diff --git a/GUI/src/services/llmConnections.ts b/GUI/src/services/llmConnections.ts index c31676f..65417f3 100644 --- a/GUI/src/services/llmConnections.ts +++ b/GUI/src/services/llmConnections.ts @@ -267,13 +267,7 @@ export async function createLLMConnection(connectionData: LLMConnectionFormData) // After successful database creation, store secrets in vault if (connection && connection.id) { - try { - await createVaultSecret(connection.id.toString(), connectionData); - } catch (vaultError) { - console.error('Failed to store secrets in vault:', vaultError); - // Note: We don't throw here to avoid breaking the connection creation flow - // The connection is already created in the database - } + await createVaultSecret(connection.id.toString(), connectionData); } return connection; @@ -314,11 +308,11 @@ export async function updateLLMConnection( const connection = data?.response; - if (connection && (connectionData.secretKey && !connectionData.secretKey?.includes('*') - || connectionData.accessKey && !connectionData.accessKey?.includes('*') - || connectionData.apiKey && !connectionData.apiKey?.includes('*') - || connectionData.embeddingAccessKey && !connectionData.embeddingAccessKey?.includes('*') - || connectionData.embeddingSecretKey && !connectionData.embeddingSecretKey?.includes('*') + if (connection && (connectionData.secretKey && !connectionData.secretKey?.includes('*') + || connectionData.accessKey && !connectionData.accessKey?.includes('*') + || connectionData.apiKey && !connectionData.apiKey?.includes('*') + || connectionData.embeddingAccessKey && !connectionData.embeddingAccessKey?.includes('*') + || connectionData.embeddingSecretKey && !connectionData.embeddingSecretKey?.includes('*') || connectionData.embeddingAzureApiKey && !connectionData.embeddingAzureApiKey?.includes('*'))) { try { await createVaultSecret(id.toString(), connectionData); diff --git a/GUI/vite.config.ts.timestamp-1760669278597-b5a7f003c52fe.mjs b/GUI/vite.config.ts.timestamp-1760669278597-b5a7f003c52fe.mjs deleted file mode 100644 index e69de29..0000000 diff --git a/README.md b/README.md index a577de1..9e7dd82 100644 --- a/README.md +++ b/README.md @@ -12,7 +12,7 @@ The **BYK-RAG Module** is part of the Burokratt ecosystem, designed to provide * - Models searchable via dropdown with cache-enabled indicators. - **Enhanced Security with RSA Encryption** - - LLM credentials encrypted with RSA-4096 asymmetric encryption before storage. + - LLM credentials encrypted with RSA-2048 asymmetric encryption before storage. - GUI encrypts using public key; CronManager decrypts with private key. - Additional security layer beyond HashiCorp Vault's encryption.