123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632 |
- import logging
- from pathlib import Path
- from typing import Optional
- import time
- import re
- import aiohttp
- from open_webui.models.groups import Groups
- from pydantic import BaseModel, HttpUrl
- from fastapi import APIRouter, Depends, HTTPException, Request, status
- from open_webui.models.oauth_sessions import OAuthSessions
- from open_webui.models.tools import (
- ToolForm,
- ToolModel,
- ToolResponse,
- ToolUserResponse,
- Tools,
- )
- from open_webui.utils.plugin import (
- load_tool_module_by_id,
- replace_imports,
- get_tool_module_from_cache,
- )
- from open_webui.utils.tools import get_tool_specs
- from open_webui.utils.auth import get_admin_user, get_verified_user
- from open_webui.utils.access_control import has_access, has_permission
- from open_webui.utils.tools import get_tool_servers
- from open_webui.env import SRC_LOG_LEVELS
- from open_webui.config import CACHE_DIR, BYPASS_ADMIN_ACCESS_CONTROL
- from open_webui.constants import ERROR_MESSAGES
- log = logging.getLogger(__name__)
- log.setLevel(SRC_LOG_LEVELS["MAIN"])
- router = APIRouter()
- def get_tool_module(request, tool_id, load_from_db=True):
- """
- Get the tool module by its ID.
- """
- tool_module, _ = get_tool_module_from_cache(request, tool_id, load_from_db)
- return tool_module
- ############################
- # GetTools
- ############################
- @router.get("/", response_model=list[ToolUserResponse])
- async def get_tools(request: Request, user=Depends(get_verified_user)):
- tools = []
- # Local Tools
- for tool in Tools.get_tools():
- tool_module = get_tool_module(request, tool.id)
- tools.append(
- ToolUserResponse(
- **{
- **tool.model_dump(),
- "has_user_valves": hasattr(tool_module, "UserValves"),
- }
- )
- )
- # OpenAPI Tool Servers
- for server in await get_tool_servers(request):
- tools.append(
- ToolUserResponse(
- **{
- "id": f"server:{server.get('id')}",
- "user_id": f"server:{server.get('id')}",
- "name": server.get("openapi", {})
- .get("info", {})
- .get("title", "Tool Server"),
- "meta": {
- "description": server.get("openapi", {})
- .get("info", {})
- .get("description", ""),
- },
- "access_control": request.app.state.config.TOOL_SERVER_CONNECTIONS[
- server.get("idx", 0)
- ]
- .get("config", {})
- .get("access_control", None),
- "updated_at": int(time.time()),
- "created_at": int(time.time()),
- }
- )
- )
- # MCP Tool Servers
- for server in request.app.state.config.TOOL_SERVER_CONNECTIONS:
- if server.get("type", "openapi") == "mcp":
- server_id = server.get("info", {}).get("id")
- auth_type = server.get("auth_type", "none")
- session_token = None
- if auth_type == "oauth_2.1":
- splits = server_id.split(":")
- server_id = splits[-1] if len(splits) > 1 else server_id
- session_token = (
- await request.app.state.oauth_client_manager.get_oauth_token(
- user.id, f"mcp:{server_id}"
- )
- )
- tools.append(
- ToolUserResponse(
- **{
- "id": f"server:mcp:{server.get('info', {}).get('id')}",
- "user_id": f"server:mcp:{server.get('info', {}).get('id')}",
- "name": server.get("info", {}).get("name", "MCP Tool Server"),
- "meta": {
- "description": server.get("info", {}).get(
- "description", ""
- ),
- },
- "access_control": server.get("config", {}).get(
- "access_control", None
- ),
- "updated_at": int(time.time()),
- "created_at": int(time.time()),
- **(
- {
- "authenticated": session_token is not None,
- }
- if auth_type == "oauth_2.1"
- else {}
- ),
- }
- )
- )
- if user.role == "admin" and BYPASS_ADMIN_ACCESS_CONTROL:
- # Admin can see all tools
- return tools
- else:
- user_group_ids = {group.id for group in Groups.get_groups_by_member_id(user.id)}
- tools = [
- tool
- for tool in tools
- if tool.user_id == user.id
- or has_access(user.id, "read", tool.access_control, user_group_ids)
- ]
- return tools
- ############################
- # GetToolList
- ############################
- @router.get("/list", response_model=list[ToolUserResponse])
- async def get_tool_list(user=Depends(get_verified_user)):
- if user.role == "admin" and BYPASS_ADMIN_ACCESS_CONTROL:
- tools = Tools.get_tools()
- else:
- tools = Tools.get_tools_by_user_id(user.id, "write")
- return tools
- ############################
- # LoadFunctionFromLink
- ############################
- class LoadUrlForm(BaseModel):
- url: HttpUrl
- def github_url_to_raw_url(url: str) -> str:
- # Handle 'tree' (folder) URLs (add main.py at the end)
- m1 = re.match(r"https://github\.com/([^/]+)/([^/]+)/tree/([^/]+)/(.*)", url)
- if m1:
- org, repo, branch, path = m1.groups()
- return f"https://raw.githubusercontent.com/{org}/{repo}/refs/heads/{branch}/{path.rstrip('/')}/main.py"
- # Handle 'blob' (file) URLs
- m2 = re.match(r"https://github\.com/([^/]+)/([^/]+)/blob/([^/]+)/(.*)", url)
- if m2:
- org, repo, branch, path = m2.groups()
- return (
- f"https://raw.githubusercontent.com/{org}/{repo}/refs/heads/{branch}/{path}"
- )
- # No match; return as-is
- return url
- @router.post("/load/url", response_model=Optional[dict])
- async def load_tool_from_url(
- request: Request, form_data: LoadUrlForm, user=Depends(get_admin_user)
- ):
- # NOTE: This is NOT a SSRF vulnerability:
- # This endpoint is admin-only (see get_admin_user), meant for *trusted* internal use,
- # and does NOT accept untrusted user input. Access is enforced by authentication.
