mirror of
https://github.com/comfyanonymous/ComfyUI.git
synced 2026-03-06 01:37:45 +08:00
Some checks are pending
Python Linting / Run Ruff (push) Waiting to run
Python Linting / Run Pylint (push) Waiting to run
Build package / Build Test (3.10) (push) Waiting to run
Build package / Build Test (3.11) (push) Waiting to run
Build package / Build Test (3.12) (push) Waiting to run
Build package / Build Test (3.13) (push) Waiting to run
Build package / Build Test (3.14) (push) Waiting to run
1. Seeder pause/resume: only resume after prompt execution if pause() returned True, preventing undo of user-initiated pauses. 2. Missing rollback in enrich_assets_batch: add sess.rollback() in exception handler to prevent broken session state for subsequent batch operations. 3. Hash checkpoint validation: store mtime_ns/file_size in HashCheckpoint and re-stat on resume instead of comparing the same stat result to itself. 4. Scan progress preserved: save _last_progress before clearing _progress in finally blocks so wait=true endpoint returns final stats instead of zeros. 5. Download XSS hardening: block dangerous MIME types (matching server.py) and add X-Content-Type-Options: nosniff header to asset content endpoint. Amp-Thread-ID: https://ampcode.com/threads/T-019cbb6b-e97b-776d-8c43-2de8acd0d09e Co-authored-by: Amp <amp@ampcode.com>
759 lines
26 KiB
Python
759 lines
26 KiB
Python
import asyncio
|
|
import functools
|
|
import json
|
|
import logging
|
|
import os
|
|
import urllib.parse
|
|
import uuid
|
|
from typing import Any
|
|
|
|
from aiohttp import web
|
|
from pydantic import ValidationError
|
|
|
|
import folder_paths
|
|
from app import user_manager
|
|
from app.assets.api import schemas_in, schemas_out
|
|
from app.assets.api.schemas_in import (
|
|
AssetValidationError,
|
|
UploadError,
|
|
)
|
|
from app.assets.helpers import validate_blake3_hash
|
|
from app.assets.api.upload import (
|
|
delete_temp_file_if_exists,
|
|
parse_multipart_upload,
|
|
)
|
|
from app.assets.seeder import ScanInProgressError, asset_seeder
|
|
from app.assets.services import (
|
|
DependencyMissingError,
|
|
HashMismatchError,
|
|
apply_tags,
|
|
asset_exists,
|
|
create_from_hash,
|
|
delete_asset_reference,
|
|
get_asset_detail,
|
|
list_assets_page,
|
|
list_tags,
|
|
remove_tags,
|
|
resolve_asset_for_download,
|
|
update_asset_metadata,
|
|
upload_from_temp_path,
|
|
)
|
|
|
|
ROUTES = web.RouteTableDef()
|
|
USER_MANAGER: user_manager.UserManager | None = None
|
|
_ASSETS_ENABLED = False
|
|
|
|
|
|
def _require_assets_feature_enabled(handler):
|
|
@functools.wraps(handler)
|
|
async def wrapper(request: web.Request) -> web.Response:
|
|
if not _ASSETS_ENABLED:
|
|
return _build_error_response(
|
|
503,
|
|
"SERVICE_DISABLED",
|
|
"Assets system is disabled. Start the server with --enable-assets to use this feature.",
|
|
)
|
|
return await handler(request)
|
|
|
|
return wrapper
|
|
|
|
|
|
# UUID regex (canonical hyphenated form, case-insensitive)
|
|
UUID_RE = r"[0-9a-fA-F]{8}-[0-9a-fA-F]{4}-[0-9a-fA-F]{4}-[0-9a-fA-F]{4}-[0-9a-fA-F]{12}"
|
|
|
|
|
|
def get_query_dict(request: web.Request) -> dict[str, Any]:
|
|
"""Gets a dictionary of query parameters from the request.
|
|
|
|
request.query is a MultiMapping[str], needs to be converted to a dict
|
|
to be validated by Pydantic.
