wraps.py 1.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263
  1. from base64 import b64encode
  2. from functools import wraps
  3. from hashlib import sha1
  4. from hmac import new as hmac_new
  5. from flask import abort, request
  6. from configs import dify_config
  7. from extensions.ext_database import db
  8. from models.model import EndUser
  9. def inner_api_only(view):
  10. @wraps(view)
  11. def decorated(*args, **kwargs):
  12. if not dify_config.INNER_API:
  13. abort(404)
  14. # get header 'X-Inner-Api-Key'
  15. inner_api_key = request.headers.get("X-Inner-Api-Key")
  16. if not inner_api_key or inner_api_key != dify_config.INNER_API_KEY:
  17. abort(401)
  18. return view(*args, **kwargs)
  19. return decorated
  20. def inner_api_user_auth(view):
  21. @wraps(view)
  22. def decorated(*args, **kwargs):
  23. if not dify_config.INNER_API:
  24. return view(*args, **kwargs)
  25. # get header 'X-Inner-Api-Key'
  26. authorization = request.headers.get("Authorization")
  27. if not authorization:
  28. return view(*args, **kwargs)
  29. parts = authorization.split(":")
  30. if len(parts) != 2:
  31. return view(*args, **kwargs)
  32. user_id, token = parts
  33. if " " in user_id:
  34. user_id = user_id.split(" ")[1]
  35. inner_api_key = request.headers.get("X-Inner-Api-Key")
  36. data_to_sign = f"DIFY {user_id}"
  37. signature = hmac_new(inner_api_key.encode("utf-8"), data_to_sign.encode("utf-8"), sha1)
  38. signature = b64encode(signature.digest()).decode("utf-8")
  39. if signature != token:
  40. return view(*args, **kwargs)
  41. kwargs["user"] = db.session.query(EndUser).filter(EndUser.id == user_id).first()
  42. return view(*args, **kwargs)
  43. return decorated