| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280 | package serviceimport (	"errors"	"fmt"	"github.com/langgenius/dify-plugin-daemon/internal/core/dify_invocation"	"github.com/langgenius/dify-plugin-daemon/internal/core/plugin_manager"	"github.com/langgenius/dify-plugin-daemon/internal/db"	"github.com/langgenius/dify-plugin-daemon/internal/service/install_service"	"github.com/langgenius/dify-plugin-daemon/internal/types/exception"	"github.com/langgenius/dify-plugin-daemon/internal/types/models"	"github.com/langgenius/dify-plugin-daemon/internal/utils/cache/helper"	"github.com/langgenius/dify-plugin-daemon/internal/utils/encryption"	"github.com/langgenius/dify-plugin-daemon/pkg/entities"	"github.com/langgenius/dify-plugin-daemon/pkg/entities/plugin_entities")func SetupEndpoint(	tenant_id string,	user_id string,	pluginUniqueIdentifier plugin_entities.PluginUniqueIdentifier,	name string,	settings map[string]any,) *entities.Response {	// try find plugin installation	installation, err := db.GetOne[models.PluginInstallation](		db.Equal("tenant_id", tenant_id),		db.Equal("plugin_unique_identifier", pluginUniqueIdentifier.String()),	)	if err != nil {		return exception.ErrPluginNotFound().ToResponse()	}	// try get plugin	pluginDeclaration, err := helper.CombinedGetPluginDeclaration(		pluginUniqueIdentifier,		plugin_entities.PluginRuntimeType(installation.RuntimeType),	)	if err != nil {		return exception.ErrPluginNotFound().ToResponse()	}	if !pluginDeclaration.Resource.Permission.AllowRegisterEndpoint() {		return exception.PermissionDeniedError("permission denied, you need to enable endpoint access in plugin manifest").ToResponse()	}	if pluginDeclaration.Endpoint == nil {		return exception.BadRequestError(errors.New("plugin does not have an endpoint")).ToResponse()	}	// check settings	if err := plugin_entities.ValidateProviderConfigs(settings, pluginDeclaration.Endpoint.Settings); err != nil {		return exception.BadRequestError(fmt.Errorf("failed to validate settings: %v", err)).ToResponse()	}	endpoint, err := install_service.InstallEndpoint(		pluginUniqueIdentifier,		installation.ID,		tenant_id,		user_id,		name,		map[string]any{},	)	if err != nil {		return exception.InternalServerError(fmt.Errorf("failed to setup endpoint: %v", err)).ToResponse()	}	manager := plugin_manager.Manager()	if manager == nil {		return exception.InternalServerError(errors.New("failed to get plugin manager")).ToResponse()	}	// encrypt settings	encryptedSettings, err := manager.BackwardsInvocation().InvokeEncrypt(		&dify_invocation.InvokeEncryptRequest{			BaseInvokeDifyRequest: dify_invocation.BaseInvokeDifyRequest{				TenantId: tenant_id,				UserId:   user_id,				Type:     dify_invocation.INVOKE_TYPE_ENCRYPT,			},			InvokeEncryptSchema: dify_invocation.InvokeEncryptSchema{				Opt:       dify_invocation.ENCRYPT_OPT_ENCRYPT,				Namespace: dify_invocation.ENCRYPT_NAMESPACE_ENDPOINT,				Identity:  endpoint.ID,				Data:      settings,				Config:    pluginDeclaration.Endpoint.Settings,			},		},	)	if err != nil {		return exception.InternalServerError(fmt.Errorf("failed to encrypt settings: %v", err)).ToResponse()	}	if err := install_service.UpdateEndpoint(endpoint, name, encryptedSettings); err != nil {		return exception.InternalServerError(fmt.Errorf("failed to update endpoint: %v", err)).ToResponse()	}	return entities.NewSuccessResponse(true)}func RemoveEndpoint(endpoint_id string, tenant_id string) *entities.Response {	endpoint, err := db.GetOne[models.Endpoint](		db.Equal("id", endpoint_id),		db.Equal("tenant_id", tenant_id),	)	if err != nil {		return exception.NotFoundError(fmt.Errorf("failed to find endpoint: %v", err)).ToResponse()	}	err = install_service.UninstallEndpoint(&endpoint)	if err != nil {		return exception.InternalServerError(fmt.Errorf("failed to remove endpoint: %v", err)).ToResponse()	}	manager := plugin_manager.Manager()	if manager == nil {		return exception.InternalServerError(errors.New("failed to get plugin manager")).ToResponse()	}	// clear credentials cache	if _, err := manager.BackwardsInvocation().InvokeEncrypt(&dify_invocation.InvokeEncryptRequest{		BaseInvokeDifyRequest: dify_invocation.BaseInvokeDifyRequest{			TenantId: tenant_id,			UserId:   "",			Type:     dify_invocation.INVOKE_TYPE_ENCRYPT,		},		InvokeEncryptSchema: dify_invocation.InvokeEncryptSchema{			Opt:       dify_invocation.ENCRYPT_OPT_CLEAR,			Namespace: dify_invocation.ENCRYPT_NAMESPACE_ENDPOINT,			Identity:  endpoint.ID,		},	}); err != nil {		return exception.InternalServerError(fmt.Errorf("failed to clear credentials cache: %v", err)).ToResponse()	}	return entities.NewSuccessResponse(true)}func