Ви не можете вибрати більше 25 тем Теми мають розпочинатися з літери або цифри, можуть містити дефіси (-) і не повинні перевищувати 35 символів.

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302
  1. #
  2. # Copyright 2024 The InfiniFlow Authors. All Rights Reserved.
  3. #
  4. # Licensed under the Apache License, Version 2.0 (the "License");
  5. # you may not use this file except in compliance with the License.
  6. # You may obtain a copy of the License at
  7. #
  8. # http://www.apache.org/licenses/LICENSE-2.0
  9. #
  10. # Unless required by applicable law or agreed to in writing, software
  11. # distributed under the License is distributed on an "AS IS" BASIS,
  12. # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. # See the License for the specific language governing permissions and
  14. # limitations under the License.
  15. #
  16. import re
  17. from datetime import datetime
  18. from flask import request, session, redirect
  19. from werkzeug.security import generate_password_hash, check_password_hash
  20. from flask_login import login_required, current_user, login_user, logout_user
  21. from api.db.db_models import TenantLLM
  22. from api.db.services.llm_service import TenantLLMService, LLMService
  23. from api.utils.api_utils import server_error_response, validate_request
  24. from api.utils import get_uuid, get_format_time, decrypt, download_img, current_timestamp, datetime_format
  25. from api.db import UserTenantRole, LLMType
  26. from api.settings import RetCode, GITHUB_OAUTH, CHAT_MDL, EMBEDDING_MDL, ASR_MDL, IMAGE2TEXT_MDL, PARSERS, API_KEY, \
  27. LLM_FACTORY, LLM_BASE_URL
  28. from api.db.services.user_service import UserService, TenantService, UserTenantService
  29. from api.settings import stat_logger
  30. from api.utils.api_utils import get_json_result, cors_reponse
  31. @manager.route('/login', methods=['POST', 'GET'])
  32. def login():
  33. login_channel = "password"
  34. if not request.json:
  35. return get_json_result(data=False, retcode=RetCode.AUTHENTICATION_ERROR,
  36. retmsg='Unautherized!')
  37. email = request.json.get('email', "")
  38. users = UserService.query(email=email)
  39. if not users:
  40. return get_json_result(
  41. data=False, retcode=RetCode.AUTHENTICATION_ERROR, retmsg=f'This Email is not registered!')
  42. password = request.json.get('password')
  43. try:
  44. password = decrypt(password)
  45. except BaseException:
  46. return get_json_result(
  47. data=False, retcode=RetCode.SERVER_ERROR, retmsg='Fail to crypt password')
  48. user = UserService.query_user(email, password)
  49. if user:
  50. response_data = user.to_json()
  51. user.access_token = get_uuid()
  52. login_user(user)
  53. user.update_time = current_timestamp(),
  54. user.update_date = datetime_format(datetime.now()),
  55. user.save()
  56. msg = "Welcome back!"
  57. return cors_reponse(data=response_data, auth=user.get_id(), retmsg=msg)
  58. else:
  59. return get_json_result(data=False, retcode=RetCode.AUTHENTICATION_ERROR,
  60. retmsg='Email and Password do not match!')
  61. @manager.route('/github_callback', methods=['GET'])
  62. def github_callback():
  63. import requests
  64. res = requests.post(GITHUB_OAUTH.get("url"), data={
  65. "client_id": GITHUB_OAUTH.get("client_id"),
  66. "client_secret": GITHUB_OAUTH.get("secret_key"),
  67. "code": request.args.get('code')
  68. }, headers={"Accept": "application/json"})
  69. res = res.json()
  70. if "error" in res:
  71. return redirect("/?error=%s" % res["error_description"])
  72. if "user:email" not in res["scope"].split(","):
  73. return redirect("/?error=user:email not in scope")
  74. session["access_token"] = res["access_token"]
  75. session["access_token_from"] = "github"
  76. userinfo = user_info_from_github(session["access_token"])
  77. users = UserService.query(email=userinfo["email"])
  78. user_id = get_uuid()
  79. if not users:
  80. try:
  81. try:
  82. avatar = download_img(userinfo["avatar_url"])
  83. except Exception as e:
  84. stat_logger.exception(e)
  85. avatar = ""
  86. users = user_register(user_id, {
  87. "access_token": session["access_token"],
  88. "email": userinfo["email"],
  89. "avatar": avatar,
  90. "nickname": userinfo["login"],
  91. "login_channel": "github",
  92. "last_login_time": get_format_time(),
  93. "is_superuser": False,
  94. })
  95. if not users:
  96. raise Exception('Register user failure.')
  97. if len(users) > 1:
  98. raise Exception('Same E-mail exist!')
  99. user = users[0]
  100. login_user(user)
  101. return redirect("/?auth=%s" % user.get_id())
  102. except Exception as e:
  103. rollback_user_registration(user_id)
  104. stat_logger.exception(e)
  105. return redirect("/?error=%s" % str(e))
  106. user = users[0]
  107. user.access_token = get_uuid()
  108. login_user(user)
  109. user.save()
  110. return redirect("/?auth=%s" % user.get_id())
  111. def user_info_from_github(access_token):
  112. import requests
  113. headers = {"Accept": "application/json",
  114. 'Authorization': f"token {access_token}"}
  115. res = requests.get(
  116. f"https://api.github.com/user?access_token={access_token}",
  117. headers=headers)
  118. user_info = res.json()
  119. email_info = requests.get(
  120. f"https://api.github.com/user/emails?access_token={access_token}",
  121. headers=headers).json()
  122. user_info["email"] = next(
  123. (email for email in email_info if email['primary'] == True),
  124. None)["email"]
  125. return user_info
  126. @manager.route("/logout", methods=['GET'])
  127. @login_required
  128. def log_out():
  129. current_user.access_token = ""
  130. current_user.save()
  131. logout_user()
  132. return get_json_result(data=True)
  133. @manager.route("/setting", methods=["POST"])
  134. @login_required
  135. def setting_user():
  136. update_dict = {}
  137. request_data = request.json
  138. if request_data.get("password"):
  139. new_password = request_data.get("new_password")
  140. if not check_password_hash(
  141. current_user.password, decrypt(request_data["password"])):
  142. return get_json_result(
  143. data=False, retcode=RetCode.AUTHENTICATION_ERROR, retmsg='Password error!')
