diff --git a/CHANGELOG.md b/CHANGELOG.md index 4d119a1386..0f756a5e1e 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -5,6 +5,96 @@ All notable changes to this project will be documented in this file. The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.1.0/), and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html). +## [0.6.37] - 2025-11-24 + +### Added + +- 🔐 Granular sharing permissions are now available with two-tiered control separating group sharing from public sharing, allowing administrators to independently configure whether users can share workspace items with groups or make them publicly accessible, with separate permission toggles for models, knowledge bases, prompts, tools, and notes, configurable via "USER_PERMISSIONS_WORKSPACE_MODELS_ALLOW_SHARING", "USER_PERMISSIONS_WORKSPACE_MODELS_ALLOW_PUBLIC_SHARING", and corresponding environment variables for other workspace item types, while groups can now be configured to opt-out of sharing via the "Allow Group Sharing" setting. [Commit](https://github.com/open-webui/open-webui/commit/7be750bcbb40da91912a0a66b7ab791effdcc3b6), [Commit](https://github.com/open-webui/open-webui/commit/f69e37a8507d6d57382d6670641b367f3127f90a) +- 🔐 Password policy enforcement is now available with configurable validation rules, allowing administrators to require specific password complexity requirements via "ENABLE_PASSWORD_VALIDATION" and "PASSWORD_VALIDATION_REGEX_PATTERN" environment variables, with default pattern requiring minimum 8 characters including uppercase, lowercase, digit, and special character. [#17794](https://github.com/open-webui/open-webui/pull/17794) +- 🔐 Granular import and export permissions are now available for workspace items, introducing six separate permission toggles for models, prompts, and tools that are disabled by default for enhanced security. [#19242](https://github.com/open-webui/open-webui/pull/19242) +- 👥 Default group assignment is now available for new users, allowing administrators to automatically assign newly registered users to a specified group for streamlined access control to models, prompts, and tools, particularly useful for organizations with group-based model access policies. [#19325](https://github.com/open-webui/open-webui/pull/19325), [#17842](https://github.com/open-webui/open-webui/issues/17842) +- 🔒 Password-based authentication can now be fully disabled via "ENABLE_PASSWORD_AUTH" environment variable, enforcing SSO-only authentication and preventing password login fallback when SSO is configured. [#19113](https://github.com/open-webui/open-webui/pull/19113) +- 🖼️ Large stream chunk handling was implemented to support models that generate images directly in their output responses, with configurable buffer size via "CHAT_STREAM_RESPONSE_CHUNK_MAX_BUFFER_SIZE" environment variable, resolving compatibility issues with models like Gemini 2.5 Flash Image. [#18884](https://github.com/open-webui/open-webui/pull/18884), [#17626](https://github.com/open-webui/open-webui/issues/17626) +- 🖼️ Streaming response middleware now handles images in delta updates with automatic base64 conversion, enabling proper display of images from models using the "choices[0].delta.images.image_url" format such as Gemini 2.5 Flash Image Preview on OpenRouter. [#19073](https://github.com/open-webui/open-webui/pull/19073), [#19019](https://github.com/open-webui/open-webui/issues/19019) +- 📈 Model list API performance was optimized by pre-fetching user group memberships and removing profile image URLs from response payloads, significantly reducing both database queries and payload size for instances with large model lists, with profile images now served dynamically via dedicated endpoints. [#19097](https://github.com/open-webui/open-webui/pull/19097), [#18950](https://github.com/open-webui/open-webui/issues/18950) +- ⏩ Batch file processing performance was improved by reducing database queries by 67% while ensuring data consistency between vector and relational databases. [#18953](https://github.com/open-webui/open-webui/pull/18953) +- 🚀 Chat import performance was dramatically improved by replacing individual per-chat API requests with a bulk import endpoint, reducing import time by up to 95% for large chat collections and providing user feedback via toast