets, null, 4), 'utf-8');
}
/**
* Deactivates all secrets for a given key
* @private
* @param {SecretValue[]} secretArray
*/
_deactivateAllSecrets(secretArray) {
secretArray.forEach(secret => {
secret.active = false;
});
}
/**
* Validates that the secret key exists and has valid structure
* @private
* @param {SecretKeys} secrets
* @param {string} key
* @returns {boolean}
*/
_validateSecretKey(secrets, key) {
return Object.hasOwn(secrets, key) && Array.isArray(secrets[key]);
}
/**
* Masks a secret value with asterisks in the middle
* @param {string} value The secret value to mask
* @returns {string} A masked version of the value for peeking
*/
getMaskedValue(value) {
// No masking if exposure is allowed
if (allowKeysExposure) {
return value;
}
const threshold = 10;
const exposedChars = 3;
const placeholder = '*';
if (value.length <= threshold) {
return placeholder.repeat(threshold);
}
const visibleEnd = value.slice(-exposedChars);
const maskedMiddle = placeholder.repeat(threshold - exposedChars);
return `${maskedMiddle}${visibleEnd}`;
}
/**
* Writes a secret to the secrets file
* @param {string} key Secret key
* @param {string} value Secret value
* @param {string} label Label for the secret
* @returns {string} The ID of the newly created secret
*/
writeSecret(key, value, label = 'Unlabeled') {
const secrets = this._readSecretsFile();
if (!Array.isArray(secrets[key])) {
secrets[key] = [];
}
this._deactivateAllSecrets(secrets[key]);
const secret = {
id: uuidv4(),
value: value,
label: label,
active: true,
};
secrets[key].push(secret);
this._writeSecretsFile(secrets);
return secret.id;
}
/**
* Deletes a secret from the secrets file by its ID
* @param {string} key Secret key
* @param {string?} id Secret ID to delete
*/
deleteSecret(key, id) {
if (!fs.existsSync(this.filePath)) {
return;
}
const secrets = this._readSecretsFile();
if (!this._validateSecretKey(secrets, key)) {
return;
}
const secretArray = secrets[key];
const targetIndex = secretArray.findIndex(s => id ? s.id === id : s.active);
// Delete the secret if found
if (targetIndex !== -1) {
secretArray.splice(targetIndex, 1);
}
// Reactivate the first secret if none are active
if (secretArray.length && !secretArray.some(s => s.active)) {
secretArray[0].active = true;
}
// Remove the key if no secrets left
if (secretArray.length === 0) {
delete secrets[key];
}
this._writeSecretsFile(secrets);
}
/**
* Reads the active secret value for a given key
* @param {string} key Secret key
* @param {string?} id ID of the secret to read (optional)
* @returns {string} Secret value or empty string if not found
*/
readSecret(key, id) {
if (!fs.existsSync(this.filePath)) {
return '';
}
const secrets = this._readSecretsFile();
const secretArray = secrets[key];
if (Array.isArray(secretArray) && secretArray.length > 0) {
const activeSecret = secretArray.find(s => id ? s.id === id : s.active);
return activeSecret?.value || '';
}
return '';
}
/**
* Activates a specific secret by ID for a given key
* @param {string} key Secret key to rotate
* @param {string} id ID of the secret to activate
*/
rotateSecret(key, id) {
if (!fs.existsSync(this.filePath)) {
return;
}
const secrets = this._readSecretsFile();
if (!this._validateSecretKey(secrets, key)) {
return;
}
const secretArray = secrets[key];
const targetIndex = secretArray.findIndex(s => s.id === id);
if (targetIndex === -1) {
console.warn(`Secret with ID ${id} not found for key ${key}`);
return;
}
this._deactivateAllSecrets(secretArray);
secretArray[targetIndex].active = true;
this._writeSecretsFile(secrets);
}
/**
* Renames a secret by its ID
* @param {string} key Secret key to rename
* @param {string} id ID of the secret to rename
* @param {string} label New label for the secret
*/
renameSecret(key, id, label) {
const secrets = this._readSecretsFile();
if (!this._validateSecretKey(secrets, key)) {
return;
}
const secretArray = secrets[key];
