feat(agent): add API key sharing and flexible authentication for chat routes
This commit is contained in:
parent
b29d8d108e
commit
6a9f329def
@ -560,3 +560,64 @@ async def delete_agent(
|
|||||||
raise HTTPException(
|
raise HTTPException(
|
||||||
status_code=status.HTTP_404_NOT_FOUND, detail="Agent not found"
|
status_code=status.HTTP_404_NOT_FOUND, detail="Agent not found"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
|
||||||
|
@router.post("/{agent_id}/share", response_model=Dict[str, str])
|
||||||
|
async def share_agent(
|
||||||
|
agent_id: uuid.UUID,
|
||||||
|
x_client_id: uuid.UUID = Header(..., alias="x-client-id"),
|
||||||
|
db: Session = Depends(get_db),
|
||||||
|
payload: dict = Depends(get_jwt_token),
|
||||||
|
):
|
||||||
|
"""Returns the agent's API key for sharing"""
|
||||||
|
await verify_user_client(payload, db, x_client_id)
|
||||||
|
|
||||||
|
# Verify if the agent exists
|
||||||
|
agent = agent_service.get_agent(db, agent_id)
|
||||||
|
if not agent:
|
||||||
|
raise HTTPException(
|
||||||
|
status_code=status.HTTP_404_NOT_FOUND, detail="Agent not found"
|
||||||
|
)
|
||||||
|
|
||||||
|
# Verify if the agent belongs to the specified client
|
||||||
|
if agent.client_id != x_client_id:
|
||||||
|
raise HTTPException(
|
||||||
|
status_code=status.HTTP_403_FORBIDDEN,
|
||||||
|
detail="Agent does not belong to the specified client",
|
||||||
|
)
|
||||||
|
|
||||||
|
# Verify if API key exists
|
||||||
|
if not agent.config or not agent.config.get("api_key"):
|
||||||
|
raise HTTPException(
|
||||||
|
status_code=status.HTTP_400_BAD_REQUEST,
|
||||||
|
detail="This agent does not have an API key",
|
||||||
|
)
|
||||||
|
|
||||||
|
return {"api_key": agent.config["api_key"]}
|
||||||
|
|
||||||
|
|
||||||
|
@router.get("/{agent_id}/shared", response_model=Agent)
|
||||||
|
async def get_shared_agent(
|
||||||
|
agent_id: uuid.UUID,
|
||||||
|
api_key: str = Header(..., alias="x-api-key"),
|
||||||
|
db: Session = Depends(get_db),
|
||||||
|
):
|
||||||
|
"""Get agent details using only API key authentication"""
|
||||||
|
# Verify if the agent exists
|
||||||
|
agent = agent_service.get_agent(db, agent_id)
|
||||||
|
if not agent or not agent.config:
|
||||||
|
raise HTTPException(
|
||||||
|
status_code=status.HTTP_404_NOT_FOUND, detail="Agent not found"
|
||||||
|
)
|
||||||
|
|
||||||
|
# Verify if the API key matches
|
||||||
|
if not agent.config.get("api_key") or agent.config.get("api_key") != api_key:
|
||||||
|
raise HTTPException(
|
||||||
|
status_code=status.HTTP_401_UNAUTHORIZED, detail="Invalid API key"
|
||||||
|
)
|
||||||
|
|
||||||
|
# Add agent card URL if not present
|
||||||
|
if not agent.agent_card_url:
|
||||||
|
agent.agent_card_url = agent.agent_card_url_property
|
||||||
|
|
||||||
|
return agent
|
||||||
|
@ -27,6 +27,7 @@
|
|||||||
└──────────────────────────────────────────────────────────────────────────────┘
|
└──────────────────────────────────────────────────────────────────────────────┘
|
||||||
"""
|
"""
|
||||||
|
|
||||||
|
import uuid
|
||||||
from fastapi import (
|
from fastapi import (
|
||||||
APIRouter,
|
APIRouter,
|
||||||
Depends,
|
Depends,
|
||||||
@ -34,6 +35,7 @@ from fastapi import (
|
|||||||
status,
|
status,
|
||||||
WebSocket,
|
WebSocket,
|
||||||
WebSocketDisconnect,
|
WebSocketDisconnect,
|
||||||
|
Header,
|
||||||
)
|
)
|
||||||
from sqlalchemy.orm import Session
|
