Вы не можете выбрать более 25 тем Темы должны начинаться с буквы или цифры, могут содержать дефисы(-) и должны содержать не более 35 символов.

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520
  1. #
  2. # Copyright 2024 The InfiniFlow Authors. All Rights Reserved.
  3. #
  4. # Licensed under the Apache License, Version 2.0 (the "License");
  5. # you may not use this file except in compliance with the License.
  6. # You may obtain a copy of the License at
  7. #
  8. # http://www.apache.org/licenses/LICENSE-2.0
  9. #
  10. # Unless required by applicable law or agreed to in writing, software
  11. # distributed under the License is distributed on an "AS IS" BASIS,
  12. # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. # See the License for the specific language governing permissions and
  14. # limitations under the License.
  15. #
  16. import functools
  17. import json
  18. import logging
  19. import random
  20. import time
  21. from base64 import b64encode
  22. from functools import wraps
  23. from hmac import HMAC
  24. from io import BytesIO
  25. from urllib.parse import quote, urlencode
  26. from uuid import uuid1
  27. import requests
  28. from flask import (
  29. Response,
  30. jsonify,
  31. make_response,
  32. send_file,
  33. )
  34. from flask import (
  35. request as flask_request,
  36. )
  37. from itsdangerous import URLSafeTimedSerializer
  38. from peewee import OperationalError
  39. from werkzeug.http import HTTP_STATUS_CODES
  40. from api import settings
  41. from api.constants import REQUEST_MAX_WAIT_SEC, REQUEST_WAIT_SEC
  42. from api.db.db_models import APIToken
  43. from api.db.services.llm_service import LLMService, TenantLLMService
  44. from api.utils import CustomJSONEncoder, get_uuid, json_dumps
  45. requests.models.complexjson.dumps = functools.partial(json.dumps, cls=CustomJSONEncoder)
  46. def request(**kwargs):
  47. sess = requests.Session()
  48. stream = kwargs.pop("stream", sess.stream)
  49. timeout = kwargs.pop("timeout", None)
  50. kwargs["headers"] = {k.replace("_", "-").upper(): v for k, v in kwargs.get("headers", {}).items()}
  51. prepped = requests.Request(**kwargs).prepare()
  52. if settings.CLIENT_AUTHENTICATION and settings.HTTP_APP_KEY and settings.SECRET_KEY:
  53. timestamp = str(round(time() * 1000))
  54. nonce = str(uuid1())
  55. signature = b64encode(
  56. HMAC(
  57. settings.SECRET_KEY.encode("ascii"),
  58. b"\n".join(
  59. [
  60. timestamp.encode("ascii"),
  61. nonce.encode("ascii"),
  62. settings.HTTP_APP_KEY.encode("ascii"),
  63. prepped.path_url.encode("ascii"),
  64. prepped.body if kwargs.get("json") else b"",
  65. urlencode(sorted(kwargs["data"].items()), quote_via=quote, safe="-._~").encode("ascii") if kwargs.get("data") and isinstance(kwargs["data"], dict) else b"",
  66. ]
  67. ),
  68. "sha1",
  69. ).digest()
  70. ).decode("ascii")
  71. prepped.headers.update(
  72. {
  73. "TIMESTAMP": timestamp,
  74. "NONCE": nonce,
  75. "APP-KEY": settings.HTTP_APP_KEY,
  76. "SIGNATURE": signature,
  77. }
  78. )
  79. return sess.send(prepped, stream=stream, timeout=timeout)
  80. def get_exponential_backoff_interval(retries, full_jitter=False):
  81. """Calculate the exponential backoff wait time."""
  82. # Will be zero if factor equals 0
  83. countdown = min(REQUEST_MAX_WAIT_SEC, REQUEST_WAIT_SEC * (2**retries))
  84. # Full jitter according to
  85. # https://aws.amazon.com/blogs/architecture/exponential-backoff-and-jitter/
  86. if full_jitter:
  87. countdown = random.randrange(countdown + 1)
  88. # Adjust according to maximum wait time and account for negative values.
