You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

user_app.py 14KB

1 vuosi sitten
1 vuosi sitten
1 vuosi sitten
1 vuosi sitten
123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389
  1. #
  2. # Copyright 2024 The InfiniFlow Authors. All Rights Reserved.
  3. #
  4. # Licensed under the Apache License, Version 2.0 (the "License");
  5. # you may not use this file except in compliance with the License.
  6. # You may obtain a copy of the License at
  7. #
  8. # http://www.apache.org/licenses/LICENSE-2.0
  9. #
  10. # Unless required by applicable law or agreed to in writing, software
  11. # distributed under the License is distributed on an "AS IS" BASIS,
  12. # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. # See the License for the specific language governing permissions and
  14. # limitations under the License.
  15. #
  16. import json
  17. import re
  18. from datetime import datetime
  19. from flask import request, session, redirect
  20. from werkzeug.security import generate_password_hash, check_password_hash
  21. from flask_login import login_required, current_user, login_user, logout_user
  22. from api.db.db_models import TenantLLM
  23. from api.db.services.llm_service import TenantLLMService, LLMService
  24. from api.utils.api_utils import server_error_response, validate_request
  25. from api.utils import get_uuid, get_format_time, decrypt, download_img, current_timestamp, datetime_format
  26. from api.db import UserTenantRole, LLMType, FileType
  27. from api.settings import RetCode, GITHUB_OAUTH, FEISHU_OAUTH, CHAT_MDL, EMBEDDING_MDL, ASR_MDL, IMAGE2TEXT_MDL, PARSERS, API_KEY, \
  28. LLM_FACTORY, LLM_BASE_URL
  29. from api.db.services.user_service import UserService, TenantService, UserTenantService
  30. from api.db.services.file_service import FileService
  31. from api.settings import stat_logger
  32. from api.utils.api_utils import get_json_result, cors_reponse
  33. @manager.route('/login', methods=['POST', 'GET'])
  34. def login():
  35. login_channel = "password"
  36. if not request.json:
  37. return get_json_result(data=False, retcode=RetCode.AUTHENTICATION_ERROR,
  38. retmsg='Unautherized!')
  39. email = request.json.get('email', "")
  40. users = UserService.query(email=email)
  41. if not users:
  42. return get_json_result(
  43. data=False, retcode=RetCode.AUTHENTICATION_ERROR, retmsg=f'This Email is not registered!')
  44. password = request.json.get('password')
  45. try:
  46. password = decrypt(password)
  47. except BaseException:
  48. return get_json_result(
  49. data=False, retcode=RetCode.SERVER_ERROR, retmsg='Fail to crypt password')
  50. user = UserService.query_user(email, password)
  51. if user:
  52. response_data = user.to_json()
  53. user.access_token = get_uuid()
  54. login_user(user)
  55. user.update_time = current_timestamp(),
  56. user.update_date = datetime_format(datetime.now()),
  57. user.save()
  58. msg = "Welcome back!"
  59. return cors_reponse(data=response_data, auth=user.get_id(), retmsg=msg)
  60. else:
  61. return get_json_result(data=False, retcode=RetCode.AUTHENTICATION_ERROR,
  62. retmsg='Email and Password do not match!')
  63. @manager.route('/github_callback', methods=['GET'])
  64. def github_callback():
  65. import requests
  66. res = requests.post(GITHUB_OAUTH.get("url"), data={
  67. "client_id": GITHUB_OAUTH.get("client_id"),
  68. "client_secret": GITHUB_OAUTH.get("secret_key"),
  69. "code": request.args.get('code')
  70. }, headers={"Accept": "application/json"})
  71. res = res.json()
  72. if "error" in res:
  73. return redirect("/?error=%s" % res["error_description"])
  74. if "user:email" not in res["scope"].split(","):
  75. return redirect("/?error=user:email not in scope")
  76. session["access_token"] = res["access_token"]
  77. session["access_token_from"] = "github"
  78. userinfo = user_info_from_github(session["access_token"])
  79. users = UserService.query(email=userinfo["email"])
  80. user_id = get_uuid()
  81. if not users:
  82. try:
  83. try:
  84. avatar = download_img(userinfo["avatar_url"])
  85. except Exception as e:
  86. stat_logger.exception(e)
  87. avatar = ""
  88. users = user_register(user_id, {
  89. "access_token": session["access_token"],
  90. "email": userinfo["email"],
  91. "avatar": avatar,
  92. "nickname": userinfo["login"],
  93. "login_channel": "github",
  94. "last_login_time": get_format_time(),
  95. "is_superuser": False,
  96. })
  97. if not users:
  98. raise Exception('Register user failure.')
  99. if len(users) > 1:
  100. raise Exception('Same E-mail exist!')
