endpoint.go 10.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336
  1. package service
  2. import (
  3. "bytes"
  4. "context"
  5. "encoding/hex"
  6. "fmt"
  7. "sync/atomic"
  8. "time"
  9. "github.com/gin-gonic/gin"
  10. "github.com/langgenius/dify-plugin-daemon/internal/core/dify_invocation"
  11. "github.com/langgenius/dify-plugin-daemon/internal/core/plugin_daemon"
  12. "github.com/langgenius/dify-plugin-daemon/internal/core/plugin_daemon/access_types"
  13. "github.com/langgenius/dify-plugin-daemon/internal/core/plugin_manager"
  14. "github.com/langgenius/dify-plugin-daemon/internal/core/session_manager"
  15. "github.com/langgenius/dify-plugin-daemon/internal/db"
  16. "github.com/langgenius/dify-plugin-daemon/internal/service/install_service"
  17. "github.com/langgenius/dify-plugin-daemon/internal/types/entities"
  18. "github.com/langgenius/dify-plugin-daemon/internal/types/entities/plugin_entities"
  19. "github.com/langgenius/dify-plugin-daemon/internal/types/entities/requests"
  20. "github.com/langgenius/dify-plugin-daemon/internal/types/models"
  21. "github.com/langgenius/dify-plugin-daemon/internal/utils/cache/helper"
  22. "github.com/langgenius/dify-plugin-daemon/internal/utils/encryption"
  23. "github.com/langgenius/dify-plugin-daemon/internal/utils/routine"
  24. )
  25. func Endpoint(
  26. ctx *gin.Context,
  27. endpoint *models.Endpoint,
  28. plugin_installation *models.PluginInstallation,
  29. path string,
  30. ) {
  31. if !endpoint.Enabled {
  32. ctx.JSON(404, gin.H{"error": "plugin not found"})
  33. return
  34. }
  35. req := ctx.Request.Clone(context.Background())
  36. req.URL.Path = path
  37. var buffer bytes.Buffer
  38. err := req.Write(&buffer)
  39. if err != nil {
  40. ctx.JSON(500, gin.H{"error": err.Error()})
  41. }
  42. identifier, err := plugin_entities.NewPluginUniqueIdentifier(plugin_installation.PluginUniqueIdentifier)
  43. if err != nil {
  44. ctx.JSON(400, gin.H{"error": "Invalid plugin identifier, " + err.Error()})
  45. return
  46. }
  47. // fetch plugin
  48. manager := plugin_manager.Manager()
  49. runtime := manager.Get(identifier)
  50. if runtime == nil {
  51. ctx.JSON(404, gin.H{"error": "plugin not found"})
  52. return
  53. }
  54. // fetch endpoint declaration
  55. endpoint_declaration := runtime.Configuration().Endpoint
  56. if endpoint_declaration == nil {
  57. ctx.JSON(404, gin.H{"error": "endpoint declaration not found"})
  58. return
  59. }
  60. // decrypt settings
  61. settings, err := manager.BackwardsInvocation().InvokeEncrypt(&dify_invocation.InvokeEncryptRequest{
  62. BaseInvokeDifyRequest: dify_invocation.BaseInvokeDifyRequest{
  63. TenantId: endpoint.TenantID,
  64. UserId: "",
  65. Type: dify_invocation.INVOKE_TYPE_ENCRYPT,
  66. },
  67. InvokeEncryptSchema: dify_invocation.InvokeEncryptSchema{
  68. Opt: dify_invocation.ENCRYPT_OPT_DECRYPT,
  69. Namespace: dify_invocation.ENCRYPT_NAMESPACE_ENDPOINT,
  70. Identity: endpoint.ID,
  71. Data: endpoint.Settings,
  72. Config: endpoint_declaration.Settings,
  73. },
  74. })
  75. if err != nil {
  76. ctx.JSON(500, gin.H{"error": "failed to decrypt data"})
  77. return
  78. }
  79. session := session_manager.NewSession(
  80. session_manager.NewSessionPayload{
  81. TenantID: endpoint.TenantID,
  82. UserID: "",
  83. PluginUniqueIdentifier: identifier,
  84. ClusterID: ctx.GetString("cluster_id"),
  85. InvokeFrom: access_types.PLUGIN_ACCESS_TYPE_ENDPOINT,
  86. Action: access_types.PLUGIN_ACCESS_ACTION_INVOKE_ENDPOINT,
  87. Declaration: runtime.Configuration(),
  88. BackwardsInvocation: manager.BackwardsInvocation(),
  89. IgnoreCache: false,
  90. },
  91. )
  92. defer session.Close(session_manager.CloseSessionPayload{
  93. IgnoreCache: false,
  94. })
  95. session.BindRuntime(runtime)
