1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374 |
- from flask_login import current_user
- from flask_restful import Resource, reqparse
- from werkzeug.exceptions import Forbidden
- from controllers.console import api
- from controllers.console.auth.error import ApiKeyAuthFailedError
- from libs.login import login_required
- from services.auth.api_key_auth_service import ApiKeyAuthService
- from ..setup import setup_required
- from ..wraps import account_initialization_required
- class ApiKeyAuthDataSource(Resource):
- @setup_required
- @login_required
- @account_initialization_required
- def get(self):
- data_source_api_key_bindings = ApiKeyAuthService.get_provider_auth_list(current_user.current_tenant_id)
- if data_source_api_key_bindings:
- return {
- "sources": [
- {
- "id": data_source_api_key_binding.id,
- "category": data_source_api_key_binding.category,
- "provider": data_source_api_key_binding.provider,
- "disabled": data_source_api_key_binding.disabled,
- "created_at": int(data_source_api_key_binding.created_at.timestamp()),
- "updated_at": int(data_source_api_key_binding.updated_at.timestamp()),
- }
- for data_source_api_key_binding in data_source_api_key_bindings
- ]
- }
- return {"sources": []}
- class ApiKeyAuthDataSourceBinding(Resource):
- @setup_required
- @login_required
- @account_initialization_required
- def post(self):
- # The role of the current user in the table must be admin or owner
- if not current_user.is_admin_or_owner:
- raise Forbidden()
- parser = reqparse.RequestParser()
- parser.add_argument("category", type=str, required=True, nullable=False, location="json")
- parser.add_argument("provider", type=str, required=True, nullable=False, location="json")
- parser.add_argument("credentials", type=dict, required=True, nullable=False, location="json")
- args = parser.parse_args()
- ApiKeyAuthService.validate_api_key_auth_args(args)
- try:
- ApiKeyAuthService.create_provider_auth(current_user.current_tenant_id, args)
- except Exception as e:
- raise ApiKeyAuthFailedError(str(e))
- return {"result": "success"}, 200
- class ApiKeyAuthDataSourceBindingDelete(Resource):
- @setup_required
- @login_required
- @account_initialization_required
- def delete(self, binding_id):
- # The role of the current user in the table must be admin or owner
- if not current_user.is_admin_or_owner:
- raise Forbidden()
- ApiKeyAuthService.delete_provider_auth(current_user.current_tenant_id, binding_id)
- return {"result": "success"}, 200
- api.add_resource(ApiKeyAuthDataSource, "/api-key-auth/data-source")
- api.add_resource(ApiKeyAuthDataSourceBinding, "/api-key-auth/data-source/binding")
- api.add_resource(ApiKeyAuthDataSourceBindingDelete, "/api-key-auth/data-source/<uuid:binding_id>")
|