- url = str(form_data.url)
- if not url:
- raise HTTPException(status_code=400, detail="Please enter a valid URL")
- url = github_url_to_raw_url(url)
- url_parts = url.rstrip("/").split("/")
- file_name = url_parts[-1]
- tool_name = (
- file_name[:-3]
- if (
- file_name.endswith(".py")
- and (not file_name.startswith(("main.py", "index.py", "__init__.py")))
- )
- else url_parts[-2] if len(url_parts) > 1 else "function"
- )
- try:
- async with aiohttp.ClientSession(trust_env=True) as session:
- async with session.get(
- url, headers={"Content-Type": "application/json"}
- ) as resp:
- if resp.status != 200:
- raise HTTPException(
- status_code=resp.status, detail="Failed to fetch the tool"
- )
- data = await resp.text()
- if not data:
- raise HTTPException(
- status_code=400, detail="No data received from the URL"
- )
- return {
- "name": tool_name,
- "content": data,
- }
- except Exception as e:
- raise HTTPException(status_code=500, detail=f"Error importing tool: {e}")
- ############################
- # ExportTools
- ############################
- @router.get("/export", response_model=list[ToolModel])
- async def export_tools(user=Depends(get_admin_user)):
- tools = Tools.get_tools()
- return tools
- ############################
- # CreateNewTools
- ############################
- @router.post("/create", response_model=Optional[ToolResponse])
- async def create_new_tools(
- request: Request,
- form_data: ToolForm,
- user=Depends(get_verified_user),
- ):
- if user.role != "admin" and not has_permission(
- user.id, "workspace.tools", request.app.state.config.USER_PERMISSIONS
- ):
- raise HTTPException(
- status_code=status.HTTP_401_UNAUTHORIZED,
- detail=ERROR_MESSAGES.UNAUTHORIZED,
- )
- if not form_data.id.isidentifier():
- raise HTTPException(
- status_code=status.HTTP_400_BAD_REQUEST,
- detail="Only alphanumeric characters and underscores are allowed in the id",
- )
- form_data.id = form_data.id.lower()
- tools = Tools.get_tool_by_id(form_data.id)
- if tools is None:
- try:
- form_data.content = replace_imports(form_data.content)
- tool_module, frontmatter = load_tool_module_by_id(
- form_data.id, content=form_data.content
- )
- form_data.meta.manifest = frontmatter
- TOOLS = request.app.state.TOOLS
- TOOLS[form_data.id] = tool_module
- specs = get_tool_specs(TOOLS[form_data.id])
- tools = Tools.insert_new_tool(user.id, form_data, specs)
- tool_cache_dir = CACHE_DIR / "tools" / form_data.id
- tool_cache_dir.mkdir(parents=True, exist_ok=True)
- if tools:
- return tools
- else:
- raise HTTPException(
- status_code=status.HTTP_400_BAD_REQUEST,
- detail=ERROR_MESSAGES.DEFAULT("Error creating tools"),
- )
- except Exception as e:
- log.exception(f"Failed to load the tool by id {form_data.id}: {e}")
- raise HTTPException(
- status_code=status.HTTP_400_BAD_REQUEST,
- detail=ERROR_MESSAGES.DEFAULT(str(e)),
- )
- else:
- raise HTTPException(
- status_code=status.HTTP_400_BAD_REQUEST,
- detail=ERROR_MESSAGES.ID_TAKEN,
- )
- ############################
- # GetToolsById
- ############################
- @router.get("/id/{id}", response_model=Optional[ToolModel])
- async def get_tools_by_id(id: str, user=Depends(get_verified_user)):
- tools = Tools.get_tool_by_id(id)
- if tools:
- if (
- user.role == "admin"
- or tools.user_id == user.id
- or has_access(user.id, "read", tools.access_control)
- ):
- return tools
- else:
- raise HTTPException(
- status_code=status.HTTP_401_UNAUTHORIZED,
- detail=ERROR_MESSAGES.NOT_FOUND,
- )
- ############################
- # UpdateToolsById
- ############################
- @router.post("/id/{id}/update", response_model=Optional[ToolModel])
- async def update_tools_by_id(
