Nevar pievienot vairāk kā 25 tēmas Tēmai ir jāsākas ar burtu vai ciparu, tā var saturēt domu zīmes ('-') un var būt līdz 35 simboliem gara.

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332
  1. import time
  2. from collections.abc import Callable
  3. from datetime import timedelta
  4. from enum import StrEnum, auto
  5. from functools import wraps
  6. from typing import Optional, ParamSpec, TypeVar
  7. from flask import current_app, request
  8. from flask_login import user_logged_in
  9. from flask_restx import Resource
  10. from pydantic import BaseModel
  11. from sqlalchemy import select, update
  12. from sqlalchemy.orm import Session
  13. from werkzeug.exceptions import Forbidden, NotFound, Unauthorized
  14. from extensions.ext_database import db
  15. from extensions.ext_redis import redis_client
  16. from libs.datetime_utils import naive_utc_now
  17. from libs.login import _get_user
  18. from models.account import Account, Tenant, TenantAccountJoin, TenantStatus
  19. from models.dataset import Dataset, RateLimitLog
  20. from models.model import ApiToken, App, EndUser
  21. from services.feature_service import FeatureService
  22. P = ParamSpec("P")
  23. R = TypeVar("R")
  24. class WhereisUserArg(StrEnum):
  25. """
  26. Enum for whereis_user_arg.
  27. """
  28. QUERY = auto()
  29. JSON = auto()
  30. FORM = auto()
  31. class FetchUserArg(BaseModel):
  32. fetch_from: WhereisUserArg
  33. required: bool = False
  34. def validate_app_token(view: Optional[Callable] = None, *, fetch_user_arg: Optional[FetchUserArg] = None):
  35. def decorator(view_func):
  36. @wraps(view_func)
  37. def decorated_view(*args, **kwargs):
  38. api_token = validate_and_get_api_token("app")
  39. app_model = db.session.query(App).where(App.id == api_token.app_id).first()
  40. if not app_model:
  41. raise Forbidden("The app no longer exists.")
  42. if app_model.status != "normal":
  43. raise Forbidden("The app's status is abnormal.")
  44. if not app_model.enable_api:
  45. raise Forbidden("The app's API service has been disabled.")
  46. tenant = db.session.query(Tenant).where(Tenant.id == app_model.tenant_id).first()
  47. if tenant is None:
  48. raise ValueError("Tenant does not exist.")
  49. if tenant.status == TenantStatus.ARCHIVE:
  50. raise Forbidden("The workspace's status is archived.")
  51. tenant_account_join = (
  52. db.session.query(Tenant, TenantAccountJoin)
  53. .where(Tenant.id == api_token.tenant_id)
  54. .where(TenantAccountJoin.tenant_id == Tenant.id)
  55. .where(TenantAccountJoin.role.in_(["owner"]))
  56. .where(Tenant.status == TenantStatus.NORMAL)
  57. .one_or_none()
  58. ) # TODO: only owner information is required, so only one is returned.
  59. if tenant_account_join:
  60. tenant, ta = tenant_account_join
  61. account = db.session.query(Account).where(Account.id == ta.account_id).first()
  62. # Login admin
  63. if account:
  64. account.current_tenant = tenant
  65. current_app.login_manager._update_request_context_with_user(account) # type: ignore
  66. user_logged_in.send(current_app._get_current_object(), user=_get_user()) # type: ignore
  67. else:
  68. raise Unauthorized("Tenant owner account does not exist.")
  69. else:
  70. raise Unauthorized("Tenant does not exist.")
  71. kwargs["app_model"] = app_model
  72. if fetch_user_arg:
  73. if fetch_user_arg.fetch_from == WhereisUserArg.QUERY:
  74. user_id = request.args.get("user")
  75. elif fetch_user_arg.fetch_from == WhereisUserArg.JSON:
  76. user_id = request.get_json().get("user")
  77. elif fetch_user_arg.fetch_from == WhereisUserArg.FORM:
  78. user_id = request.form.get("user")
  79. else:
  80. # use default-user
  81. user_id = None
  82. if not user_id and fetch_user_arg.required:
  83. raise ValueError("Arg user must be provided.")
