2023-05-15 08:51:32 +08:00
|
|
|
import os
|
2023-06-15 13:59:36 +08:00
|
|
|
|
2024-08-15 12:54:05 +08:00
|
|
|
if os.environ.get("DEBUG", "false").lower() != "true":
|
2023-05-15 08:51:32 +08:00
|
|
|
from gevent import monkey
|
2024-04-12 14:53:44 +08:00
|
|
|
|
2023-05-15 08:51:32 +08:00
|
|
|
monkey.patch_all()
|
2024-04-25 22:26:45 +08:00
|
|
|
|
2024-01-02 23:42:00 +08:00
|
|
|
import grpc.experimental.gevent
|
2024-04-12 14:53:44 +08:00
|
|
|
|
2024-01-02 23:42:00 +08:00
|
|
|
grpc.experimental.gevent.init_gevent()
|
|
|
|
|
2023-05-15 08:51:32 +08:00
|
|
|
import json
|
2024-01-12 12:34:01 +08:00
|
|
|
import logging
|
2024-04-25 22:26:45 +08:00
|
|
|
import sys
|
2023-05-15 08:51:32 +08:00
|
|
|
import threading
|
2024-01-12 12:34:01 +08:00
|
|
|
import time
|
|
|
|
import warnings
|
2024-04-25 22:26:45 +08:00
|
|
|
from logging.handlers import RotatingFileHandler
|
2023-05-15 08:51:32 +08:00
|
|
|
|
2024-02-06 13:21:13 +08:00
|
|
|
from flask import Flask, Response, request
|
|
|
|
from flask_cors import CORS
|
2024-04-15 22:28:32 +08:00
|
|
|
from werkzeug.exceptions import Unauthorized
|
2024-04-18 20:24:05 +08:00
|
|
|
|
2024-07-22 15:29:39 +08:00
|
|
|
import contexts
|
2024-01-12 12:34:01 +08:00
|
|
|
from commands import register_commands
|
2024-07-22 15:29:39 +08:00
|
|
|
from configs import dify_config
|
2024-04-18 20:24:05 +08:00
|
|
|
|
|
|
|
# DO NOT REMOVE BELOW
|
2024-10-08 11:13:11 +08:00
|
|
|
from events import event_handlers # noqa: F401
|
2024-02-06 13:21:13 +08:00
|
|
|
from extensions import (
|
|
|
|
ext_celery,
|
|
|
|
ext_code_based_extension,
|
2024-03-05 14:45:22 +08:00
|
|
|
ext_compress,
|
2024-02-06 13:21:13 +08:00
|
|
|
ext_database,
|
|
|
|
ext_hosting_provider,
|
|
|
|
ext_login,
|
|
|
|
ext_mail,
|
|
|
|
ext_migrate,
|
2024-10-09 14:42:30 +08:00
|
|
|
ext_proxy_fix,
|
2024-02-06 13:21:13 +08:00
|
|
|
ext_redis,
|
|
|
|
ext_sentry,
|
|
|
|
ext_storage,
|
|
|
|
)
|
2023-05-15 08:51:32 +08:00
|
|
|
from extensions.ext_database import db
|
|
|
|
from extensions.ext_login import login_manager
|
2024-01-12 12:34:01 +08:00
|
|
|
from libs.passport import PassportService
|
2024-07-04 18:18:26 +08:00
|
|
|
|
|
|
|
# TODO: Find a way to avoid importing models here
|
2024-10-08 11:13:11 +08:00
|
|
|
from models import account, dataset, model, source, task, tool, tools, web # noqa: F401
|
2024-04-18 20:24:05 +08:00
|
|
|
from services.account_service import AccountService
|
2024-04-12 14:53:44 +08:00
|
|
|
|
2023-05-15 08:51:32 +08:00
|
|
|
# DO NOT REMOVE ABOVE
|
|
|
|
|
|
|
|
|
|
|
|
warnings.simplefilter("ignore", ResourceWarning)
|
|
|
|
|
2024-09-24 17:33:29 +08:00
|
|
|
os.environ["TZ"] = "UTC"
|
|
|
|
# windows platform not support tzset
|
|
|
|
if hasattr(time, "tzset"):
