wraps.py 4.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137
  1. # -*- coding:utf-8 -*-
  2. from datetime import datetime
  3. from functools import wraps
  4. from flask import current_app, request
  5. from flask_login import user_logged_in
  6. from flask_restful import Resource
  7. from werkzeug.exceptions import NotFound, Unauthorized
  8. from extensions.ext_database import db
  9. from libs.login import _get_user
  10. from models.account import Account, Tenant, TenantAccountJoin
  11. from models.model import ApiToken, App
  12. from services.feature_service import FeatureService
  13. def validate_app_token(view=None):
  14. def decorator(view):
  15. @wraps(view)
  16. def decorated(*args, **kwargs):
  17. api_token = validate_and_get_api_token('app')
  18. app_model = db.session.query(App).filter(App.id == api_token.app_id).first()
  19. if not app_model:
  20. raise NotFound()
  21. if app_model.status != 'normal':
  22. raise NotFound()
  23. if not app_model.enable_api:
  24. raise NotFound()
  25. return view(app_model, None, *args, **kwargs)
  26. return decorated
  27. if view:
  28. return decorator(view)
  29. # if view is None, it means that the decorator is used without parentheses
  30. # use the decorator as a function for method_decorators
  31. return decorator
  32. def cloud_edition_billing_resource_check(resource: str,
  33. api_token_type: str,
  34. error_msg: str = "You have reached the limit of your subscription."):
  35. def interceptor(view):
  36. def decorated(*args, **kwargs):
  37. api_token = validate_and_get_api_token(api_token_type)
  38. features = FeatureService.get_features(api_token.tenant_id)
  39. if features.billing.enabled:
  40. members = features.members
  41. apps = features.apps
  42. vector_space = features.vector_space
  43. if resource == 'members' and 0 < members.limit <= members.size:
  44. raise Unauthorized(error_msg)
  45. elif resource == 'apps' and 0 < apps.limit <= apps.size:
  46. raise Unauthorized(error_msg)
  47. elif resource == 'vector_space' and 0 < vector_space.limit <= vector_space.size:
  48. raise Unauthorized(error_msg)
  49. else:
  50. return view(*args, **kwargs)
  51. return view(*args, **kwargs)
  52. return decorated
  53. return interceptor
  54. def validate_dataset_token(view=None):
  55. def decorator(view):
  56. @wraps(view)
  57. def decorated(*args, **kwargs):
  58. api_token = validate_and_get_api_token('dataset')
  59. tenant_account_join = db.session.query(Tenant, TenantAccountJoin) \
  60. .filter(Tenant.id == api_token.tenant_id) \
  61. .filter(TenantAccountJoin.tenant_id == Tenant.id) \
  62. .filter(TenantAccountJoin.role.in_(['owner'])) \
  63. .one_or_none() # TODO: only owner information is required, so only one is returned.
  64. if tenant_account_join:
  65. tenant, ta = tenant_account_join
  66. account = Account.query.filter_by(id=ta.account_id).first()
  67. # Login admin
  68. if account:
  69. account.current_tenant = tenant
  70. current_app.login_manager._update_request_context_with_user(account)
  71. user_logged_in.send(current_app._get_current_object(), user=_get_user())
  72. else:
  73. raise Unauthorized("Tenant owner account does not exist.")
  74. else:
  75. raise Unauthorized("Tenant does not exist.")
  76. return view(api_token.tenant_id, *args, **kwargs)
  77. return decorated
  78. if view:
  79. return decorator(view)
  80. # if view is None, it means that the decorator is used without parentheses
  81. # use the decorator as a function for method_decorators
  82. return decorator
  83. def validate_and_get_api_token(scope=None):
  84. """
  85. Validate and get API token.
  86. """
  87. auth_header = request.headers.get('Authorization')
  88. if auth_header is None or ' ' not in auth_header:
  89. raise Unauthorized("Authorization header must be provided and start with 'Bearer'")
  90. auth_scheme, auth_token = auth_header.split(None, 1)
  91. auth_scheme = auth_scheme.lower()
  92. if auth_scheme != 'bearer':
  93. raise Unauthorized("Authorization scheme must be 'Bearer'")
  94. api_token = db.session.query(ApiToken).filter(
  95. ApiToken.token == auth_token,
  96. ApiToken.type == scope,
  97. ).first()
  98. if not api_token:
  99. raise Unauthorized("Access token is invalid")
  100. api_token.last_used_at = datetime.utcnow()
  101. db.session.commit()
  102. return api_token
  103. class AppApiResource(Resource):
  104. method_decorators = [validate_app_token]
  105. class DatasetApiResource(Resource):
  106. method_decorators = [validate_dataset_token]