mirror of
https://github.com/danswer-ai/danswer.git
synced 2025-05-29 05:00:04 +02:00
* bump fastapi and starlette * bumping llama index and nltk and associated deps * bump to fix python-multipart * bump aiohttp * update package lock for examples/widget * bump black * sentencesplitter has changed namespaces * fix reorder import check, fix missing passlib * update package-lock.json * black formatter updated * reformatted again * change to black compatible reorder * change to black compatible reorder-python-imports fork * fix pytest dependency * black format again * we don't need cdk.txt. update packages to be consistent across all packages --------- Co-authored-by: Richard Kuo (Onyx) <rkuo@onyx.app> Co-authored-by: Richard Kuo <rkuo@rkuo.com>
99 lines
3.3 KiB
Python
99 lines
3.3 KiB
Python
from uuid import uuid4
|
|
|
|
import requests
|
|
|
|
from onyx.db.models import UserRole
|
|
from onyx.server.api_key.models import APIKeyArgs
|
|
from tests.integration.common_utils.constants import API_SERVER_URL
|
|
from tests.integration.common_utils.constants import GENERAL_HEADERS
|
|
from tests.integration.common_utils.test_models import DATestAPIKey
|
|
from tests.integration.common_utils.test_models import DATestUser
|
|
|
|
|
|
class APIKeyManager:
|
|
@staticmethod
|
|
def create(
|
|
name: str | None = None,
|
|
api_key_role: UserRole = UserRole.ADMIN,
|
|
user_performing_action: DATestUser | None = None,
|
|
) -> DATestAPIKey:
|
|
name = f"{name}-api-key" if name else f"test-api-key-{uuid4()}"
|
|
api_key_request = APIKeyArgs(
|
|
name=name,
|
|
role=api_key_role,
|
|
)
|
|
api_key_response = requests.post(
|
|
f"{API_SERVER_URL}/admin/api-key",
|
|
json=api_key_request.model_dump(),
|
|
headers=(
|
|
user_performing_action.headers
|
|
if user_performing_action
|
|
else GENERAL_HEADERS
|
|
),
|
|
)
|
|
api_key_response.raise_for_status()
|
|
api_key = api_key_response.json()
|
|
result_api_key = DATestAPIKey(
|
|
api_key_id=api_key["api_key_id"],
|
|
api_key_display=api_key["api_key_display"],
|
|
api_key=api_key["api_key"],
|
|
api_key_name=name,
|
|
api_key_role=api_key_role,
|
|
user_id=api_key["user_id"],
|
|
headers=GENERAL_HEADERS,
|
|
)
|
|
result_api_key.headers["Authorization"] = f"Bearer {result_api_key.api_key}"
|
|
return result_api_key
|
|
|
|
@staticmethod
|
|
def delete(
|
|
api_key: DATestAPIKey,
|
|
user_performing_action: DATestUser | None = None,
|
|
) -> None:
|
|
api_key_response = requests.delete(
|
|
f"{API_SERVER_URL}/admin/api-key/{api_key.api_key_id}",
|
|
headers=(
|
|
user_performing_action.headers
|
|
if user_performing_action
|
|
else GENERAL_HEADERS
|
|
),
|
|
)
|
|
api_key_response.raise_for_status()
|
|
|
|
@staticmethod
|
|
def get_all(
|
|
user_performing_action: DATestUser | None = None,
|
|
) -> list[DATestAPIKey]:
|
|
api_key_response = requests.get(
|
|
f"{API_SERVER_URL}/admin/api-key",
|
|
headers=(
|
|
user_performing_action.headers
|
|
if user_performing_action
|
|
else GENERAL_HEADERS
|
|
),
|
|
)
|
|
api_key_response.raise_for_status()
|
|
return [DATestAPIKey(**api_key) for api_key in api_key_response.json()]
|
|
|
|
@staticmethod
|
|
def verify(
|
|
api_key: DATestAPIKey,
|
|
verify_deleted: bool = False,
|
|
user_performing_action: DATestUser | None = None,
|
|
) -> None:
|
|
retrieved_keys = APIKeyManager.get_all(
|
|
user_performing_action=user_performing_action
|
|
)
|
|
for key in retrieved_keys:
|
|
if key.api_key_id == api_key.api_key_id:
|
|
if verify_deleted:
|
|
raise ValueError("API Key found when it should have been deleted")
|
|
if (
|
|
key.api_key_name == api_key.api_key_name
|
|
and key.api_key_role == api_key.api_key_role
|
|
):
|
|
return
|
|
|
|
if not verify_deleted:
|
|
raise Exception("API Key not found")
|