  89. return max(0, countdown)
  90. def get_data_error_result(code=settings.RetCode.DATA_ERROR, message="Sorry! Data missing!"):
  91. logging.exception(Exception(message))
  92. result_dict = {"code": code, "message": message}
  93. response = {}
  94. for key, value in result_dict.items():
  95. if value is None and key != "code":
  96. continue
  97. else:
  98. response[key] = value
  99. return jsonify(response)
  100. def server_error_response(e):
  101. logging.exception(e)
  102. try:
  103. if e.code == 401:
  104. return get_json_result(code=401, message=repr(e))
  105. except BaseException:
  106. pass
  107. if len(e.args) > 1:
  108. return get_json_result(code=settings.RetCode.EXCEPTION_ERROR, message=repr(e.args[0]), data=e.args[1])
  109. if repr(e).find("index_not_found_exception") >= 0:
  110. return get_json_result(code=settings.RetCode.EXCEPTION_ERROR, message="No chunk found, please upload file and parse it.")
  111. return get_json_result(code=settings.RetCode.EXCEPTION_ERROR, message=repr(e))
  112. def error_response(response_code, message=None):
  113. if message is None:
  114. message = HTTP_STATUS_CODES.get(response_code, "Unknown Error")
  115. return Response(
  116. json.dumps(
  117. {
  118. "message": message,
  119. "code": response_code,
  120. }
  121. ),
  122. status=response_code,
  123. mimetype="application/json",
  124. )
  125. def validate_request(*args, **kwargs):
  126. def wrapper(func):
  127. @wraps(func)
  128. def decorated_function(*_args, **_kwargs):
  129. input_arguments = flask_request.json or flask_request.form.to_dict()
  130. no_arguments = []
  131. error_arguments = []
  132. for arg in args:
  133. if arg not in input_arguments:
  134. no_arguments.append(arg)
  135. for k, v in kwargs.items():
  136. config_value = input_arguments.get(k, None)
  137. if config_value is None:
  138. no_arguments.append(k)
  139. elif isinstance(v, (tuple, list)):
  140. if config_value not in v:
  141. error_arguments.append((k, set(v)))
  142. elif config_value != v:
  143. error_arguments.append((k, v))
  144. if no_arguments or error_arguments:
  145. error_string = ""
  146. if no_arguments:
  147. error_string += "required argument are missing: {}; ".format(",".join(no_arguments))
  148. if error_arguments:
  149. error_string += "required argument values: {}".format(",".join(["{}={}".format(a[0], a[1]) for a in error_arguments]))
  150. return get_json_result(code=settings.RetCode.ARGUMENT_ERROR, message=error_string)
  151. return func(*_args, **_kwargs)
  152. return decorated_function
  153. return wrapper
  154. def not_allowed_parameters(*params):
  155. def decorator(f):
  156. def wrapper(*args, **kwargs):
  157. input_arguments = flask_request.json or flask_request.form.to_dict()
  158. for param in params:
  159. if param in input_arguments:
  160. return get_json_result(code=settings.RetCode.ARGUMENT_ERROR, message=f"Parameter {param} isn't allowed")
  161. return f(*args, **kwargs)
  162. return wrapper
  163. return decorator
  164. def is_localhost(ip):
  165. return ip in {"127.0.0.1", "::1", "[::1]", "localhost"}
  166. def send_file_in_mem(data, filename):
  167. if not isinstance(data, (str, bytes)):
  168. data = json_dumps(data)
  169. if isinstance(data, str):
  170. data = data.encode("utf-8")
  171. f = BytesIO()
  172. f.write(data)
  173. f.seek(0)
  174. return send_file(f, as_attachment=True, attachment_filename=filename)
  175. def get_json_result(code=settings.RetCode.SUCCESS, message="success", data=None):
  176. response = {"code": code, "message": message, "data": data}
  177. return jsonify(response)
  178. def apikey_required(func):
  179. @wraps(func)
  180. def decorated_function(*args, **kwargs):
  181. token = flask_request.headers.get("Authorization").split()[1]
  182. objs = APIToken.query(token=token)
  183. if not objs:
  184. return build_error_result(message="API-KEY is invalid!", code=settings.RetCode.FORBIDDEN)
  185. kwargs["tenant_id"] = objs[0].tenant_id
  186. return func(*args, **kwargs)
  187. return decorated_function
  188. def build_error_result(code=settings.RetCode.FORBIDDEN, message="success"):
