wraps.py 8.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227
  1. from collections.abc import Callable
  2. from datetime import datetime, timezone
  3. from enum import Enum
  4. from functools import wraps
  5. from typing import Optional
  6. from flask import current_app, request
  7. from flask_login import user_logged_in
  8. from flask_restful import Resource
  9. from pydantic import BaseModel
  10. from werkzeug.exceptions import Forbidden, NotFound, Unauthorized
  11. from extensions.ext_database import db
  12. from libs.login import _get_user
  13. from models.account import Account, Tenant, TenantAccountJoin, TenantStatus
  14. from models.model import ApiToken, App, EndUser
  15. from services.feature_service import FeatureService
  16. class WhereisUserArg(Enum):
  17. """
  18. Enum for whereis_user_arg.
  19. """
  20. QUERY = 'query'
  21. JSON = 'json'
  22. FORM = 'form'
  23. class FetchUserArg(BaseModel):
  24. fetch_from: WhereisUserArg
  25. required: bool = False
  26. def validate_app_token(view: Optional[Callable] = None, *, fetch_user_arg: Optional[FetchUserArg] = None):
  27. def decorator(view_func):
  28. @wraps(view_func)
  29. def decorated_view(*args, **kwargs):
  30. api_token = validate_and_get_api_token('app')
  31. app_model = db.session.query(App).filter(App.id == api_token.app_id).first()
  32. if not app_model:
  33. raise NotFound()
  34. if app_model.status != 'normal':
  35. raise NotFound()
  36. if not app_model.enable_api:
  37. raise NotFound()
  38. tenant = db.session.query(Tenant).filter(Tenant.id == app_model.tenant_id).first()
  39. if tenant.status == TenantStatus.ARCHIVE:
  40. raise NotFound()
  41. kwargs['app_model'] = app_model
  42. if fetch_user_arg:
  43. if fetch_user_arg.fetch_from == WhereisUserArg.QUERY:
  44. user_id = request.args.get('user')
  45. elif fetch_user_arg.fetch_from == WhereisUserArg.JSON:
  46. user_id = request.get_json().get('user')
  47. elif fetch_user_arg.fetch_from == WhereisUserArg.FORM:
  48. user_id = request.form.get('user')
  49. else:
  50. # use default-user
  51. user_id = None
  52. if not user_id and fetch_user_arg.required:
  53. raise ValueError("Arg user must be provided.")
  54. if user_id:
  55. user_id = str(user_id)
  56. kwargs['end_user'] = create_or_update_end_user_for_user_id(app_model, user_id)
  57. return view_func(*args, **kwargs)
  58. return decorated_view
  59. if view is None:
  60. return decorator
  61. else:
  62. return decorator(view)
  63. def cloud_edition_billing_resource_check(resource: str,
  64. api_token_type: str,
  65. error_msg: str = "You have reached the limit of your subscription."):
  66. def interceptor(view):
  67. def decorated(*args, **kwargs):
  68. api_token = validate_and_get_api_token(api_token_type)
  69. features = FeatureService.get_features(api_token.tenant_id)
  70. if features.billing.enabled:
  71. members = features.members
  72. apps = features.apps
  73. vector_space = features.vector_space
  74. documents_upload_quota = features.documents_upload_quota
  75. if resource == 'members' and 0 < members.limit <= members.size:
  76. raise Forbidden(error_msg)
  77. elif resource == 'apps' and 0 < apps.limit <= apps.size:
  78. raise Forbidden(error_msg)
  79. elif resource == 'vector_space' and 0 < vector_space.limit <= vector_space.size:
  80. raise Forbidden(error_msg)
  81. elif resource == 'documents' and 0 < documents_upload_quota.limit <= documents_upload_quota.size:
  82. raise Forbidden(error_msg)
  83. else:
  84. return view(*args, **kwargs)
  85. return view(*args, **kwargs)
  86. return decorated
  87. return interceptor
  88. def cloud_edition_billing_knowledge_limit_check(resource: str,
  89. api_token_type: str,
