Вы не можете выбрать более 25 тем Темы должны начинаться с буквы или цифры, могут содержать дефисы(-) и должны содержать не более 35 символов.

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313
  1. import time
  2. from collections.abc import Callable
  3. from datetime import timedelta
  4. from enum import StrEnum, auto
  5. from functools import wraps
  6. from typing import Concatenate, Optional, ParamSpec, TypeVar
  7. from flask import current_app, request
  8. from flask_login import user_logged_in
  9. from flask_restx import Resource
  10. from pydantic import BaseModel
  11. from sqlalchemy import select, update
  12. from sqlalchemy.orm import Session
  13. from werkzeug.exceptions import Forbidden, NotFound, Unauthorized
  14. from core.file.constants import DEFAULT_SERVICE_API_USER_ID
  15. from extensions.ext_database import db
  16. from extensions.ext_redis import redis_client
  17. from libs.datetime_utils import naive_utc_now
  18. from libs.login import current_user
  19. from models.account import Account, Tenant, TenantAccountJoin, TenantStatus
  20. from models.dataset import Dataset, RateLimitLog
  21. from models.model import ApiToken, App, EndUser
  22. from services.feature_service import FeatureService
  23. P = ParamSpec("P")
  24. R = TypeVar("R")
  25. T = TypeVar("T")
  26. class WhereisUserArg(StrEnum):
  27. """
  28. Enum for whereis_user_arg.
  29. """
  30. QUERY = auto()
  31. JSON = auto()
  32. FORM = auto()
  33. class FetchUserArg(BaseModel):
  34. fetch_from: WhereisUserArg
  35. required: bool = False
  36. def validate_app_token(view: Optional[Callable[P, R]] = None, *, fetch_user_arg: Optional[FetchUserArg] = None):
  37. def decorator(view_func: Callable[P, R]):
  38. @wraps(view_func)
  39. def decorated_view(*args: P.args, **kwargs: P.kwargs):
  40. api_token = validate_and_get_api_token("app")
  41. app_model = db.session.query(App).where(App.id == api_token.app_id).first()
  42. if not app_model:
  43. raise Forbidden("The app no longer exists.")
  44. if app_model.status != "normal":
  45. raise Forbidden("The app's status is abnormal.")
  46. if not app_model.enable_api:
  47. raise Forbidden("The app's API service has been disabled.")
  48. tenant = db.session.query(Tenant).where(Tenant.id == app_model.tenant_id).first()
  49. if tenant is None:
  50. raise ValueError("Tenant does not exist.")
  51. if tenant.status == TenantStatus.ARCHIVE:
  52. raise Forbidden("The workspace's status is archived.")
  53. kwargs["app_model"] = app_model
  54. if fetch_user_arg:
  55. if fetch_user_arg.fetch_from == WhereisUserArg.QUERY:
  56. user_id = request.args.get("user")
  57. elif fetch_user_arg.fetch_from == WhereisUserArg.JSON:
  58. user_id = request.get_json().get("user")
  59. elif fetch_user_arg.fetch_from == WhereisUserArg.FORM:
  60. user_id = request.form.get("user")
  61. else:
  62. # use default-user
  63. user_id = None
  64. if not user_id and fetch_user_arg.required:
  65. raise ValueError("Arg user must be provided.")
  66. if user_id:
  67. user_id = str(user_id)
  68. end_user = create_or_update_end_user_for_user_id(app_model, user_id)
  69. kwargs["end_user"] = end_user
  70. # Set EndUser as current logged-in user for flask_login.current_user
  71. current_app.login_manager._update_request_context_with_user(end_user) # type: ignore
  72. user_logged_in.send(current_app._get_current_object(), user=end_user) # type: ignore
  73. return view_func(*args, **kwargs)
  74. return decorated_view
  75. if view is None:
  76. return decorator
  77. else:
  78. return decorator(view)
  79. def cloud_edition_billing_resource_check(resource: str, api_token_type: str):
  80. def interceptor(view: Callable[P, R]):
  81. def decorated(*args: P.args, **kwargs: P.kwargs):
  82. api_token = validate_and_get_api_token(api_token_type)
  83. features = FeatureService.get_features(api_token.tenant_id)
  84. if features.billing.enabled:
  85. members = features.members
  86. apps = features.apps
  87. vector_space = features.vector_space
  88. documents_upload_quota = features.documents_upload_quota
  89. if resource == "members" and 0 < members.limit <= members.size:
  90. raise Forbidden("The number of members has reached the limit of your subscription.")
