Spaces:
Running on CPU Upgrade
Running on CPU Upgrade
File size: 6,996 Bytes
79b2fcc 564aab6 79b2fcc ff8c636 79b2fcc 540437a 79b2fcc 5af3ab5 79b2fcc 540437a 79b2fcc 540437a 79b2fcc 540437a ff8c636 540437a ff8c636 540437a 79b2fcc 540437a 79b2fcc 5af3ab5 79b2fcc 540437a | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 | """Authentication dependencies for FastAPI routes.
- In dev mode (OAUTH_CLIENT_ID not set): auth is bypassed, returns a default "dev" user.
- In production: validates Bearer tokens or cookies against HF OAuth.
"""
import logging
import os
import time
from typing import Any
import httpx
from fastapi import HTTPException, Request, status
from agent.core.hf_access import fetch_whoami_v2, jobs_access_from_whoami
logger = logging.getLogger(__name__)
OPENID_PROVIDER_URL = os.environ.get("OPENID_PROVIDER_URL", "https://huggingface.co")
AUTH_ENABLED = bool(os.environ.get("OAUTH_CLIENT_ID", ""))
HF_EMPLOYEE_ORG = os.environ.get("HF_EMPLOYEE_ORG", "huggingface")
# Simple in-memory token cache: token -> (user_info, expiry_time)
_token_cache: dict[str, tuple[dict[str, Any], float]] = {}
TOKEN_CACHE_TTL = 300 # 5 minutes
# Org membership cache: key -> expiry_time (only caches positive results)
_org_member_cache: dict[str, float] = {}
DEV_USER: dict[str, Any] = {
"user_id": "dev",
"username": "dev",
"authenticated": True,
"plan": "org", # Dev runs at the Pro/Org quota tier so local testing isn't capped.
}
# Plan field discovery — log the whoami-v2 shape once at DEBUG so we can
# confirm the actual key in production without hammering the HF API.
_WHOAMI_SHAPE_LOGGED = False
async def _validate_token(token: str) -> dict[str, Any] | None:
"""Validate a token against HF OAuth userinfo endpoint.
Results are cached for TOKEN_CACHE_TTL seconds to avoid excessive API calls.
"""
now = time.time()
# Check cache
if token in _token_cache:
user_info, expiry = _token_cache[token]
if now < expiry:
return user_info
del _token_cache[token]
# Validate against HF
async with httpx.AsyncClient(timeout=10.0) as client:
try:
response = await client.get(
f"{OPENID_PROVIDER_URL}/oauth/userinfo",
headers={"Authorization": f"Bearer {token}"},
)
if response.status_code != 200:
logger.debug("Token validation failed: status %d", response.status_code)
return None
user_info = response.json()
_token_cache[token] = (user_info, now + TOKEN_CACHE_TTL)
return user_info
except httpx.HTTPError as e:
logger.warning("Token validation error: %s", e)
return None
def _user_from_info(user_info: dict[str, Any]) -> dict[str, Any]:
"""Build a normalized user dict from HF userinfo response."""
return {
"user_id": user_info.get("sub", user_info.get("preferred_username", "unknown")),
"username": user_info.get("preferred_username", "unknown"),
"name": user_info.get("name"),
"picture": user_info.get("picture"),
"authenticated": True,
}
async def _fetch_user_plan(token: str) -> str:
"""Look up the user's HF plan via /api/whoami-v2.
Returns 'free' | 'pro' | 'org'. Non-200, network errors, or an unknown
payload shape all collapse to 'free' — safe default; we'd rather under-
grant the Pro cap than over-grant it on bad data.
"""
global _WHOAMI_SHAPE_LOGGED
whoami = await fetch_whoami_v2(token)
if whoami is None:
return "free"
if not _WHOAMI_SHAPE_LOGGED:
_WHOAMI_SHAPE_LOGGED = True
logger.debug(
"whoami-v2 payload keys: %s (sample values: plan=%r type=%r isPro=%r)",
sorted(whoami.keys()) if isinstance(whoami, dict) else type(whoami).__name__,
whoami.get("plan") if isinstance(whoami, dict) else None,
whoami.get("type") if isinstance(whoami, dict) else None,
whoami.get("isPro") if isinstance(whoami, dict) else None,
)
if not isinstance(whoami, dict):
return "free"
return jobs_access_from_whoami(whoami).plan
async def _extract_user_from_token(token: str) -> dict[str, Any] | None:
"""Validate a token and return a user dict, or None."""
user_info = await _validate_token(token)
if user_info is None:
return None
user = _user_from_info(user_info)
user["plan"] = await _fetch_user_plan(token)
return user
async def check_org_membership(token: str, org_name: str) -> bool:
"""Check if the token owner belongs to an HF org. Only caches positive results."""
now = time.time()
key = token + org_name
cached = _org_member_cache.get(key)
if cached and cached > now:
return True
async with httpx.AsyncClient(timeout=10.0) as client:
try:
resp = await client.get(
f"{OPENID_PROVIDER_URL}/api/whoami-v2",
headers={"Authorization": f"Bearer {token}"},
)
if resp.status_code != 200:
return False
orgs = {o.get("name") for o in resp.json().get("orgs", [])}
if org_name in orgs:
_org_member_cache[key] = now + TOKEN_CACHE_TTL
return True
return False
except httpx.HTTPError:
return False
async def get_current_user(request: Request) -> dict[str, Any]:
"""FastAPI dependency: extract and validate the current user.
Checks (in order):
1. Authorization: Bearer <token> header
2. hf_access_token cookie
In dev mode (AUTH_ENABLED=False), returns a default dev user.
"""
if not AUTH_ENABLED:
return DEV_USER
# Try Authorization header
auth_header = request.headers.get("Authorization", "")
if auth_header.startswith("Bearer "):
token = auth_header[7:]
user = await _extract_user_from_token(token)
if user:
return user
# Try cookie
token = request.cookies.get("hf_access_token")
if token:
user = await _extract_user_from_token(token)
if user:
return user
raise HTTPException(
status_code=status.HTTP_401_UNAUTHORIZED,
detail="Not authenticated. Please log in via /auth/login.",
headers={"WWW-Authenticate": "Bearer"},
)
def _extract_token(request: Request) -> str | None:
"""Pull the HF access token from the Authorization header or cookie.
Mirrors the lookup order used by ``get_current_user``.
"""
auth_header = request.headers.get("Authorization", "")
if auth_header.startswith("Bearer "):
return auth_header[7:]
return request.cookies.get("hf_access_token")
async def require_huggingface_org_member(request: Request) -> bool:
"""Return True if the caller is a member of the ``huggingface`` org.
Used to gate endpoints that can push a session onto an Anthropic model
billed to the Space's ``ANTHROPIC_API_KEY``. Returns True unconditionally
in dev mode so local testing isn't blocked.
"""
if not AUTH_ENABLED:
return True
token = _extract_token(request)
if not token:
return False
return await check_org_membership(token, HF_EMPLOYEE_ORG)
|