notifications displaying the number of successfully imported chats. [#17861](https://github.com/open-webui/open-webui/pull/17861) +- ⚡ Socket event broadcasting performance was optimized by implementing user-specific rooms, significantly reducing server overhead particularly for users with multiple concurrent sessions. [#18996](https://github.com/open-webui/open-webui/pull/18996) +- 🗄️ Weaviate is now supported as a vector database option, providing an additional choice for RAG document storage alongside existing ChromaDB, Milvus, Qdrant, and OpenSearch integrations. [#14747](https://github.com/open-webui/open-webui/pull/14747) +- 🗄️ PostgreSQL pgvector now supports HNSW index types and large dimensional embeddings exceeding 2000 dimensions through automatic halfvec type selection, with configurable index methods via "PGVECTOR_INDEX_METHOD", "PGVECTOR_HNSW_M", "PGVECTOR_HNSW_EF_CONSTRUCTION", and "PGVECTOR_IVFFLAT_LISTS" environment variables. [#19158](https://github.com/open-webui/open-webui/pull/19158), [#16890](https://github.com/open-webui/open-webui/issues/16890) +- 🔍 Azure AI Search is now supported as a web search provider, enabling integration with Azure's cognitive search services via "AZURE_AI_SEARCH_API_KEY", "AZURE_AI_SEARCH_ENDPOINT", and "AZURE_AI_SEARCH_INDEX_NAME" configuration. [#19104](https://github.com/open-webui/open-webui/pull/19104) +- ⚡ External embedding generation now processes API requests in parallel instead of sequential batches, reducing document processing time by 10-50x when using OpenAI, Azure OpenAI, or Ollama embedding providers, with large PDFs now processing in seconds instead of minutes. [#19296](https://github.com/open-webui/open-webui/pull/19296) +- 💨 Base64 image conversion is now available for markdown content in chat responses, automatically uploading embedded images exceeding 1KB and replacing them with file URLs to reduce payload size and resource consumption, configurable via "REPLACE_IMAGE_URLS_IN_CHAT_RESPONSE" environment variable. [#19076](https://github.com/open-webui/open-webui/pull/19076) +- 🎨 OpenAI image generation now supports additional API parameters including quality settings for GPT Image 1, configurable via "IMAGES_OPENAI_API_PARAMS" environment variable or through the admin interface, enabling cost-effective image generation with low, medium, or high quality options. [#19228](https://github.com/open-webui/open-webui/issues/19228) +- 🖼️ Image editing can now be independently enabled or disabled via admin settings, allowing administrators to control whether sequential image prompts trigger image editing or new image generation, configurable via "ENABLE_IMAGE_EDIT" environment variable. [#19284](https://github.com/open-webui/open-webui/issues/19284) +- 🔐 SSRF protection was implemented with a configurable URL blocklist that prevents access to cloud metadata endpoints and private networks, with default protections for AWS, Google Cloud, Azure, and Alibaba Cloud metadata services, customizable via "WEB_FETCH_FILTER_LIST" environment variable. [#19201](https://github.com/open-webui/open-webui/pull/19201) +- ⚡ Workspace models page now supports server-side pagination dramatically improving load times and usability for instances with large numbers of workspace models. +- 🔍 Hybrid search now indexes file metadata including filenames, titles, headings, sources, and snippets alongside document content, enabling keyword queries to surface documents where search terms appear only in metadata, configurable via "ENABLE_RAG_HYBRID_SEARCH_ENRICHED_TEXTS" environment variable. [#19095](https://github.com/open-webui/open-webui/pull/19095) +- 📂 Knowledge base upload page now supports folder drag-and-drop with recursive directory handling, enabling batch uploads of entire directory structures instead of requiring individual file selection. [#19320](https://github.com/open-webui/open-webui/pull/19320) +- 🤖 Model cloning is now available in admin settings, allowing administrators to quickly create workspace models based on existing base models through a "Clone" option in the model dropdown menu. [#17937](https://github.com/open-webui/open-webui/pull/17937) +- 🎨 UI scale adjustment is now available in interface settings, allowing users to increase the size of the entire interface from 1.0x to 1.5x for