|
|
"""
|
|
query_dict = {
|
|
key: request.query.getall(key)
|
|
if len(request.query.getall(key)) > 1
|
|
else request.query.get(key)
|
|
for key in request.query.keys()
|
|
}
|
|
return query_dict
|
|
|
|
|
|
# Note to any custom node developers reading this code:
|
|
# The assets system is not yet fully implemented,
|
|
# do not rely on the code in /app/assets remaining the same.
|
|
|
|
|
|
def register_assets_routes(
|
|
app: web.Application,
|
|
user_manager_instance: user_manager.UserManager | None = None,
|
|
) -> None:
|
|
global USER_MANAGER, _ASSETS_ENABLED
|
|
if user_manager_instance is not None:
|
|
USER_MANAGER = user_manager_instance
|
|
_ASSETS_ENABLED = True
|
|
app.add_routes(ROUTES)
|
|
|
|
|
|
def disable_assets_routes() -> None:
|
|
"""Disable asset routes at runtime (e.g. after DB init failure)."""
|
|
global _ASSETS_ENABLED
|
|
_ASSETS_ENABLED = False
|
|
|
|
|
|
def _build_error_response(
|
|
status: int, code: str, message: str, details: dict | None = None
|
|
) -> web.Response:
|
|
return web.json_response(
|
|
{"error": {"code": code, "message": message, "details": details or {}}},
|
|
status=status,
|
|
)
|
|
|
|
|
|
def _build_validation_error_response(code: str, ve: ValidationError) -> web.Response:
|
|
errors = json.loads(ve.json())
|
|
return _build_error_response(400, code, "Validation failed.", {"errors": errors})
|
|
|
|
|
|
def _validate_sort_field(requested: str | None) -> str:
|
|
if not requested:
|
|
return "created_at"
|
|
v = requested.lower()
|
|
if v in {"name", "created_at", "updated_at", "size", "last_access_time"}:
|
|
return v
|
|
return "created_at"
|
|
|
|
|
|
@ROUTES.head("/api/assets/hash/{hash}")
|
|
@_require_assets_feature_enabled
|
|
async def head_asset_by_hash(request: web.Request) -> web.Response:
|
|
hash_str = request.match_info.get("hash", "").strip().lower()
|
|
try:
|
|
hash_str = validate_blake3_hash(hash_str)
|
|
except ValueError:
|
|
return _build_error_response(
|
|
400, "INVALID_HASH", "hash must be like 'blake3:<hex>'"
|
|
)
|
|
exists = asset_exists(hash_str)
|
|
return web.Response(status=200 if exists else 404)
|
|
|
|
|
|
@ROUTES.get("/api/assets")
|
|
@_require_assets_feature_enabled
|
|
async def list_assets_route(request: web.Request) -> web.Response:
|
|
"""
|
|
GET request to list assets.
|
|
"""
|
|
query_dict = get_query_dict(request)
|
|
try:
|
|
q = schemas_in.ListAssetsQuery.model_validate(query_dict)
|
|
except ValidationError as ve:
|
|
return _build_validation_error_response("INVALID_QUERY", ve)
|
|
|
|
sort = _validate_sort_field(q.sort)
|
|
order_candidate = (q.order or "desc").lower()
|
|
order = order_candidate if order_candidate in {"asc", "desc"} else "desc"
|
|
|
|
result = list_assets_page(
|
|
owner_id=USER_MANAGER.get_request_user_id(request),
|
|
include_tags=q.include_tags,
|
|
exclude_tags=q.exclude_tags,
|
|
name_contains=q.name_contains,
|
|
metadata_filter=q.metadata_filter,
|
|
limit=q.limit,
|
|
offset=q.offset,
|
|
sort=sort,
|
|
order=order,
|
|
)
|
|
|
|
summaries = [
|
|
schemas_out.AssetSummary(
|
|
id=item.ref.id,
|
|
name=item.ref.name,
|
|
asset_hash=item.asset.hash if item.asset else None,
|
|
size=int(item.asset.size_bytes) if item.asset else None,
|
|
mime_type=item.asset.mime_type if item.asset else None,
|
|
tags=item.tags,
|
|
created_at=item.ref.created_at,
|
|
updated_at=item.ref.updated_at,
|
|
last_access_time=item.ref.last_access_time,
|
|
)
|
|
for item in result.items
|
|
]
|
|
|
|
payload = schemas_out.AssetsList(
|
|
assets=summaries,
|
|
total=result.total,
|
|
has_more=(q.offset + len(summaries)) < result.total,
|
|
)
|
|
return web.json_response(payload.model_dump(mode="json", exclude_none=True))
|
|
|
|
|
|
@ROUTES.get(f"/api/assets/{{id:{UUID_RE}}}")
|
|
@_require_assets_feature_enabled
|
|
async def get_asset_route(request: web.Request) -> web.Response:
|
|
"""
|
|
GET request to get an asset's info as JSON.
