wraps.py 9.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253
  1. from collections.abc import Callable
  2. from datetime import UTC, datetime, timedelta
  3. from enum import Enum
  4. from functools import wraps
  5. from typing import Optional
  6. from flask import current_app, request
  7. from flask_login import user_logged_in # type: ignore
  8. from flask_restful import Resource # type: ignore
  9. from pydantic import BaseModel
  10. from sqlalchemy import select, update
  11. from sqlalchemy.orm import Session
  12. from werkzeug.exceptions import Forbidden, Unauthorized
  13. from extensions.ext_database import db
  14. from libs.login import _get_user
  15. from models.account import Account, Tenant, TenantAccountJoin, TenantStatus
  16. from models.model import ApiToken, App, EndUser
  17. from services.feature_service import FeatureService
  18. class WhereisUserArg(Enum):
  19. """
  20. Enum for whereis_user_arg.
  21. """
  22. QUERY = "query"
  23. JSON = "json"
  24. FORM = "form"
  25. class FetchUserArg(BaseModel):
  26. fetch_from: WhereisUserArg
  27. required: bool = False
  28. def validate_app_token(view: Optional[Callable] = None, *, fetch_user_arg: Optional[FetchUserArg] = None):
  29. def decorator(view_func):
  30. @wraps(view_func)
  31. def decorated_view(*args, **kwargs):
  32. api_token = validate_and_get_api_token("app")
  33. app_model = db.session.query(App).filter(App.id == api_token.app_id).first()
  34. if not app_model:
  35. raise Forbidden("The app no longer exists.")
  36. if app_model.status != "normal":
  37. raise Forbidden("The app's status is abnormal.")
  38. if not app_model.enable_api:
  39. raise Forbidden("The app's API service has been disabled.")
  40. tenant = db.session.query(Tenant).filter(Tenant.id == app_model.tenant_id).first()
  41. if tenant is None:
  42. raise ValueError("Tenant does not exist.")
  43. if tenant.status == TenantStatus.ARCHIVE:
  44. raise Forbidden("The workspace's status is archived.")
  45. kwargs["app_model"] = app_model
  46. if fetch_user_arg:
  47. if fetch_user_arg.fetch_from == WhereisUserArg.QUERY:
  48. user_id = request.args.get("user")
  49. elif fetch_user_arg.fetch_from == WhereisUserArg.JSON:
  50. user_id = request.get_json().get("user")
  51. elif fetch_user_arg.fetch_from == WhereisUserArg.FORM:
  52. user_id = request.form.get("user")
  53. else:
  54. # use default-user
  55. user_id = None
  56. if not user_id and fetch_user_arg.required:
  57. raise ValueError("Arg user must be provided.")
  58. if user_id:
  59. user_id = str(user_id)
  60. kwargs["end_user"] = create_or_update_end_user_for_user_id(app_model, user_id)
  61. return view_func(*args, **kwargs)
  62. return decorated_view
  63. if view is None:
  64. return decorator
  65. else:
  66. return decorator(view)
  67. def cloud_edition_billing_resource_check(resource: str, api_token_type: str):
  68. def interceptor(view):
  69. def decorated(*args, **kwargs):
  70. api_token = validate_and_get_api_token(api_token_type)
  71. features = FeatureService.get_features(api_token.tenant_id)
  72. if features.billing.enabled:
  73. members = features.members
  74. apps = features.apps
  75. vector_space = features.vector_space
  76. documents_upload_quota = features.documents_upload_quota
  77. if resource == "members" and 0 < members.limit <= members.size:
  78. raise Forbidden("The number of members has reached the limit of your subscription.")
  79. elif resource == "apps" and 0 < apps.limit <= apps.size:
  80. raise Forbidden("The number of apps has reached the limit of your subscription.")
  81. elif resource == "vector_space" and 0 < vector_space.limit <= vector_space.size:
  82. raise Forbidden("The capacity of the vector space has reached the limit of your subscription.")
  83. elif resource == "documents" and 0 < documents_upload_quota.limit <= documents_upload_quota.size:
  84. raise Forbidden("The number of documents has reached the limit of your subscription.")
  85. else:
  86. return view(*args, **kwargs)
  87. return view(*args, **kwargs)
  88. return decorated
  89. return interceptor
  90. def cloud_edition_billing_knowledge_limit_check(resource: str, api_token_type: str):
  91. def interceptor(view):
  92. @wraps(view)
  93. def decorated(*args, **kwargs):
  94. api_token = validate_and_get_api_token(api_token_type)
  95. features = FeatureService.get_features(api_token.tenant_id)
  96. if features.billing.enabled:
  97. if resource == "add_segment":
  98. if features.billing.subscription.plan == "sandbox":
  99. raise Forbidden(
  100. "To unlock this feature and elevate your Dify experience, please upgrade to a paid plan."