  84. if user_id:
  85. user_id = str(user_id)
  86. end_user = create_or_update_end_user_for_user_id(app_model, user_id)
  87. kwargs["end_user"] = end_user
  88. # Set EndUser as current logged-in user for flask_login.current_user
  89. current_app.login_manager._update_request_context_with_user(end_user) # type: ignore
  90. user_logged_in.send(current_app._get_current_object(), user=end_user) # type: ignore
  91. return view_func(*args, **kwargs)
  92. return decorated_view
  93. if view is None:
  94. return decorator
  95. else:
  96. return decorator(view)
  97. def cloud_edition_billing_resource_check(resource: str, api_token_type: str):
  98. def interceptor(view: Callable[P, R]):
  99. def decorated(*args: P.args, **kwargs: P.kwargs):
  100. api_token = validate_and_get_api_token(api_token_type)
  101. features = FeatureService.get_features(api_token.tenant_id)
  102. if features.billing.enabled:
  103. members = features.members
  104. apps = features.apps
  105. vector_space = features.vector_space
  106. documents_upload_quota = features.documents_upload_quota
  107. if resource == "members" and 0 < members.limit <= members.size:
  108. raise Forbidden("The number of members has reached the limit of your subscription.")
  109. elif resource == "apps" and 0 < apps.limit <= apps.size:
  110. raise Forbidden("The number of apps has reached the limit of your subscription.")
  111. elif resource == "vector_space" and 0 < vector_space.limit <= vector_space.size:
  112. raise Forbidden("The capacity of the vector space has reached the limit of your subscription.")
  113. elif resource == "documents" and 0 < documents_upload_quota.limit <= documents_upload_quota.size:
  114. raise Forbidden("The number of documents has reached the limit of your subscription.")
  115. else:
  116. return view(*args, **kwargs)
  117. return view(*args, **kwargs)
  118. return decorated
  119. return interceptor
  120. def cloud_edition_billing_knowledge_limit_check(resource: str, api_token_type: str):
  121. def interceptor(view: Callable[P, R]):
  122. @wraps(view)
  123. def decorated(*args: P.args, **kwargs: P.kwargs):
  124. api_token = validate_and_get_api_token(api_token_type)
  125. features = FeatureService.get_features(api_token.tenant_id)
  126. if features.billing.enabled:
  127. if resource == "add_segment":
  128. if features.billing.subscription.plan == "sandbox":
  129. raise Forbidden(
  130. "To unlock this feature and elevate your Dify experience, please upgrade to a paid plan."
  131. )
  132. else:
  133. return view(*args, **kwargs)
  134. return view(*args, **kwargs)
  135. return decorated
  136. return interceptor
  137. def cloud_edition_billing_rate_limit_check(resource: str, api_token_type: str):
  138. def interceptor(view: Callable[P, R]):
  139. @wraps(view)
  140. def decorated(*args: P.args, **kwargs: P.kwargs):
  141. api_token = validate_and_get_api_token(api_token_type)
  142. if resource == "knowledge":
  143. knowledge_rate_limit = FeatureService.get_knowledge_rate_limit(api_token.tenant_id)
  144. if knowledge_rate_limit.enabled:
  145. current_time = int(time.time() * 1000)
  146. key = f"rate_limit_{api_token.tenant_id}"
  147. redis_client.zadd(key, {current_time: current_time})
  148. redis_client.zremrangebyscore(key, 0, current_time - 60000)
  149. request_count = redis_client.zcard(key)
  150. if request_count > knowledge_rate_limit.limit:
  151. # add ratelimit record
  152. rate_limit_log = RateLimitLog(
  153. tenant_id=api_token.tenant_id,
  154. subscription_plan=knowledge_rate_limit.subscription_plan,
  155. operation="knowledge",
  156. )
  157. db.session.add(rate_limit_log)
  158. db.session.commit()
  159. raise Forbidden(
  160. "Sorry, you have reached the knowledge base request rate limit of your subscription."