|
|
"""
|
|
reference_id = str(uuid.UUID(request.match_info["id"]))
|
|
try:
|
|
result = get_asset_detail(
|
|
reference_id=reference_id,
|
|
owner_id=USER_MANAGER.get_request_user_id(request),
|
|
)
|
|
if not result:
|
|
return _build_error_response(
|
|
404,
|
|
"ASSET_NOT_FOUND",
|
|
f"AssetReference {reference_id} not found",
|
|
{"id": reference_id},
|
|
)
|
|
|
|
payload = schemas_out.AssetDetail(
|
|
id=result.ref.id,
|
|
name=result.ref.name,
|
|
asset_hash=result.asset.hash if result.asset else None,
|
|
size=int(result.asset.size_bytes) if result.asset else None,
|
|
mime_type=result.asset.mime_type if result.asset else None,
|
|
tags=result.tags,
|
|
user_metadata=result.ref.user_metadata or {},
|
|
preview_id=result.ref.preview_id,
|
|
created_at=result.ref.created_at,
|
|
last_access_time=result.ref.last_access_time,
|
|
)
|
|
except ValueError as e:
|
|
return _build_error_response(
|
|
404, "ASSET_NOT_FOUND", str(e), {"id": reference_id}
|
|
)
|
|
except Exception:
|
|
logging.exception(
|
|
"get_asset failed for reference_id=%s, owner_id=%s",
|
|
reference_id,
|
|
USER_MANAGER.get_request_user_id(request),
|
|
)
|
|
return _build_error_response(500, "INTERNAL", "Unexpected server error.")
|
|
return web.json_response(payload.model_dump(mode="json"), status=200)
|
|
|
|
|
|
@ROUTES.get(f"/api/assets/{{id:{UUID_RE}}}/content")
|
|
@_require_assets_feature_enabled
|
|
async def download_asset_content(request: web.Request) -> web.Response:
|
|
disposition = request.query.get("disposition", "attachment").lower().strip()
|
|
if disposition not in {"inline", "attachment"}:
|
|
disposition = "attachment"
|
|
|
|
try:
|
|
result = resolve_asset_for_download(
|
|
reference_id=str(uuid.UUID(request.match_info["id"])),
|
|
owner_id=USER_MANAGER.get_request_user_id(request),
|
|
)
|
|
abs_path = result.abs_path
|
|
content_type = result.content_type
|
|
filename = result.download_name
|
|
except ValueError as ve:
|
|
return _build_error_response(404, "ASSET_NOT_FOUND", str(ve))
|
|
except NotImplementedError as nie:
|
|
return _build_error_response(501, "BACKEND_UNSUPPORTED", str(nie))
|
|
except FileNotFoundError:
|
|
return _build_error_response(
|
|
404, "FILE_NOT_FOUND", "Underlying file not found on disk."