improved accessibility and readability, particularly beneficial for users with visual impairments. [#19186](https://github.com/open-webui/open-webui/pull/19186) +- 📌 Default pinned models can now be configured by administrators for all new users, mirroring the behavior of default models where admin-configured defaults apply only to users who haven't customized their pinned models, configurable via "DEFAULT_PINNED_MODELS" environment variable. [#19273](https://github.com/open-webui/open-webui/pull/19273) +- 🎙️ Text-to-Speech and Speech-to-Text services now receive user information headers when "ENABLE_FORWARD_USER_INFO_HEADERS" is enabled, allowing external TTS and STT providers to implement user-specific personalization, rate limiting, and usage tracking. [#19323](https://github.com/open-webui/open-webui/pull/19323), [#19312](https://github.com/open-webui/open-webui/issues/19312) +- 🎙️ Voice mode now supports custom system prompts via "VOICE_MODE_PROMPT_TEMPLATE" configuration, allowing administrators to control response style and behavior for voice interactions. [#18607](https://github.com/open-webui/open-webui/pull/18607) +- 🔧 WebSocket and Redis configuration options are now available including debug logging controls, custom ping timeout and interval settings, and arbitrary Redis connection options via "WEBSOCKET_SERVER_LOGGING", "WEBSOCKET_SERVER_ENGINEIO_LOGGING", "WEBSOCKET_SERVER_PING_TIMEOUT", "WEBSOCKET_SERVER_PING_INTERVAL", and "WEBSOCKET_REDIS_OPTIONS" environment variables. [#19091](https://github.com/open-webui/open-webui/pull/19091) +- 🔧 MCP OAuth dynamic client registration now automatically detects and uses the appropriate token endpoint authentication method from server-supported options, enabling compatibility with OAuth servers that only support "client_secret_basic" instead of "client_secret_post". [#19193](https://github.com/open-webui/open-webui/issues/19193) +- 🔧 Custom headers can now be configured for remote MCP and OpenAPI tool server connections, enabling integration with services that require additional authentication headers. [#18918](https://github.com/open-webui/open-webui/issues/18918) +- 🔍 Perplexity Search now supports custom API endpoints via "PERPLEXITY_SEARCH_API_URL" configuration and automatically forwards user information headers to enable personalized search experiences. [#19147](https://github.com/open-webui/open-webui/pull/19147) +- 🔍 User information headers can now be optionally forwarded to external web search engines when "ENABLE_FORWARD_USER_INFO_HEADERS" is enabled. [#19043](https://github.com/open-webui/open-webui/pull/19043) +- 📊 Daily active user metric is now available for monitoring, tracking unique users active since midnight UTC via the "webui.users.active.today" Prometheus gauge. [#19236](https://github.com/open-webui/open-webui/pull/19236), [#19234](https://github.com/open-webui/open-webui/issues/19234) +- 📊 Audit log file path is now configurable via "AUDIT_LOGS_FILE_PATH" environment variable, enabling storage in separate volumes or custom locations. [#19173](https://github.com/open-webui/open-webui/pull/19173) +- 🎨 Sidebar collapse states for model lists and group information are now persistent across page refreshes, remembering user preferences through browser-based storage. [#19159](https://github.com/open-webui/open-webui/issues/19159) +- 🎨 Background image display was enhanced with semi-transparent overlays for navbar and sidebar, creating a seamless and visually cohesive design across the entire interface. [#19157](https://github.com/open-webui/open-webui/issues/19157) +- 📋 Tables in chat messages now include a copy button that appears on hover, enabling quick copying of table content alongside the existing CSV export functionality. [#19162](https://github.com/open-webui/open-webui/issues/19162) +- 📝 Notes can now be created directly via the "/notes/new" URL endpoint with optional title and content query parameters, enabling faster note creation through bookmarks and shortcuts. [#19195](https://github.com/open-webui/open-webui/issues/19195) +- 🏷️ Tag suggestions are now context-aware, displaying only relevant tags when creating or editing models versus chat conversations, preventing confusion between model and chat tags. [#19135](https://github.com/open-webui/open-webui/issues/19135) +- ✍️ Prompt autocompletion is now available independently of the rich text input setting, improving accessibility to the feature. [#19150](https://github.com/open-webui/open-webui/issues/19150) +- 🔄 Various improvements were implemented across the frontend and backend to enhance performance, stability, and security. +- 🌐 Translations for Simplified Chinese, Traditional Chinese, Portuguese (Brazil), Catalan, Spanish (Spain), Finnish, Irish, Farsi, Swedish, Danish, German, Korean, and Thai were improved and expanded. + +### Fixed + +- 🤖 Model update functionality now works correctly, resolving a database parameter binding error that prevented saving changes to model configurations via the Save & Update button. [#19335](https://github.com/open-webui/open-webui/issues/19335) +- 🖼️ Multiple input images for image editing and generation are now correctly passed as an array using the "image[]" parameter syntax, enabling proper multi-image reference functionality with models like GPT Image 1. [#19339](https://github.com/open-webui/open-webui/issues/19339) +- 📱 PWA installations on iOS now properly refresh after server container restarts, resolving freezing issues by automatically unregistering service workers when version or deployment changes are detected. [#19316](https://github.com/open-webui/open-webui/pull/19316) +- 🗄️ S3 Vectors collection detection now correctly handles buckets with more than 2000 indexes by using direct index lookup instead of paginated list scanning, improving performance by approximately 8x and enabling RAG queries to work reliably at scale. [#19238](https://github.com/open-webui/open-webui/pull/19238), [#19233](https://github.com/open-webui/open-webui/issues/19233) +- 📈 Feedback retrieval performance was optimized by eliminating N+1 query patterns through database joins, adding server-side pagination and sorting, significantly reducing database load for instances with large feedback datasets. [#17976](https://github.com/open-webui/open-webui/pull/17976) +- 🔍 Chat search now works correctly with PostgreSQL when chat data contains null bytes, with comprehensive sanitization preventing null bytes during data writes, cleaning existing data on read, and stripping null bytes during search queries to ensure reliable search functionality. [#15616](https://github.com/open-webui/open-webui/issues/15616) +- 🔍 Hybrid search with reranking now correctly handles attribute validation, preventing errors when collection results lack expected structure. [#19025](https://github.com/open-webui/open-webui/pull/19025), [#17046](https://github.com/open-webui/open-webui/issues/17046) +- 🔎 Reranking functionality now works correctly after recent refactoring, resolving crashes caused by incorrect function argument handling. [#19270](https://github.com/open-webui/open-webui/pull/19270) +- 🤖 Azure OpenAI models now support the "reasoning_effort" parameter, enabling proper configuration of reasoning capabilities for models like GPT-5.1 which default to no reasoning without this setting. [#19290](https://github.com/open-webui/open-webui/issues/19290) +- 🤖 Models with very long IDs can now be deleted correctly, resolving URL length limitations that previously prevented management operations on such models. [#18230](https://github.com/open-webui/open-webui/pull/18230) +- 🤖 Model-level streaming settings now correctly apply to API requests, ensuring "Stream Chat Response" toggle properly controls the streaming parameter. [#19154](https://github.com/open-webui/open-webui/issues/19154) +- 🖼️ Image editing configuration now correctly preserves independent OpenAI API endpoints and keys, preventing them from being overwritten by image generation settings. [#19003](https://github.com/open-webui/open-webui/issues/19003) +- 🎨 Gemini image edit settings now display correctly in the admin panel, fixing an incorrect configuration key reference that prevented proper rendering of edit options. [#19200](https://github.com/open-webui/open-webui/pull/19200) +- 🖌️ Image generation settings menu now loads correctly, resolving validation errors with AUTOMATIC1111 API authentication parameters. [#19187](https://github.com/open-webui/open-webui/issues/19187), [#19246](https://github.com/open-webui/open-webui/issues/19246) +- 📅 Date formatting in chat search and