  96. status_code, headers, response, err := plugin_daemon.InvokeEndpoint(
  97. session, &requests.RequestInvokeEndpoint{
  98. RawHttpRequest: hex.EncodeToString(buffer.Bytes()),
  99. Settings: settings,
  100. },
  101. )
  102. if err != nil {
  103. ctx.JSON(500, gin.H{"error": err.Error()})
  104. return
  105. }
  106. defer response.Close()
  107. done := make(chan bool)
  108. closed := new(int32)
  109. ctx.Status(status_code)
  110. for k, v := range *headers {
  111. if len(v) > 0 {
  112. ctx.Writer.Header().Set(k, v[0])
  113. }
  114. }
  115. close := func() {
  116. if atomic.CompareAndSwapInt32(closed, 0, 1) {
  117. close(done)
  118. }
  119. }
  120. defer close()
  121. routine.Submit(func() {
  122. defer close()
  123. for response.Next() {
  124. chunk, err := response.Read()
  125. if err != nil {
  126. ctx.JSON(500, gin.H{"error": err.Error()})
  127. return
  128. }
  129. ctx.Writer.Write(chunk)
  130. ctx.Writer.Flush()
  131. }
  132. })
  133. select {
  134. case <-ctx.Writer.CloseNotify():
  135. case <-done:
  136. case <-time.After(240 * time.Second):
  137. ctx.JSON(500, gin.H{"error": "killed by timeout"})
  138. }
  139. }
  140. func EnableEndpoint(endpoint_id string, tenant_id string) *entities.Response {
  141. endpoint, err := db.GetOne[models.Endpoint](
  142. db.Equal("id", endpoint_id),
  143. db.Equal("tenant_id", tenant_id),
  144. )
  145. if err != nil {
  146. return entities.NewErrorResponse(-404, "Endpoint not found")
  147. }
  148. endpoint.Enabled = true
  149. if err := install_service.EnabledEndpoint(&endpoint); err != nil {
  150. return entities.NewErrorResponse(-500, "Failed to enable endpoint")
  151. }
  152. return entities.NewSuccessResponse(true)
  153. }
  154. func DisableEndpoint(endpoint_id string, tenant_id string) *entities.Response {
  155. endpoint, err := db.GetOne[models.Endpoint](
  156. db.Equal("id", endpoint_id),
  157. db.Equal("tenant_id", tenant_id),
  158. )
  159. if err != nil {
  160. return entities.NewErrorResponse(-404, "Endpoint not found")
  161. }
  162. endpoint.Enabled = false
  163. if err := install_service.DisabledEndpoint(&endpoint); err != nil {
  164. return entities.NewErrorResponse(-500, "Failed to disable endpoint")
  165. }
  166. return entities.NewSuccessResponse(true)
  167. }
  168. func ListEndpoints(tenant_id string, page int, page_size int) *entities.Response {
  169. endpoints, err := db.GetAll[models.Endpoint](
  170. db.Equal("tenant_id", tenant_id),
  171. db.OrderBy("created_at", true),
  172. db.Page(page, page_size),
  173. )
  174. if err != nil {
  175. return entities.NewErrorResponse(-500, fmt.Sprintf("failed to list endpoints: %v", err))
  176. }
  177. manager := plugin_manager.Manager()
  178. if manager == nil {
  179. return entities.NewErrorResponse(-500, "failed to get plugin manager")
  180. }
  181. // decrypt settings
  182. for i, endpoint := range endpoints {
  183. plugin_installation, err := db.GetOne[models.PluginInstallation](
  184. db.Equal("plugin_id", endpoint.PluginID),
  185. db.Equal("tenant_id", tenant_id),
  186. )
  187. if err != nil {
  188. return entities.NewErrorResponse(-404, fmt.Sprintf("failed to find plugin installation: %v", err))
  189. }
  190. plugin_unique_identifier, err := plugin_entities.NewPluginUniqueIdentifier(
  191. plugin_installation.PluginUniqueIdentifier,
  192. )
  193. if err != nil {
  194. return entities.NewErrorResponse(-500, fmt.Sprintf("failed to parse plugin unique identifier: %v", err))
  195. }
  196. plugin_declaration, err := helper.CombinedGetPluginDeclaration(plugin_unique_identifier)
  197. if err != nil {
  198. return entities.NewErrorResponse(-500, fmt.Sprintf("failed to get plugin declaration: %v", err))
  199. }
  200. if plugin_declaration.Endpoint == nil {