  189. response = {"code": code, "message": message}
  190. response = jsonify(response)
  191. response.status_code = code
  192. return response
  193. def construct_response(code=settings.RetCode.SUCCESS, message="success", data=None, auth=None):
  194. result_dict = {"code": code, "message": message, "data": data}
  195. response_dict = {}
  196. for key, value in result_dict.items():
  197. if value is None and key != "code":
  198. continue
  199. else:
  200. response_dict[key] = value
  201. response = make_response(jsonify(response_dict))
  202. if auth:
  203. response.headers["Authorization"] = auth
  204. response.headers["Access-Control-Allow-Origin"] = "*"
  205. response.headers["Access-Control-Allow-Method"] = "*"
  206. response.headers["Access-Control-Allow-Headers"] = "*"
  207. response.headers["Access-Control-Allow-Headers"] = "*"
  208. response.headers["Access-Control-Expose-Headers"] = "Authorization"
  209. return response
  210. def construct_result(code=settings.RetCode.DATA_ERROR, message="data is missing"):
  211. result_dict = {"code": code, "message": message}
  212. response = {}
  213. for key, value in result_dict.items():
  214. if value is None and key != "code":
  215. continue
  216. else:
  217. response[key] = value
  218. return jsonify(response)
  219. def construct_json_result(code=settings.RetCode.SUCCESS, message="success", data=None):
  220. if data is None:
  221. return jsonify({"code": code, "message": message})
  222. else:
  223. return jsonify({"code": code, "message": message, "data": data})
  224. def construct_error_response(e):
  225. logging.exception(e)
  226. try:
  227. if e.code == 401:
  228. return construct_json_result(code=settings.RetCode.UNAUTHORIZED, message=repr(e))
  229. except BaseException:
  230. pass
  231. if len(e.args) > 1:
  232. return construct_json_result(code=settings.RetCode.EXCEPTION_ERROR, message=repr(e.args[0]), data=e.args[1])
  233. return construct_json_result(code=settings.RetCode.EXCEPTION_ERROR, message=repr(e))
  234. def token_required(func):
  235. @wraps(func)
  236. def decorated_function(*args, **kwargs):
  237. authorization_str = flask_request.headers.get("Authorization")
  238. if not authorization_str:
  239. return get_json_result(data=False, message="`Authorization` can't be empty")
  240. authorization_list = authorization_str.split()
  241. if len(authorization_list) < 2:
  242. return get_json_result(data=False, message="Please check your authorization format.")
  243. token = authorization_list[1]
  244. objs = APIToken.query(token=token)
  245. if not objs:
  246. return get_json_result(data=False, message="Authentication error: API key is invalid!", code=settings.RetCode.AUTHENTICATION_ERROR)
  247. kwargs["tenant_id"] = objs[0].tenant_id
  248. return func(*args, **kwargs)
  249. return decorated_function
  250. def get_result(code=settings.RetCode.SUCCESS, message="", data=None):
  251. if code == 0:
  252. if data is not None:
  253. response = {"code": code, "data": data}
  254. else:
  255. response = {"code": code}
  256. else:
  257. response = {"code": code, "message": message}
  258. return jsonify(response)
  259. def get_error_data_result(
  260. message="Sorry! Data missing!",
  261. code=settings.RetCode.DATA_ERROR,
  262. ):
  263. result_dict = {"code": code, "message": message}
  264. response = {}
  265. for key, value in result_dict.items():
  266. if value is None and key != "code":
  267. continue
  268. else:
  269. response[key] = value
  270. return jsonify(response)
  271. def get_error_argument_result(message="Invalid arguments"):
  272. return get_result(code=settings.RetCode.ARGUMENT_ERROR, message=message)
  273. def generate_confirmation_token(tenant_id):
  274. serializer = URLSafeTimedSerializer(tenant_id)
  275. return "ragflow-" + serializer.dumps(get_uuid(), salt=tenant_id)[2:34]
  276. def valid(permission, valid_permission, chunk_method, valid_chunk_method):
  277. if valid_parameter(permission, valid_permission):
  278. return valid_parameter(permission, valid_permission)
  279. if valid_parameter(chunk_method, valid_chunk_method):
  280. return valid_parameter(chunk_method, valid_chunk_method)