|
2023-11-21 11:49:07 +08:00
|
|
|
time.tzset()
|
2023-11-15 19:14:31 +08:00
|
|
|
|
2023-05-15 08:51:32 +08:00
|
|
|
|
|
|
|
class DifyApp(Flask):
|
|
|
|
pass
|
|
|
|
|
2024-04-12 14:53:44 +08:00
|
|
|
|
2023-05-15 08:51:32 +08:00
|
|
|
# -------------
|
|
|
|
# Configuration
|
|
|
|
# -------------
|
|
|
|
|
|
|
|
|
2024-08-15 12:54:05 +08:00
|
|
|
config_type = os.getenv("EDITION", default="SELF_HOSTED") # ce edition first
|
2023-05-15 08:51:32 +08:00
|
|
|
|
2024-04-12 14:53:44 +08:00
|
|
|
|
2023-05-15 08:51:32 +08:00
|
|
|
# ----------------------------
|
|
|
|
# Application Factory Function
|
|
|
|
# ----------------------------
|
|
|
|
|
2024-08-15 12:54:05 +08:00
|
|
|
|
2024-06-19 13:41:12 +08:00
|
|
|
def create_flask_app_with_configs() -> Flask:
|
|
|
|
"""
|
|
|
|
create a raw flask app
|
|
|
|
with configs loaded from .env file
|
|
|
|
"""
|
|
|
|
dify_app = DifyApp(__name__)
|
2024-07-03 21:09:23 +08:00
|
|
|
dify_app.config.from_mapping(dify_config.model_dump())
|
2024-06-26 14:27:49 +08:00
|
|
|
|
|
|
|
# populate configs into system environment variables
|
|
|
|
for key, value in dify_app.config.items():
|
|
|
|
if isinstance(value, str):
|
|
|
|
os.environ[key] = value
|
|
|
|
elif isinstance(value, int | float | bool):
|
|
|
|
os.environ[key] = str(value)
|
|
|
|
elif value is None:
|
2024-08-15 12:54:05 +08:00
|
|
|
os.environ[key] = ""
|
2024-06-26 14:27:49 +08:00
|
|
|
|
2024-06-19 13:41:12 +08:00
|
|
|
return dify_app
|
|
|
|
|
2023-05-15 08:51:32 +08:00
|
|
|
|
2024-04-25 22:26:45 +08:00
|
|
|
def create_app() -> Flask:
|
2024-06-19 13:41:12 +08:00
|
|
|
app = create_flask_app_with_configs()
|
2023-05-15 08:51:32 +08:00
|
|
|
|
2024-08-15 12:54:05 +08:00
|
|
|
app.secret_key = app.config["SECRET_KEY"]
|
2023-05-15 08:51:32 +08:00
|
|
|
|
2024-04-20 08:59:49 +08:00
|
|
|
log_handlers = None
|
2024-08-15 12:54:05 +08:00
|
|
|
log_file = app.config.get("LOG_FILE")
|
2024-04-20 08:59:49 +08:00
|
|
|
if log_file:
|
|
|
|
log_dir = os.path.dirname(log_file)
|
|
|
|
os.makedirs(log_dir, exist_ok=True)
|
|
|
|
log_handlers = [
|
|
|
|
RotatingFileHandler(
|
|
|
|
filename=log_file,
|
|
|
|
maxBytes=1024 * 1024 * 1024,
|
2024-08-15 12:54:05 +08:00
|
|
|
backupCount=5,
|
2024-04-20 08:59:49 +08:00
|
|
|
),
|
2024-08-15 12:54:05 +08:00
|
|
|
logging.StreamHandler(sys.stdout),
|
2024-04-20 08:59:49 +08:00
|
|
|
]
|
2024-04-25 22:26:45 +08:00
|
|
|
|
2024-04-20 08:59:49 +08:00
|
|
|
logging.basicConfig(
|
2024-08-15 12:54:05 +08:00
|
|
|
level=app.config.get("LOG_LEVEL"),
|
2024-09-02 00:46:59 +08:00
|
|
|
format=app.config["LOG_FORMAT"],
|
2024-08-15 12:54:05 +08:00
|
|
|
datefmt=app.config.get("LOG_DATEFORMAT"),
|
2024-06-19 15:51:00 +08:00
|
|
|
handlers=log_handlers,
|
2024-08-15 12:54:05 +08:00
