You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

api_utils.py 12KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355
  1. #
  2. # Copyright 2024 The InfiniFlow Authors. All Rights Reserved.
  3. #
  4. # Licensed under the Apache License, Version 2.0 (the "License");
  5. # you may not use this file except in compliance with the License.
  6. # You may obtain a copy of the License at
  7. #
  8. # http://www.apache.org/licenses/LICENSE-2.0
  9. #
  10. # Unless required by applicable law or agreed to in writing, software
  11. # distributed under the License is distributed on an "AS IS" BASIS,
  12. # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. # See the License for the specific language governing permissions and
  14. # limitations under the License.
  15. #
  16. import logging
  17. import functools
  18. import json
  19. import random
  20. import time
  21. from base64 import b64encode
  22. from functools import wraps
  23. from hmac import HMAC
  24. from io import BytesIO
  25. from urllib.parse import quote, urlencode
  26. from uuid import uuid1
  27. import requests
  28. from flask import (
  29. Response, jsonify, send_file, make_response,
  30. request as flask_request,
  31. )
  32. from itsdangerous import URLSafeTimedSerializer
  33. from werkzeug.http import HTTP_STATUS_CODES
  34. from api.db.db_models import APIToken
  35. from api import settings
  36. from api import settings
  37. from api.utils import CustomJSONEncoder, get_uuid
  38. from api.utils import json_dumps
  39. requests.models.complexjson.dumps = functools.partial(
  40. json.dumps, cls=CustomJSONEncoder)
  41. def request(**kwargs):
  42. sess = requests.Session()
  43. stream = kwargs.pop('stream', sess.stream)
  44. timeout = kwargs.pop('timeout', None)
  45. kwargs['headers'] = {
  46. k.replace(
  47. '_',
  48. '-').upper(): v for k,
  49. v in kwargs.get(
  50. 'headers',
  51. {}).items()}
  52. prepped = requests.Request(**kwargs).prepare()
  53. if settings.CLIENT_AUTHENTICATION and settings.HTTP_APP_KEY and settings.SECRET_KEY:
  54. timestamp = str(round(time() * 1000))
  55. nonce = str(uuid1())
  56. signature = b64encode(HMAC(settings.SECRET_KEY.encode('ascii'), b'\n'.join([
  57. timestamp.encode('ascii'),
  58. nonce.encode('ascii'),
  59. settings.HTTP_APP_KEY.encode('ascii'),
  60. prepped.path_url.encode('ascii'),
  61. prepped.body if kwargs.get('json') else b'',
  62. urlencode(
  63. sorted(
  64. kwargs['data'].items()),
  65. quote_via=quote,
  66. safe='-._~').encode('ascii')
  67. if kwargs.get('data') and isinstance(kwargs['data'], dict) else b'',
  68. ]), 'sha1').digest()).decode('ascii')
  69. prepped.headers.update({
  70. 'TIMESTAMP': timestamp,
  71. 'NONCE': nonce,
  72. 'APP-KEY': settings.HTTP_APP_KEY,
  73. 'SIGNATURE': signature,
  74. })
  75. return sess.send(prepped, stream=stream, timeout=timeout)
  76. def get_exponential_backoff_interval(retries, full_jitter=False):
  77. """Calculate the exponential backoff wait time."""
  78. # Will be zero if factor equals 0
  79. countdown = min(settings.REQUEST_MAX_WAIT_SEC, settings.REQUEST_WAIT_SEC * (2 ** retries))
  80. # Full jitter according to
  81. # https://aws.amazon.com/blogs/architecture/exponential-backoff-and-jitter/
  82. if full_jitter:
  83. countdown = random.randrange(countdown + 1)
  84. # Adjust according to maximum wait time and account for negative values.