  90. error_msg: str = "To unlock this feature and elevate your Dify experience, please upgrade to a paid plan."):
  91. def interceptor(view):
  92. @wraps(view)
  93. def decorated(*args, **kwargs):
  94. api_token = validate_and_get_api_token(api_token_type)
  95. features = FeatureService.get_features(api_token.tenant_id)
  96. if features.billing.enabled:
  97. if resource == 'add_segment':
  98. if features.billing.subscription.plan == 'sandbox':
  99. raise Forbidden(error_msg)
  100. else:
  101. return view(*args, **kwargs)
  102. return view(*args, **kwargs)
  103. return decorated
  104. return interceptor
  105. def validate_dataset_token(view=None):
  106. def decorator(view):
  107. @wraps(view)
  108. def decorated(*args, **kwargs):
  109. api_token = validate_and_get_api_token('dataset')
  110. tenant_account_join = db.session.query(Tenant, TenantAccountJoin) \
  111. .filter(Tenant.id == api_token.tenant_id) \
  112. .filter(TenantAccountJoin.tenant_id == Tenant.id) \
  113. .filter(TenantAccountJoin.role.in_(['owner'])) \
  114. .filter(Tenant.status == TenantStatus.NORMAL) \
  115. .one_or_none() # TODO: only owner information is required, so only one is returned.
  116. if tenant_account_join:
  117. tenant, ta = tenant_account_join
  118. account = Account.query.filter_by(id=ta.account_id).first()
  119. # Login admin
  120. if account:
  121. account.current_tenant = tenant
  122. current_app.login_manager._update_request_context_with_user(account)
  123. user_logged_in.send(current_app._get_current_object(), user=_get_user())
  124. else:
  125. raise Unauthorized("Tenant owner account does not exist.")
  126. else:
  127. raise Unauthorized("Tenant does not exist.")
  128. return view(api_token.tenant_id, *args, **kwargs)
  129. return decorated
  130. if view:
  131. return decorator(view)
  132. # if view is None, it means that the decorator is used without parentheses
  133. # use the decorator as a function for method_decorators
  134. return decorator
  135. def validate_and_get_api_token(scope=None):
  136. """
  137. Validate and get API token.
  138. """
  139. auth_header = request.headers.get('Authorization')
  140. if auth_header is None or ' ' not in auth_header:
  141. raise Unauthorized("Authorization header must be provided and start with 'Bearer'")
  142. auth_scheme, auth_token = auth_header.split(None, 1)
  143. auth_scheme = auth_scheme.lower()
  144. if auth_scheme != 'bearer':
  145. raise Unauthorized("Authorization scheme must be 'Bearer'")
  146. api_token = db.session.query(ApiToken).filter(
  147. ApiToken.token == auth_token,
  148. ApiToken.type == scope,
  149. ).first()
  150. if not api_token:
  151. raise Unauthorized("Access token is invalid")
  152. api_token.last_used_at = datetime.now(timezone.utc).replace(tzinfo=None)
  153. db.session.commit()
  154. return api_token
  155. def create_or_update_end_user_for_user_id(app_model: App, user_id: Optional[str] = None) -> EndUser:
  156. """
  157. Create or update session terminal based on user ID.
  158. """
  159. if not user_id:
  160. user_id = 'DEFAULT-USER'
  161. end_user = db.session.query(EndUser) \
  162. .filter(
  163. EndUser.tenant_id == app_model.tenant_id,
  164. EndUser.app_id == app_model.id,
  165. EndUser.session_id == user_id,
  166. EndUser.type == 'service_api'
  167. ).first()
  168. if end_user is None:
  169. end_user = EndUser(
  170. tenant_id=app_model.tenant_id,
  171. app_id=app_model.id,
  172. type='service_api',
  173. is_anonymous=True if user_id == 'DEFAULT-USER' else False,
  174. session_id=user_id
  175. )
  176. db.session.add(end_user)
  177. db.session.commit()
  178. return end_user
  179. class DatasetApiResource(Resource):
  180. method_decorators = [validate_dataset_token]