mirror of
https://github.com/infiniflow/ragflow.git
synced 2026-03-27 17:29:39 +08:00
### What problem does this PR solve? As title to be compatible with go server ### Type of change - [x] Bug Fix (non-breaking change which fixes an issue) Signed-off-by: Jin Hai <haijin.chn@gmail.com>
655 lines
20 KiB
Python
655 lines
20 KiB
Python
#
|
|
# Copyright 2025 The InfiniFlow Authors. All Rights Reserved.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
#
|
|
|
|
import secrets
|
|
import logging
|
|
from typing import Any
|
|
|
|
from common.time_utils import current_timestamp, datetime_format
|
|
from datetime import datetime
|
|
from flask import Blueprint, Response, request
|
|
from flask_login import current_user, login_required, logout_user
|
|
|
|
from auth import login_verify, login_admin, check_admin_auth
|
|
from responses import success_response, error_response
|
|
from services import UserMgr, ServiceMgr, UserServiceMgr, SettingsMgr, ConfigMgr, EnvironmentsMgr, SandboxMgr
|
|
from roles import RoleMgr
|
|
from api.common.exceptions import AdminException
|
|
from common.versions import get_ragflow_version
|
|
from api.utils.api_utils import generate_confirmation_token
|
|
|
|
admin_bp = Blueprint("admin", __name__, url_prefix="/api/v1/admin")
|
|
|
|
|
|
@admin_bp.route("/ping", methods=["GET"])
|
|
def ping():
|
|
return success_response(message="pong")
|
|
|
|
|
|
@admin_bp.route("/login", methods=["POST"])
|
|
def login():
|
|
if not request.json:
|
|
return error_response("Authorize admin failed.", 400)
|
|
try:
|
|
email = request.json.get("email", "")
|
|
password = request.json.get("password", "")
|
|
return login_admin(email, password)
|
|
except Exception as e:
|
|
return error_response(str(e), 500)
|
|
|
|
|
|
@admin_bp.route("/logout", methods=["GET"])
|
|
@login_required
|
|
def logout():
|
|
try:
|
|
current_user.access_token = f"INVALID_{secrets.token_hex(16)}"
|
|
current_user.save()
|
|
logout_user()
|
|
return success_response(True)
|
|
except Exception as e:
|
|
return error_response(str(e), 500)
|
|
|
|
|
|
@admin_bp.route("/auth", methods=["GET"])
|
|
@login_verify
|
|
def auth_admin():
|
|
try:
|
|
return success_response(None, "Admin is authorized", 0)
|
|
except Exception as e:
|
|
return error_response(str(e), 500)
|
|
|
|
|
|
@admin_bp.route("/users", methods=["GET"])
|
|
@login_required
|
|
@check_admin_auth
|
|
def list_users():
|
|
try:
|
|
users = UserMgr.get_all_users()
|
|
return success_response(users, "Get all users", 0)
|
|
except Exception as e:
|
|
return error_response(str(e), 500)
|
|
|
|
|
|
@admin_bp.route("/users", methods=["POST"])
|
|
@login_required
|
|
@check_admin_auth
|
|
def create_user():
|
|
try:
|
|
data = request.get_json()
|
|
if not data or "username" not in data or "password" not in data:
|
|
return error_response("Username and password are required", 400)
|
|
|
|
username = data["username"]
|
|
password = data["password"]
|
|
role = data.get("role", "user")
|
|
|
|
res = UserMgr.create_user(username, password, role)
|
|
if res["success"]:
|
|
user_info = res["user_info"]
|
|
user_info.pop("password") # do not return password
|
|
return success_response(user_info, "User created successfully")
|
|
else:
|
|
return error_response("create user failed")
|
|
|
|
except AdminException as e:
|
|
return error_response(e.message, e.code)
|
|
except Exception as e:
|
|
return error_response(str(e))
|
|
|
|
|
|
@admin_bp.route("/users/<username>", methods=["DELETE"])
|
|
@login_required