  85. return max(0, countdown)
  86. def get_data_error_result(code=settings.RetCode.DATA_ERROR,
  87. message='Sorry! Data missing!'):
  88. import re
  89. result_dict = {
  90. "code": code,
  91. "message": re.sub(
  92. r"rag",
  93. "seceum",
  94. message,
  95. flags=re.IGNORECASE)}
  96. response = {}
  97. for key, value in result_dict.items():
  98. if value is None and key != "code":
  99. continue
  100. else:
  101. response[key] = value
  102. return jsonify(response)
  103. def server_error_response(e):
  104. logging.exception(e)
  105. try:
  106. if e.code == 401:
  107. return get_json_result(code=401, message=repr(e))
  108. except BaseException:
  109. pass
  110. if len(e.args) > 1:
  111. return get_json_result(
  112. code=settings.RetCode.EXCEPTION_ERROR, message=repr(e.args[0]), data=e.args[1])
  113. return get_json_result(code=settings.RetCode.EXCEPTION_ERROR, message=repr(e))
  114. def error_response(response_code, message=None):
  115. if message is None:
  116. message = HTTP_STATUS_CODES.get(response_code, 'Unknown Error')
  117. return Response(json.dumps({
  118. 'message': message,
  119. 'code': response_code,
  120. }), status=response_code, mimetype='application/json')
  121. def validate_request(*args, **kwargs):
  122. def wrapper(func):
  123. @wraps(func)
  124. def decorated_function(*_args, **_kwargs):
  125. input_arguments = flask_request.json or flask_request.form.to_dict()
  126. no_arguments = []
  127. error_arguments = []
  128. for arg in args:
  129. if arg not in input_arguments:
  130. no_arguments.append(arg)
  131. for k, v in kwargs.items():
  132. config_value = input_arguments.get(k, None)
  133. if config_value is None:
  134. no_arguments.append(k)
  135. elif isinstance(v, (tuple, list)):
  136. if config_value not in v:
  137. error_arguments.append((k, set(v)))
  138. elif config_value != v:
  139. error_arguments.append((k, v))
  140. if no_arguments or error_arguments:
  141. error_string = ""
  142. if no_arguments:
  143. error_string += "required argument are missing: {}; ".format(
  144. ",".join(no_arguments))
  145. if error_arguments:
  146. error_string += "required argument values: {}".format(
  147. ",".join(["{}={}".format(a[0], a[1]) for a in error_arguments]))
  148. return get_json_result(
  149. code=settings.RetCode.ARGUMENT_ERROR, message=error_string)
  150. return func(*_args, **_kwargs)
  151. return decorated_function
  152. return wrapper
  153. def is_localhost(ip):
  154. return ip in {'127.0.0.1', '::1', '[::1]', 'localhost'}
  155. def send_file_in_mem(data, filename):
  156. if not isinstance(data, (str, bytes)):
  157. data = json_dumps(data)
  158. if isinstance(data, str):
  159. data = data.encode('utf-8')
  160. f = BytesIO()
  161. f.write(data)
  162. f.seek(0)
  163. return send_file(f, as_attachment=True, attachment_filename=filename)
  164. def get_json_result(code=settings.RetCode.SUCCESS, message='success', data=None):
  165. response = {"code": code, "message": message, "data": data}
  166. return jsonify(response)
  167. def apikey_required(func):
  168. @wraps(func)
  169. def decorated_function(*args, **kwargs):
  170. token = flask_request.headers.get('Authorization').split()[1]
  171. objs = APIToken.query(token=token)
  172. if not objs:
  173. return build_error_result(
  174. message='API-KEY is invalid!', code=settings.RetCode.FORBIDDEN
  175. )
  176. kwargs['tenant_id'] = objs[0].tenant_id
  177. return func(*args, **kwargs)
  178. return decorated_function
  179. def build_error_result(code=settings.RetCode.FORBIDDEN, message='success'):
  180. response = {"code": code, "message": message}
  181. response = jsonify(response)
  182. response.status_code = code
  183. return response
  184. def construct_response(code=settings.RetCode.SUCCESS,
  185. message='success', data=None, auth=None):
  186. result_dict = {"code": code, "message": message, "data": data}
  187. response_dict = {}
  188. for key, value in result_dict.items():
  189. if value is None and key != "code":
  190. continue
  191. else:
  192. response_dict[key] = value
  193. response = make_response(jsonify(response_dict))
  194. if auth:
  195. response.headers["Authorization"] = auth
  196. response.headers["Access-Control-Allow-Origin"] = "*"
  197. response.headers["Access-Control-Allow-Method"] = "*"
  198. response.headers["Access-Control-Allow-Headers"] = "*"
  199. response.headers["Access-Control-Allow-Headers"] = "*"
  200. response.headers["Access-Control-Expose-Headers"] = "Authorization"
  201. return response
  202. def construct_result(code=settings.RetCode.DATA_ERROR, message='data is missing'):
  203. import re
  204. result_dict = {"code": code, "message": re.sub(r"rag", "seceum", message, flags=re.IGNORECASE)}
  205. response = {}
  206. for key, value in result_dict.items():
  207. if value is None and key != "code":
  208. continue
  209. else:
  210. response[key] = value
  211. return jsonify(response)
  212. def construct_json_result(code=settings.RetCode.SUCCESS, message='success', data=None):
  213. if data is None:
  214. return jsonify({"code": code, "message": message})
  215. else:
  216. return jsonify({"code": code, "message": message, "data": data})
  217. def construct_error_response(e):
  218. logging.exception(e)
  219. try:
  220. if e.code == 401:
  221. return construct_json_result(code=settings.RetCode.UNAUTHORIZED, message=repr(e))
  222. except BaseException:
  223. pass
  224. if len(e.args) > 1:
  225. return construct_json_result(code=settings.RetCode.EXCEPTION_ERROR, message=repr(e.args[0]), data=e.args[1])
  226. return construct_json_result(code=settings.RetCode.EXCEPTION_ERROR, message=repr(e))
  227. def token_required(func):
  228. @wraps(func)
  229. def decorated_function(*args, **kwargs):
  230. authorization_list=flask_request.headers.get('Authorization').split()
  231. if len(authorization_list) < 2:
  232. return get_json_result(data=False,message="Please check your authorization format.")