  101. user = users[0]
  102. login_user(user)
  103. return redirect("/?auth=%s" % user.get_id())
  104. except Exception as e:
  105. rollback_user_registration(user_id)
  106. stat_logger.exception(e)
  107. return redirect("/?error=%s" % str(e))
  108. user = users[0]
  109. user.access_token = get_uuid()
  110. login_user(user)
  111. user.save()
  112. return redirect("/?auth=%s" % user.get_id())
  113. @manager.route('/feishu_callback', methods=['GET'])
  114. def feishu_callback():
  115. import requests
  116. app_access_token_res = requests.post(FEISHU_OAUTH.get("app_access_token_url"), data=json.dumps({
  117. "app_id": FEISHU_OAUTH.get("app_id"),
  118. "app_secret": FEISHU_OAUTH.get("app_secret")
  119. }), headers={"Content-Type": "application/json; charset=utf-8"})
  120. app_access_token_res = app_access_token_res.json()
  121. if app_access_token_res['code'] != 0:
  122. return redirect("/?error=%s" % app_access_token_res)
  123. res = requests.post(FEISHU_OAUTH.get("user_access_token_url"), data=json.dumps({
  124. "grant_type": FEISHU_OAUTH.get("grant_type"),
  125. "code": request.args.get('code')
  126. }), headers={"Content-Type": "application/json; charset=utf-8",
  127. 'Authorization': f"Bearer {app_access_token_res['app_access_token']}"})
  128. res = res.json()
  129. if res['code'] != 0:
  130. return redirect("/?error=%s" % res["message"])
  131. if "contact:user.email:readonly" not in res["data"]["scope"].split(" "):
  132. return redirect("/?error=contact:user.email:readonly not in scope")
  133. session["access_token"] = res["data"]["access_token"]
  134. session["access_token_from"] = "feishu"
  135. userinfo = user_info_from_feishu(session["access_token"])
  136. users = UserService.query(email=userinfo["email"])
  137. user_id = get_uuid()
  138. if not users:
  139. try:
  140. try:
  141. avatar = download_img(userinfo["avatar_url"])
  142. except Exception as e:
  143. stat_logger.exception(e)
  144. avatar = ""
  145. users = user_register(user_id, {
  146. "access_token": session["access_token"],
  147. "email": userinfo["email"],
  148. "avatar": avatar,
  149. "nickname": userinfo["en_name"],
  150. "login_channel": "feishu",
  151. "last_login_time": get_format_time(),
  152. "is_superuser": False,
  153. })
  154. if not users:
  155. raise Exception('Register user failure.')
  156. if len(users) > 1:
  157. raise Exception('Same E-mail exist!')
  158. user = users[0]
  159. login_user(user)
  160. return redirect("/?auth=%s" % user.get_id())
  161. except Exception as e:
  162. rollback_user_registration(user_id)
  163. stat_logger.exception(e)
  164. return redirect("/?error=%s" % str(e))
  165. user = users[0]
  166. user.access_token = get_uuid()
  167. login_user(user)
  168. user.save()
  169. return redirect("/?auth=%s" % user.get_id())
  170. def user_info_from_feishu(access_token):
  171. import requests
  172. headers = {"Content-Type": "application/json; charset=utf-8",
  173. 'Authorization': f"Bearer {access_token}"}
  174. res = requests.get(
  175. f"https://open.feishu.cn/open-apis/authen/v1/user_info",
  176. headers=headers)
  177. user_info = res.json()["data"]
  178. user_info["email"] = None if user_info.get("email") == "" else user_info["email"]
  179. return user_info
  180. def user_info_from_github(access_token):
  181. import requests
  182. headers = {"Accept": "application/json",
  183. 'Authorization': f"token {access_token}"}
  184. res = requests.get(
  185. f"https://api.github.com/user?access_token={access_token}",
  186. headers=headers)
  187. user_info = res.json()
  188. email_info = requests.get(
  189. f"https://api.github.com/user/emails?access_token={access_token}",
  190. headers=headers).json()
  191. user_info["email"] = next(
  192. (email for email in email_info if email['primary'] == True),
  193. None)["email"]
  194. return user_info
  195. @manager.route("/logout", methods=['GET'])
  196. @login_required
  197. def log_out():
  198. current_user.access_token = ""
  199. current_user.save()
  200. logout_user()
  201. return get_json_result(data=True)
  202. @manager.route("/setting", methods=["POST"])
  203. @login_required
  204. def setting_user():
  205. update_dict = {}
  206. request_data = request.json
  207. if request_data.get("password"):
  208. new_password = request_data.get("new_password")
  209. if not check_password_hash(
  210. current_user.password, decrypt(request_data["password"])):
  211. return get_json_result(
  212. data=False, retcode=RetCode.AUTHENTICATION_ERROR, retmsg='Password error!')