admin user chat search now correctly respects the "DEFAULT_LOCALE" environment variable, displaying dates according to the configured locale instead of always using MM/DD/YYYY format. [#19305](https://github.com/open-webui/open-webui/pull/19305), [#19020](https://github.com/open-webui/open-webui/issues/19020) +- 📝 RAG template query placeholder escaping logic was corrected to prevent unintended replacements of context values when query placeholders appear in retrieved content. [#19102](https://github.com/open-webui/open-webui/pull/19102), [#19101](https://github.com/open-webui/open-webui/issues/19101) +- 📄 RAG template prompt duplication was eliminated by removing redundant user query section from the default template. [#19099](https://github.com/open-webui/open-webui/pull/19099), [#19098](https://github.com/open-webui/open-webui/issues/19098) +- 📋 MinerU local mode configuration no longer incorrectly requires an API key, allowing proper use of local content extraction without external API credentials. [#19258](https://github.com/open-webui/open-webui/issues/19258) +- 📊 Excel file uploads now work correctly with the addition of the missing msoffcrypto-tool dependency, resolving import errors introduced by the unstructured package upgrade. [#19153](https://github.com/open-webui/open-webui/issues/19153) +- 📑 Docling parameters now properly handle JSON serialization, preventing exceptions and ensuring configuration changes are saved correctly. [#19072](https://github.com/open-webui/open-webui/pull/19072) +- 🛠️ UserValves configuration now correctly isolates settings per tool, preventing configuration contamination when multiple tools with UserValves are used simultaneously. [#19185](https://github.com/open-webui/open-webui/pull/19185), [#15569](https://github.com/open-webui/open-webui/issues/15569) +- 🔧 Tool selection prompt now correctly handles user messages without duplication, removing redundant query prefixes and improving prompt clarity. [#19122](https://github.com/open-webui/open-webui/pull/19122), [#19121](https://github.com/open-webui/open-webui/issues/19121) +- 📝 Notes chat feature now correctly submits messages to the completions endpoint, resolving errors that prevented AI model interactions. [#19079](https://github.com/open-webui/open-webui/pull/19079) +- 📝 Note PDF downloads now sanitize HTML content using DOMPurify before rendering, preventing potential DOM-based XSS attacks from malicious content in notes. [Commit](https://github.com/open-webui/open-webui/commit/03cc6ce8eb5c055115406e2304fbf7e3338b8dce) +- 📁 Archived chats now have their folder associations automatically removed to prevent unintended deletion when their previous folder is deleted. [#14578](https://github.com/open-webui/open-webui/issues/14578) +- 🔐 ElevenLabs API key is now properly obfuscated in the admin settings page, preventing plain text exposure of sensitive credentials. [#19262](https://github.com/open-webui/open-webui/pull/19262), [#19260](https://github.com/open-webui/open-webui/issues/19260) +- 🔧 MCP OAuth server metadata discovery now follows the correct specification order, ensuring proper authentication flow compliance. [#19244](https://github.com/open-webui/open-webui/pull/19244) +- 🔒 API key endpoint restrictions now properly enforce access controls for all endpoints including SCIM, preventing unintended access when "API_KEY_ALLOWED_ENDPOINTS" is configured. [#19168](https://github.com/open-webui/open-webui/issues/19168) +- 🔓 OAuth role claim parsing now supports both flat and nested claim structures, enabling compatibility with OAuth providers that deliver claims as direct properties on the user object rather than nested structures. [#19286](https://github.com/open-webui/open-webui/pull/19286) +- 🔑 OAuth MCP server verification now correctly extracts the access token value for authorization headers instead of sending the entire token dictionary. [#19149](https://github.com/open-webui/open-webui/pull/19149), [#19148](https://github.com/open-webui/open-webui/issues/19148) +- ⚙️ OAuth dynamic client registration now correctly converts empty strings to None for optional fields, preventing validation failures in MCP package integration. [#19144](https://github.com/open-webui/open-webui/pull/19144), [#19129](https://github.com/open-webui/open-webui/issues/19129) +- 