|
|
|
force=True,
|
2024-04-20 08:59:49 +08:00
|
|
|
)
|
2024-08-15 12:54:05 +08:00
|
|
|
log_tz = app.config.get("LOG_TZ")
|
2024-06-19 15:51:00 +08:00
|
|
|
if log_tz:
|
|
|
|
from datetime import datetime
|
2023-05-15 08:51:32 +08:00
|
|
|
|
2024-06-19 15:51:00 +08:00
|
|
|
import pytz
|
2024-08-15 12:54:05 +08:00
|
|
|
|
2024-06-19 15:51:00 +08:00
|
|
|
timezone = pytz.timezone(log_tz)
|
|
|
|
|
|
|
|
def time_converter(seconds):
|
|
|
|
return datetime.utcfromtimestamp(seconds).astimezone(timezone).timetuple()
|
|
|
|
|
|
|
|
for handler in logging.root.handlers:
|
2024-09-02 00:46:59 +08:00
|
|
|
assert handler.formatter
|
2024-06-19 15:51:00 +08:00
|
|
|
handler.formatter.converter = time_converter
|
2023-05-15 08:51:32 +08:00
|
|
|
initialize_extensions(app)
|
|
|
|
register_blueprints(app)
|
|
|
|
register_commands(app)
|
|
|
|
|
|
|
|
return app
|
|
|
|
|
|
|
|
|
|
|
|
def initialize_extensions(app):
|
|
|
|
# Since the application instance is now created, pass it to each Flask
|
|
|
|
# extension instance to bind it to the Flask application instance (app)
|
2024-03-05 14:45:22 +08:00
|
|
|
ext_compress.init_app(app)
|
2023-11-06 19:36:16 +08:00
|
|
|
ext_code_based_extension.init()
|
2023-05-15 08:51:32 +08:00
|
|
|
ext_database.init_app(app)
|
|
|
|
ext_migrate.init(app, db)
|
|
|
|
ext_redis.init_app(app)
|
|
|
|
ext_storage.init_app(app)
|
|
|
|
ext_celery.init_app(app)
|
|
|
|
ext_login.init_app(app)
|
2023-07-14 11:19:26 +08:00
|
|
|
ext_mail.init_app(app)
|
2024-01-02 23:42:00 +08:00
|
|
|
ext_hosting_provider.init_app(app)
|
2023-05-15 08:51:32 +08:00
|
|
|
ext_sentry.init_app(app)
|
2024-10-09 14:42:30 +08:00
|
|
|
ext_proxy_fix.init_app(app)
|
2023-05-15 08:51:32 +08:00
|
|
|
|
|
|
|
|
|
|
|
# Flask-Login configuration
|
2023-09-25 12:49:16 +08:00
|
|
|
@login_manager.request_loader
|
|
|
|
def load_user_from_request(request_from_flask_login):
|
|
|
|
"""Load user based on the request."""
|
2024-09-13 22:42:08 +08:00
|
|
|
if request.blueprint not in {"console", "inner_api"}:
|
2023-05-15 08:51:32 +08:00
|
|
|
return None
|
2024-06-21 12:39:07 +08:00
|
|
|
# Check if the user_id contains a dot, indicating the old format
|
2024-08-15 12:54:05 +08:00
|
|
|
auth_header = request.headers.get("Authorization", "")
|
2024-06-21 12:39:07 +08:00
|
|
|
if not auth_header:
|
2024-08-15 12:54:05 +08:00
|
|
|
auth_token = request.args.get("_token")
|
2024-06-21 12:39:07 +08:00
|
|
|
if not auth_token:
|
2024-08-15 12:54:05 +08:00
|
|
|
raise Unauthorized("Invalid Authorization token.")
|
2024-06-21 12:39:07 +08:00
|
|
|
else:
|
2024-08-15 12:54:05 +08:00
|
|
|
if " " not in auth_header:
|
|
|
|
raise Unauthorized("Invalid Authorization header format. Expected 'Bearer <api-key>' format.")