  213. if new_password:
  214. update_dict["password"] = generate_password_hash(
  215. decrypt(new_password))
  216. for k in request_data.keys():
  217. if k in ["password", "new_password"]:
  218. continue
  219. update_dict[k] = request_data[k]
  220. try:
  221. UserService.update_by_id(current_user.id, update_dict)
  222. return get_json_result(data=True)
  223. except Exception as e:
  224. stat_logger.exception(e)
  225. return get_json_result(
  226. data=False, retmsg='Update failure!', retcode=RetCode.EXCEPTION_ERROR)
  227. @manager.route("/info", methods=["GET"])
  228. @login_required
  229. def user_info():
  230. return get_json_result(data=current_user.to_dict())
  231. def rollback_user_registration(user_id):
  232. try:
  233. UserService.delete_by_id(user_id)
  234. except Exception as e:
  235. pass
  236. try:
  237. TenantService.delete_by_id(user_id)
  238. except Exception as e:
  239. pass
  240. try:
  241. u = UserTenantService.query(tenant_id=user_id)
  242. if u:
  243. UserTenantService.delete_by_id(u[0].id)
  244. except Exception as e:
  245. pass
  246. try:
  247. TenantLLM.delete().where(TenantLLM.tenant_id == user_id).execute()
  248. except Exception as e:
  249. pass
  250. def user_register(user_id, user):
  251. user["id"] = user_id
  252. tenant = {
  253. "id": user_id,
  254. "name": user["nickname"] + "‘s Kingdom",
  255. "llm_id": CHAT_MDL,
  256. "embd_id": EMBEDDING_MDL,
  257. "asr_id": ASR_MDL,
  258. "parser_ids": PARSERS,
  259. "img2txt_id": IMAGE2TEXT_MDL
  260. }
  261. usr_tenant = {
  262. "tenant_id": user_id,
  263. "user_id": user_id,
  264. "invited_by": user_id,
  265. "role": UserTenantRole.OWNER
  266. }
  267. file_id = get_uuid()
  268. file = {
  269. "id": file_id,
  270. "parent_id": file_id,
  271. "tenant_id": user_id,
  272. "created_by": user_id,
  273. "name": "/",
  274. "type": FileType.FOLDER.value,
  275. "size": 0,
  276. "location": "",
  277. }
  278. tenant_llm = []
  279. for llm in LLMService.query(fid=LLM_FACTORY):
  280. tenant_llm.append({"tenant_id": user_id,
  281. "llm_factory": LLM_FACTORY,
  282. "llm_name": llm.llm_name,
  283. "model_type": llm.model_type,
  284. "api_key": API_KEY,
  285. "api_base": LLM_BASE_URL
  286. })
  287. if not UserService.save(**user):
  288. return
  289. TenantService.insert(**tenant)
  290. UserTenantService.insert(**usr_tenant)
  291. TenantLLMService.insert_many(tenant_llm)
  292. FileService.insert(file)
  293. return UserService.query(email=user["email"])
  294. @manager.route("/register", methods=["POST"])
  295. @validate_request("nickname", "email", "password")
  296. def user_add():
  297. req = request.json
  298. if UserService.query(email=req["email"]):
  299. return get_json_result(
  300. data=False, retmsg=f'Email: {req["email"]} has already registered!', retcode=RetCode.OPERATING_ERROR)
  301. if not re.match(r"^[\w\._-]+@([\w_-]+\.)+[\w-]{2,4}$", req["email"]):
  302. return get_json_result(data=False, retmsg=f'Invaliad e-mail: {req["email"]}!',
  303. retcode=RetCode.OPERATING_ERROR)
  304. user_dict = {
  305. "access_token": get_uuid(),
  306. "email": req["email"],
  307. "nickname": req["nickname"],
  308. "password": decrypt(req["password"]),
  309. "login_channel": "password",
  310. "last_login_time": get_format_time(),
  311. "is_superuser": False,
  312. }
  313. user_id = get_uuid()
  314. try:
  315. users = user_register(user_id, user_dict)
  316. if not users:
  317. raise Exception('Register user failure.')
  318. if len(users) > 1:
  319. raise Exception('Same E-mail exist!')
  320. user = users[0]
  321. login_user(user)
  322. return cors_reponse(data=user.to_json(),
  323. auth=user.get_id(), retmsg="Welcome aboard!")
  324. except Exception as e:
  325. rollback_user_registration(user_id)
  326. stat_logger.exception(e)
  327. return get_json_result(
  328. data=False, retmsg='User registration failure!', retcode=RetCode.EXCEPTION_ERROR)
  329. @manager.route("/tenant_info", methods=["GET"])
  330. @login_required
  331. def tenant_info():
  332. try:
  333. tenants = TenantService.get_by_user_id(current_user.id)[0]
  334. return get_json_result(data=tenants)
  335. except Exception as e:
  336. return server_error_response(e)
  337. @manager.route("/set_tenant_info", methods=["POST"])
  338. @login_required
  339. @validate_request("tenant_id", "asr_id", "embd_id", "img2txt_id", "llm_id")
  340. def set_tenant_info():
  341. req = request.json
  342. try:
  343. tid = req["tenant_id"]
  344. del req["tenant_id"]
  345. TenantService.update_by_id(tid, req)
  346. return get_json_result(data=True)
  347. except Exception as e:
  348. return server_error_response(e)