Nelze vybrat více než 25 témat Téma musí začínat písmenem nebo číslem, může obsahovat pomlčky („-“) a může být dlouhé až 35 znaků.

wraps.py 12KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328
  1. import time
  2. from collections.abc import Callable
  3. from datetime import timedelta
  4. from enum import Enum
  5. from functools import wraps
  6. from typing import Optional
  7. from flask import current_app, request
  8. from flask_login import user_logged_in # type: ignore
  9. from flask_restful import Resource
  10. from pydantic import BaseModel
  11. from sqlalchemy import select, update
  12. from sqlalchemy.orm import Session
  13. from werkzeug.exceptions import Forbidden, NotFound, Unauthorized
  14. from extensions.ext_database import db
  15. from extensions.ext_redis import redis_client
  16. from libs.datetime_utils import naive_utc_now
  17. from libs.login import _get_user
  18. from models.account import Account, Tenant, TenantAccountJoin, TenantStatus
  19. from models.dataset import Dataset, RateLimitLog
  20. from models.model import ApiToken, App, EndUser
  21. from services.feature_service import FeatureService
  22. class WhereisUserArg(Enum):
  23. """
  24. Enum for whereis_user_arg.
  25. """
  26. QUERY = "query"
  27. JSON = "json"
  28. FORM = "form"
  29. class FetchUserArg(BaseModel):
  30. fetch_from: WhereisUserArg
  31. required: bool = False
  32. def validate_app_token(view: Optional[Callable] = None, *, fetch_user_arg: Optional[FetchUserArg] = None):
  33. def decorator(view_func):
  34. @wraps(view_func)
  35. def decorated_view(*args, **kwargs):
  36. api_token = validate_and_get_api_token("app")
  37. app_model = db.session.query(App).filter(App.id == api_token.app_id).first()
  38. if not app_model:
  39. raise Forbidden("The app no longer exists.")
  40. if app_model.status != "normal":
  41. raise Forbidden("The app's status is abnormal.")
  42. if not app_model.enable_api:
  43. raise Forbidden("The app's API service has been disabled.")
  44. tenant = db.session.query(Tenant).filter(Tenant.id == app_model.tenant_id).first()
  45. if tenant is None:
  46. raise ValueError("Tenant does not exist.")
  47. if tenant.status == TenantStatus.ARCHIVE:
  48. raise Forbidden("The workspace's status is archived.")
  49. tenant_account_join = (
  50. db.session.query(Tenant, TenantAccountJoin)
  51. .filter(Tenant.id == api_token.tenant_id)
  52. .filter(TenantAccountJoin.tenant_id == Tenant.id)
  53. .filter(TenantAccountJoin.role.in_(["owner"]))
  54. .filter(Tenant.status == TenantStatus.NORMAL)
  55. .one_or_none()
  56. ) # TODO: only owner information is required, so only one is returned.
  57. if tenant_account_join:
  58. tenant, ta = tenant_account_join
  59. account = db.session.query(Account).filter(Account.id == ta.account_id).first()
  60. # Login admin
  61. if account:
  62. account.current_tenant = tenant
  63. current_app.login_manager._update_request_context_with_user(account) # type: ignore
  64. user_logged_in.send(current_app._get_current_object(), user=_get_user()) # type: ignore
  65. else:
  66. raise Unauthorized("Tenant owner account does not exist.")
  67. else:
  68. raise Unauthorized("Tenant does not exist.")
  69. kwargs["app_model"] = app_model
  70. if fetch_user_arg:
  71. if fetch_user_arg.fetch_from == WhereisUserArg.QUERY:
  72. user_id = request.args.get("user")
  73. elif fetch_user_arg.fetch_from == WhereisUserArg.JSON:
  74. user_id = request.get_json().get("user")
  75. elif fetch_user_arg.fetch_from == WhereisUserArg.FORM:
  76. user_id = request.form.get("user")
  77. else:
  78. # use default-user
  79. user_id = None
  80. if not user_id and fetch_user_arg.required:
  81. raise ValueError("Arg user must be provided.")