🔐 OIDC authentication now correctly passes client credentials in access token requests, ensuring compatibility with providers that require these parameters per RFC 6749. [#19132](https://github.com/open-webui/open-webui/pull/19132), [#19131](https://github.com/open-webui/open-webui/issues/19131) +- 🔗 OAuth client creation now respects configured token endpoint authentication methods instead of defaulting to basic authentication, preventing failures with servers that don't support basic auth. [#19165](https://github.com/open-webui/open-webui/pull/19165) +- 📋 Text copied from chat responses in Chrome now pastes without background formatting, improving readability when pasting into word processors. [#19083](https://github.com/open-webui/open-webui/issues/19083) + +### Changed + +- 🗄️ Group membership data storage was refactored from JSON arrays to a dedicated relational database table, significantly improving query performance and scalability for instances with large numbers of users and groups, while API responses now return member counts instead of full user ID arrays. [#19239](https://github.com/open-webui/open-webui/pull/19239) +- 📄 MinerU parameter handling was refactored to pass parameters directly to the API, improving flexibility and fixing VLM backend configuration. [#19105](https://github.com/open-webui/open-webui/pull/19105), [#18446](https://github.com/open-webui/open-webui/discussions/18446) +- 🔐 API key creation is now controlled by granular user and group permissions, with the "ENABLE_API_KEY" environment variable renamed to "ENABLE_API_KEYS" and disabled by default, requiring explicit configuration at both the global and user permission levels, while related environment variables "ENABLE_API_KEY_ENDPOINT_RESTRICTIONS" and "API_KEY_ALLOWED_ENDPOINTS" were renamed to "ENABLE_API_KEYS_ENDPOINT_RESTRICTIONS" and "API_KEYS_ALLOWED_ENDPOINTS" respectively. [#18336](https://github.com/open-webui/open-webui/pull/18336) + ## [0.6.36] - 2025-11-07 ### Added diff --git a/README.md b/README.md index 52a3821aa5..638cdacabb 100644 --- a/README.md +++ b/README.md @@ -31,32 +31,44 @@ For more information, be sure to check out our [Open WebUI Documentation](https: - 🛡️ **Granular Permissions and User Groups**: By allowing administrators to create detailed user roles and permissions, we ensure a secure user environment. This granularity not only enhances security but also allows for customized user experiences, fostering a sense of ownership and responsibility amongst users. -- 🔄 **SCIM 2.0 Support**: Enterprise-grade user and group provisioning through SCIM 2.0 protocol, enabling seamless integration with identity providers like Okta, Azure AD, and Google Workspace for automated user lifecycle management. - - 📱 **Responsive Design**: Enjoy a seamless experience across Desktop PC, Laptop, and Mobile devices. - 📱 **Progressive Web App (PWA) for Mobile**: Enjoy a native app-like experience on your mobile device with our PWA, providing offline access on localhost and a seamless user interface. - ✒️🔢 **Full Markdown and LaTeX Support**: Elevate your LLM experience with comprehensive Markdown and LaTeX capabilities for enriched interaction. -- 🎤📹 **Hands-Free Voice/Video Call**: Experience seamless communication with integrated hands-free voice and video call features, allowing for a more dynamic and interactive chat environment. +- 🎤📹 **Hands-Free Voice/Video Call**: Experience seamless communication with integrated hands-free voice and video call features using multiple Speech-to-Text providers (Local Whisper, OpenAI, Deepgram, Azure) and Text-to-Speech engines (Azure, ElevenLabs, OpenAI, Transformers, WebAPI), allowing for dynamic and interactive chat environments. - 🛠️ **Model Builder**: Easily create Ollama models via the Web UI. Create and add custom characters/agents, customize chat elements, and import models effortlessly through [Open WebUI Community](https://openwebui.com/) integration. - 🐍 **Native Python Function Calling Tool**: Enhance your LLMs with built-in code editor support in the tools workspace. Bring Your Own Function (BYOF) by simply adding your pure Python functions, enabling seamless integration with LLMs. -- 📚 **Local RAG Integration**: Dive into the future of chat interactions with groundbreaking Retrieval