| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222 | from collections.abc import Callablefrom datetime import datetime, timezonefrom enum import Enumfrom functools import wrapsfrom typing import Optionalfrom flask import current_app, requestfrom flask_login import user_logged_infrom flask_restful import Resourcefrom pydantic import BaseModelfrom werkzeug.exceptions import Forbidden, NotFound, Unauthorizedfrom extensions.ext_database import dbfrom libs.login import _get_userfrom models.account import Account, Tenant, TenantAccountJoinfrom models.model import ApiToken, App, EndUserfrom services.feature_service import FeatureServiceclass WhereisUserArg(Enum):    """    Enum for whereis_user_arg.    """    QUERY = 'query'    JSON = 'json'    FORM = 'form'class FetchUserArg(BaseModel):    fetch_from: WhereisUserArg    required: bool = Falsedef validate_app_token(view: Optional[Callable] = None, *, fetch_user_arg: Optional[FetchUserArg] = None):    def decorator(view_func):        @wraps(view_func)        def decorated_view(*args, **kwargs):            api_token = validate_and_get_api_token('app')            app_model = db.session.query(App).filter(App.id == api_token.app_id).first()            if not app_model:                raise NotFound()            if app_model.status != 'normal':                raise NotFound()            if not app_model.enable_api:                raise NotFound()            kwargs['app_model'] = app_model            if fetch_user_arg:                if fetch_user_arg.fetch_from == WhereisUserArg.QUERY:                    user_id = request.args.get('user')                elif fetch_user_arg.fetch_from == WhereisUserArg.JSON:                    user_id = request.get_json().get('user')                elif fetch_user_arg.fetch_from == WhereisUserArg.FORM:                    user_id = request.form.get('user')                else:                    # use default-user                    user_id = None                if not user_id and fetch_user_arg.required:                    raise ValueError("Arg user must be provided.")                if user_id:                    user_id = str(user_id)                kwargs['end_user'] = create_or_update_end_user_for_user_id(app_model, user_id)            return view_func(*args, **kwargs)        return decorated_view    if view is None:        return decorator    else:        return decorator(view)def cloud_edition_billing_resource_check(resource: str,                                         api_token_type: str,                                         error_msg: str = "You have reached the limit of your subscription."):    def interceptor(view):        def decorated(*args, **kwargs):            api_token = validate_and_get_api_token(api_token_type)            features = FeatureService.get_features(api_token.tenant_id)            if features.billing.enabled:                members = features.members                apps = features.apps                vector_space = features.vector_space                documents_upload_quota = features.documents_upload_quota                if resource == 'members' and 0 < members.limit <= members.size:                    raise Forbidden(error_msg)                elif resource == 'apps' and 0 < apps.limit <= apps.size:                    raise Forbidden(error_msg)                elif resource == 'vector_space' and 0 < vector_space.limit <= vector_space.size:                    raise Forbidden(error_msg)                elif resource == 'documents' and 0 < documents_upload_quota.limit <= documents_upload_quota.size:                    raise Forbidden(error_msg)                else:                    return view(*args, **kwargs)            return view(*args, **kwargs)        return decorated    return interceptordef cloud_edition_billing_knowledge_limit_check(resource: str,                                                api_token_type: str,                                                error_msg: str = "To unlock this feature and elevate your Dify experience, please upgrade to a paid plan."):    def interceptor(view):        @wraps(view)        def decorated(*args, **kwargs):            api_token = validate_and_get_api_token(api_token_type)            features = FeatureService.get_features(api_token.tenant_id)            if features.billing.enabled:                if resource == 'add_segment':                    if features.billing.subscription.plan == 'sandbox':                        raise Forbidden(error_msg)                else:                    return view(*args, **kwargs)            return view(*args, **kwargs)        return decorated    return interceptordef validate_dataset_token(view=None):    def decorator(view):        @wraps(view)        def decorated(*args, **kwargs):            api_token = validate_and_get_api_token('dataset')            tenant_account_join = db.session.query(Tenant, TenantAccountJoin) \                .filter(Tenant.id == api_token.tenant_id) \                .filter(TenantAccountJoin.tenant_id == Tenant.id) \                .filter(TenantAccountJoin.role.in_(['owner'])) \                .one_or_none() # TODO: only owner information is required, so only one is returned.            if tenant_account_join:                tenant, ta = tenant_account_join                account = Account.query.filter_by(id=ta.account_id).first()                # Login admin                if account:                    account.current_tenant = tenant                    current_app.login_manager._update_request_context_with_user(account)                    user_logged_in.send(current_app._get_current_object(), user=_get_user())                else:                    raise Unauthorized("Tenant owner account does not exist.")            else:                raise Unauthorized("Tenant does not exist.")            return view(api_token.tenant_id, *args, **kwargs)        return decorated    if view:        return decorator(view)    # if view is None, it means that the decorator is used without parentheses    # use the decorator as a function for method_decorators    return decoratordef validate_and_get_api_token(scope=None):    """    Validate and get API token.    """    auth_header = request.headers.get('Authorization')    if auth_header is None or ' ' not in auth_header:        raise Unauthorized("Authorization header must be provided and start with 'Bearer'")    auth_scheme, auth_token = auth_header.split(None, 1)    auth_scheme = auth_scheme.lower()    if auth_scheme != 'bearer':        raise Unauthorized("Authorization scheme must be 'Bearer'")    api_token = db.session.query(ApiToken).filter(        ApiToken.token == auth_token,        ApiToken.type == scope,    ).first()    if not api_token:        raise Unauthorized("Access token is invalid")    api_token.last_used_at = datetime.now(timezone.utc).replace(tzinfo=None)    db.session.commit()    return api_tokendef create_or_update_end_user_for_user_id(app_model: App, user_id: Optional[str] = None) -> EndUser:    """    Create or update session terminal based on user ID.    """    if not user_id:        user_id = 'DEFAULT-USER'    end_user = db.session.query(EndUser) \        .filter(        EndUser.tenant_id == app_model.tenant_id,        EndUser.app_id == app_model.id,        EndUser.session_id == user_id,        EndUser.type == 'service_api'    ).first()    if end_user is None:        end_user = EndUser(            tenant_id=app_model.tenant_id,            app_id=app_model.id,            type='service_api',            is_anonymous=True if user_id == 'DEFAULT-USER' else False,            session_id=user_id        )        db.session.add(end_user)        db.session.commit()    return end_userclass DatasetApiResource(Resource):    method_decorators = [validate_dataset_token]
 |