Du kannst nicht mehr als 25 Themen auswählen Themen müssen mit entweder einem Buchstaben oder einer Ziffer beginnen. Sie können Bindestriche („-“) enthalten und bis zu 35 Zeichen lang sein.

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168
  1. import logging
  2. from flask import request
  3. from flask_restx import Resource, marshal_with, reqparse
  4. from werkzeug.exceptions import Unauthorized
  5. from controllers.common import fields
  6. from controllers.web import web_ns
  7. from controllers.web.error import AppUnavailableError
  8. from controllers.web.wraps import WebApiResource
  9. from core.app.app_config.common.parameters_mapping import get_parameters_from_feature_dict
  10. from libs.passport import PassportService
  11. from models.model import App, AppMode
  12. from services.app_service import AppService
  13. from services.enterprise.enterprise_service import EnterpriseService
  14. from services.feature_service import FeatureService
  15. from services.webapp_auth_service import WebAppAuthService
  16. logger = logging.getLogger(__name__)
  17. @web_ns.route("/parameters")
  18. class AppParameterApi(WebApiResource):
  19. """Resource for app variables."""
  20. @web_ns.doc("Get App Parameters")
  21. @web_ns.doc(description="Retrieve the parameters for a specific app.")
  22. @web_ns.doc(
  23. responses={
  24. 200: "Success",
  25. 400: "Bad Request",
  26. 401: "Unauthorized",
  27. 403: "Forbidden",
  28. 404: "App Not Found",
  29. 500: "Internal Server Error",
  30. }
  31. )
  32. @marshal_with(fields.parameters_fields)
  33. def get(self, app_model: App, end_user):
  34. """Retrieve app parameters."""
  35. if app_model.mode in {AppMode.ADVANCED_CHAT, AppMode.WORKFLOW}:
  36. workflow = app_model.workflow
  37. if workflow is None:
  38. raise AppUnavailableError()
  39. features_dict = workflow.features_dict
  40. user_input_form = workflow.user_input_form(to_old_structure=True)
  41. else:
  42. app_model_config = app_model.app_model_config
  43. if app_model_config is None:
  44. raise AppUnavailableError()
  45. features_dict = app_model_config.to_dict()
  46. user_input_form = features_dict.get("user_input_form", [])
  47. return get_parameters_from_feature_dict(features_dict=features_dict, user_input_form=user_input_form)
  48. @web_ns.route("/meta")
  49. class AppMeta(WebApiResource):
  50. @web_ns.doc("Get App Meta")
  51. @web_ns.doc(description="Retrieve the metadata for a specific app.")
  52. @web_ns.doc(
  53. responses={
  54. 200: "Success",
  55. 400: "Bad Request",
  56. 401: "Unauthorized",
  57. 403: "Forbidden",
  58. 404: "App Not Found",
  59. 500: "Internal Server Error",
  60. }
  61. )
  62. def get(self, app_model: App, end_user):
  63. """Get app meta"""
  64. return AppService().get_app_meta(app_model)
  65. @web_ns.route("/webapp/access-mode")
  66. class AppAccessMode(Resource):
  67. @web_ns.doc("Get App Access Mode")
  68. @web_ns.doc(description="Retrieve the access mode for a web application (public or restricted).")
  69. @web_ns.doc(
  70. params={
  71. "appId": {"description": "Application ID", "type": "string", "required": False},
  72. "appCode": {"description": "Application code", "type": "string", "required": False},
  73. }
  74. )
  75. @web_ns.doc(
  76. responses={
  77. 200: "Success",
  78. 400: "Bad Request",
  79. 500: "Internal Server Error",
  80. }
  81. )
  82. def get(self):
  83. parser = reqparse.RequestParser()
  84. parser.add_argument("appId", type=str, required=False, location="args")
  85. parser.add_argument("appCode", type=str, required=False, location="args")
  86. args = parser.parse_args()
  87. features = FeatureService.get_system_features()
  88. if not features.webapp_auth.enabled:
  89. return {"accessMode": "public"}
  90. app_id = args.get("appId")
  91. if args.get("appCode"):
  92. app_code = args["appCode"]
  93. app_id = AppService.get_app_id_by_code(app_code)
  94. if not app_id:
  95. raise ValueError("appId or appCode must be provided")
  96. res = EnterpriseService.WebAppAuth.get_app_access_mode_by_id(app_id)
  97. return {"accessMode": res.access_mode}
  98. @web_ns.route("/webapp/permission")
  99. class AppWebAuthPermission(Resource):
  100. @web_ns.doc("Check App Permission")
  101. @web_ns.doc(description="Check if user has permission to access a web application.")
  102. @web_ns.doc(params={"appId": {"description": "Application ID", "type": "string", "required": True}})
  103. @web_ns.doc(
  104. responses={
  105. 200: "Success",
  106. 400: "Bad Request",
  107. 401: "Unauthorized",
  108. 500: "Internal Server Error",
  109. }
  110. )
  111. def get(self):
  112. user_id = "visitor"
  113. try:
  114. auth_header = request.headers.get("Authorization")
  115. if auth_header is None:
  116. raise Unauthorized("Authorization header is missing.")
  117. if " " not in auth_header:
  118. raise Unauthorized("Invalid Authorization header format. Expected 'Bearer <api-key>' format.")
  119. auth_scheme, tk = auth_header.split(None, 1)
  120. auth_scheme = auth_scheme.lower()
  121. if auth_scheme != "bearer":
  122. raise Unauthorized("Authorization scheme must be 'Bearer'")
  123. decoded = PassportService().verify(tk)
  124. user_id = decoded.get("user_id", "visitor")
  125. except Unauthorized:
  126. raise
  127. except Exception:
  128. logger.exception("Unexpected error during auth verification")
  129. raise
  130. features = FeatureService.get_system_features()
  131. if not features.webapp_auth.enabled:
  132. return {"result": True}
  133. parser = reqparse.RequestParser()
  134. parser.add_argument("appId", type=str, required=True, location="args")
  135. args = parser.parse_args()
  136. app_id = args["appId"]
  137. app_code = AppService.get_app_code_by_id(app_id)
  138. res = True
  139. if WebAppAuthService.is_app_require_permission_check(app_id=app_id):
  140. res = EnterpriseService.WebAppAuth.is_user_allowed_to_access_webapp(str(user_id), app_code)
  141. return {"result": res}