| | import { env } from "$env/dynamic/private"; |
| | import { env as envPublic } from "$env/dynamic/public"; |
| | import type { Handle, HandleServerError } from "@sveltejs/kit"; |
| | import { collections } from "$lib/server/database"; |
| | import { base } from "$app/paths"; |
| | import { findUser, refreshSessionCookie, requiresUser } from "$lib/server/auth"; |
| | import { ERROR_MESSAGES } from "$lib/stores/errors"; |
| | import { sha256 } from "$lib/utils/sha256"; |
| | import { addWeeks } from "date-fns"; |
| | import { checkAndRunMigrations } from "$lib/migrations/migrations"; |
| | import { building } from "$app/environment"; |
| | import { logger } from "$lib/server/logger"; |
| | import { AbortedGenerations } from "$lib/server/abortedGenerations"; |
| | import { MetricsServer } from "$lib/server/metrics"; |
| | import { initExitHandler } from "$lib/server/exitHandler"; |
| | import { ObjectId } from "mongodb"; |
| | import { refreshAssistantsCounts } from "$lib/jobs/refresh-assistants-counts"; |
| | import { refreshConversationStats } from "$lib/jobs/refresh-conversation-stats"; |
| |
|
| | |
| | if (!building) { |
| | |
| | process.env.HF_TOKEN ??= env.HF_TOKEN; |
| |
|
| | logger.info("Starting server..."); |
| | initExitHandler(); |
| |
|
| | checkAndRunMigrations(); |
| | if (env.ENABLE_ASSISTANTS) { |
| | refreshAssistantsCounts(); |
| | } |
| | refreshConversationStats(); |
| |
|
| | |
| | MetricsServer.getInstance(); |
| |
|
| | |
| | AbortedGenerations.getInstance(); |
| | } |
| |
|
| | export const handleError: HandleServerError = async ({ error, event, status, message }) => { |
| | |
| |
|
| | if (building) { |
| | throw error; |
| | } |
| |
|
| | if (event.route.id === null) { |
| | return { |
| | message: `Page ${event.url.pathname} not found`, |
| | }; |
| | } |
| |
|
| | const errorId = crypto.randomUUID(); |
| |
|
| | logger.error({ |
| | locals: event.locals, |
| | url: event.request.url, |
| | params: event.params, |
| | request: event.request, |
| | message, |
| | error, |
| | errorId, |
| | status, |
| | stack: error instanceof Error ? error.stack : undefined, |
| | }); |
| |
|
| | return { |
| | message: "An error occurred", |
| | errorId, |
| | }; |
| | }; |
| |
|
| | export const handle: Handle = async ({ event, resolve }) => { |
| | logger.debug({ |
| | locals: event.locals, |
| | url: event.url.pathname, |
| | params: event.params, |
| | request: event.request, |
| | }); |
| |
|
| | if (event.url.pathname.startsWith(`${base}/api/`) && env.EXPOSE_API !== "true") { |
| | return new Response("API is disabled", { status: 403 }); |
| | } |
| |
|
| | function errorResponse(status: number, message: string) { |
| | const sendJson = |
| | event.request.headers.get("accept")?.includes("application/json") || |
| | event.request.headers.get("content-type")?.includes("application/json"); |
| | return new Response(sendJson ? JSON.stringify({ error: message }) : message, { |
| | status, |
| | headers: { |
| | "content-type": sendJson ? "application/json" : "text/plain", |
| | }, |
| | }); |
| | } |
| |
|
| | if (event.url.pathname.startsWith(`${base}/admin/`) || event.url.pathname === `${base}/admin`) { |
| | const ADMIN_SECRET = env.ADMIN_API_SECRET || env.PARQUET_EXPORT_SECRET; |
| |
|
| | if (!ADMIN_SECRET) { |
| | return errorResponse(500, "Admin API is not configured"); |
| | } |
| |
|
| | if (event.request.headers.get("Authorization") !== `Bearer ${ADMIN_SECRET}`) { |
| | return errorResponse(401, "Unauthorized"); |
| | } |
| | } |
| |
|
| | const token = event.cookies.get(env.COOKIE_NAME); |
| |
|
| | |
| | const email = env.TRUSTED_EMAIL_HEADER |
| | ? event.request.headers.get(env.TRUSTED_EMAIL_HEADER) |
| | : null; |
| |
|
| | let secretSessionId: string | null = null; |
| | let sessionId: string | null = null; |
| |
|
| | if (email) { |
| | secretSessionId = sessionId = await sha256(email); |
| |
|
| | event.locals.user = { |
| | |
| | _id: new ObjectId(sessionId.slice(0, 24)), |
| | name: email, |
| | email, |
| | createdAt: new Date(), |
| | updatedAt: new Date(), |
| | hfUserId: email, |
| | avatarUrl: "", |
| | logoutDisabled: true, |
| | }; |
| | } else if (token) { |
| | secretSessionId = token; |
| | sessionId = await sha256(token); |
| |
|
| | const user = await findUser(sessionId); |
| |
|
| | if (user) { |
| | event.locals.user = user; |
| | } |
