2025-02-19 17:28:32 +08:00
|
|
|
from urllib.parse import quote
|
|
|
|
|
|
2024-01-12 12:34:01 +08:00
|
|
|
from flask import Response, request
|
2025-12-05 13:05:53 +09:00
|
|
|
from flask_restx import Resource
|
|
|
|
|
from pydantic import BaseModel, Field
|
2024-02-06 13:21:13 +08:00
|
|
|
from werkzeug.exceptions import NotFound
|
|
|
|
|
|
|
|
|
|
import services
|
2025-08-13 17:06:07 +08:00
|
|
|
from controllers.common.errors import UnsupportedFileTypeError
|
2025-08-25 09:27:09 +08:00
|
|
|
from controllers.files import files_ns
|
2025-09-18 12:49:10 +08:00
|
|
|
from extensions.ext_database import db
|
2023-12-18 16:25:37 +08:00
|
|
|
from services.account_service import TenantService
|
2024-01-12 12:34:01 +08:00
|
|
|
from services.file_service import FileService
|
2023-11-13 22:05:46 +08:00
|
|
|
|
2025-12-05 13:05:53 +09:00
|
|
|
DEFAULT_REF_TEMPLATE_SWAGGER_2_0 = "#/definitions/{model}"
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
class FileSignatureQuery(BaseModel):
|
|
|
|
|
timestamp: str = Field(..., description="Unix timestamp used in the signature")
|
|
|
|
|
nonce: str = Field(..., description="Random string for signature")
|
|
|
|
|
sign: str = Field(..., description="HMAC signature")
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
class FilePreviewQuery(FileSignatureQuery):
|
|
|
|
|
as_attachment: bool = Field(default=False, description="Whether to download as attachment")
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
files_ns.schema_model(
|
|
|
|
|
FileSignatureQuery.__name__, FileSignatureQuery.model_json_schema(ref_template=DEFAULT_REF_TEMPLATE_SWAGGER_2_0)
|
|
|
|
|
)
|
|
|
|
|
files_ns.schema_model(
|
|
|
|
|
FilePreviewQuery.__name__, FilePreviewQuery.model_json_schema(ref_template=DEFAULT_REF_TEMPLATE_SWAGGER_2_0)
|
|
|
|
|
)
|
|
|
|
|
|
2023-11-13 22:05:46 +08:00
|
|
|
|
2025-08-25 09:27:09 +08:00
|
|
|
@files_ns.route("/<uuid:file_id>/image-preview")
|
2023-11-13 22:05:46 +08:00
|
|
|
class ImagePreviewApi(Resource):
|
2025-10-25 18:23:27 +08:00
|
|
|
"""Deprecated endpoint for retrieving image previews."""
|
|
|
|
|
|
|
|
|
|
@files_ns.doc("get_image_preview")
|
|
|
|
|
@files_ns.doc(description="Retrieve a signed image preview for a file")
|
|
|
|
|
@files_ns.doc(
|
|
|
|
|
params={
|
|
|
|
|
"file_id": "ID of the file to preview",
|
|
|
|
|
"timestamp": "Unix timestamp used in the signature",
|
|
|
|
|
"nonce": "Random string used in the signature",
|
|
|
|
|
"sign": "HMAC signature verifying the request",
|
|
|
|
|
}
|
|
|
|
|
)
|
|
|
|
|
@files_ns.doc(
|
|
|
|
|
responses={
|
|
|
|
|
200: "Image preview returned successfully",
|
|
|
|
|
400: "Missing or invalid signature parameters",
|
|
|
|
|
415: "Unsupported file type",
|
|
|
|
|
}
|
|
|
|
|
)
|
2024-10-21 10:43:49 +08:00
|
|
|
def get(self, file_id):
|
|
|
|
|
file_id = str(file_id)
|
|
|
|
|
|
2025-12-05 13:05:53 +09:00
|
|
|
args = FileSignatureQuery.model_validate(request.args.to_dict(flat=True)) # type: ignore
|
|
|
|
|
timestamp = args.timestamp
|
|
|
|
|
nonce = args.nonce
|
|
|
|
|
sign = args.sign
|
2024-10-21 10:43:49 +08:00
|
|
|
|
|
|
|
|
try:
|
2025-09-18 12:49:10 +08:00
|
|
|
generator, mimetype = FileService(db.engine).get_image_preview(
|
2024-10-21 10:43:49 +08:00
|
|
|
file_id=file_id,
|
|
|
|
|
timestamp=timestamp,
|
|
|
|
|
nonce=nonce,
|
|
|
|
|
sign=sign,
|
|
|
|
|
)
|
|
|
|
|
except services.errors.file.UnsupportedFileTypeError:
|
|
|
|
|
raise UnsupportedFileTypeError()
|
|
|
|
|
|
|
|
|
|
return Response(generator, mimetype=mimetype)
|
|
|
|
|
|
|
|
|
|
|
2025-08-25 09:27:09 +08:00
|
|
|
@files_ns.route("/<uuid:file_id>/file-preview")
|
2024-10-21 10:43:49 +08:00
|
|
|
class FilePreviewApi(Resource):
|
2025-10-25 18:23:27 +08:00
|
|
|
@files_ns.doc("get_file_preview")
|
|
|
|
|
@files_ns.doc(description="Download a file preview or attachment using signed parameters")
|
|
|
|
|
@files_ns.doc(
|
|
|
|
|
params={
|
|
|
|
|
"file_id": "ID of the file to preview",
|
|
|
|
|