from sqlalchemy.orm import Session
|
||||||
from src.config.database import get_db
|
from src.config.database import get_db
|
||||||
@ -57,6 +59,7 @@ from src.services.service_providers import (
|
|||||||
from datetime import datetime
|
from datetime import datetime
|
||||||
import logging
|
import logging
|
||||||
import json
|
import json
|
||||||
|
from typing import Optional, Dict
|
||||||
|
|
||||||
logger = logging.getLogger(__name__)
|
logger = logging.getLogger(__name__)
|
||||||
|
|
||||||
@ -67,6 +70,59 @@ router = APIRouter(
|
|||||||
)
|
)
|
||||||
|
|
||||||
|
|
||||||
|
async def get_agent_by_api_key(
|
||||||
|
agent_id: str,
|
||||||
|
api_key: Optional[str] = Header(None, alias="x-api-key"),
|
||||||
|
authorization: Optional[str] = Header(None),
|
||||||
|
db: Session = Depends(get_db),
|
||||||
|
):
|
||||||
|
"""Flexible authentication for chat routes, allowing JWT or API key"""
|
||||||
|
if authorization:
|
||||||
|
# Try to authenticate with JWT token first
|
||||||
|
try:
|
||||||
|
# Extract token from Authorization header if needed
|
||||||
|
token = (
|
||||||
|
authorization.replace("Bearer ", "")
|
||||||
|
if authorization.startswith("Bearer ")
|
||||||
|
else authorization
|
||||||
|
)
|
||||||
|
payload = await get_jwt_token(token)
|
||||||
|
agent = agent_service.get_agent(db, agent_id)
|
||||||
|
if not agent:
|
||||||
|
raise HTTPException(
|
||||||
|
status_code=status.HTTP_404_NOT_FOUND,
|
||||||
|
detail="Agent not found",
|
||||||
|
)
|
||||||
|
|
||||||
|
# Verify if the user has access to the agent's client
|
||||||
|
await verify_user_client(payload, db, agent.client_id)
|
||||||
|
return agent
|
||||||
|
except Exception as e:
|
||||||
|
logger.warning(f"JWT authentication failed: {str(e)}")
|
||||||
|
# If JWT fails, continue to try with API key
|
||||||
|
|
||||||
|
# Try to authenticate with API key
|
||||||
|
if not api_key:
|
||||||
|
raise HTTPException(
|
||||||
|
status_code=status.HTTP_401_UNAUTHORIZED,
|
||||||
|
detail="Authentication required (JWT or API key)",
|
||||||
|
)
|
||||||
|
|
||||||
|
agent = agent_service.get_agent(db, agent_id)
|
||||||
|
if not agent or not agent.config:
|
||||||
|
raise HTTPException(
|
||||||
|
status_code=status.HTTP_404_NOT_FOUND, detail="Agent not found"
|
||||||
|
)
|
||||||
|
|
||||||
|
# Verify if the API key matches
|
||||||
|
if not agent.config.get("api_key") or agent.config.get("api_key") != api_key:
|
||||||
|
raise HTTPException(
|
||||||
|
status_code=status.HTTP_401_UNAUTHORIZED, detail="Invalid API key"
|
||||||
|
)
|
||||||
|
|
||||||
|
return agent
|
||||||
|
|
||||||
|
|
||||||
@router.websocket("/ws/{agent_id}/{external_id}")
|
@router.websocket("/ws/{agent_id}/{external_id}")
|
||||||
async def websocket_chat(
|
async def websocket_chat(
|
||||||
websocket: WebSocket,
|
websocket: WebSocket,
|
||||||
@ -82,32 +138,49 @@ async def websocket_chat(
|
|||||||
# Wait for authentication message
|
# Wait for authentication message
|
||||||
try:
|
try:
|
||||||
auth_data = await websocket.receive_json()
|
auth_data = await websocket.receive_json()
|
||||||
logger.info(f"Received authentication data: {auth_data}")
|
logger.info(f"Authentication data received: {auth_data}")
|
||||||
|
|
||||||
if not (
|
if not (
|
||||||
auth_data.get("type") == "authorization" and auth_data.get("token")
|
auth_data.get("type") == "authorization"
|
||||||
|