const targetIndex = secretArray.findIndex(s => s.id === id);
if (targetIndex === -1) {
console.warn(`Secret with ID ${id} not found for key ${key}`);
return;
}
secretArray[targetIndex].label = label;
this._writeSecretsFile(secrets);
}
/**
* Gets the state of all secrets (whether they exist or not)
* @returns {SecretStateMap} Secret state
*/
getSecretState() {
const secrets = this._readSecretsFile();
/** @type {SecretStateMap} */
const state = {};
for (const key of Object.values(SECRET_KEYS)) {
// Skip migration marker
if (key === SECRET_KEYS._MIGRATED) {
continue;
}
const value = secrets[key];
if (value && Array.isArray(value) && value.length > 0) {
state[key] = value.map(secret => ({
id: secret.id,
value: this.getMaskedValue(secret.value),
label: secret.label,
active: secret.active,
}));
} else {
// No secrets for this key
state[key] = null;
}
}
return state;
}
/**
* Gets all secrets (for admin viewing)
* @returns {SecretKeys} All secrets
*/
getAllSecrets() {
return this._readSecretsFile();
}
/**
* Migrates legacy flat secrets format to new format
*/
migrateFlatSecrets() {
if (!fs.existsSync(this.filePath)) {
return;
}
const fileContents = fs.readFileSync(this.filePath, 'utf8');
const secrets = /** @type {FlatSecretKeys} */ (JSON.parse(fileContents));
const values = Object.values(secrets);
// Check if already migrated
if (secrets[SECRET_KEYS._MIGRATED] || values.length === 0 || values.some(v => Array.isArray(v))) {
return;
}
/** @type {SecretKeys} */
const migratedSecrets = {};
for (const [key, value] of Object.entries(secrets)) {
if (typeof value === 'string' && value.trim()) {
migratedSecrets[key] = [{
id: uuidv4(),
value: value,
label: key,
active: true,
}];
}
}
// Mark as migrated
migratedSecrets[SECRET_KEYS._MIGRATED] = [];
// Save backup of the old secrets file
const backupFilePath = path.join(this.directories.backups, `secrets_migration_${Date.now()}.json`);
fs.cpSync(this.filePath, backupFilePath);
this._writeSecretsFile(migratedSecrets);
console.info(color.green('Secrets migrated successfully, old secrets backed up to:'), backupFilePath);
}
}
//#region Backwards compatibility
/**
* Writes a secret to the secrets file
* @param {import('../users.js').UserDirectoryList} directories User directories
* @param {string} key Secret key
* @param {string} value Secret value
*/
export function writeSecret(directories, key, value) {
return new SecretManager(directories).writeSecret(key, value);
}
/**
* Deletes a secret from the secrets file
* @param {import('../users.js').UserDirectoryList} directories User directories
* @param {string} key Secret key
*/
export function deleteSecret(directories, key) {
return new SecretManager(directories).deleteSecret(key, null);
}
/**
* Reads a secret from the secrets file
* @param {import('../users.js').UserDirectoryList} directories User directories
* @param {string} key Secret key
* @returns {string} Secret value
*/
export function readSecret(directories, key) {
return new SecretManager(directories).readSecret(key, null);
}
/**
* Reads the secret state from the secrets file
* @param {import('../users.js').UserDirectoryList} directories User directories
* @returns {Record<string, boolean>} Secret state
*/
export function readSecretState(directories) {
const state = new SecretManager(directories).getSecretState();
const result = /** @type {Record<string, boolean>} */ ({});
for (const key of Object.values(SECRET_KEYS)) {
// Skip migration marker
if (key === SECRET_KEYS._MIGRATED) {
continue;
}
result[key] = Array.isArray(state[key]) && state[key].length > 0;
}
return result;
}
/**
* Reads all secrets from the secrets file
* @param {import('../users.js').UserDirectoryList} directories User directories
* @returns {Record<string, string>} Secrets
*/
export function getAllSecrets(directories) {
const secrets = new SecretManager(directories).getAllSecrets();
const result = /** @type {Record<string, string>} */ ({});