|
|
@check_admin_auth
|
|
def delete_user(username):
|
|
try:
|
|
res = UserMgr.delete_user(username)
|
|
if res["success"]:
|
|
return success_response(None, res["message"])
|
|
else:
|
|
return error_response(res["message"])
|
|
|
|
except AdminException as e:
|
|
return error_response(e.message, e.code)
|
|
except Exception as e:
|
|
return error_response(str(e), 500)
|
|
|
|
|
|
@admin_bp.route("/users/<username>/password", methods=["PUT"])
|
|
@login_required
|
|
@check_admin_auth
|
|
def change_password(username):
|
|
try:
|
|
data = request.get_json()
|
|
if not data or "new_password" not in data:
|
|
return error_response("New password is required", 400)
|
|
|
|
new_password = data["new_password"]
|
|
msg = UserMgr.update_user_password(username, new_password)
|
|
return success_response(None, msg)
|
|
|
|
except AdminException as e:
|
|
return error_response(e.message, e.code)
|
|
except Exception as e:
|
|
return error_response(str(e), 500)
|
|
|
|
|
|
@admin_bp.route("/users/<username>/activate", methods=["PUT"])
|
|
@login_required
|
|
@check_admin_auth
|
|
def alter_user_activate_status(username):
|
|
try:
|
|
data = request.get_json()
|
|
if not data or "activate_status" not in data:
|
|
return error_response("Activation status is required", 400)
|
|
activate_status = data["activate_status"]
|
|
msg = UserMgr.update_user_activate_status(username, activate_status)
|
|
return success_response(None, msg)
|
|
except AdminException as e:
|
|
return error_response(e.message, e.code)
|
|
except Exception as e:
|
|
return error_response(str(e), 500)
|
|
|
|
|
|
@admin_bp.route("/users/<username>/admin", methods=["PUT"])
|
|
@login_required
|
|
@check_admin_auth
|
|
def grant_admin(username):
|
|
try:
|
|
if current_user.email == username:
|
|
return error_response(f"can't grant current user: {username}", 409)
|
|
msg = UserMgr.grant_admin(username)
|
|
return success_response(None, msg)
|
|
|
|
except AdminException as e:
|
|
return error_response(e.message, e.code)
|
|
except Exception as e:
|
|
return error_response(str(e), 500)
|
|
|
|
|
|
@admin_bp.route("/users/<username>/admin", methods=["DELETE"])
|
|
@login_required
|
|
@check_admin_auth
|
|
def revoke_admin(username):
|
|
try:
|
|
if current_user.email == username:
|
|
return error_response(f"can't grant current user: {username}", 409)
|
|
msg = UserMgr.revoke_admin(username)
|
|
return success_response(None, msg)
|
|
|
|
except AdminException as e:
|
|
return error_response(e.message, e.code)
|
|
except Exception as e:
|
|
return error_response(str(e), 500)
|
|
|
|
|
|
@admin_bp.route("/users/<username>", methods=["GET"])
|
|
@login_required
|
|
@check_admin_auth
|
|
def get_user_details(username):
|
|
try:
|
|
user_details = UserMgr.get_user_details(username)
|
|
return success_response(user_details)
|
|
|
|
except AdminException as e:
|
|
return error_response(e.message, e.code)
|
|
except Exception as e:
|
|
return error_response(str(e), 500)
|
|
|
|
|
|
@admin_bp.route("/users/<username>/datasets", methods=["GET"])
|
|
@login_required
|
|
@check_admin_auth
|
|
def get_user_datasets(username):
|
|
try:
|
|
datasets_list = UserServiceMgr.get_user_datasets(username)
|
|
return success_response(datasets_list)
|
|
|
|
except AdminException as e:
|
|
return error_response(e.message, e.code)
|
|
except Exception as e:
|
|
return error_response(str(e), 500)
|
|
|
|
|
|
@admin_bp.route("/users/<username>/agents", methods=["GET"])
|
|
@login_required
|
|
@check_admin_auth
|