- request: Request,
- id: str,
- form_data: ToolForm,
- user=Depends(get_verified_user),
- ):
- tools = Tools.get_tool_by_id(id)
- if not tools:
- raise HTTPException(
- status_code=status.HTTP_401_UNAUTHORIZED,
- detail=ERROR_MESSAGES.NOT_FOUND,
- )
- # Is the user the original creator, in a group with write access, or an admin
- if (
- tools.user_id != user.id
- and not has_access(user.id, "write", tools.access_control)
- and user.role != "admin"
- ):
- raise HTTPException(
- status_code=status.HTTP_401_UNAUTHORIZED,
- detail=ERROR_MESSAGES.UNAUTHORIZED,
- )
- try:
- form_data.content = replace_imports(form_data.content)
- tool_module, frontmatter = load_tool_module_by_id(id, content=form_data.content)
- form_data.meta.manifest = frontmatter
- TOOLS = request.app.state.TOOLS
- TOOLS[id] = tool_module
- specs = get_tool_specs(TOOLS[id])
- updated = {
- **form_data.model_dump(exclude={"id"}),
- "specs": specs,
- }
- log.debug(updated)
- tools = Tools.update_tool_by_id(id, updated)
- if tools:
- return tools
- else:
- raise HTTPException(
- status_code=status.HTTP_400_BAD_REQUEST,
- detail=ERROR_MESSAGES.DEFAULT("Error updating tools"),
- )
- except Exception as e:
- raise HTTPException(
- status_code=status.HTTP_400_BAD_REQUEST,
- detail=ERROR_MESSAGES.DEFAULT(str(e)),
- )
- ############################
- # DeleteToolsById
- ############################
- @router.delete("/id/{id}/delete", response_model=bool)
- async def delete_tools_by_id(
- request: Request, id: str, user=Depends(get_verified_user)
- ):
- tools = Tools.get_tool_by_id(id)
- if not tools:
- raise HTTPException(
- status_code=status.HTTP_401_UNAUTHORIZED,
- detail=ERROR_MESSAGES.NOT_FOUND,
- )
- if (
- tools.user_id != user.id
- and not has_access(user.id, "write", tools.access_control)
- and user.role != "admin"
- ):
- raise HTTPException(
- status_code=status.HTTP_401_UNAUTHORIZED,
- detail=ERROR_MESSAGES.UNAUTHORIZED,
- )
- result = Tools.delete_tool_by_id(id)
- if result:
- TOOLS = request.app.state.TOOLS
- if id in TOOLS:
- del TOOLS[id]
- return result
- ############################
- # GetToolValves
- ############################
- @router.get("/id/{id}/valves", response_model=Optional[dict])
- async def get_tools_valves_by_id(id: str, user=Depends(get_verified_user)):
- tools = Tools.get_tool_by_id(id)
- if tools:
- try:
- valves = Tools.get_tool_valves_by_id(id)
- return valves
- except Exception as e:
- raise HTTPException(
- status_code=status.HTTP_400_BAD_REQUEST,
- detail=ERROR_MESSAGES.DEFAULT(str(e)),
- )
- else:
- raise HTTPException(
- status_code=status.HTTP_401_UNAUTHORIZED,
- detail=ERROR_MESSAGES.NOT_FOUND,
- )
- ############################
- # GetToolValvesSpec
- ############################
- @router.get("/id/{id}/valves/spec", response_model=Optional[dict])
- async def get_tools_valves_spec_by_id(
- request: Request, id: str, user=Depends(get_verified_user)
- ):
- tools = Tools.get_tool_by_id(id)
- if tools:
- if id in request.app.state.TOOLS:
- tools_module = request.app.state.TOOLS[id]
- else:
- tools_module, _ = load_tool_module_by_id(id)
- request.app.state.TOOLS[id] = tools_module
- if hasattr(tools_module, "Valves"):
- Valves = tools_module.Valves
- return Valves.schema()
- return None
- else:
- raise HTTPException(
- status_code=status.HTTP_401_UNAUTHORIZED,
- detail=ERROR_MESSAGES.NOT_FOUND,
- )
- ############################
- # UpdateToolValves
- ############################
- @router.post("/id/{id}/valves/update", response_model=Optional[dict])
- async def update_tools_valves_by_id(
- request: Request, id: str, form_data: dict, user=Depends(get_verified_user)
- ):
- tools = Tools.get_tool_by_id(id)
