Vous ne pouvez pas sélectionner plus de 25 sujets Les noms de sujets doivent commencer par une lettre ou un nombre, peuvent contenir des tirets ('-') et peuvent comporter jusqu'à 35 caractères.

api_utils.py 12KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361
  1. #
  2. # Copyright 2024 The InfiniFlow Authors. All Rights Reserved.
  3. #
  4. # Licensed under the Apache License, Version 2.0 (the "License");
  5. # you may not use this file except in compliance with the License.
  6. # You may obtain a copy of the License at
  7. #
  8. # http://www.apache.org/licenses/LICENSE-2.0
  9. #
  10. # Unless required by applicable law or agreed to in writing, software
  11. # distributed under the License is distributed on an "AS IS" BASIS,
  12. # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. # See the License for the specific language governing permissions and
  14. # limitations under the License.
  15. #
  16. import functools
  17. import json
  18. import random
  19. import time
  20. from base64 import b64encode
  21. from functools import wraps
  22. from hmac import HMAC
  23. from io import BytesIO
  24. from urllib.parse import quote, urlencode
  25. from uuid import uuid1
  26. import requests
  27. from flask import (
  28. Response, jsonify, send_file, make_response,
  29. request as flask_request,
  30. )
  31. from itsdangerous import URLSafeTimedSerializer
  32. from werkzeug.http import HTTP_STATUS_CODES
  33. from api.db.db_models import APIToken
  34. from api.settings import (
  35. REQUEST_MAX_WAIT_SEC, REQUEST_WAIT_SEC,
  36. stat_logger, CLIENT_AUTHENTICATION, HTTP_APP_KEY, SECRET_KEY
  37. )
  38. from api.settings import RetCode
  39. from api.utils import CustomJSONEncoder, get_uuid
  40. from api.utils import json_dumps
  41. requests.models.complexjson.dumps = functools.partial(
  42. json.dumps, cls=CustomJSONEncoder)
  43. def request(**kwargs):
  44. sess = requests.Session()
  45. stream = kwargs.pop('stream', sess.stream)
  46. timeout = kwargs.pop('timeout', None)
  47. kwargs['headers'] = {
  48. k.replace(
  49. '_',
  50. '-').upper(): v for k,
  51. v in kwargs.get(
  52. 'headers',
  53. {}).items()}
  54. prepped = requests.Request(**kwargs).prepare()
  55. if CLIENT_AUTHENTICATION and HTTP_APP_KEY and SECRET_KEY:
  56. timestamp = str(round(time() * 1000))
  57. nonce = str(uuid1())
  58. signature = b64encode(HMAC(SECRET_KEY.encode('ascii'), b'\n'.join([
  59. timestamp.encode('ascii'),
  60. nonce.encode('ascii'),
  61. HTTP_APP_KEY.encode('ascii'),
  62. prepped.path_url.encode('ascii'),
  63. prepped.body if kwargs.get('json') else b'',
  64. urlencode(
  65. sorted(
  66. kwargs['data'].items()),
  67. quote_via=quote,
  68. safe='-._~').encode('ascii')
  69. if kwargs.get('data') and isinstance(kwargs['data'], dict) else b'',
  70. ]), 'sha1').digest()).decode('ascii')
  71. prepped.headers.update({
  72. 'TIMESTAMP': timestamp,
  73. 'NONCE': nonce,
  74. 'APP-KEY': HTTP_APP_KEY,
  75. 'SIGNATURE': signature,
  76. })
  77. return sess.send(prepped, stream=stream, timeout=timeout)
  78. def get_exponential_backoff_interval(retries, full_jitter=False):
  79. """Calculate the exponential backoff wait time."""
  80. # Will be zero if factor equals 0
  81. countdown = min(REQUEST_MAX_WAIT_SEC, REQUEST_WAIT_SEC * (2 ** retries))
  82. # Full jitter according to
  83. # https://aws.amazon.com/blogs/architecture/exponential-backoff-and-jitter/
  84. if full_jitter:
  85. countdown = random.randrange(countdown + 1)
  86. # Adjust according to maximum wait time and account for negative values.