  281. def valid_parameter(parameter, valid_values):
  282. if parameter and parameter not in valid_values:
  283. return get_error_data_result(f"'{parameter}' is not in {valid_values}")
  284. def dataset_readonly_fields(field_name):
  285. return field_name in ["chunk_count", "create_date", "create_time", "update_date", "update_time", "created_by", "document_count", "token_num", "status", "tenant_id", "id"]
  286. def get_parser_config(chunk_method, parser_config):
  287. if parser_config:
  288. return parser_config
  289. if not chunk_method:
  290. chunk_method = "naive"
  291. key_mapping = {
  292. "naive": {"chunk_token_num": 128, "delimiter": r"\n", "html4excel": False, "layout_recognize": "DeepDOC", "raptor": {"use_raptor": False}},
  293. "qa": {"raptor": {"use_raptor": False}},
  294. "tag": None,
  295. "resume": None,
  296. "manual": {"raptor": {"use_raptor": False}},
  297. "table": None,
  298. "paper": {"raptor": {"use_raptor": False}},
  299. "book": {"raptor": {"use_raptor": False}},
  300. "laws": {"raptor": {"use_raptor": False}},
  301. "presentation": {"raptor": {"use_raptor": False}},
  302. "one": None,
  303. "knowledge_graph": {"chunk_token_num": 8192, "delimiter": r"\n", "entity_types": ["organization", "person", "location", "event", "time"]},
  304. "email": None,
  305. "picture": None,
  306. }
  307. parser_config = key_mapping[chunk_method]
  308. return parser_config
  309. def get_data_openai(
  310. id=None,
  311. created=None,
  312. model=None,
  313. prompt_tokens=0,
  314. completion_tokens=0,
  315. content=None,
  316. finish_reason=None,
  317. object="chat.completion",
  318. param=None,
  319. ):
  320. total_tokens = prompt_tokens + completion_tokens
  321. return {
  322. "id": f"{id}",
  323. "object": object,
  324. "created": int(time.time()) if created else None,
  325. "model": model,
  326. "param": param,
  327. "usage": {
  328. "prompt_tokens": prompt_tokens,
  329. "completion_tokens": completion_tokens,
  330. "total_tokens": total_tokens,
  331. "completion_tokens_details": {"reasoning_tokens": 0, "accepted_prediction_tokens": 0, "rejected_prediction_tokens": 0},
  332. },
  333. "choices": [{"message": {"role": "assistant", "content": content}, "logprobs": None, "finish_reason": finish_reason, "index": 0}],
  334. }
  335. def valid_parser_config(parser_config):
  336. if not parser_config:
  337. return
  338. scopes = set(
  339. [
  340. "chunk_token_num",
  341. "delimiter",
  342. "raptor",
  343. "graphrag",
  344. "layout_recognize",
  345. "task_page_size",
  346. "pages",
  347. "html4excel",
  348. "auto_keywords",
  349. "auto_questions",
  350. "tag_kb_ids",
  351. "topn_tags",
  352. "filename_embd_weight",
  353. ]
  354. )
  355. for k in parser_config.keys():
  356. assert k in scopes, f"Abnormal 'parser_config'. Invalid key: {k}"
  357. assert isinstance(parser_config.get("chunk_token_num", 1), int), "chunk_token_num should be int"
  358. assert 1 <= parser_config.get("chunk_token_num", 1) < 100000000, "chunk_token_num should be in range from 1 to 100000000"
  359. assert isinstance(parser_config.get("task_page_size", 1), int), "task_page_size should be int"
  360. assert 1 <= parser_config.get("task_page_size", 1) < 100000000, "task_page_size should be in range from 1 to 100000000"
  361. assert isinstance(parser_config.get("auto_keywords", 1), int), "auto_keywords should be int"
  362. assert 0 <= parser_config.get("auto_keywords", 0) < 32, "auto_keywords should be in range from 0 to 32"
  363. assert isinstance(parser_config.get("auto_questions", 1), int), "auto_questions should be int"
  364. assert 0 <= parser_config.get("auto_questions", 0) < 10, "auto_questions should be in range from 0 to 10"
  365. assert isinstance(parser_config.get("topn_tags", 1), int), "topn_tags should be int"
  366. assert 0 <= parser_config.get("topn_tags", 0) < 10, "topn_tags should be in range from 0 to 10"
  367. assert isinstance(parser_config.get("html4excel", False), bool), "html4excel should be True or False"
  368. assert isinstance(parser_config.get("delimiter", ""), str), "delimiter should be str"
  369. def check_duplicate_ids(ids, id_type="item"):
  370. """