|
2024-06-21 12:39:07 +08:00
|
|
|
auth_scheme, auth_token = auth_header.split(None, 1)
|
|
|
|
auth_scheme = auth_scheme.lower()
|
2024-08-15 12:54:05 +08:00
|
|
|
if auth_scheme != "bearer":
|
|
|
|
raise Unauthorized("Invalid Authorization header format. Expected 'Bearer <api-key>' format.")
|
2024-06-21 12:39:07 +08:00
|
|
|
|
|
|
|
decoded = PassportService().verify(auth_token)
|
2024-08-15 12:54:05 +08:00
|
|
|
user_id = decoded.get("user_id")
|
2024-06-21 12:39:07 +08:00
|
|
|
|
2024-10-12 23:46:30 +08:00
|
|
|
logged_in_account = AccountService.load_logged_in_account(account_id=user_id)
|
2024-10-08 11:13:11 +08:00
|
|
|
if logged_in_account:
|
|
|
|
contexts.tenant_id.set(logged_in_account.current_tenant_id)
|
|
|
|
return logged_in_account
|
2023-05-15 08:51:32 +08:00
|
|
|
|
2024-01-24 01:05:37 +08:00
|
|
|
|
2023-05-15 08:51:32 +08:00
|
|
|
@login_manager.unauthorized_handler
|
|
|
|
def unauthorized_handler():
|
|
|
|
"""Handle unauthorized requests."""
|
2024-08-15 12:54:05 +08:00
|
|
|
return Response(
|
|
|
|
json.dumps({"code": "unauthorized", "message": "Unauthorized."}),
|
|
|
|
status=401,
|
|
|
|
content_type="application/json",
|
|
|
|
)
|
2023-05-15 08:51:32 +08:00
|
|
|
|
|
|
|
|
|
|
|
# register blueprint routers
|
|
|
|
def register_blueprints(app):
|
|
|
|
from controllers.console import bp as console_app_bp
|
2023-11-13 22:05:46 +08:00
|
|
|
from controllers.files import bp as files_bp
|
2024-04-18 20:24:05 +08:00
|
|
|
from controllers.inner_api import bp as inner_api_bp
|
2024-01-12 12:34:01 +08:00
|
|
|
from controllers.service_api import bp as service_api_bp
|
|
|
|
from controllers.web import bp as web_bp
|
2023-05-15 08:51:32 +08:00
|
|
|
|
2024-08-15 12:54:05 +08:00
|
|
|
CORS(
|
|
|
|
service_api_bp,
|
|
|
|
allow_headers=["Content-Type", "Authorization", "X-App-Code"],
|
|
|
|
methods=["GET", "PUT", "POST", "DELETE", "OPTIONS", "PATCH"],
|
|
|
|
)
|
2023-05-15 08:51:32 +08:00
|
|
|
app.register_blueprint(service_api_bp)
|
|
|
|
|
2024-08-15 12:54:05 +08:00
|
|
|
CORS(
|
|
|
|
web_bp,
|
|
|
|
resources={r"/*": {"origins": app.config["WEB_API_CORS_ALLOW_ORIGINS"]}},
|
|
|
|
supports_credentials=True,
|
|
|
|
allow_headers=["Content-Type", "Authorization", "X-App-Code"],
|
|
|
|
methods=["GET", "PUT", "POST", "DELETE", "OPTIONS", "PATCH"],
|
|
|
|
expose_headers=["X-Version", "X-Env"],
|
|
|
|
)
|
2023-05-15 08:51:32 +08:00
|
|
|
|
|
|
|
app.register_blueprint(web_bp)
|
|
|
|
|
2024-08-15 12:54:05 +08:00
|
|
|
CORS(
|
|
|
|
console_app_bp,
|
|
|
|
resources={r"/*": {"origins": app.config["CONSOLE_CORS_ALLOW_ORIGINS"]}},
|
|
|
|
supports_credentials=True,
|
|
|
|
allow_headers=["Content-Type", "Authorization"],
|
|
|
|
methods=["GET", "PUT", "POST", "DELETE", "OPTIONS", "PATCH"],
|
|
|
|
expose_headers=["X-Version", "X-Env"],
|
|
|
|
)
|
2023-05-15 08:51:32 +08:00
|
|
|
|
|
|
|
app.register_blueprint(console_app_bp)
|
|
|
|
|
2024-08-15 12:54:05 +08:00
|
|
|
CORS(files_bp, allow_headers=["Content-Type"], methods=["GET", "PUT", "POST", "DELETE", "OPTIONS", "PATCH"])
|
2023-11-13 22:05:46 +08:00
|
|
|
app.register_blueprint(files_bp)
|
|
|
|
|
2024-04-18 17:33:32 +08:00
|
|
|
app.register_blueprint(inner_api_bp)
|
|
|
|
|
2023-05-15 08:51:32 +08:00
|
|
|
|
|
|
|
# create app
|
|
|
|
app = create_app()
|
|
|
|
celery = app.extensions["celery"]
|
|
|
|
|
2024-08-15 12:54:05 +08:00
|
|
|
if app.config.get("TESTING"):
|
2023-05-15 08:51:32 +08:00
|
|
|
print("App is running in TESTING mode")
|
|
|
|
|
|
|
|
|
|
|
|
@app.after_request
|
|
|
|
def after_request(response):
|
|
|
|
"""Add Version headers to the response."""