|
def get_user_agents(username):
|
|
try:
|
|
agents_list = UserServiceMgr.get_user_agents(username)
|
|
return success_response(agents_list)
|
|
|
|
except AdminException as e:
|
|
return error_response(e.message, e.code)
|
|
except Exception as e:
|
|
return error_response(str(e), 500)
|
|
|
|
|
|
@admin_bp.route("/services", methods=["GET"])
|
|
@login_required
|
|
@check_admin_auth
|
|
def get_services():
|
|
try:
|
|
services = ServiceMgr.get_all_services()
|
|
return success_response(services, "Get all services", 0)
|
|
except Exception as e:
|
|
return error_response(str(e), 500)
|
|
|
|
|
|
@admin_bp.route("/service_types/<service_type>", methods=["GET"])
|
|
@login_required
|
|
@check_admin_auth
|
|
def get_services_by_type(service_type_str):
|
|
try:
|
|
services = ServiceMgr.get_services_by_type(service_type_str)
|
|
return success_response(services)
|
|
except Exception as e:
|
|
return error_response(str(e), 500)
|
|
|
|
|
|
@admin_bp.route("/services/<service_id>", methods=["GET"])
|
|
@login_required
|
|
@check_admin_auth
|
|
def get_service(service_id):
|
|
try:
|
|
services = ServiceMgr.get_service_details(service_id)
|
|
return success_response(services)
|
|
except Exception as e:
|
|
return error_response(str(e), 500)
|
|
|
|
|
|
@admin_bp.route("/services/<service_id>", methods=["DELETE"])
|
|
@login_required
|
|
@check_admin_auth
|
|
def shutdown_service(service_id):
|
|
try:
|
|
services = ServiceMgr.shutdown_service(service_id)
|
|
return success_response(services)
|
|
except Exception as e:
|
|
return error_response(str(e), 500)
|
|
|
|
|
|
@admin_bp.route("/services/<service_id>", methods=["PUT"])
|
|
@login_required
|
|
@check_admin_auth
|
|
def restart_service(service_id):
|
|
try:
|
|
services = ServiceMgr.restart_service(service_id)
|
|
return success_response(services)
|
|
except Exception as e:
|
|
return error_response(str(e), 500)
|
|
|
|
|
|
@admin_bp.route("/roles", methods=["POST"])
|
|
@login_required
|
|
@check_admin_auth
|
|
def create_role():
|
|
try:
|
|
data = request.get_json()
|
|
if not data or "role_name" not in data:
|
|
return error_response("Role name is required", 400)
|
|
role_name: str = data["role_name"]
|
|
description: str = data["description"]
|
|
res = RoleMgr.create_role(role_name, description)
|
|
return success_response(res)
|
|
except Exception as e:
|
|
return error_response(str(e), 500)
|
|
|
|
|
|
@admin_bp.route("/roles/<role_name>", methods=["PUT"])
|
|
@login_required
|
|
@check_admin_auth
|
|
def update_role(role_name: str):
|
|
try:
|
|
data = request.get_json()
|
|
if not data or "description" not in data:
|
|
return error_response("Role description is required", 400)
|
|
description: str = data["description"]
|
|
res = RoleMgr.update_role_description(role_name, description)
|
|
return success_response(res)
|
|
except Exception as e:
|
|
return error_response(str(e), 500)
|
|
|
|
|
|
@admin_bp.route("/roles/<role_name>", methods=["DELETE"])
|
|
@login_required
|
|
@check_admin_auth
|
|
def delete_role(role_name: str):
|
|
try:
|
|
res = RoleMgr.delete_role(role_name)
|
|
return success_response(res)
|
|
except Exception as e:
|
|
return error_response(str(e), 500)
|
|
|
|
|
|
@admin_bp.route("/roles", methods=["GET"])
|
|
@login_required
|
|
@check_admin_auth
|
|
def list_roles():
|
|
try:
|
|
res = RoleMgr.list_roles()
|
|
return success_response(res)
|
|
except Exception as e:
|
|
return error_response(str(e), 500)
|
|
|
|
|
|
@admin_bp.route("/roles/<role_name>/permission", methods=["GET"])