  82. if user_id:
  83. user_id = str(user_id)
  84. end_user = create_or_update_end_user_for_user_id(app_model, user_id)
  85. kwargs["end_user"] = end_user
  86. # Set EndUser as current logged-in user for flask_login.current_user
  87. current_app.login_manager._update_request_context_with_user(end_user) # type: ignore
  88. user_logged_in.send(current_app._get_current_object(), user=end_user) # type: ignore
  89. return view_func(*args, **kwargs)
  90. return decorated_view
  91. if view is None:
  92. return decorator
  93. else:
  94. return decorator(view)
  95. def cloud_edition_billing_resource_check(resource: str, api_token_type: str):
  96. def interceptor(view):
  97. def decorated(*args, **kwargs):
  98. api_token = validate_and_get_api_token(api_token_type)
  99. features = FeatureService.get_features(api_token.tenant_id)
  100. if features.billing.enabled:
  101. members = features.members
  102. apps = features.apps
  103. vector_space = features.vector_space
  104. documents_upload_quota = features.documents_upload_quota
  105. if resource == "members" and 0 < members.limit <= members.size:
  106. raise Forbidden("The number of members has reached the limit of your subscription.")
  107. elif resource == "apps" and 0 < apps.limit <= apps.size:
  108. raise Forbidden("The number of apps has reached the limit of your subscription.")
  109. elif resource == "vector_space" and 0 < vector_space.limit <= vector_space.size:
  110. raise Forbidden("The capacity of the vector space has reached the limit of your subscription.")
  111. elif resource == "documents" and 0 < documents_upload_quota.limit <= documents_upload_quota.size:
  112. raise Forbidden("The number of documents has reached the limit of your subscription.")
  113. else:
  114. return view(*args, **kwargs)
  115. return view(*args, **kwargs)
  116. return decorated
  117. return interceptor
  118. def cloud_edition_billing_knowledge_limit_check(resource: str, api_token_type: str):
  119. def interceptor(view):
  120. @wraps(view)
  121. def decorated(*args, **kwargs):
  122. api_token = validate_and_get_api_token(api_token_type)
  123. features = FeatureService.get_features(api_token.tenant_id)
  124. if features.billing.enabled:
  125. if resource == "add_segment":
  126. if features.billing.subscription.plan == "sandbox":
  127. raise Forbidden(
  128. "To unlock this feature and elevate your Dify experience, please upgrade to a paid plan."
  129. )
  130. else:
  131. return view(*args, **kwargs)
  132. return view(*args, **kwargs)
  133. return decorated
  134. return interceptor
  135. def cloud_edition_billing_rate_limit_check(resource: str, api_token_type: str):
  136. def interceptor(view):
  137. @wraps(view)
  138. def decorated(*args, **kwargs):
  139. api_token = validate_and_get_api_token(api_token_type)
  140. if resource == "knowledge":
  141. knowledge_rate_limit = FeatureService.get_knowledge_rate_limit(api_token.tenant_id)
  142. if knowledge_rate_limit.enabled:
  143. current_time = int(time.time() * 1000)
  144. key = f"rate_limit_{api_token.tenant_id}"
  145. redis_client.zadd(key, {current_time: current_time})
  146. redis_client.zremrangebyscore(key, 0, current_time - 60000)
  147. request_count = redis_client.zcard(key)
  148. if request_count > knowledge_rate_limit.limit:
  149. # add ratelimit record
  150. rate_limit_log = RateLimitLog(
  151. tenant_id=api_token.tenant_id,
  152. subscription_plan=knowledge_rate_limit.subscription_plan,
  153. operation="knowledge",
  154. )
  155. db.session.add(rate_limit_log)
  156. db.session.commit()
  157. raise Forbidden(
  158. "Sorry, you have reached the knowledge base request rate limit of your subscription."