|
|
)
|
|
|
|
_DANGEROUS_MIME_TYPES = {
|
|
"text/html", "text/html-sandboxed", "application/xhtml+xml",
|
|
"text/javascript", "text/css",
|
|
}
|
|
if content_type in _DANGEROUS_MIME_TYPES:
|
|
content_type = "application/octet-stream"
|
|
|
|
safe_name = (filename or "").replace("\r", "").replace("\n", "")
|
|
encoded = urllib.parse.quote(safe_name)
|
|
cd = f"{disposition}; filename*=UTF-8''{encoded}"
|
|
|
|
file_size = os.path.getsize(abs_path)
|
|
size_mb = file_size / (1024 * 1024)
|
|
logging.info(
|
|
"download_asset_content: path=%s, size=%d bytes (%.2f MB), type=%s, name=%s",
|
|
abs_path,
|
|
file_size,
|
|
size_mb,
|
|
content_type,
|
|
filename,
|
|
)
|
|
|
|
async def stream_file_chunks():
|
|
chunk_size = 64 * 1024
|
|
with open(abs_path, "rb") as f:
|
|
while True:
|
|
chunk = f.read(chunk_size)
|
|
if not chunk:
|
|
break
|
|
yield chunk
|
|
|
|
return web.Response(
|
|
body=stream_file_chunks(),
|
|
content_type=content_type,
|
|
headers={
|
|
"Content-Disposition": cd,
|
|
"Content-Length": str(file_size),
|
|
"X-Content-Type-Options": "nosniff",
|
|
},
|
|
)
|
|
|
|
|
|
@ROUTES.post("/api/assets/from-hash")
|
|
@_require_assets_feature_enabled
|
|
async def create_asset_from_hash_route(request: web.Request) -> web.Response:
|
|
try:
|
|
payload = await request.json()
|
|
body = schemas_in.CreateFromHashBody.model_validate(payload)
|
|
except ValidationError as ve:
|
|
return _build_validation_error_response("INVALID_BODY", ve)
|
|
except Exception:
|
|
return _build_error_response(
|
|
400, "INVALID_JSON", "Request body must be valid JSON."
|
|
)
|
|
|
|
result = create_from_hash(
|
|
hash_str=body.hash,
|
|
name=body.name,
|
|
tags=body.tags,
|
|
user_metadata=body.user_metadata,
|
|
owner_id=USER_MANAGER.get_request_user_id(request),
|
|
)
|
|
if result is None:
|
|
return _build_error_response(
|
|
404, "ASSET_NOT_FOUND", f"Asset content {body.hash} does not exist"
|
|
)
|
|
|
|
payload_out = schemas_out.AssetCreated(
|
|
id=result.ref.id,
|
|
name=result.ref.name,
|
|
asset_hash=result.asset.hash,
|
|
size=int(result.asset.size_bytes),
|
|
mime_type=result.asset.mime_type,
|
|
tags=result.tags,
|
|
user_metadata=result.ref.user_metadata or {},
|
|
preview_id=result.ref.preview_id,
|
|
created_at=result.ref.created_at,
|
|
last_access_time=result.ref.last_access_time,
|
|
created_new=result.created_new,
|
|
)
|
|
return web.json_response(payload_out.model_dump(mode="json"), status=201)
|
|
|
|
|
|
@ROUTES.post("/api/assets")
|
|
@_require_assets_feature_enabled
|
|
async def upload_asset(request: web.Request) -> web.Response:
|
|
"""Multipart/form-data endpoint for Asset uploads."""