UpdateEndpoint(endpoint_id string, tenant_id string, user_id string, name string, settings map[string]any) *entities.Response {	// get endpoint	endpoint, err := db.GetOne[models.Endpoint](		db.Equal("id", endpoint_id),		db.Equal("tenant_id", tenant_id),	)	if err != nil {		return exception.NotFoundError(fmt.Errorf("failed to find endpoint: %v", err)).ToResponse()	}	// get plugin installation	installation, err := db.GetOne[models.PluginInstallation](		db.Equal("plugin_id", endpoint.PluginID),		db.Equal("tenant_id", tenant_id),	)	if err != nil {		return exception.NotFoundError(fmt.Errorf("failed to find plugin installation: %v", err)).ToResponse()	}	pluginUniqueIdentifier, err := plugin_entities.NewPluginUniqueIdentifier(		installation.PluginUniqueIdentifier,	)	if err != nil {		return exception.UniqueIdentifierError(fmt.Errorf("failed to parse plugin unique identifier: %v", err)).ToResponse()	}	// get plugin	pluginDeclaration, err := helper.CombinedGetPluginDeclaration(		pluginUniqueIdentifier,		plugin_entities.PluginRuntimeType(installation.RuntimeType),	)	if err != nil {		return exception.ErrPluginNotFound().ToResponse()	}	if pluginDeclaration.Endpoint == nil {		return exception.BadRequestError(errors.New("plugin does not have an endpoint")).ToResponse()	}	// decrypt original settings	manager := plugin_manager.Manager()	if manager == nil {		return exception.InternalServerError(errors.New("failed to get plugin manager")).ToResponse()	}	originalSettings, err := manager.BackwardsInvocation().InvokeEncrypt(		&dify_invocation.InvokeEncryptRequest{			BaseInvokeDifyRequest: dify_invocation.BaseInvokeDifyRequest{				TenantId: tenant_id,				UserId:   user_id,				Type:     dify_invocation.INVOKE_TYPE_ENCRYPT,			},			InvokeEncryptSchema: dify_invocation.InvokeEncryptSchema{				Opt:       dify_invocation.ENCRYPT_OPT_DECRYPT,				Namespace: dify_invocation.ENCRYPT_NAMESPACE_ENDPOINT,				Identity:  endpoint.ID,				Data:      endpoint.Settings,				Config:    pluginDeclaration.Endpoint.Settings,			},		},	)	if err != nil {		return exception.InternalServerError(fmt.Errorf("failed to decrypt settings: %v", err)).ToResponse()	}	maskedSettings := encryption.MaskConfigCredentials(originalSettings, pluginDeclaration.Endpoint.Settings)	// check if settings is changed, replace the value is the same as masked_settings	for settingName, value := range settings {		// skip it if the value is not secret-input		found := false		for _, config := range pluginDeclaration.Endpoint.Settings {			if config.Name == settingName && config.Type == plugin_entities.CONFIG_TYPE_SECRET_INPUT {				found = true				break			}		}		if !found {			continue		}		if maskedSettings[settingName] == value {			settings[settingName] = originalSettings[settingName]		}	}	// check settings	if err := plugin_entities.ValidateProviderConfigs(settings, pluginDeclaration.Endpoint.Settings); err != nil {		return exception.BadRequestError(fmt.Errorf("failed to validate settings: %v", err)).ToResponse()	}	// encrypt settings	encryptedSettings, err := manager.BackwardsInvocation().InvokeEncrypt(		&dify_invocation.InvokeEncryptRequest{			BaseInvokeDifyRequest: dify_invocation.BaseInvokeDifyRequest{				TenantId: tenant_id,				UserId:   user_id,				Type:     dify_invocation.INVOKE_TYPE_ENCRYPT,			},			InvokeEncryptSchema: dify_invocation.InvokeEncryptSchema{				Opt:       dify_invocation.ENCRYPT_OPT_ENCRYPT,				Namespace: dify_invocation.ENCRYPT_NAMESPACE_ENDPOINT,				Identity:  endpoint.ID,				Data:      settings,				Config:    pluginDeclaration.Endpoint.Settings,			},		},	)	if err != nil {		return exception.InternalServerError(fmt.Errorf("failed to encrypt settings: %v", err)).ToResponse()	}	// update endpoint	if err := install_service.UpdateEndpoint(&endpoint, name, encryptedSettings); err != nil {		return exception.InternalServerError(fmt.Errorf("failed to update endpoint: %v", err)).ToResponse()	}	// clear credentials cache	if _, err := manager.BackwardsInvocation().InvokeEncrypt(&dify_invocation.InvokeEncryptRequest{		BaseInvokeDifyRequest: dify_invocation.BaseInvokeDifyRequest{			TenantId: tenant_id,			UserId:   user_id,			Type:     dify_invocation.INVOKE_TYPE_ENCRYPT,		},		InvokeEncryptSchema: dify_invocation.InvokeEncryptSchema{			Opt:       dify_invocation.ENCRYPT_OPT_CLEAR,			Namespace: dify_invocation.ENCRYPT_NAMESPACE_ENDPOINT,			Identity:  endpoint.ID,			Data:      settings,			Config:    pluginDeclaration.Endpoint.Settings,		},	}); err != nil {		return exception.InternalServerError(fmt.Errorf("failed to clear credentials cache: %v", err)).ToResponse()	}	return entities.NewSuccessResponse(true)}
 |