  233. token = authorization_list[1]
  234. objs = APIToken.query(token=token)
  235. if not objs:
  236. return get_json_result(
  237. data=False, message='Token is not valid!', code=settings.RetCode.AUTHENTICATION_ERROR
  238. )
  239. kwargs['tenant_id'] = objs[0].tenant_id
  240. return func(*args, **kwargs)
  241. return decorated_function
  242. def get_result(code=settings.RetCode.SUCCESS, message="", data=None):
  243. if code == 0:
  244. if data is not None:
  245. response = {"code": code, "data": data}
  246. else:
  247. response = {"code": code}
  248. else:
  249. response = {"code": code, "message": message}
  250. return jsonify(response)
  251. def get_error_data_result(message='Sorry! Data missing!', code=settings.RetCode.DATA_ERROR,
  252. ):
  253. import re
  254. result_dict = {
  255. "code": code,
  256. "message": re.sub(
  257. r"rag",
  258. "seceum",
  259. message,
  260. flags=re.IGNORECASE)}
  261. response = {}
  262. for key, value in result_dict.items():
  263. if value is None and key != "code":
  264. continue
  265. else:
  266. response[key] = value
  267. return jsonify(response)
  268. def generate_confirmation_token(tenent_id):
  269. serializer = URLSafeTimedSerializer(tenent_id)
  270. return "ragflow-" + serializer.dumps(get_uuid(), salt=tenent_id)[2:34]
  271. def valid(permission,valid_permission,language,valid_language,chunk_method,valid_chunk_method):
  272. if valid_parameter(permission,valid_permission):
  273. return valid_parameter(permission,valid_permission)
  274. if valid_parameter(language,valid_language):
  275. return valid_parameter(language,valid_language)
  276. if valid_parameter(chunk_method,valid_chunk_method):
  277. return valid_parameter(chunk_method,valid_chunk_method)
  278. def valid_parameter(parameter,valid_values):
  279. if parameter and parameter not in valid_values:
  280. return get_error_data_result(f"'{parameter}' is not in {valid_values}")
  281. def get_parser_config(chunk_method,parser_config):
  282. if parser_config:
  283. return parser_config
  284. if not chunk_method:
  285. chunk_method = "naive"
  286. key_mapping={"naive":{"chunk_token_num": 128, "delimiter": "\\n!?;。;!?", "html4excel": False,"layout_recognize": True, "raptor": {"use_raptor": False}},
  287. "qa":{"raptor":{"use_raptor":False}},
  288. "resume":None,
  289. "manual":{"raptor":{"use_raptor":False}},
  290. "table":None,
  291. "paper":{"raptor":{"use_raptor":False}},
  292. "book":{"raptor":{"use_raptor":False}},
  293. "laws":{"raptor":{"use_raptor":False}},
  294. "presentation":{"raptor":{"use_raptor":False}},
  295. "one":None,
  296. "knowledge_graph":{"chunk_token_num":8192,"delimiter":"\\n!?;。;!?","entity_types":["organization","person","location","event","time"]},
  297. "email":None,
  298. "picture":None}
  299. parser_config=key_mapping[chunk_method]
  300. return parser_config