  159. )
  160. return view(*args, **kwargs)
  161. return decorated
  162. return interceptor
  163. def validate_dataset_token(view=None):
  164. def decorator(view):
  165. @wraps(view)
  166. def decorated(*args, **kwargs):
  167. api_token = validate_and_get_api_token("dataset")
  168. tenant_account_join = (
  169. db.session.query(Tenant, TenantAccountJoin)
  170. .filter(Tenant.id == api_token.tenant_id)
  171. .filter(TenantAccountJoin.tenant_id == Tenant.id)
  172. .filter(TenantAccountJoin.role.in_(["owner"]))
  173. .filter(Tenant.status == TenantStatus.NORMAL)
  174. .one_or_none()
  175. ) # TODO: only owner information is required, so only one is returned.
  176. if tenant_account_join:
  177. tenant, ta = tenant_account_join
  178. account = db.session.query(Account).filter(Account.id == ta.account_id).first()
  179. # Login admin
  180. if account:
  181. account.current_tenant = tenant
  182. current_app.login_manager._update_request_context_with_user(account) # type: ignore
  183. user_logged_in.send(current_app._get_current_object(), user=_get_user()) # type: ignore
  184. else:
  185. raise Unauthorized("Tenant owner account does not exist.")
  186. else:
  187. raise Unauthorized("Tenant does not exist.")
  188. return view(api_token.tenant_id, *args, **kwargs)
  189. return decorated
  190. if view:
  191. return decorator(view)
  192. # if view is None, it means that the decorator is used without parentheses
  193. # use the decorator as a function for method_decorators
  194. return decorator
  195. def validate_and_get_api_token(scope: str | None = None):
  196. """
  197. Validate and get API token.
  198. """
  199. auth_header = request.headers.get("Authorization")
  200. if auth_header is None or " " not in auth_header:
  201. raise Unauthorized("Authorization header must be provided and start with 'Bearer'")
  202. auth_scheme, auth_token = auth_header.split(None, 1)
  203. auth_scheme = auth_scheme.lower()
  204. if auth_scheme != "bearer":
  205. raise Unauthorized("Authorization scheme must be 'Bearer'")
  206. current_time = naive_utc_now()
  207. cutoff_time = current_time - timedelta(minutes=1)
  208. with Session(db.engine, expire_on_commit=False) as session:
  209. update_stmt = (
  210. update(ApiToken)
  211. .where(
  212. ApiToken.token == auth_token,
  213. (ApiToken.last_used_at.is_(None) | (ApiToken.last_used_at < cutoff_time)),
  214. ApiToken.type == scope,
  215. )
  216. .values(last_used_at=current_time)
  217. .returning(ApiToken)
  218. )
  219. result = session.execute(update_stmt)
  220. api_token = result.scalar_one_or_none()
  221. if not api_token:
  222. stmt = select(ApiToken).where(ApiToken.token == auth_token, ApiToken.type == scope)
  223. api_token = session.scalar(stmt)
  224. if not api_token:
  225. raise Unauthorized("Access token is invalid")
  226. else:
  227. session.commit()
  228. return api_token
  229. def create_or_update_end_user_for_user_id(app_model: App, user_id: Optional[str] = None) -> EndUser:
  230. """
  231. Create or update session terminal based on user ID.
  232. """
  233. if not user_id:
  234. user_id = "DEFAULT-USER"
  235. end_user = (
  236. db.session.query(EndUser)
  237. .filter(
  238. EndUser.tenant_id == app_model.tenant_id,
  239. EndUser.app_id == app_model.id,
  240. EndUser.session_id == user_id,
  241. EndUser.type == "service_api",
  242. )
  243. .first()
  244. )
  245. if end_user is None:
  246. end_user = EndUser(
  247. tenant_id=app_model.tenant_id,
  248. app_id=app_model.id,
  249. type="service_api",
  250. is_anonymous=user_id == "DEFAULT-USER",
  251. session_id=user_id,
  252. )
  253. db.session.add(end_user)
  254. db.session.commit()
  255. return end_user
  256. class DatasetApiResource(Resource):
  257. method_decorators = [validate_dataset_token]
  258. def get_dataset(self, dataset_id: str, tenant_id: str) -> Dataset:
  259. dataset = db.session.query(Dataset).filter(Dataset.id == dataset_id, Dataset.tenant_id == tenant_id).first()
  260. if not dataset:
  261. raise NotFound("Dataset not found.")
  262. return dataset