  371. Check for duplicate IDs in a list and return unique IDs and error messages.
  372. Args:
  373. ids (list): List of IDs to check for duplicates
  374. id_type (str): Type of ID for error messages (e.g., 'document', 'dataset', 'chunk')
  375. Returns:
  376. tuple: (unique_ids, error_messages)
  377. - unique_ids (list): List of unique IDs
  378. - error_messages (list): List of error messages for duplicate IDs
  379. """
  380. id_count = {}
  381. duplicate_messages = []
  382. # Count occurrences of each ID
  383. for id_value in ids:
  384. id_count[id_value] = id_count.get(id_value, 0) + 1
  385. # Check for duplicates
  386. for id_value, count in id_count.items():
  387. if count > 1:
  388. duplicate_messages.append(f"Duplicate {id_type} ids: {id_value}")
  389. # Return unique IDs and error messages
  390. return list(set(ids)), duplicate_messages
  391. def verify_embedding_availability(embd_id: str, tenant_id: str) -> tuple[bool, Response | None]:
  392. """Verifies availability of an embedding model for a specific tenant.
  393. Implements a four-stage validation process:
  394. 1. Model identifier parsing and validation
  395. 2. System support verification
  396. 3. Tenant authorization check
  397. 4. Database operation error handling
  398. Args:
  399. embd_id (str): Unique identifier for the embedding model in format "model_name@factory"
  400. tenant_id (str): Tenant identifier for access control
  401. Returns:
  402. tuple[bool, Response | None]:
  403. - First element (bool):
  404. - True: Model is available and authorized
  405. - False: Validation failed
  406. - Second element contains:
  407. - None on success
  408. - Error detail dict on failure
  409. Raises:
  410. ValueError: When model identifier format is invalid
  411. OperationalError: When database connection fails (auto-handled)
  412. Examples:
  413. >>> verify_embedding_availability("text-embedding@openai", "tenant_123")
  414. (True, None)
  415. >>> verify_embedding_availability("invalid_model", "tenant_123")
  416. (False, {'code': 101, 'message': "Unsupported model: <invalid_model>"})
  417. """
  418. try:
  419. llm_name, llm_factory = TenantLLMService.split_model_name_and_factory(embd_id)
  420. if not LLMService.query(llm_name=llm_name, fid=llm_factory, model_type="embedding"):
  421. return False, get_error_argument_result(f"Unsupported model: <{embd_id}>")
  422. # Tongyi-Qianwen is added to TenantLLM by default, but remains unusable with empty api_key
  423. tenant_llms = TenantLLMService.get_my_llms(tenant_id=tenant_id)
  424. is_tenant_model = any(llm["llm_name"] == llm_name and llm["llm_factory"] == llm_factory and llm["model_type"] == "embedding" for llm in tenant_llms)
  425. is_builtin_model = embd_id in settings.BUILTIN_EMBEDDING_MODELS
  426. if not (is_builtin_model or is_tenant_model):
  427. return False, get_error_argument_result(f"Unauthorized model: <{embd_id}>")
  428. except OperationalError as e:
  429. logging.exception(e)
  430. return False, get_error_data_result(message="Database operation failed")
  431. return True, None