|
|
try:
|
|
parsed = await parse_multipart_upload(request, check_hash_exists=asset_exists)
|
|
except UploadError as e:
|
|
return _build_error_response(e.status, e.code, e.message)
|
|
|
|
owner_id = USER_MANAGER.get_request_user_id(request)
|
|
|
|
try:
|
|
spec = schemas_in.UploadAssetSpec.model_validate(
|
|
{
|
|
"tags": parsed.tags_raw,
|
|
"name": parsed.provided_name,
|
|
"user_metadata": parsed.user_metadata_raw,
|
|
"hash": parsed.provided_hash,
|
|
}
|
|
)
|
|
except ValidationError as ve:
|
|
delete_temp_file_if_exists(parsed.tmp_path)
|
|
return _build_error_response(
|
|
400, "INVALID_BODY", f"Validation failed: {ve.json()}"
|
|
)
|
|
|
|
if spec.tags and spec.tags[0] == "models":
|
|
if (
|
|
len(spec.tags) < 2
|
|
or spec.tags[1] not in folder_paths.folder_names_and_paths
|
|
):
|
|
delete_temp_file_if_exists(parsed.tmp_path)
|
|
category = spec.tags[1] if len(spec.tags) >= 2 else ""
|
|
return _build_error_response(
|
|
400, "INVALID_BODY", f"unknown models category '{category}'"
|
|
)
|
|
|
|
try:
|
|
# Fast path: hash exists, create AssetReference without writing anything
|
|
if spec.hash and parsed.provided_hash_exists is True:
|
|
result = create_from_hash(
|
|
hash_str=spec.hash,
|
|
name=spec.name or (spec.hash.split(":", 1)[1]),
|
|
tags=spec.tags,
|
|
user_metadata=spec.user_metadata or {},
|
|
owner_id=owner_id,
|
|
)
|
|
if result is None:
|
|
delete_temp_file_if_exists(parsed.tmp_path)
|
|
return _build_error_response(
|
|
404, "ASSET_NOT_FOUND", f"Asset content {spec.hash} does not exist"
|
|
)
|
|
delete_temp_file_if_exists(parsed.tmp_path)
|
|
else:
|
|
# Otherwise, we must have a temp file path to ingest
|
|
if not parsed.tmp_path or not os.path.exists(parsed.tmp_path):
|
|
return _build_error_response(
|
|
400,
|
|
"MISSING_INPUT",
|
|
"Provided hash not found and no file uploaded.",
|
|
)
|
|
|
|
result = upload_from_temp_path(
|
|
temp_path=parsed.tmp_path,
|
|
name=spec.name,
|
|
tags=spec.tags,
|
|
user_metadata=spec.user_metadata or {},
|
|
client_filename=parsed.file_client_name,
|
|
owner_id=owner_id,
|
|
expected_hash=spec.hash,
|
|
)
|
|
except AssetValidationError as e:
|
|
delete_temp_file_if_exists(parsed.tmp_path)
|
|
return _build_error_response(400, e.code, str(e))
|
|
except ValueError as e:
|
|
delete_temp_file_if_exists(parsed.tmp_path)
|
|
return _build_error_response(400, "BAD_REQUEST", str(e))
|
|
except HashMismatchError as e:
|
|
delete_temp_file_if_exists(parsed.tmp_path)
|
|
return _build_error_response(400, "HASH_MISMATCH", str(e))
|
|
except DependencyMissingError as e:
|
|
delete_temp_file_if_exists(parsed.tmp_path)
|
|
return _build_error_response(503, "DEPENDENCY_MISSING", e.message)
|
|
except Exception:
|
|
delete_temp_file_if_exists(parsed.tmp_path)
|
|
logging.exception("upload_asset failed for owner_id=%s", owner_id)
|
|
return _build_error_response(500, "INTERNAL", "Unexpected server error.")
|
|
|
|
payload = schemas_out.AssetCreated(
|
|
id=result.ref.id,
|
|
name=result.ref.name,
|
|
asset_hash=result.asset.hash,
|
|
size=int(result.asset.size_bytes),
|
|
mime_type=result.asset.mime_type,
|
|
tags=result.tags,
|
|
user_metadata=result.ref.user_metadata or {},
|
|
preview_id=result.ref.preview_id,
|
|
created_at=result.ref.created_at,
|
|
last_access_time=result.ref.last_access_time,
|
|
created_new=result.created_new,
|
|
)
|
|
status = 201 if result.created_new else 200
|
|
return web.json_response(payload.model_dump(mode="json"), status=status)
|
|
|
|
|
|
@ROUTES.put(f"/api/assets/{{id:{UUID_RE}}}")
|
|
@_require_assets_feature_enabled
|
|
async def update_asset_route(request: web.Request) -> web.Response:
|
|
reference_id = str(uuid.UUID(request.match_info["id"]))
|
|
try:
|
|
body = schemas_in.UpdateAssetBody.model_validate(await request.json())
|
|
except ValidationError as ve:
|
|
return _build_validation_error_response("INVALID_BODY", ve)
|
|
except Exception:
|
|
return _build_error_response(
|
|
400, "INVALID_JSON", "Request body must be valid JSON."