|
|
@login_required
|
|
@check_admin_auth
|
|
def get_role_permission(role_name: str):
|
|
try:
|
|
res = RoleMgr.get_role_permission(role_name)
|
|
return success_response(res)
|
|
except Exception as e:
|
|
return error_response(str(e), 500)
|
|
|
|
|
|
@admin_bp.route("/roles/<role_name>/permission", methods=["POST"])
|
|
@login_required
|
|
@check_admin_auth
|
|
def grant_role_permission(role_name: str):
|
|
try:
|
|
data = request.get_json()
|
|
if not data or "actions" not in data or "resource" not in data:
|
|
return error_response("Permission is required", 400)
|
|
actions: list = data["actions"]
|
|
resource: str = data["resource"]
|
|
res = RoleMgr.grant_role_permission(role_name, actions, resource)
|
|
return success_response(res)
|
|
except Exception as e:
|
|
return error_response(str(e), 500)
|
|
|
|
|
|
@admin_bp.route("/roles/<role_name>/permission", methods=["DELETE"])
|
|
@login_required
|
|
@check_admin_auth
|
|
def revoke_role_permission(role_name: str):
|
|
try:
|
|
data = request.get_json()
|
|
if not data or "actions" not in data or "resource" not in data:
|
|
return error_response("Permission is required", 400)
|
|
actions: list = data["actions"]
|
|
resource: str = data["resource"]
|
|
res = RoleMgr.revoke_role_permission(role_name, actions, resource)
|
|
return success_response(res)
|
|
except Exception as e:
|
|
return error_response(str(e), 500)
|
|
|
|
|
|
@admin_bp.route("/users/<user_name>/role", methods=["PUT"])
|
|
@login_required
|
|
@check_admin_auth
|
|
def update_user_role(user_name: str):
|
|
try:
|
|
data = request.get_json()
|
|
if not data or "role_name" not in data:
|
|
return error_response("Role name is required", 400)
|
|
role_name: str = data["role_name"]
|
|
res = RoleMgr.update_user_role(user_name, role_name)
|
|
return success_response(res)
|
|
except Exception as e:
|
|
return error_response(str(e), 500)
|
|
|
|
|
|
@admin_bp.route("/users/<user_name>/permission", methods=["GET"])
|
|
@login_required
|
|
@check_admin_auth
|
|
def get_user_permission(user_name: str):
|
|
try:
|
|
res = RoleMgr.get_user_permission(user_name)
|
|
return success_response(res)
|
|
except Exception as e:
|
|
return error_response(str(e), 500)
|
|
|
|
|
|
@admin_bp.route("/variables", methods=["PUT"])
|
|
@login_required
|
|
@check_admin_auth
|
|
def set_variable():
|
|
try:
|
|
data = request.get_json()
|
|
if not data and "var_name" not in data:
|
|
return error_response("Var name is required", 400)
|
|
|
|
if "var_value" not in data:
|
|
return error_response("Var value is required", 400)
|
|
var_name: str = data["var_name"]
|
|
var_value: str = data["var_value"]
|
|
|
|
SettingsMgr.update_by_name(var_name, var_value)
|
|
return success_response(None, "Set variable successfully")
|
|
except AdminException as e:
|
|
return error_response(str(e), 400)
|
|
except Exception as e:
|
|
return error_response(str(e), 500)
|
|
|
|
|
|
@admin_bp.route("/variables", methods=["GET"])
|
|
@login_required
|
|
@check_admin_auth
|
|
def get_variable():
|
|
try:
|
|
if request.content_length is None or request.content_length == 0:
|
|
# list variables
|
|
res = list(SettingsMgr.get_all())
|
|
return success_response(res)
|
|
|
|
# get var
|
|
data = request.get_json()
|
|
if not data and "var_name" not in data:
|
|
return error_response("Var name is required", 400)
|
|
var_name: str = data["var_name"]
|
|
res = SettingsMgr.get_by_name(var_name)
|
|
return success_response(res)
|
|
except AdminException as e:
|
|
return error_response(str(e), 400)
|
|
except Exception as e:
|
|
return error_response(str(e), 500)
|
|
|
|
|
|
@admin_bp.route("/configs", methods=["GET"])
|
|
@login_required
|
|
@check_admin_auth
|
|
def get_config():
|
|
try:
|
|
res = list(ConfigMgr.get_all())
|
|
return success_response(res)
|
|
except AdminException as e:
|
|
return error_response(str(e), 400)
|
|
except Exception as e:
|
|
return error_response(str(e), 500)
|
|
|
|
|
|
@admin_bp.route("/environments", methods=["GET"])
|
|
@login_required
|
|
@check_admin_auth
|
|
def get_environments():
|
|
try:
|
|
res = list(EnvironmentsMgr.get_all())
|
|
return success_response(res)
|
|
except AdminException as e:
|
|
return error_response(str(e), 400)
|
|
except Exception as e:
|
|
return error_response(str(e), 500)
|
|
|
|
|
|
@admin_bp.route("/users/<username>/keys", methods=["POST"])
|
|
@login_required
|
|
@check_admin_auth
|
|
def generate_user_api_key(username: str) -> tuple[Response, int]:
|
|
try:
|
|
user_details: list[dict[str, Any]] = UserMgr.get_user_details(username)
|
|
if not user_details:
|
|
return error_response("User not found!", 404)
|
|
tenants: list[dict[str, Any]] = UserServiceMgr.get_user_tenants(username)
|
|
if not tenants:
|
|
return error_response("Tenant not found!", 404)
|
|
tenant_id: str = tenants[0]["tenant_id"]
|
|
key: str = generate_confirmation_token()
|
|
obj: dict[str, Any] = {
|
|
"tenant_id": tenant_id,
|
|
"token": key,
|
|
"beta": generate_confirmation_token().replace("ragflow-", "")[:32],
|
|
"create_time": current_timestamp(),
|
|
"create_date": datetime_format(datetime.now()),
|
|
"update_time": None,
|
|
"update_date": None,
|
|
}
|
|
|
|
if not UserMgr.save_api_key(obj):
|
|
return error_response("Failed to generate API key!", 500)
|
|
return success_response(obj, "API key generated successfully")
|
|
except AdminException as e:
|
|
return error_response(e.message, e.code)
|
|
except Exception as e:
|
|
return error_response(str(e), 500)
|
|
|
|
|
|
@admin_bp.route("/users/<username>/keys", methods=["GET"])
|
|
@login_required
|
|
@check_admin_auth
|
|
def get_user_api_keys(username: str) -> tuple[Response, int]:
|
|
try:
|
|
api_keys: list[dict[str, Any]] = UserMgr.get_user_api_key(username)
|
|
return success_response(api_keys, "Get user API keys")
|
|
except AdminException as e:
|
|
return error_response(e.message, e.code)
|
|
except Exception as e:
|
|
return error_response(str(e), 500)
|
|
|
|
|
|
@admin_bp.route("/users/<username>/keys/<key>", methods=["DELETE"])
|
|
@login_required
|
|
@check_admin_auth
|
|
def delete_user_api_key(username: str, key: str) -> tuple[Response, int]:
|
|
try:
|
|
deleted = UserMgr.delete_api_key(username, key)
|
|
if deleted:
|
|
return success_response(None, "API key deleted successfully")
|
|
else:
|
|
return error_response("API key not found or could not be deleted", 404)
|
|
except AdminException as e:
|
|
return error_response(e.message, e.code)
|
|
except Exception as e:
|
|
return error_response(str(e), 500)
|
|
|
|
|
|
@admin_bp.route("/version", methods=["GET"])
|
|
@login_required
|
|
@check_admin_auth
|
|
def show_version():
|
|
try:
|
|
res = {"version": get_ragflow_version()}
|
|
return success_response(res)
|
|
except Exception as e:
|
|
return error_response(str(e), 500)
|
|
|
|
|
|
@admin_bp.route("/sandbox/providers", methods=["GET"])
|
|
@login_required
|
|
@check_admin_auth
|
|
def list_sandbox_providers():
|
|
"""List all available sandbox providers."""
