wraps.py 1.7 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162
  1. from base64 import b64encode
  2. from functools import wraps
  3. from hashlib import sha1
  4. from hmac import new as hmac_new
  5. from flask import abort, request
  6. from configs import dify_config
  7. from extensions.ext_database import db
  8. from models.model import EndUser
  9. def inner_api_only(view):
  10. @wraps(view)
  11. def decorated(*args, **kwargs):
  12. if not dify_config.INNER_API:
  13. abort(404)
  14. # get header 'X-Inner-Api-Key'
  15. inner_api_key = request.headers.get('X-Inner-Api-Key')
  16. if not inner_api_key or inner_api_key != dify_config.INNER_API_KEY:
  17. abort(404)
  18. return view(*args, **kwargs)
  19. return decorated
  20. def inner_api_user_auth(view):
  21. @wraps(view)
  22. def decorated(*args, **kwargs):
  23. if not dify_config.INNER_API:
  24. return view(*args, **kwargs)
  25. # get header 'X-Inner-Api-Key'
  26. authorization = request.headers.get('Authorization')
  27. if not authorization:
  28. return view(*args, **kwargs)
  29. parts = authorization.split(':')
  30. if len(parts) != 2:
  31. return view(*args, **kwargs)
  32. user_id, token = parts
  33. if ' ' in user_id:
  34. user_id = user_id.split(' ')[1]
  35. inner_api_key = request.headers.get('X-Inner-Api-Key')
  36. data_to_sign = f'DIFY {user_id}'
  37. signature = hmac_new(inner_api_key.encode('utf-8'), data_to_sign.encode('utf-8'), sha1)
  38. signature = b64encode(signature.digest()).decode('utf-8')
  39. if signature != token:
  40. return view(*args, **kwargs)
  41. kwargs['user'] = db.session.query(EndUser).filter(EndUser.id == user_id).first()
  42. return view(*args, **kwargs)
  43. return decorated