|
|
)
|
|
|
|
try:
|
|
result = update_asset_metadata(
|
|
reference_id=reference_id,
|
|
name=body.name,
|
|
user_metadata=body.user_metadata,
|
|
owner_id=USER_MANAGER.get_request_user_id(request),
|
|
)
|
|
payload = schemas_out.AssetUpdated(
|
|
id=result.ref.id,
|
|
name=result.ref.name,
|
|
asset_hash=result.asset.hash if result.asset else None,
|
|
tags=result.tags,
|
|
user_metadata=result.ref.user_metadata or {},
|
|
updated_at=result.ref.updated_at,
|
|
)
|
|
except PermissionError as pe:
|
|
return _build_error_response(403, "FORBIDDEN", str(pe), {"id": reference_id})
|
|
except ValueError as ve:
|
|
return _build_error_response(
|
|
404, "ASSET_NOT_FOUND", str(ve), {"id": reference_id}
|
|
)
|
|
except Exception:
|
|
logging.exception(
|
|
"update_asset failed for reference_id=%s, owner_id=%s",
|
|
reference_id,
|
|
USER_MANAGER.get_request_user_id(request),
|
|
)
|
|
return _build_error_response(500, "INTERNAL", "Unexpected server error.")
|
|
return web.json_response(payload.model_dump(mode="json"), status=200)
|
|
|
|
|
|
@ROUTES.delete(f"/api/assets/{{id:{UUID_RE}}}")
|
|
@_require_assets_feature_enabled
|
|
async def delete_asset_route(request: web.Request) -> web.Response:
|
|
reference_id = str(uuid.UUID(request.match_info["id"]))
|
|
delete_content_param = request.query.get("delete_content")
|
|
delete_content = (
|
|
False
|
|
if delete_content_param is None
|
|
else delete_content_param.lower() not in {"0", "false", "no"}
|
|
)
|
|
|
|
try:
|
|
deleted = delete_asset_reference(
|
|
reference_id=reference_id,
|
|
owner_id=USER_MANAGER.get_request_user_id(request),
|
|
delete_content_if_orphan=delete_content,
|
|
)
|
|
except Exception:
|
|
logging.exception(
|
|
"delete_asset_reference failed for reference_id=%s, owner_id=%s",
|
|
reference_id,
|
|
USER_MANAGER.get_request_user_id(request),
|
|
)
|
|
return _build_error_response(500, "INTERNAL", "Unexpected server error.")
|
|
|
|
if not deleted:
|
|
return _build_error_response(
|
|
404, "ASSET_NOT_FOUND", f"AssetReference {reference_id} not found."
|
|
)
|
|
return web.Response(status=204)
|
|
|
|
|
|
@ROUTES.get("/api/tags")
|
|
@_require_assets_feature_enabled
|
|
async def get_tags(request: web.Request) -> web.Response:
|
|
"""
|
|
GET request to list all tags based on query parameters.
|
|
"""
|
|
query_map = dict(request.rel_url.query)
|
|
|
|
try:
|
|
query = schemas_in.TagsListQuery.model_validate(query_map)
|
|
except ValidationError as e:
|
|
return _build_error_response(
|
|
400,
|
|
"INVALID_QUERY",
|
|
"Invalid query parameters",
|
|
{"errors": json.loads(e.json())},
|
|
)
|
|
|
|
rows, total = list_tags(
|
|
prefix=query.prefix,
|
|
limit=query.limit,
|
|
offset=query.offset,
|
|
order=query.order,
|
|
include_zero=query.include_zero,
|
|
owner_id=USER_MANAGER.get_request_user_id(request),
|
|
)
|
|
|
|
tags = [
|
|
schemas_out.TagUsage(name=name, count=count, type=tag_type)
|
|
for (name, tag_type, count) in rows
|
|
]
|
|
payload = schemas_out.TagsList(
|
|
tags=tags, total=total, has_more=(query.offset + len(tags)) < total
|
|
)
|
|
return web.json_response(payload.model_dump(mode="json"))
|
|
|
|
|
|
@ROUTES.post(f"/api/assets/{{id:{UUID_RE}}}/tags")
|
|
@_require_assets_feature_enabled
|
|
async def add_asset_tags(request: web.Request) -> web.Response:
|
|
reference_id = str(uuid.UUID(request.match_info["id"]))
|
|
try:
|
|
json_payload = await request.json()
|
|
data = schemas_in.TagsAdd.model_validate(json_payload)
|
|
except ValidationError as ve:
|
|
return _build_error_response(
|
|
400,
|
|
"INVALID_BODY",
|
|
"Invalid JSON body for tags add.",
|
|
{"errors": ve.errors()},
|
|
)
|
|
except Exception:
|
|
return _build_error_response(
|
|
400, "INVALID_JSON", "Request body must be valid JSON."
