| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227 | 
							- from collections.abc import Callable
 
- from datetime import datetime, timezone
 
- from enum import Enum
 
- from functools import wraps
 
- from typing import Optional
 
- from flask import current_app, request
 
- from flask_login import user_logged_in
 
- from flask_restful import Resource
 
- from pydantic import BaseModel
 
- from werkzeug.exceptions import Forbidden, Unauthorized
 
- from extensions.ext_database import db
 
- from libs.login import _get_user
 
- from models.account import Account, Tenant, TenantAccountJoin, TenantStatus
 
- from models.model import ApiToken, App, EndUser
 
- from services.feature_service import FeatureService
 
- class WhereisUserArg(Enum):
 
-     """
 
-     Enum for whereis_user_arg.
 
-     """
 
-     QUERY = 'query'
 
-     JSON = 'json'
 
-     FORM = 'form'
 
- class FetchUserArg(BaseModel):
 
-     fetch_from: WhereisUserArg
 
-     required: bool = False
 
- def validate_app_token(view: Optional[Callable] = None, *, fetch_user_arg: Optional[FetchUserArg] = None):
 
-     def decorator(view_func):
 
-         @wraps(view_func)
 
-         def decorated_view(*args, **kwargs):
 
-             api_token = validate_and_get_api_token('app')
 
-             app_model = db.session.query(App).filter(App.id == api_token.app_id).first()
 
-             if not app_model:
 
-                 raise Forbidden("The app no longer exists.")
 
-             if app_model.status != 'normal':
 
-                 raise Forbidden("The app's status is abnormal.")
 
-             if not app_model.enable_api:
 
-                 raise Forbidden("The app's API service has been disabled.")
 
-             tenant = db.session.query(Tenant).filter(Tenant.id == app_model.tenant_id).first()
 
-             if tenant.status == TenantStatus.ARCHIVE:
 
-                 raise Forbidden("The workspace's status is archived.")
 
-             kwargs['app_model'] = app_model
 
-             if fetch_user_arg:
 
-                 if fetch_user_arg.fetch_from == WhereisUserArg.QUERY:
 
-                     user_id = request.args.get('user')
 
-                 elif fetch_user_arg.fetch_from == WhereisUserArg.JSON:
 
-                     user_id = request.get_json().get('user')
 
-                 elif fetch_user_arg.fetch_from == WhereisUserArg.FORM:
 
-                     user_id = request.form.get('user')
 
-                 else:
 
-                     # use default-user
 
-                     user_id = None
 
-                 if not user_id and fetch_user_arg.required:
 
-                     raise ValueError("Arg user must be provided.")
 
-                 if user_id:
 
-                     user_id = str(user_id)
 
-                 kwargs['end_user'] = create_or_update_end_user_for_user_id(app_model, user_id)
 
-             return view_func(*args, **kwargs)
 
-         return decorated_view
 
-     if view is None:
 
-         return decorator
 
-     else:
 
-         return decorator(view)
 
- def cloud_edition_billing_resource_check(resource: str,
 
-                                          api_token_type: str,
 
-                                          error_msg: str = "You have reached the limit of your subscription."):
 
-     def interceptor(view):
 
-         def decorated(*args, **kwargs):
 
-             api_token = validate_and_get_api_token(api_token_type)
 
-             features = FeatureService.get_features(api_token.tenant_id)
 
-             if features.billing.enabled:
 
-                 members = features.members
 
-                 apps = features.apps
 
-                 vector_space = features.vector_space
 
-                 documents_upload_quota = features.documents_upload_quota
 
-                 if resource == 'members' and 0 < members.limit <= members.size:
 
-                     raise Forbidden(error_msg)
 
-                 elif resource == 'apps' and 0 < apps.limit <= apps.size:
 
-                     raise Forbidden(error_msg)
 
-                 elif resource == 'vector_space' and 0 < vector_space.limit <= vector_space.size:
 
-                     raise Forbidden(error_msg)
 
-                 elif resource == 'documents' and 0 < documents_upload_quota.limit <= documents_upload_quota.size:
 
-                     raise Forbidden(error_msg)
 
-                 else:
 
-                     return view(*args, **kwargs)
 
-             return view(*args, **kwargs)
 