|
2024-08-15 12:54:05 +08:00
|
|
|
response.set_cookie("remember_token", "", expires=0)
|
|
|
|
response.headers.add("X-Version", app.config["CURRENT_VERSION"])
|
|
|
|
response.headers.add("X-Env", app.config["DEPLOY_ENV"])
|
2023-05-15 08:51:32 +08:00
|
|
|
return response
|
|
|
|
|
|
|
|
|
2024-08-15 12:54:05 +08:00
|
|
|
@app.route("/health")
|
2023-05-15 08:51:32 +08:00
|
|
|
def health():
|
2024-08-15 12:54:05 +08:00
|
|
|
return Response(
|
|
|
|
json.dumps({"pid": os.getpid(), "status": "ok", "version": app.config["CURRENT_VERSION"]}),
|
|
|
|
status=200,
|
|
|
|
content_type="application/json",
|
|
|
|
)
|
2023-05-15 08:51:32 +08:00
|
|
|
|
|
|
|
|
2024-08-15 12:54:05 +08:00
|
|
|
@app.route("/threads")
|
2023-05-15 08:51:32 +08:00
|
|
|
def threads():
|
|
|
|
num_threads = threading.active_count()
|
|
|
|
threads = threading.enumerate()
|
|
|
|
|
|
|
|
thread_list = []
|
|
|
|
for thread in threads:
|
|
|
|
thread_name = thread.name
|
|
|
|
thread_id = thread.ident
|
|
|
|
is_alive = thread.is_alive()
|
|
|
|
|
2024-08-15 12:54:05 +08:00
|
|
|
thread_list.append(
|
|
|
|
{
|
|
|
|
"name": thread_name,
|
|
|
|
"id": thread_id,
|
|
|
|
"is_alive": is_alive,
|
|
|
|
}
|
|
|
|
)
|
2023-05-15 08:51:32 +08:00
|
|
|
|
|
|
|
return {
|
2024-08-15 12:54:05 +08:00
|
|
|
"pid": os.getpid(),
|
|
|
|
"thread_num": num_threads,
|
|
|
|
"threads": thread_list,
|
2023-05-15 08:51:32 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2024-08-15 12:54:05 +08:00
|
|
|
@app.route("/db-pool-stat")
|
2023-08-12 00:57:00 +08:00
|
|
|
def pool_stat():
|
|
|
|
engine = db.engine
|
|
|
|
return {
|
2024-08-15 12:54:05 +08:00
|
|
|
"pid": os.getpid(),
|
|
|
|
"pool_size": engine.pool.size(),
|
|
|
|
"checked_in_connections": engine.pool.checkedin(),
|
|
|
|
"checked_out_connections": engine.pool.checkedout(),
|
|
|
|
"overflow_connections": engine.pool.overflow(),
|
|
|
|
"connection_timeout": engine.pool.timeout(),
|
|
|
|
"recycle_time": db.engine.pool._recycle,
|
2023-08-12 00:57:00 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2024-08-15 12:54:05 +08:00
|
|
|
if __name__ == "__main__":
|
|
|
|
app.run(host="0.0.0.0", port=5001)
|