| | } else if (event.url.pathname.startsWith(`${base}/api/`) && env.USE_HF_TOKEN_IN_API === "true") { |
| | |
| | |
| |
|
| | const authorization = event.request.headers.get("Authorization"); |
| |
|
| | if (authorization && authorization.startsWith("Bearer ")) { |
| | const token = authorization.slice(7); |
| |
|
| | const hash = await sha256(token); |
| |
|
| | sessionId = secretSessionId = hash; |
| |
|
| | |
| | |
| |
|
| | const cacheHit = await collections.tokenCaches.findOne({ tokenHash: hash }); |
| |
|
| | if (cacheHit) { |
| | const user = await collections.users.findOne({ hfUserId: cacheHit.userId }); |
| |
|
| | if (!user) { |
| | return errorResponse(500, "User not found"); |
| | } |
| |
|
| | event.locals.user = user; |
| | } else { |
| | const response = await fetch("https://huggingface.co/api/whoami-v2", { |
| | headers: { |
| | Authorization: `Bearer ${token}`, |
| | }, |
| | }); |
| |
|
| | if (!response.ok) { |
| | return errorResponse(401, "Unauthorized"); |
| | } |
| |
|
| | const data = await response.json(); |
| | const user = await collections.users.findOne({ hfUserId: data.id }); |
| |
|
| | if (!user) { |
| | return errorResponse(500, "User not found"); |
| | } |
| |
|
| | await collections.tokenCaches.insertOne({ |
| | tokenHash: hash, |
| | userId: data.id, |
| | createdAt: new Date(), |
| | updatedAt: new Date(), |
| | }); |
| |
|
| | event.locals.user = user; |
| | } |
| | } |
| | } |
| |
|
| | if (!sessionId || !secretSessionId) { |
| | secretSessionId = crypto.randomUUID(); |
| | sessionId = await sha256(secretSessionId); |
| |
|
| | if (await collections.sessions.findOne({ sessionId })) { |
| | return errorResponse(500, "Session ID collision"); |
| | } |
| | } |
| |
|
| | event.locals.sessionId = sessionId; |
| |
|
| | |
| | const requestContentType = event.request.headers.get("content-type")?.split(";")[0] ?? ""; |
| | |
| | const nativeFormContentTypes = [ |
| | "multipart/form-data", |
| | "application/x-www-form-urlencoded", |
| | "text/plain", |
| | ]; |
| |
|
| | if (event.request.method === "POST") { |
| | if (nativeFormContentTypes.includes(requestContentType)) { |
| | const origin = event.request.headers.get("origin"); |
| |
|
| | if (!origin) { |
| | return errorResponse(403, "Non-JSON form requests need to have an origin"); |
| | } |
| |
|
| | const validOrigins = [ |
| | new URL(event.request.url).host, |
| | ...(envPublic.PUBLIC_ORIGIN ? [new URL(envPublic.PUBLIC_ORIGIN).host] : []), |
| | ]; |
| |
|
| | if (!validOrigins.includes(new URL(origin).host)) { |
| | return errorResponse(403, "Invalid referer for POST request"); |
| | } |
| | } |
| | } |
| |
|
| | if (event.request.method === "POST") { |
| | |
| | refreshSessionCookie(event.cookies, secretSessionId); |
| |
|
| | await collections.sessions.updateOne( |
| | { sessionId }, |
| | { $set: { updatedAt: new Date(), expiresAt: addWeeks(new Date(), 2) } } |
| | ); |
| | } |
| |
|
| | if ( |
| | !event.url.pathname.startsWith(`${base}/login`) && |
| | !event.url.pathname.startsWith(`${base}/admin`) && |
| | !event.url.pathname.startsWith(`${base}/settings`) && |
| | !["GET", "OPTIONS", "HEAD"].includes(event.request.method) |
| | ) { |
| | if ( |
| | !event.locals.user && |
| | requiresUser && |
| | !((env.MESSAGES_BEFORE_LOGIN ? parseInt(env.MESSAGES_BEFORE_LOGIN) : 0) > 0) |
| | ) { |
| | return errorResponse(401, ERROR_MESSAGES.authOnly); |
| | } |
| |
|
| | |
| | |
| | |
| | if ( |
| | !requiresUser && |
| | !event.url.pathname.startsWith(`${base}/settings`) && |
| | envPublic.PUBLIC_APP_DISCLAIMER === "1" |
| | ) { |
| | const hasAcceptedEthicsModal = await collections.settings.countDocuments({ |
| | sessionId: event.locals.sessionId, |
| | ethicsModalAcceptedAt: { $exists: true }, |
| | }); |
| |
|
| | if (!hasAcceptedEthicsModal) { |
| | return errorResponse(405, "You need to accept the welcome modal first"); |
| | } |
| | } |
| | } |
| |
|
| | let replaced = false; |
| |
|
| | const response = await resolve(event, { |
| | transformPageChunk: (chunk) => { |
| | |
| | if (replaced || !chunk.html.includes("%gaId%")) { |
| | return chunk.html; |
| | } |
| | replaced = true; |
| |
|
| | return chunk.html.replace("%gaId%", envPublic.PUBLIC_GOOGLE_ANALYTICS_ID); |
| | }, |
| | }); |
| |
|
| | |
| | if (env.ALLOW_IFRAME !== "true") { |
| | response.headers.append("Content-Security-Policy", "frame-ancestors 'none';"); |
| | } |
| |
|
| | return response; |
| | }; |
| |
|