|
|
)
|
|
|
|
try:
|
|
result = apply_tags(
|
|
reference_id=reference_id,
|
|
tags=data.tags,
|
|
origin="manual",
|
|
owner_id=USER_MANAGER.get_request_user_id(request),
|
|
)
|
|
payload = schemas_out.TagsAdd(
|
|
added=result.added,
|
|
already_present=result.already_present,
|
|
total_tags=result.total_tags,
|
|
)
|
|
except PermissionError as pe:
|
|
return _build_error_response(403, "FORBIDDEN", str(pe), {"id": reference_id})
|
|
except ValueError as ve:
|
|
return _build_error_response(
|
|
404, "ASSET_NOT_FOUND", str(ve), {"id": reference_id}
|
|
)
|
|
except Exception:
|
|
logging.exception(
|
|
"add_tags_to_asset failed for reference_id=%s, owner_id=%s",
|
|
reference_id,
|
|
USER_MANAGER.get_request_user_id(request),
|
|
)
|
|
return _build_error_response(500, "INTERNAL", "Unexpected server error.")
|
|
|
|
return web.json_response(payload.model_dump(mode="json"), status=200)
|
|
|
|
|
|
@ROUTES.delete(f"/api/assets/{{id:{UUID_RE}}}/tags")
|
|
@_require_assets_feature_enabled
|
|
async def delete_asset_tags(request: web.Request) -> web.Response:
|
|
reference_id = str(uuid.UUID(request.match_info["id"]))
|
|
try:
|
|
json_payload = await request.json()
|
|
data = schemas_in.TagsRemove.model_validate(json_payload)
|
|
except ValidationError as ve:
|
|
return _build_error_response(
|
|
400,
|
|
"INVALID_BODY",
|
|
"Invalid JSON body for tags remove.",
|
|
{"errors": ve.errors()},
|
|
)
|
|
except Exception:
|
|
return _build_error_response(
|
|
400, "INVALID_JSON", "Request body must be valid JSON."
|
|
)
|
|
|
|
try:
|
|
result = remove_tags(
|
|
reference_id=reference_id,
|
|
tags=data.tags,
|
|
owner_id=USER_MANAGER.get_request_user_id(request),
|
|
)
|
|
payload = schemas_out.TagsRemove(
|
|
removed=result.removed,
|
|
not_present=result.not_present,
|
|
total_tags=result.total_tags,
|
|
)
|
|
except PermissionError as pe:
|
|
return _build_error_response(403, "FORBIDDEN", str(pe), {"id": reference_id})
|
|
except ValueError as ve:
|
|
return _build_error_response(
|
|
404, "ASSET_NOT_FOUND", str(ve), {"id": reference_id}
|
|
)
|
|
except Exception:
|
|
logging.exception(
|
|
"remove_tags_from_asset failed for reference_id=%s, owner_id=%s",
|
|
reference_id,
|
|
USER_MANAGER.get_request_user_id(request),
|
|
)
|
|
return _build_error_response(500, "INTERNAL", "Unexpected server error.")