Augmented Generation (RAG) support. This feature seamlessly integrates document interactions into your chat experience. You can load documents directly into the chat or add files to your document library, effortlessly accessing them using the `#` command before a query. +- 💾 **Persistent Artifact Storage**: Built-in key-value storage API for artifacts, enabling features like journals, trackers, leaderboards, and collaborative tools with both personal and shared data scopes across sessions. -- 🔍 **Web Search for RAG**: Perform web searches using providers like `SearXNG`, `Google PSE`, `Brave Search`, `serpstack`, `serper`, `Serply`, `DuckDuckGo`, `TavilySearch`, `SearchApi` and `Bing` and inject the results directly into your chat experience. +- 📚 **Local RAG Integration**: Dive into the future of chat interactions with groundbreaking Retrieval Augmented Generation (RAG) support using your choice of 9 vector databases and multiple content extraction engines (Tika, Docling, Document Intelligence, Mistral OCR, External loaders). Load documents directly into chat or add files to your document library, effortlessly accessing them using the `#` command before a query. + +- 🔍 **Web Search for RAG**: Perform web searches using 15+ providers including `SearXNG`, `Google PSE`, `Brave Search`, `Kagi`, `Mojeek`, `Tavily`, `Perplexity`, `serpstack`, `serper`, `Serply`, `DuckDuckGo`, `SearchApi`, `SerpApi`, `Bing`, `Jina`, `Exa`, `Sougou`, `Azure AI Search`, and `Ollama Cloud`, injecting results directly into your chat experience. - 🌐 **Web Browsing Capability**: Seamlessly integrate websites into your chat experience using the `#` command followed by a URL. This feature allows you to incorporate web content directly into your conversations, enhancing the richness and depth of your interactions. -- 🎨 **Image Generation Integration**: Seamlessly incorporate image generation capabilities using options such as AUTOMATIC1111 API or ComfyUI (local), and OpenAI's DALL-E (external), enriching your chat experience with dynamic visual content. +- 🎨 **Image Generation & Editing Integration**: Create and edit images using multiple engines including OpenAI's DALL-E, Gemini, ComfyUI (local), and AUTOMATIC1111 (local), with support for both generation and prompt-based editing workflows. - ⚙️ **Many Models Conversations**: Effortlessly engage with various models simultaneously, harnessing their unique strengths for optimal responses. Enhance your experience by leveraging a diverse set of models in parallel. - 🔐 **Role-Based Access Control (RBAC)**: Ensure secure access with restricted permissions; only authorized individuals can access your Ollama, and exclusive model creation/pulling rights are reserved for administrators. +- 🗄️ **Flexible Database & Storage Options**: Choose from SQLite (with optional encryption), PostgreSQL, or configure cloud storage backends (S3, Google Cloud Storage, Azure Blob Storage) for scalable deployments. + +- 🔍 **Advanced Vector Database Support**: Select from 9 vector database options including ChromaDB, PGVector, Qdrant, Milvus, Elasticsearch, OpenSearch, Pinecone, S3Vector, and Oracle 23ai for optimal RAG performance. + +- 🔐 **Enterprise Authentication**: Full support for LDAP/Active Directory integration, SCIM 2.0 automated provisioning, and SSO via trusted headers alongside OAuth providers. Enterprise-grade user and group provisioning through SCIM 2.0 protocol, enabling seamless integration with identity providers like Okta, Azure AD, and Google Workspace for automated user lifecycle management. + +- ☁️ **Cloud-Native Integration**: Native support for Google Drive and OneDrive/SharePoint file picking, enabling seamless document import from enterprise cloud storage. + +- 📊 **Production Observability**: Built-in OpenTelemetry support for traces, metrics, and logs, enabling comprehensive monitoring with your existing observability stack. + +- ⚖️ **Horizontal Scalability**: Redis-backed session management and WebSocket support for multi-worker and multi-node deployments behind load balancers. + - 🌐🌍 **Multilingual Support**: Experience Open WebUI in your preferred language with our internationalization (i18n) support. Join us in expanding our supported languages! We're actively seeking contributors! - 🧩 **Pipelines, Open WebUI Plugin