"timestamp": "Unix timestamp used in the signature",
|
|
|
|
|
"nonce": "Random string used in the signature",
|
|
|
|
|
"sign": "HMAC signature verifying the request",
|
|
|
|
|
"as_attachment": "Whether to download the file as an attachment",
|
|
|
|
|
}
|
|
|
|
|
)
|
|
|
|
|
@files_ns.doc(
|
|
|
|
|
responses={
|
|
|
|
|
200: "File stream returned successfully",
|
|
|
|
|
400: "Missing or invalid signature parameters",
|
|
|
|
|
404: "File not found",
|
|
|
|
|
415: "Unsupported file type",
|
|
|
|
|
}
|
|
|
|
|
)
|
2023-11-13 22:05:46 +08:00
|
|
|
def get(self, file_id):
|
|
|
|
|
file_id = str(file_id)
|
|
|
|
|
|
2025-12-05 13:05:53 +09:00
|
|
|
args = FilePreviewQuery.model_validate(request.args.to_dict(flat=True)) # type: ignore
|
2023-11-13 22:05:46 +08:00
|
|
|
|
|
|
|
|
try:
|
2025-09-18 12:49:10 +08:00
|
|
|
generator, upload_file = FileService(db.engine).get_file_generator_by_file_id(
|
2024-10-21 10:43:49 +08:00
|
|
|
file_id=file_id,
|
2025-12-05 13:05:53 +09:00
|
|
|
timestamp=args.timestamp,
|
|
|
|
|
nonce=args.nonce,
|
|
|
|
|
sign=args.sign,
|
2024-10-21 10:43:49 +08:00
|
|
|
)
|
2023-11-13 22:05:46 +08:00
|
|
|
except services.errors.file.UnsupportedFileTypeError:
|
|
|
|
|
raise UnsupportedFileTypeError()
|
|
|
|
|
|
2024-10-23 13:12:34 +08:00
|
|
|
response = Response(
|
|
|
|
|
generator,
|
|
|
|
|
mimetype=upload_file.mime_type,
|
|
|
|
|
direct_passthrough=True,
|
|
|
|
|
headers={},
|
|
|
|
|
)
|
2025-04-30 10:51:27 +08:00
|
|
|
# add Accept-Ranges header for audio/video files
|
|
|
|
|
if upload_file.mime_type in [
|
|
|
|
|
"audio/mpeg",
|
|
|
|
|
"audio/wav",
|
|
|
|
|
"audio/mp4",
|
|
|
|
|
"audio/ogg",
|
|
|
|
|
"audio/flac",
|
|
|
|
|
"audio/aac",
|
|
|
|
|
"video/mp4",
|
|
|
|
|
"video/webm",
|
|
|
|
|
"video/quicktime",
|
|
|
|
|
"audio/x-m4a",
|
|
|
|
|
]:
|
|
|
|
|
response.headers["Accept-Ranges"] = "bytes"
|
2024-10-23 13:12:34 +08:00
|
|
|
if upload_file.size > 0:
|
|
|
|
|
response.headers["Content-Length"] = str(upload_file.size)
|
2025-12-05 13:05:53 +09:00
|
|
|
if args.as_attachment:
|
2025-02-19 17:28:32 +08:00
|
|
|
encoded_filename = quote(upload_file.name)
|
|
|
|
|
response.headers["Content-Disposition"] = f"attachment; filename*=UTF-8''{encoded_filename}"
|
2025-04-29 15:38:33 +08:00
|
|
|
response.headers["Content-Type"] = "application/octet-stream"
|
2024-10-23 13:12:34 +08:00
|
|
|
|
|
|
|
|
return response
|
2024-08-26 15:29:10 +08:00
|
|
|
|
2023-12-18 16:25:37 +08:00
|
|
|
|
2025-08-25 09:27:09 +08:00
|
|
|
@files_ns.route("/workspaces/<uuid:workspace_id>/webapp-logo")
|
2023-12-18 16:25:37 +08:00
|
|
|
class WorkspaceWebappLogoApi(Resource):
|
2025-10-25 18:23:27 +08:00
|
|
|
@files_ns.doc("get_workspace_webapp_logo")
|
|
|
|
|
@files_ns.doc(description="Fetch the custom webapp logo for a workspace")
|
|
|
|
|
@files_ns.doc(
|
|
|
|
|
params={
|
|
|
|
|
"workspace_id": "Workspace identifier",
|
|
|
|
|
}
|
|
|
|
|
)
|
|
|
|
|
@files_ns.doc(
|
|
|
|
|
responses={
|
|
|
|
|
200: "Logo returned successfully",
|
|
|
|
|
404: "Webapp logo not configured",
|
|
|
|
|
415: "Unsupported file type",
|
|
|
|
|
}
|
|
|
|
|
)
|
2023-12-18 16:25:37 +08:00
|
|
|
def get(self, workspace_id):
|
|
|
|
|
workspace_id = str(workspace_id)
|
|
|
|
|
|
|
|
|
|
custom_config = TenantService.get_custom_config(workspace_id)
|
2024-08-26 15:29:10 +08:00
|
|
|
webapp_logo_file_id = custom_config.get("replace_webapp_logo") if custom_config is not None else None
|
2023-12-18 16:25:37 +08:00
|
|
|
|
|
|
|
|
if not webapp_logo_file_id:
|
2024-08-26 15:29:10 +08:00
|
|
|
raise NotFound("webapp logo is not found")
|
2023-12-18 16:25:37 +08:00
|
|
|
|
|
|
|
|
try:
|
2025-09-18 12:49:10 +08:00
|
|
|
generator, mimetype = FileService(db.engine).get_public_image_preview(
|
2023-12-18 16:25:37 +08:00
|
|
|
webapp_logo_file_id,
|
|
|
|
|
)
|
|
|
|
|
except services.errors.file.UnsupportedFileTypeError:
|
|
|
|
|
raise UnsupportedFileTypeError()
|
|
|
|
|
|
|
|
|
|
return Response(generator, mimetype=mimetype)
|