|
|
|
|
return web.json_response(payload.model_dump(mode="json"), status=200)
|
|
|
|
|
|
@ROUTES.post("/api/assets/seed")
|
|
@_require_assets_feature_enabled
|
|
async def seed_assets(request: web.Request) -> web.Response:
|
|
"""Trigger asset seeding for specified roots (models, input, output).
|
|
|
|
Query params:
|
|
wait: If "true", block until scan completes (synchronous behavior for tests)
|
|
|
|
Returns:
|
|
202 Accepted if scan started
|
|
409 Conflict if scan already running
|
|
200 OK with final stats if wait=true
|
|
"""
|
|
try:
|
|
payload = await request.json()
|
|
roots = payload.get("roots", ["models", "input", "output"])
|
|
except Exception:
|
|
roots = ["models", "input", "output"]
|
|
|
|
valid_roots = tuple(r for r in roots if r in ("models", "input", "output"))
|
|
if not valid_roots:
|
|
return _build_error_response(400, "INVALID_BODY", "No valid roots specified")
|
|
|
|
wait_param = request.query.get("wait", "").lower()
|
|
should_wait = wait_param in ("true", "1", "yes")
|
|
|
|
started = asset_seeder.start(roots=valid_roots)
|
|
if not started:
|
|
return web.json_response({"status": "already_running"}, status=409)
|
|
|
|
if should_wait:
|
|
await asyncio.to_thread(asset_seeder.wait)
|
|
status = asset_seeder.get_status()
|
|
return web.json_response(
|
|
{
|
|
"status": "completed",
|
|
"progress": {
|
|
"scanned": status.progress.scanned if status.progress else 0,
|
|
"total": status.progress.total if status.progress else 0,
|
|
"created": status.progress.created if status.progress else 0,
|
|
"skipped": status.progress.skipped if status.progress else 0,
|
|
},
|
|
"errors": status.errors,
|
|
},
|
|
status=200,
|
|
)
|
|
|
|
return web.json_response({"status": "started"}, status=202)
|
|
|
|
|
|
@ROUTES.get("/api/assets/seed/status")
|
|
@_require_assets_feature_enabled
|
|
async def get_seed_status(request: web.Request) -> web.Response:
|
|
"""Get current scan status and progress."""
|
|
status = asset_seeder.get_status()
|
|
return web.json_response(
|
|
{
|
|
"state": status.state.value,
|
|
"progress": {
|
|
"scanned": status.progress.scanned,
|
|
"total": status.progress.total,
|
|
"created": status.progress.created,
|
|
"skipped": status.progress.skipped,
|
|
}
|
|
if status.progress
|
|
else None,
|
|
"errors": status.errors,
|
|
},
|
|
status=200,
|
|
)
|
|
|
|
|
|
@ROUTES.post("/api/assets/seed/cancel")
|
|
@_require_assets_feature_enabled
|
|
async def cancel_seed(request: web.Request) -> web.Response:
|
|
"""Request cancellation of in-progress scan."""
|
|
cancelled = asset_seeder.cancel()
|
|
if cancelled:
|
|
return web.json_response({"status": "cancelling"}, status=200)
|
|
return web.json_response({"status": "idle"}, status=200)
|
|
|
|
|
|
@ROUTES.post("/api/assets/prune")
|
|
@_require_assets_feature_enabled
|
|
async def mark_missing_assets(request: web.Request) -> web.Response:
|
|
"""Mark assets as missing when outside all known root prefixes.
|
|
|
|
This is a non-destructive soft-delete operation. Assets and metadata
|
|
are preserved, but references are flagged as missing. They can be
|
|
restored if the file reappears in a future scan.
|
|
|
|
Returns:
|
|
200 OK with count of marked assets
|
|
409 Conflict if a scan is currently running
|
|
"""
|
|
try:
|
|
marked = asset_seeder.mark_missing_outside_prefixes()
|
|
except ScanInProgressError:
|
|
return web.json_response(
|
|
{"status": "scan_running", "marked": 0},
|
|
status=409,
|
|
)
|
|
return web.json_response({"status": "completed", "marked": marked}, status=200)
|