  91. elif resource == "apps" and 0 < apps.limit <= apps.size:
  92. raise Forbidden("The number of apps has reached the limit of your subscription.")
  93. elif resource == "vector_space" and 0 < vector_space.limit <= vector_space.size:
  94. raise Forbidden("The capacity of the vector space has reached the limit of your subscription.")
  95. elif resource == "documents" and 0 < documents_upload_quota.limit <= documents_upload_quota.size:
  96. raise Forbidden("The number of documents has reached the limit of your subscription.")
  97. else:
  98. return view(*args, **kwargs)
  99. return view(*args, **kwargs)
  100. return decorated
  101. return interceptor
  102. def cloud_edition_billing_knowledge_limit_check(resource: str, api_token_type: str):
  103. def interceptor(view: Callable[P, R]):
  104. @wraps(view)
  105. def decorated(*args: P.args, **kwargs: P.kwargs):
  106. api_token = validate_and_get_api_token(api_token_type)
  107. features = FeatureService.get_features(api_token.tenant_id)
  108. if features.billing.enabled:
  109. if resource == "add_segment":
  110. if features.billing.subscription.plan == "sandbox":
  111. raise Forbidden(
  112. "To unlock this feature and elevate your Dify experience, please upgrade to a paid plan."
  113. )
  114. else:
  115. return view(*args, **kwargs)
  116. return view(*args, **kwargs)
  117. return decorated
  118. return interceptor
  119. def cloud_edition_billing_rate_limit_check(resource: str, api_token_type: str):
  120. def interceptor(view: Callable[P, R]):
  121. @wraps(view)
  122. def decorated(*args: P.args, **kwargs: P.kwargs):
  123. api_token = validate_and_get_api_token(api_token_type)
  124. if resource == "knowledge":
  125. knowledge_rate_limit = FeatureService.get_knowledge_rate_limit(api_token.tenant_id)
  126. if knowledge_rate_limit.enabled:
  127. current_time = int(time.time() * 1000)
  128. key = f"rate_limit_{api_token.tenant_id}"
  129. redis_client.zadd(key, {current_time: current_time})
  130. redis_client.zremrangebyscore(key, 0, current_time - 60000)
  131. request_count = redis_client.zcard(key)
  132. if request_count > knowledge_rate_limit.limit:
  133. # add ratelimit record
  134. rate_limit_log = RateLimitLog(
  135. tenant_id=api_token.tenant_id,
  136. subscription_plan=knowledge_rate_limit.subscription_plan,
  137. operation="knowledge",
  138. )
  139. db.session.add(rate_limit_log)
  140. db.session.commit()
  141. raise Forbidden(
  142. "Sorry, you have reached the knowledge base request rate limit of your subscription."
  143. )
  144. return view(*args, **kwargs)
  145. return decorated
  146. return interceptor
  147. def validate_dataset_token(view: Optional[Callable[Concatenate[T, P], R]] = None):
  148. def decorator(view: Callable[Concatenate[T, P], R]):
  149. @wraps(view)
  150. def decorated(*args: P.args, **kwargs: P.kwargs):
  151. api_token = validate_and_get_api_token("dataset")
  152. tenant_account_join = (
  153. db.session.query(Tenant, TenantAccountJoin)
  154. .where(Tenant.id == api_token.tenant_id)
  155. .where(TenantAccountJoin.tenant_id == Tenant.id)
  156. .where(TenantAccountJoin.role.in_(["owner"]))
  157. .where(Tenant.status == TenantStatus.NORMAL)
  158. .one_or_none()
  159. ) # TODO: only owner information is required, so only one is returned.