  201. return entities.NewErrorResponse(-404, "plugin does not have an endpoint")
  202. }
  203. decrypted_settings, err := manager.BackwardsInvocation().InvokeEncrypt(&dify_invocation.InvokeEncryptRequest{
  204. BaseInvokeDifyRequest: dify_invocation.BaseInvokeDifyRequest{
  205. TenantId: tenant_id,
  206. UserId: "",
  207. Type: dify_invocation.INVOKE_TYPE_ENCRYPT,
  208. },
  209. InvokeEncryptSchema: dify_invocation.InvokeEncryptSchema{
  210. Opt: dify_invocation.ENCRYPT_OPT_DECRYPT,
  211. Namespace: dify_invocation.ENCRYPT_NAMESPACE_ENDPOINT,
  212. Identity: endpoint.ID,
  213. Data: endpoint.Settings,
  214. Config: plugin_declaration.Endpoint.Settings,
  215. },
  216. })
  217. if err != nil {
  218. return entities.NewErrorResponse(-500, fmt.Sprintf("failed to decrypt settings: %v", err))
  219. }
  220. // mask settings
  221. decrypted_settings = encryption.MaskConfigCredentials(decrypted_settings, plugin_declaration.Endpoint.Settings)
  222. endpoint.Settings = decrypted_settings
  223. endpoint.Declaration = plugin_declaration.Endpoint
  224. endpoints[i] = endpoint
  225. }
  226. return entities.NewSuccessResponse(endpoints)
  227. }
  228. func ListPluginEndpoints(tenant_id string, plugin_id string, page int, page_size int) *entities.Response {
  229. endpoints, err := db.GetAll[models.Endpoint](
  230. db.Equal("plugin_id", plugin_id),
  231. db.Equal("tenant_id", tenant_id),
  232. db.OrderBy("created_at", true),
  233. db.Page(page, page_size),
  234. )
  235. if err != nil {
  236. return entities.NewErrorResponse(-500, fmt.Sprintf("failed to list endpoints: %v", err))
  237. }
  238. manager := plugin_manager.Manager()
  239. if manager == nil {
  240. return entities.NewErrorResponse(-500, "failed to get plugin manager")
  241. }
  242. // decrypt settings
  243. for i, endpoint := range endpoints {
  244. // get installation
  245. plugin_installation, err := db.GetOne[models.PluginInstallation](
  246. db.Equal("plugin_id", plugin_id),
  247. db.Equal("tenant_id", tenant_id),
  248. )
  249. if err != nil {
  250. return entities.NewErrorResponse(-404, fmt.Sprintf("failed to find plugin installation: %v", err))
  251. }
  252. plugin_unique_identifier, err := plugin_entities.NewPluginUniqueIdentifier(
  253. plugin_installation.PluginUniqueIdentifier,
  254. )
  255. if err != nil {
  256. return entities.NewErrorResponse(-500, fmt.Sprintf("failed to parse plugin unique identifier: %v", err))
  257. }
  258. plugin_declaration, err := helper.CombinedGetPluginDeclaration(plugin_unique_identifier)
  259. if err != nil {
  260. return entities.NewErrorResponse(-500, fmt.Sprintf("failed to get plugin declaration: %v", err))
  261. }
  262. decrypted_settings, err := manager.BackwardsInvocation().InvokeEncrypt(&dify_invocation.InvokeEncryptRequest{
  263. BaseInvokeDifyRequest: dify_invocation.BaseInvokeDifyRequest{
  264. TenantId: tenant_id,
  265. UserId: "",
  266. Type: dify_invocation.INVOKE_TYPE_ENCRYPT,
  267. },
  268. InvokeEncryptSchema: dify_invocation.InvokeEncryptSchema{
  269. Opt: dify_invocation.ENCRYPT_OPT_DECRYPT,
  270. Namespace: dify_invocation.ENCRYPT_NAMESPACE_ENDPOINT,
  271. Identity: endpoint.ID,
  272. Data: endpoint.Settings,
  273. Config: plugin_declaration.Endpoint.Settings,
  274. },
  275. })
  276. if err != nil {
  277. return entities.NewErrorResponse(-500, fmt.Sprintf("failed to decrypt settings: %v", err))
  278. }
  279. // mask settings
  280. decrypted_settings = encryption.MaskConfigCredentials(decrypted_settings, plugin_declaration.Endpoint.Settings)
  281. endpoint.Settings = decrypted_settings
  282. endpoint.Declaration = plugin_declaration.Endpoint
  283. endpoints[i] = endpoint
  284. }
  285. return entities.NewSuccessResponse(endpoints)
  286. }