- if not tools:
- raise HTTPException(
- status_code=status.HTTP_401_UNAUTHORIZED,
- detail=ERROR_MESSAGES.NOT_FOUND,
- )
- if (
- tools.user_id != user.id
- and not has_access(user.id, "write", tools.access_control)
- and user.role != "admin"
- ):
- raise HTTPException(
- status_code=status.HTTP_400_BAD_REQUEST,
- detail=ERROR_MESSAGES.ACCESS_PROHIBITED,
- )
- if id in request.app.state.TOOLS:
- tools_module = request.app.state.TOOLS[id]
- else:
- tools_module, _ = load_tool_module_by_id(id)
- request.app.state.TOOLS[id] = tools_module
- if not hasattr(tools_module, "Valves"):
- raise HTTPException(
- status_code=status.HTTP_401_UNAUTHORIZED,
- detail=ERROR_MESSAGES.NOT_FOUND,
- )
- Valves = tools_module.Valves
- try:
- form_data = {k: v for k, v in form_data.items() if v is not None}
- valves = Valves(**form_data)
- valves_dict = valves.model_dump(exclude_unset=True)
- Tools.update_tool_valves_by_id(id, valves_dict)
- return valves_dict
- except Exception as e:
- log.exception(f"Failed to update tool valves by id {id}: {e}")
- raise HTTPException(
- status_code=status.HTTP_400_BAD_REQUEST,
- detail=ERROR_MESSAGES.DEFAULT(str(e)),
- )
- ############################
- # ToolUserValves
- ############################
- @router.get("/id/{id}/valves/user", response_model=Optional[dict])
- async def get_tools_user_valves_by_id(id: str, user=Depends(get_verified_user)):
- tools = Tools.get_tool_by_id(id)
- if tools:
- try:
- user_valves = Tools.get_user_valves_by_id_and_user_id(id, user.id)
- return user_valves
- except Exception as e:
- raise HTTPException(
- status_code=status.HTTP_400_BAD_REQUEST,
- detail=ERROR_MESSAGES.DEFAULT(str(e)),
- )
- else:
- raise HTTPException(
- status_code=status.HTTP_401_UNAUTHORIZED,
- detail=ERROR_MESSAGES.NOT_FOUND,
- )
- @router.get("/id/{id}/valves/user/spec", response_model=Optional[dict])
- async def get_tools_user_valves_spec_by_id(
- request: Request, id: str, user=Depends(get_verified_user)
- ):
- tools = Tools.get_tool_by_id(id)
- if tools:
- if id in request.app.state.TOOLS:
- tools_module = request.app.state.TOOLS[id]
- else:
- tools_module, _ = load_tool_module_by_id(id)
- request.app.state.TOOLS[id] = tools_module
- if hasattr(tools_module, "UserValves"):
- UserValves = tools_module.UserValves
- return UserValves.schema()
- return None
- else:
- raise HTTPException(
- status_code=status.HTTP_401_UNAUTHORIZED,
- detail=ERROR_MESSAGES.NOT_FOUND,
- )
- @router.post("/id/{id}/valves/user/update", response_model=Optional[dict])
- async def update_tools_user_valves_by_id(
- request: Request, id: str, form_data: dict, user=Depends(get_verified_user)
- ):
- tools = Tools.get_tool_by_id(id)
- if tools:
- if id in request.app.state.TOOLS:
- tools_module = request.app.state.TOOLS[id]
- else:
- tools_module, _ = load_tool_module_by_id(id)
- request.app.state.TOOLS[id] = tools_module
- if hasattr(tools_module, "UserValves"):
- UserValves = tools_module.UserValves
- try:
- form_data = {k: v for k, v in form_data.items() if v is not None}
- user_valves = UserValves(**form_data)
- user_valves_dict = user_valves.model_dump(exclude_unset=True)
- Tools.update_user_valves_by_id_and_user_id(
- id, user.id, user_valves_dict
- )
- return user_valves_dict
- except Exception as e:
- log.exception(f"Failed to update user valves by id {id}: {e}")
- raise HTTPException(
- status_code=status.HTTP_400_BAD_REQUEST,
- detail=ERROR_MESSAGES.DEFAULT(str(e)),
- )
- else:
- raise HTTPException(
- status_code=status.HTTP_401_UNAUTHORIZED,
- detail=ERROR_MESSAGES.NOT_FOUND,
- )
- else:
- raise HTTPException(
- status_code=status.HTTP_401_UNAUTHORIZED,
- detail=ERROR_MESSAGES.NOT_FOUND,
- )
|