  144. if new_password:
  145. update_dict["password"] = generate_password_hash(
  146. decrypt(new_password))
  147. for k in request_data.keys():
  148. if k in ["password", "new_password"]:
  149. continue
  150. update_dict[k] = request_data[k]
  151. try:
  152. UserService.update_by_id(current_user.id, update_dict)
  153. return get_json_result(data=True)
  154. except Exception as e:
  155. stat_logger.exception(e)
  156. return get_json_result(
  157. data=False, retmsg='Update failure!', retcode=RetCode.EXCEPTION_ERROR)
  158. @manager.route("/info", methods=["GET"])
  159. @login_required
  160. def user_info():
  161. return get_json_result(data=current_user.to_dict())
  162. def rollback_user_registration(user_id):
  163. try:
  164. UserService.delete_by_id(user_id)
  165. except Exception as e:
  166. pass
  167. try:
  168. TenantService.delete_by_id(user_id)
  169. except Exception as e:
  170. pass
  171. try:
  172. u = UserTenantService.query(tenant_id=user_id)
  173. if u:
  174. UserTenantService.delete_by_id(u[0].id)
  175. except Exception as e:
  176. pass
  177. try:
  178. TenantLLM.delete().where(TenantLLM.tenant_id == user_id).excute()
  179. except Exception as e:
  180. pass
  181. def user_register(user_id, user):
  182. user["id"] = user_id
  183. tenant = {
  184. "id": user_id,
  185. "name": user["nickname"] + "‘s Kingdom",
  186. "llm_id": CHAT_MDL,
  187. "embd_id": EMBEDDING_MDL,
  188. "asr_id": ASR_MDL,
  189. "parser_ids": PARSERS,
  190. "img2txt_id": IMAGE2TEXT_MDL
  191. }
  192. usr_tenant = {
  193. "tenant_id": user_id,
  194. "user_id": user_id,
  195. "invited_by": user_id,
  196. "role": UserTenantRole.OWNER
  197. }
  198. tenant_llm = []
  199. for llm in LLMService.query(fid=LLM_FACTORY):
  200. tenant_llm.append({"tenant_id": user_id,
  201. "llm_factory": LLM_FACTORY,
  202. "llm_name": llm.llm_name,
  203. "model_type": llm.model_type,
  204. "api_key": API_KEY,
  205. "api_base": LLM_BASE_URL
  206. })
  207. if not UserService.save(**user):
  208. return
  209. TenantService.insert(**tenant)
  210. UserTenantService.insert(**usr_tenant)
  211. TenantLLMService.insert_many(tenant_llm)
  212. return UserService.query(email=user["email"])
  213. @manager.route("/register", methods=["POST"])
  214. @validate_request("nickname", "email", "password")
  215. def user_add():
  216. req = request.json
  217. if UserService.query(email=req["email"]):
  218. return get_json_result(
  219. data=False, retmsg=f'Email: {req["email"]} has already registered!', retcode=RetCode.OPERATING_ERROR)
  220. if not re.match(r"^[\w\._-]+@([\w_-]+\.)+[\w-]{2,4}$", req["email"]):
  221. return get_json_result(data=False, retmsg=f'Invaliad e-mail: {req["email"]}!',
  222. retcode=RetCode.OPERATING_ERROR)
  223. user_dict = {
  224. "access_token": get_uuid(),
  225. "email": req["email"],
  226. "nickname": req["nickname"],
  227. "password": decrypt(req["password"]),
  228. "login_channel": "password",
  229. "last_login_time": get_format_time(),
  230. "is_superuser": False,
  231. }
  232. user_id = get_uuid()
  233. try:
  234. users = user_register(user_id, user_dict)
  235. if not users:
  236. raise Exception('Register user failure.')
  237. if len(users) > 1:
  238. raise Exception('Same E-mail exist!')
  239. user = users[0]
  240. login_user(user)
  241. return cors_reponse(data=user.to_json(),
  242. auth=user.get_id(), retmsg="Welcome aboard!")
  243. except Exception as e:
  244. rollback_user_registration(user_id)
  245. stat_logger.exception(e)
  246. return get_json_result(
  247. data=False, retmsg='User registration failure!', retcode=RetCode.EXCEPTION_ERROR)
  248. @manager.route("/tenant_info", methods=["GET"])
  249. @login_required
  250. def tenant_info():
  251. try:
  252. tenants = TenantService.get_by_user_id(current_user.id)[0]
  253. return get_json_result(data=tenants)
  254. except Exception as e:
  255. return server_error_response(e)
  256. @manager.route("/set_tenant_info", methods=["POST"])
  257. @login_required
  258. @validate_request("tenant_id", "asr_id", "embd_id", "img2txt_id", "llm_id")
  259. def set_tenant_info():
  260. req = request.json
  261. try:
  262. tid = req["tenant_id"]
  263. del req["tenant_id"]
  264. TenantService.update_by_id(tid, req)
  265. return get_json_result(data=True)
  266. except Exception as e:
  267. return server_error_response(e)