  101. )
  102. else:
  103. return view(*args, **kwargs)
  104. return view(*args, **kwargs)
  105. return decorated
  106. return interceptor
  107. def validate_dataset_token(view=None):
  108. def decorator(view):
  109. @wraps(view)
  110. def decorated(*args, **kwargs):
  111. api_token = validate_and_get_api_token("dataset")
  112. tenant_account_join = (
  113. db.session.query(Tenant, TenantAccountJoin)
  114. .filter(Tenant.id == api_token.tenant_id)
  115. .filter(TenantAccountJoin.tenant_id == Tenant.id)
  116. .filter(TenantAccountJoin.role.in_(["owner"]))
  117. .filter(Tenant.status == TenantStatus.NORMAL)
  118. .one_or_none()
  119. ) # TODO: only owner information is required, so only one is returned.
  120. if tenant_account_join:
  121. tenant, ta = tenant_account_join
  122. account = Account.query.filter_by(id=ta.account_id).first()
  123. # Login admin
  124. if account:
  125. account.current_tenant = tenant
  126. current_app.login_manager._update_request_context_with_user(account) # type: ignore
  127. user_logged_in.send(current_app._get_current_object(), user=_get_user()) # type: ignore
  128. else:
  129. raise Unauthorized("Tenant owner account does not exist.")
  130. else:
  131. raise Unauthorized("Tenant does not exist.")
  132. return view(api_token.tenant_id, *args, **kwargs)
  133. return decorated
  134. if view:
  135. return decorator(view)
  136. # if view is None, it means that the decorator is used without parentheses
  137. # use the decorator as a function for method_decorators
  138. return decorator
  139. def validate_and_get_api_token(scope: str | None = None):
  140. """
  141. Validate and get API token.
  142. """
  143. auth_header = request.headers.get("Authorization")
  144. if auth_header is None or " " not in auth_header:
  145. raise Unauthorized("Authorization header must be provided and start with 'Bearer'")
  146. auth_scheme, auth_token = auth_header.split(None, 1)
  147. auth_scheme = auth_scheme.lower()
  148. if auth_scheme != "bearer":
  149. raise Unauthorized("Authorization scheme must be 'Bearer'")
  150. current_time = datetime.now(UTC).replace(tzinfo=None)
  151. cutoff_time = current_time - timedelta(minutes=1)
  152. with Session(db.engine, expire_on_commit=False) as session:
  153. update_stmt = (
  154. update(ApiToken)
  155. .where(
  156. ApiToken.token == auth_token,
  157. (ApiToken.last_used_at.is_(None) | (ApiToken.last_used_at < cutoff_time)),
  158. ApiToken.type == scope,
  159. )
  160. .values(last_used_at=current_time)
  161. .returning(ApiToken)
  162. )
  163. result = session.execute(update_stmt)
  164. api_token = result.scalar_one_or_none()
  165. if not api_token:
  166. stmt = select(ApiToken).where(ApiToken.token == auth_token, ApiToken.type == scope)
  167. api_token = session.scalar(stmt)
  168. if not api_token:
  169. raise Unauthorized("Access token is invalid")
  170. else:
  171. session.commit()
  172. return api_token
  173. def create_or_update_end_user_for_user_id(app_model: App, user_id: Optional[str] = None) -> EndUser:
  174. """
  175. Create or update session terminal based on user ID.
  176. """
  177. if not user_id:
  178. user_id = "DEFAULT-USER"
  179. end_user = (
  180. db.session.query(EndUser)
  181. .filter(
  182. EndUser.tenant_id == app_model.tenant_id,
  183. EndUser.app_id == app_model.id,
  184. EndUser.session_id == user_id,
  185. EndUser.type == "service_api",
  186. )
  187. .first()
  188. )
  189. if end_user is None:
  190. end_user = EndUser(
  191. tenant_id=app_model.tenant_id,
  192. app_id=app_model.id,
  193. type="service_api",
  194. is_anonymous=user_id == "DEFAULT-USER",
  195. session_id=user_id,
  196. )
  197. db.session.add(end_user)
  198. db.session.commit()
  199. return end_user
  200. class DatasetApiResource(Resource):
  201. method_decorators = [validate_dataset_token]