  87. return max(0, countdown)
  88. def get_data_error_result(retcode=RetCode.DATA_ERROR,
  89. retmsg='Sorry! Data missing!'):
  90. import re
  91. result_dict = {
  92. "retcode": retcode,
  93. "retmsg": re.sub(
  94. r"rag",
  95. "seceum",
  96. retmsg,
  97. flags=re.IGNORECASE)}
  98. response = {}
  99. for key, value in result_dict.items():
  100. if value is None and key != "retcode":
  101. continue
  102. else:
  103. response[key] = value
  104. return jsonify(response)
  105. def server_error_response(e):
  106. stat_logger.exception(e)
  107. try:
  108. if e.code == 401:
  109. return get_json_result(retcode=401, retmsg=repr(e))
  110. except BaseException:
  111. pass
  112. if len(e.args) > 1:
  113. return get_json_result(
  114. retcode=RetCode.EXCEPTION_ERROR, retmsg=repr(e.args[0]), data=e.args[1])
  115. if repr(e).find("index_not_found_exception") >= 0:
  116. return get_json_result(retcode=RetCode.EXCEPTION_ERROR,
  117. retmsg="No chunk found, please upload file and parse it.")
  118. return get_json_result(retcode=RetCode.EXCEPTION_ERROR, retmsg=repr(e))
  119. def error_response(response_code, retmsg=None):
  120. if retmsg is None:
  121. retmsg = HTTP_STATUS_CODES.get(response_code, 'Unknown Error')
  122. return Response(json.dumps({
  123. 'retmsg': retmsg,
  124. 'retcode': response_code,
  125. }), status=response_code, mimetype='application/json')
  126. def validate_request(*args, **kwargs):
  127. def wrapper(func):
  128. @wraps(func)
  129. def decorated_function(*_args, **_kwargs):
  130. input_arguments = flask_request.json or flask_request.form.to_dict()
  131. no_arguments = []
  132. error_arguments = []
  133. for arg in args:
  134. if arg not in input_arguments:
  135. no_arguments.append(arg)
  136. for k, v in kwargs.items():
  137. config_value = input_arguments.get(k, None)
  138. if config_value is None:
  139. no_arguments.append(k)
  140. elif isinstance(v, (tuple, list)):
  141. if config_value not in v:
  142. error_arguments.append((k, set(v)))
  143. elif config_value != v:
  144. error_arguments.append((k, v))
  145. if no_arguments or error_arguments:
  146. error_string = ""
  147. if no_arguments:
  148. error_string += "required argument are missing: {}; ".format(
  149. ",".join(no_arguments))
  150. if error_arguments:
  151. error_string += "required argument values: {}".format(
  152. ",".join(["{}={}".format(a[0], a[1]) for a in error_arguments]))
  153. return get_json_result(
  154. retcode=RetCode.ARGUMENT_ERROR, retmsg=error_string)
  155. return func(*_args, **_kwargs)
  156. return decorated_function
  157. return wrapper
  158. def is_localhost(ip):
  159. return ip in {'127.0.0.1', '::1', '[::1]', 'localhost'}
  160. def send_file_in_mem(data, filename):
  161. if not isinstance(data, (str, bytes)):
  162. data = json_dumps(data)
  163. if isinstance(data, str):
  164. data = data.encode('utf-8')
  165. f = BytesIO()
  166. f.write(data)
  167. f.seek(0)
  168. return send_file(f, as_attachment=True, attachment_filename=filename)
  169. def get_json_result(retcode=RetCode.SUCCESS, retmsg='success', data=None):
  170. response = {"retcode": retcode, "retmsg": retmsg, "data": data}
  171. return jsonify(response)
  172. def apikey_required(func):
  173. @wraps(func)
  174. def decorated_function(*args, **kwargs):
  175. token = flask_request.headers.get('Authorization').split()[1]
  176. objs = APIToken.query(token=token)
  177. if not objs:
  178. return build_error_result(
  179. error_msg='API-KEY is invalid!', retcode=RetCode.FORBIDDEN
  180. )
  181. kwargs['tenant_id'] = objs[0].tenant_id
  182. return func(*args, **kwargs)
  183. return decorated_function
  184. def build_error_result(retcode=RetCode.FORBIDDEN, error_msg='success'):
  185. response = {"error_code": retcode, "error_msg": error_msg}
  186. response = jsonify(response)
  187. response.status_code = retcode
  188. return response
  189. def construct_response(retcode=RetCode.SUCCESS,
  190. retmsg='success', data=None, auth=None):
  191. result_dict = {"retcode": retcode, "retmsg": retmsg, "data": data}
  192. response_dict = {}
  193. for key, value in result_dict.items():
  194. if value is None and key != "retcode":
  195. continue
  196. else:
  197. response_dict[key] = value
  198. response = make_response(jsonify(response_dict))
  199. if auth:
  200. response.headers["Authorization"] = auth
  201. response.headers["Access-Control-Allow-Origin"] = "*"
  202. response.headers["Access-Control-Allow-Method"] = "*"
  203. response.headers["Access-Control-Allow-Headers"] = "*"
  204. response.headers["Access-Control-Allow-Headers"] = "*"
  205. response.headers["Access-Control-Expose-Headers"] = "Authorization"
  206. return response
  207. def construct_result(code=RetCode.DATA_ERROR, message='data is missing'):
  208. import re
  209. result_dict = {"code": code, "message": re.sub(r"rag", "seceum", message, flags=re.IGNORECASE)}
  210. response = {}
  211. for key, value in result_dict.items():
  212. if value is None and key != "code":
  213. continue
  214. else:
  215. response[key] = value
  216. return jsonify(response)
  217. def construct_json_result(code=RetCode.SUCCESS, message='success', data=None):
  218. if data is None:
  219. return jsonify({"code": code, "message": message})
  220. else:
  221. return jsonify({"code": code, "message": message, "data": data})
  222. def construct_error_response(e):
  223. stat_logger.exception(e)
  224. try:
  225. if e.code == 401:
  226. return construct_json_result(code=RetCode.UNAUTHORIZED, message=repr(e))
  227. except BaseException:
  228. pass
  229. if len(e.args) > 1:
  230. return construct_json_result(code=RetCode.EXCEPTION_ERROR, message=repr(e.args[0]), data=e.args[1])
  231. if repr(e).find("index_not_found_exception") >= 0:
  232. return construct_json_result(code=RetCode.EXCEPTION_ERROR,
  233. message="No chunk found, please upload file and parse it.")