-         return decorated
 
-     return interceptor
 
- def cloud_edition_billing_knowledge_limit_check(resource: str,
 
-                                                 api_token_type: str,
 
-                                                 error_msg: str = "To unlock this feature and elevate your Dify experience, please upgrade to a paid plan."):
 
-     def interceptor(view):
 
-         @wraps(view)
 
-         def decorated(*args, **kwargs):
 
-             api_token = validate_and_get_api_token(api_token_type)
 
-             features = FeatureService.get_features(api_token.tenant_id)
 
-             if features.billing.enabled:
 
-                 if resource == 'add_segment':
 
-                     if features.billing.subscription.plan == 'sandbox':
 
-                         raise Forbidden(error_msg)
 
-                 else:
 
-                     return view(*args, **kwargs)
 
-             return view(*args, **kwargs)
 
-         return decorated
 
-     return interceptor
 
- def validate_dataset_token(view=None):
 
-     def decorator(view):
 
-         @wraps(view)
 
-         def decorated(*args, **kwargs):
 
-             api_token = validate_and_get_api_token('dataset')
 
-             tenant_account_join = db.session.query(Tenant, TenantAccountJoin) \
 
-                 .filter(Tenant.id == api_token.tenant_id) \
 
-                 .filter(TenantAccountJoin.tenant_id == Tenant.id) \
 
-                 .filter(TenantAccountJoin.role.in_(['owner'])) \
 
-                 .filter(Tenant.status == TenantStatus.NORMAL) \
 
-                 .one_or_none() # TODO: only owner information is required, so only one is returned.
 
-             if tenant_account_join:
 
-                 tenant, ta = tenant_account_join
 
-                 account = Account.query.filter_by(id=ta.account_id).first()
 
-                 # Login admin
 
-                 if account:
 
-                     account.current_tenant = tenant
 
-                     current_app.login_manager._update_request_context_with_user(account)
 
-                     user_logged_in.send(current_app._get_current_object(), user=_get_user())
 
-                 else:
 
-                     raise Unauthorized("Tenant owner account does not exist.")
 
-             else:
 
-                 raise Unauthorized("Tenant does not exist.")
 
-             return view(api_token.tenant_id, *args, **kwargs)
 
-         return decorated
 
-     if view:
 
-         return decorator(view)
 
-     # if view is None, it means that the decorator is used without parentheses
 
-     # use the decorator as a function for method_decorators
 
-     return decorator
 
- def validate_and_get_api_token(scope=None):
 
-     """
 
-     Validate and get API token.
 
-     """
 
-     auth_header = request.headers.get('Authorization')
 
-     if auth_header is None or ' ' not in auth_header:
 
-         raise Unauthorized("Authorization header must be provided and start with 'Bearer'")
 
-     auth_scheme, auth_token = auth_header.split(None, 1)
 
-     auth_scheme = auth_scheme.lower()
 
-     if auth_scheme != 'bearer':
 
-         raise Unauthorized("Authorization scheme must be 'Bearer'")
 
-     api_token = db.session.query(ApiToken).filter(
 
-         ApiToken.token == auth_token,
 
-         ApiToken.type == scope,
 
-     ).first()
 
-     if not api_token:
 
-         raise Unauthorized("Access token is invalid")
 
-     api_token.last_used_at = datetime.now(timezone.utc).replace(tzinfo=None)
 
-     db.session.commit()
 
-     return api_token
 
- def create_or_update_end_user_for_user_id(app_model: App, user_id: Optional[str] = None) -> EndUser:
 
-     """
 
-     Create or update session terminal based on user ID.
 
-     """
 
-     if not user_id:
 
-         user_id = 'DEFAULT-USER'
 
-     end_user = db.session.query(EndUser) \
 
-         .filter(
 
-         EndUser.tenant_id == app_model.tenant_id,
 
-         EndUser.app_id == app_model.id,
 
-         EndUser.session_id == user_id,
 
-         EndUser.type == 'service_api'
 
-     ).first()
 
-     if end_user is None:
 
-         end_user = EndUser(
 
-             tenant_id=app_model.tenant_id,
 
-             app_id=app_model.id,
 
-             type='service_api',
 
-             is_anonymous=True if user_id == 'DEFAULT-USER' else False,
 
-             session_id=user_id
 
-         )
 
-         db.session.add(end_user)
 
-         db.session.commit()
 
-     return end_user
 
- class DatasetApiResource(Resource):
 
-     method_decorators = [validate_dataset_token]
 
 
  |