for (const [key, values] of Object.entries(secrets)) {
// Skip migration marker
if (key === SECRET_KEYS._MIGRATED) {
continue;
}
if (Array.isArray(values) && values.length > 0) {
const activeSecret = values.find(secret => secret.active);
if (activeSecret) {
result[key] = activeSecret.value;
}
}
}
return result;
}
//#endregion
/**
* Migrates legacy flat secrets format to the new format for all user directories
* @param {import('../users.js').UserDirectoryList[]} directoriesList User directories
*/
export function migrateFlatSecrets(directoriesList) {
for (const directories of directoriesList) {
try {
const manager = new SecretManager(directories);
manager.migrateFlatSecrets();
} catch (error) {
console.warn(color.red(`Failed to migrate secrets for ${directories.root}:`), error);
}
}
}
export const router = express.Router();
router.post('/write', (request, response) => {
try {
const { key, value, label } = request.body;
if (!key || typeof value !== 'string') {
return response.status(400).send('Invalid key or value');
}
const manager = new SecretManager(request.user.directories);
const id = manager.writeSecret(key, value, label);
return response.send({ id });
} catch (error) {
console.error('Error writing secret:', error);
return response.sendStatus(500);
}
});
router.post('/read', (request, response) => {
try {
const manager = new SecretManager(request.user.directories);
const state = manager.getSecretState();
return response.send(state);
} catch (error) {
console.error('Error reading secret state:', error);
return response.send({});
}
});
router.post('/view', (request, response) => {
try {
if (!allowKeysExposure) {
console.error('secrets.json could not be viewed unless allowKeysExposure in config.yaml is set to true');
return response.sendStatus(403);
}
const secrets = getAllSecrets(request.user.directories);
if (!secrets) {
return response.sendStatus(404);
}
return response.send(secrets);
} catch (error) {
console.error('Error viewing secrets:', error);
return response.sendStatus(500);
}
});
router.post('/find', (request, response) => {
try {
const { key, id } = request.body;
if (!key) {
return response.status(400).send('Key is required');
}
if (!allowKeysExposure && !EXPORTABLE_KEYS.includes(key)) {
console.error('Cannot fetch secrets unless allowKeysExposure in config.yaml is set to true');
return response.sendStatus(403);
}
const manager = new SecretManager(request.user.directories);
const secretValue = manager.readSecret(key, id);
if (!secretValue) {
return response.sendStatus(404);
}
return response.send({ value: secretValue });
} catch (error) {
console.error('Error finding secret:', error);
return response.sendStatus(500);
}
});
router.post('/delete', (request, response) => {
try {
const { key, id } = request.body;
if (!key) {
return response.status(400).send('Key and ID are required');
}
const manager = new SecretManager(request.user.directories);
manager.deleteSecret(key, id);
return response.sendStatus(204);
} catch (error) {
console.error('Error deleting secret:', error);
return response.sendStatus(500);
}
});
router.post('/rotate', (request, response) => {
try {
const { key, id } = request.body;
if (!key || !id) {
return response.status(400).send('Key and ID are required');
}
const manager = new SecretManager(request.user.directories);
manager.rotateSecret(key, id);
return response.sendStatus(204);
} catch (error) {
console.error('Error rotating secret:', error);
return response.sendStatus(500);
}
});
router.post('/rename', (request, response) => {
try {
const { key, id, label } = request.body;
if (!key || !id || !label) {
return response.status(400).send('Key, ID, and label are required');
}
const manager = new SecretManager(request.user.directories);
manager.renameSecret(key, id, label);
return response.sendStatus(204);
} catch (error) {
console.error('Error renaming secret:', error);
return response.sendStatus(500);
}
});