  234. return construct_json_result(code=RetCode.EXCEPTION_ERROR, message=repr(e))
  235. def token_required(func):
  236. @wraps(func)
  237. def decorated_function(*args, **kwargs):
  238. token = flask_request.headers.get('Authorization').split()[1]
  239. objs = APIToken.query(token=token)
  240. if not objs:
  241. return get_json_result(
  242. data=False, retmsg='Token is not valid!', retcode=RetCode.AUTHENTICATION_ERROR
  243. )
  244. kwargs['tenant_id'] = objs[0].tenant_id
  245. return func(*args, **kwargs)
  246. return decorated_function
  247. def get_result(retcode=RetCode.SUCCESS, retmsg='error', data=None):
  248. if retcode == 0:
  249. if data is not None:
  250. response = {"code": retcode, "data": data}
  251. else:
  252. response = {"code": retcode}
  253. else:
  254. response = {"code": retcode, "message": retmsg}
  255. return jsonify(response)
  256. def get_error_data_result(retmsg='Sorry! Data missing!', retcode=RetCode.DATA_ERROR,
  257. ):
  258. import re
  259. result_dict = {
  260. "code": retcode,
  261. "message": re.sub(
  262. r"rag",
  263. "seceum",
  264. retmsg,
  265. flags=re.IGNORECASE)}
  266. response = {}
  267. for key, value in result_dict.items():
  268. if value is None and key != "code":
  269. continue
  270. else:
  271. response[key] = value
  272. return jsonify(response)
  273. def generate_confirmation_token(tenent_id):
  274. serializer = URLSafeTimedSerializer(tenent_id)
  275. return "ragflow-" + serializer.dumps(get_uuid(), salt=tenent_id)[2:34]
  276. def valid(permission,valid_permission,language,valid_language,chunk_method,valid_chunk_method):
  277. if valid_parameter(permission,valid_permission):
  278. return valid_parameter(permission,valid_permission)
  279. if valid_parameter(language,valid_language):
  280. return valid_parameter(language,valid_language)
  281. if valid_parameter(chunk_method,valid_chunk_method):
  282. return valid_parameter(chunk_method,valid_chunk_method)
  283. def valid_parameter(parameter,valid_values):
  284. if parameter and parameter not in valid_values:
  285. return get_error_data_result(f"'{parameter}' is not in {valid_values}")
  286. def get_parser_config(chunk_method,parser_config):
  287. if parser_config:
  288. return parser_config
  289. if not chunk_method:
  290. chunk_method = "naive"
  291. key_mapping={"naive":{"chunk_token_num": 128, "delimiter": "\\n!?;。;!?", "html4excel": False,"layout_recognize": True, "raptor": {"use_raptor": False}},
  292. "qa":{"raptor":{"use_raptor":False}},
  293. "resume":None,
  294. "manual":{"raptor":{"use_raptor":False}},
  295. "table":None,
  296. "paper":{"raptor":{"use_raptor":False}},
  297. "book":{"raptor":{"use_raptor":False}},
  298. "laws":{"raptor":{"use_raptor":False}},
  299. "presentation":{"raptor":{"use_raptor":False}},
  300. "one":None,
  301. "knowledge_graph":{"chunk_token_num":8192,"delimiter":"\\n!?;。;!?","entity_types":["organization","person","location","event","time"]},
  302. "email":None,
  303. "picture":None}
  304. parser_config=key_mapping[chunk_method]
  305. return parser_config