  160. if tenant_account_join:
  161. tenant, ta = tenant_account_join
  162. account = db.session.query(Account).where(Account.id == ta.account_id).first()
  163. # Login admin
  164. if account:
  165. account.current_tenant = tenant
  166. current_app.login_manager._update_request_context_with_user(account) # type: ignore
  167. user_logged_in.send(current_app._get_current_object(), user=current_user) # type: ignore
  168. else:
  169. raise Unauthorized("Tenant owner account does not exist.")
  170. else:
  171. raise Unauthorized("Tenant does not exist.")
  172. return view(api_token.tenant_id, *args, **kwargs)
  173. return decorated
  174. if view:
  175. return decorator(view)
  176. # if view is None, it means that the decorator is used without parentheses
  177. # use the decorator as a function for method_decorators
  178. return decorator
  179. def validate_and_get_api_token(scope: str | None = None):
  180. """
  181. Validate and get API token.
  182. """
  183. auth_header = request.headers.get("Authorization")
  184. if auth_header is None or " " not in auth_header:
  185. raise Unauthorized("Authorization header must be provided and start with 'Bearer'")
  186. auth_scheme, auth_token = auth_header.split(None, 1)
  187. auth_scheme = auth_scheme.lower()
  188. if auth_scheme != "bearer":
  189. raise Unauthorized("Authorization scheme must be 'Bearer'")
  190. current_time = naive_utc_now()
  191. cutoff_time = current_time - timedelta(minutes=1)
  192. with Session(db.engine, expire_on_commit=False) as session:
  193. update_stmt = (
  194. update(ApiToken)
  195. .where(
  196. ApiToken.token == auth_token,
  197. (ApiToken.last_used_at.is_(None) | (ApiToken.last_used_at < cutoff_time)),
  198. ApiToken.type == scope,
  199. )
  200. .values(last_used_at=current_time)
  201. .returning(ApiToken)
  202. )
  203. result = session.execute(update_stmt)
  204. api_token = result.scalar_one_or_none()
  205. if not api_token:
  206. stmt = select(ApiToken).where(ApiToken.token == auth_token, ApiToken.type == scope)
  207. api_token = session.scalar(stmt)
  208. if not api_token:
  209. raise Unauthorized("Access token is invalid")
  210. else:
  211. session.commit()
  212. return api_token
  213. def create_or_update_end_user_for_user_id(app_model: App, user_id: Optional[str] = None) -> EndUser:
  214. """
  215. Create or update session terminal based on user ID.
  216. """
  217. if not user_id:
  218. user_id = DEFAULT_SERVICE_API_USER_ID
  219. with Session(db.engine, expire_on_commit=False) as session:
  220. end_user = (
  221. session.query(EndUser)
  222. .where(
  223. EndUser.tenant_id == app_model.tenant_id,
  224. EndUser.app_id == app_model.id,
  225. EndUser.session_id == user_id,
  226. EndUser.type == "service_api",
  227. )
  228. .first()
  229. )
  230. if end_user is None:
  231. end_user = EndUser(
  232. tenant_id=app_model.tenant_id,
  233. app_id=app_model.id,
  234. type="service_api",
  235. is_anonymous=user_id == DEFAULT_SERVICE_API_USER_ID,
  236. session_id=user_id,
  237. )
  238. session.add(end_user)
  239. session.commit()
  240. return end_user
  241. class DatasetApiResource(Resource):
  242. method_decorators = [validate_dataset_token]
  243. def get_dataset(self, dataset_id: str, tenant_id: str) -> Dataset:
  244. dataset = db.session.query(Dataset).where(Dataset.id == dataset_id, Dataset.tenant_id == tenant_id).first()
  245. if not dataset:
  246. raise NotFound("Dataset not found.")
  247. return dataset