|
|
try:
|
|
res = SandboxMgr.list_providers()
|
|
return success_response(res)
|
|
except AdminException as e:
|
|
return error_response(str(e), 400)
|
|
except Exception as e:
|
|
return error_response(str(e), 500)
|
|
|
|
|
|
@admin_bp.route("/sandbox/providers/<provider_id>/schema", methods=["GET"])
|
|
@login_required
|
|
@check_admin_auth
|
|
def get_sandbox_provider_schema(provider_id: str):
|
|
"""Get configuration schema for a specific provider."""
|
|
try:
|
|
res = SandboxMgr.get_provider_config_schema(provider_id)
|
|
return success_response(res)
|
|
except AdminException as e:
|
|
return error_response(str(e), 400)
|
|
except Exception as e:
|
|
return error_response(str(e), 500)
|
|
|
|
|
|
@admin_bp.route("/sandbox/config", methods=["GET"])
|
|
@login_required
|
|
@check_admin_auth
|
|
def get_sandbox_config():
|
|
"""Get current sandbox configuration."""
|
|
try:
|
|
res = SandboxMgr.get_config()
|
|
return success_response(res)
|
|
except AdminException as e:
|
|
return error_response(str(e), 400)
|
|
except Exception as e:
|
|
return error_response(str(e), 500)
|
|
|
|
|
|
@admin_bp.route("/sandbox/config", methods=["POST"])
|
|
@login_required
|
|
@check_admin_auth
|
|
def set_sandbox_config():
|
|
"""Set sandbox provider configuration."""
|
|
try:
|
|
data = request.get_json()
|
|
if not data:
|
|
logging.error("set_sandbox_config: Request body is required")
|
|
return error_response("Request body is required", 400)
|
|
|
|
provider_type = data.get("provider_type")
|
|
if not provider_type:
|
|
logging.error("set_sandbox_config: provider_type is required")
|
|
return error_response("provider_type is required", 400)
|
|
|
|
config = data.get("config", {})
|
|
set_active = data.get("set_active", True) # Default to True for backward compatibility
|
|
|
|
logging.info(f"set_sandbox_config: provider_type={provider_type}, set_active={set_active}")
|
|
logging.info(f"set_sandbox_config: config keys={list(config.keys())}")
|
|
|
|
res = SandboxMgr.set_config(provider_type, config, set_active)
|
|
return success_response(res, "Sandbox configuration updated successfully")
|
|
except AdminException as e:
|
|
logging.exception("set_sandbox_config AdminException")
|
|
return error_response(str(e), 400)
|
|
except Exception as e:
|
|
logging.exception("set_sandbox_config unexpected error")
|
|
return error_response(str(e), 500)
|
|
|
|
|
|
@admin_bp.route("/sandbox/test", methods=["POST"])
|
|
@login_required
|
|
@check_admin_auth
|
|
def test_sandbox_connection():
|
|
"""Test connection to sandbox provider."""
|
|
try:
|
|
data = request.get_json()
|
|
if not data:
|
|
return error_response("Request body is required", 400)
|
|
|
|
provider_type = data.get("provider_type")
|
|
if not provider_type:
|
|
return error_response("provider_type is required", 400)
|
|
|
|
config = data.get("config", {})
|
|
res = SandboxMgr.test_connection(provider_type, config)
|
|
return success_response(res)
|
|
except AdminException as e:
|
|
return error_response(str(e), 400)
|
|
except Exception as e:
|
|
return error_response(str(e), 500)
|