  161. )
  162. return view(*args, **kwargs)
  163. return decorated
  164. return interceptor
  165. def validate_dataset_token(view=None):
  166. def decorator(view):
  167. @wraps(view)
  168. def decorated(*args, **kwargs):
  169. api_token = validate_and_get_api_token("dataset")
  170. tenant_account_join = (
  171. db.session.query(Tenant, TenantAccountJoin)
  172. .where(Tenant.id == api_token.tenant_id)
  173. .where(TenantAccountJoin.tenant_id == Tenant.id)
  174. .where(TenantAccountJoin.role.in_(["owner"]))
  175. .where(Tenant.status == TenantStatus.NORMAL)
  176. .one_or_none()
  177. ) # TODO: only owner information is required, so only one is returned.
  178. if tenant_account_join:
  179. tenant, ta = tenant_account_join
  180. account = db.session.query(Account).where(Account.id == ta.account_id).first()
  181. # Login admin
  182. if account:
  183. account.current_tenant = tenant
  184. current_app.login_manager._update_request_context_with_user(account) # type: ignore
  185. user_logged_in.send(current_app._get_current_object(), user=_get_user()) # type: ignore
  186. else:
  187. raise Unauthorized("Tenant owner account does not exist.")
  188. else:
  189. raise Unauthorized("Tenant does not exist.")
  190. return view(api_token.tenant_id, *args, **kwargs)
  191. return decorated
  192. if view:
  193. return decorator(view)
  194. # if view is None, it means that the decorator is used without parentheses
  195. # use the decorator as a function for method_decorators
  196. return decorator
  197. def validate_and_get_api_token(scope: str | None = None):
  198. """
  199. Validate and get API token.
  200. """
  201. auth_header = request.headers.get("Authorization")
  202. if auth_header is None or " " not in auth_header:
  203. raise Unauthorized("Authorization header must be provided and start with 'Bearer'")
  204. auth_scheme, auth_token = auth_header.split(None, 1)
  205. auth_scheme = auth_scheme.lower()
  206. if auth_scheme != "bearer":
  207. raise Unauthorized("Authorization scheme must be 'Bearer'")
  208. current_time = naive_utc_now()
  209. cutoff_time = current_time - timedelta(minutes=1)
  210. with Session(db.engine, expire_on_commit=False) as session:
  211. update_stmt = (
  212. update(ApiToken)
  213. .where(
  214. ApiToken.token == auth_token,
  215. (ApiToken.last_used_at.is_(None) | (ApiToken.last_used_at < cutoff_time)),
  216. ApiToken.type == scope,
  217. )
  218. .values(last_used_at=current_time)
  219. .returning(ApiToken)
  220. )
  221. result = session.execute(update_stmt)
  222. api_token = result.scalar_one_or_none()
  223. if not api_token:
  224. stmt = select(ApiToken).where(ApiToken.token == auth_token, ApiToken.type == scope)
  225. api_token = session.scalar(stmt)
  226. if not api_token:
  227. raise Unauthorized("Access token is invalid")
  228. else:
  229. session.commit()
  230. return api_token
  231. def create_or_update_end_user_for_user_id(app_model: App, user_id: Optional[str] = None) -> EndUser:
  232. """
  233. Create or update session terminal based on user ID.
  234. """
  235. if not user_id:
  236. user_id = "DEFAULT-USER"
  237. with Session(db.engine, expire_on_commit=False) as session:
  238. end_user = (
  239. session.query(EndUser)
  240. .where(
  241. EndUser.tenant_id == app_model.tenant_id,
  242. EndUser.app_id == app_model.id,
  243. EndUser.session_id == user_id,
  244. EndUser.type == "service_api",
  245. )
  246. .first()
  247. )
  248. if end_user is None:
  249. end_user = EndUser(
  250. tenant_id=app_model.tenant_id,
  251. app_id=app_model.id,
  252. type="service_api",
  253. is_anonymous=user_id == "DEFAULT-USER",
  254. session_id=user_id,
  255. )
  256. session.add(end_user)
  257. session.commit()
  258. return end_user
  259. class DatasetApiResource(Resource):
  260. method_decorators = [validate_dataset_token]
  261. def get_dataset(self, dataset_id: str, tenant_id: str) -> Dataset:
  262. dataset = db.session.query(Dataset).where(Dataset.id == dataset_id, Dataset.tenant_id == tenant_id).first()
  263. if not dataset:
  264. raise NotFound("Dataset not found.")
  265. return dataset