and (auth_data.get("token") or auth_data.get("api_key"))
|
||||||
):
|
):
|
||||||
logger.warning("Invalid authentication message")
|
logger.warning("Invalid authentication message")
|
||||||
await websocket.close(code=status.WS_1008_POLICY_VIOLATION)
|
await websocket.close(code=status.WS_1008_POLICY_VIOLATION)
|
||||||
return
|
return
|
||||||
|
|
||||||
token = auth_data["token"]
|
# Verify if the agent exists
|
||||||
# Verify the token
|
|
||||||
payload = await get_jwt_token_ws(token)
|
|
||||||
if not payload:
|
|
||||||
logger.warning("Invalid token")
|
|
||||||
await websocket.close(code=status.WS_1008_POLICY_VIOLATION)
|
|
||||||
return
|
|
||||||
|
|
||||||
# Verify if the agent belongs to the user's client
|
|
||||||
agent = agent_service.get_agent(db, agent_id)
|
agent = agent_service.get_agent(db, agent_id)
|
||||||
if not agent:
|
if not agent:
|
||||||
logger.warning(f"Agent {agent_id} not found")
|
logger.warning(f"Agent {agent_id} not found")
|
||||||
await websocket.close(code=status.WS_1008_POLICY_VIOLATION)
|
await websocket.close(code=status.WS_1008_POLICY_VIOLATION)
|
||||||
return
|
return
|
||||||
|
|
||||||
# Verify if the user has access to the agent (via client)
|
# Verify authentication
|
||||||
await verify_user_client(payload, db, agent.client_id)
|
is_authenticated = False
|
||||||
|
|
||||||
|
# Try with JWT token
|
||||||
|
if auth_data.get("token"):
|
||||||
|
try:
|
||||||
|
payload = await get_jwt_token_ws(auth_data["token"])
|
||||||
|
if payload:
|
||||||
|
# Verify if the user has access to the agent
|
||||||
|
await verify_user_client(payload, db, agent.client_id)
|
||||||
|
is_authenticated = True
|
||||||
|
except Exception as e:
|
||||||
|
logger.warning(f"JWT authentication failed: {str(e)}")
|
||||||
|
|
||||||
|
# If JWT fails, try with API key
|
||||||
|
if not is_authenticated and auth_data.get("api_key"):
|
||||||
|
if agent.config and agent.config.get("api_key") == auth_data.get(
|
||||||
|
"api_key"
|
||||||
|
):
|
||||||
|
is_authenticated = True
|
||||||
|
else:
|
||||||
|
logger.warning("Invalid API key")
|
||||||
|
|
||||||
|
if not is_authenticated:
|
||||||
|
await websocket.close(code=status.WS_1008_POLICY_VIOLATION)
|
||||||
|
return
|
||||||
|
|
||||||
logger.info(
|
logger.info(
|
||||||
f"WebSocket connection established for agent {agent_id} and external_id {external_id}"
|
f"WebSocket connection established for agent {agent_id} and external_id {external_id}"
|
||||||
@ -174,19 +247,9 @@ async def websocket_chat(
|
|||||||
)
|
)
|
||||||
async def chat(
|
async def chat(
|
||||||
request: ChatRequest,
|
request: ChatRequest,
|
||||||
|
_=Depends(get_agent_by_api_key),
|
||||||
db: Session = Depends(get_db),
|
db: Session = Depends(get_db),
|
||||||
payload: dict = Depends(get_jwt_token),
|
|
||||||
):
|
):
|
||||||
# Verify if the agent belongs to the user's client
|
|
||||||
agent = agent_service.get_agent(db, request.agent_id)
|
|
||||||
if not agent:
|
|
||||||
raise HTTPException(
|
|
||||||
status_code=status.HTTP_404_NOT_FOUND, detail="Agent not found"
|
|
||||||
)
|
|
||||||
|
|
||||||
# Verify if the user has access to the agent (via client)
|
|
||||||
await verify_user_client(payload, db, agent.client_id)
|
|
||||||
|
|
||||||
try:
|
try:
|
||||||
final_response = await run_agent(
|
final_response = await run_agent(
|
||||||
request.agent_id,
|
request.agent_id,
|
||||||
|
Loading…
Reference in New Issue
Block a user