Support**: Seamlessly integrate custom logic and Python libraries into Open WebUI using [Pipelines Plugin Framework](https://github.com/open-webui/pipelines). Launch your Pipelines instance, set the OpenAI URL to the Pipelines URL, and explore endless possibilities. [Examples](https://github.com/open-webui/pipelines/tree/main/examples) include **Function Calling**, User **Rate Limiting** to control access, **Usage Monitoring** with tools like Langfuse, **Live Translation with LibreTranslate** for multilingual support, **Toxic Message Filtering** and much more. diff --git a/backend/open_webui/config.py b/backend/open_webui/config.py index 8d5b6829dc..4070e03376 100644 --- a/backend/open_webui/config.py +++ b/backend/open_webui/config.py @@ -287,25 +287,30 @@ class AppConfig: # WEBUI_AUTH (Required for security) #################################### -ENABLE_API_KEY = PersistentConfig( - "ENABLE_API_KEY", - "auth.api_key.enable", - os.environ.get("ENABLE_API_KEY", "True").lower() == "true", +ENABLE_API_KEYS = PersistentConfig( + "ENABLE_API_KEYS", + "auth.enable_api_keys", + os.environ.get("ENABLE_API_KEYS", "False").lower() == "true", ) -ENABLE_API_KEY_ENDPOINT_RESTRICTIONS = PersistentConfig( - "ENABLE_API_KEY_ENDPOINT_RESTRICTIONS", +ENABLE_API_KEYS_ENDPOINT_RESTRICTIONS = PersistentConfig( + "ENABLE_API_KEYS_ENDPOINT_RESTRICTIONS", "auth.api_key.endpoint_restrictions", - os.environ.get("ENABLE_API_KEY_ENDPOINT_RESTRICTIONS", "False").lower() == "true", + os.environ.get( + "ENABLE_API_KEYS_ENDPOINT_RESTRICTIONS", + os.environ.get("ENABLE_API_KEY_ENDPOINT_RESTRICTIONS", "False"), + ).lower() + == "true", ) -API_KEY_ALLOWED_ENDPOINTS = PersistentConfig( - "API_KEY_ALLOWED_ENDPOINTS", +API_KEYS_ALLOWED_ENDPOINTS = PersistentConfig( + "API_KEYS_ALLOWED_ENDPOINTS", "auth.api_key.allowed_endpoints", - os.environ.get("API_KEY_ALLOWED_ENDPOINTS", ""), + os.environ.get( + "API_KEYS_ALLOWED_ENDPOINTS", os.environ.get("API_KEY_ALLOWED_ENDPOINTS", "") + ), ) - JWT_EXPIRES_IN = PersistentConfig( "JWT_EXPIRES_IN", "auth.jwt_expiry", os.environ.get("JWT_EXPIRES_IN", "4w") ) @@ -1124,6 +1129,7 @@ ENABLE_LOGIN_FORM = PersistentConfig( os.environ.get("ENABLE_LOGIN_FORM", "True").lower() == "true", ) +ENABLE_PASSWORD_AUTH = os.environ.get("ENABLE_PASSWORD_AUTH", "True").lower() == "true" DEFAULT_LOCALE = PersistentConfig( "DEFAULT_LOCALE", @@ -1135,6 +1141,12 @@ DEFAULT_MODELS = PersistentConfig( "DEFAULT_MODELS", "ui.default_models", os.environ.get("DEFAULT_MODELS", None) ) +DEFAULT_PINNED_MODELS = PersistentConfig( + "DEFAULT_PINNED_MODELS", + "ui.default_pinned_models", + os.environ.get("DEFAULT_PINNED_MODELS", None), +) + try: default_prompt_suggestions = json.loads( os.environ.get("DEFAULT_PROMPT_SUGGESTIONS", "[]") @@ -1191,6 +1203,12 @@ DEFAULT_USER_ROLE = PersistentConfig( os.getenv("DEFAULT_USER_ROLE", "pending"), ) +DEFAULT_GROUP_ID = PersistentConfig( + "DEFAULT_GROUP_ID", + "ui.default_group_id", + os.environ.get("DEFAULT_GROUP_ID", ""), +) + PENDING_USER_OVERLAY_TITLE = PersistentConfig( "PENDING_USER_OVERLAY_TITLE", "ui.pending_user_overlay_title", @@ -1230,6 +1248,40 @@ USER_PERMISSIONS_WORKSPACE_TOOLS_ACCESS = ( os.environ.get("USER_PERMISSIONS_WORKSPACE_TOOLS_ACCESS", "False").lower() == "true" ) +USER_PERMISSIONS_WORKSPACE_MODELS_IMPORT = ( + os.environ.get("USER_PERMISSIONS_WORKSPACE_MODELS_IMPORT", "False").lower() + == "true" +) + +USER_PERMISSIONS_WORKSPACE_MODELS_EXPORT = ( + os.environ.get("USER_PERMISSIONS_WORKSPACE_MODELS_EXPORT", "False").lower() + == "true" +) + +USER_PERMISSIONS_WORKSPACE_PROMPTS_IMPORT = ( + os.environ.get("USER_PERMISSIONS_WORKSPACE_PROMPTS_IMPORT", "False").lower() + == "true" +) + +USER_PERMISSIONS_WORKSPACE_PROMPTS_EXPORT = ( + os.environ.get("USER_PERMISSIONS_WORKSPACE_PROMPTS_EXPORT", "False").lower() + == "true" +) + +USER_PERMISSIONS_WORKSPACE_TOOLS_IMPORT = ( + os.environ.get("USER_PERMISSIONS_WORKSPACE_TOOLS_IMPORT", "False").lower() == "true" +) + +USER_PERMISSIONS_WORKSPACE_TOOLS_EXPORT = ( + os.environ.get("USER_PERMISSIONS_WORKSPACE_TOOLS_EXPORT", "False").lower() == "true" +) + + +USER_PERMISSIONS_WORKSPACE_MODELS_ALLOW_SHARING = ( + os.environ.get("USER_PERMISSIONS_WORKSPACE_MODELS_ALLOW_SHARING", "False").lower() + == "true" +) + USER_PERMISSIONS_WORKSPACE_MODELS_ALLOW_PUBLIC_SHARING = ( os.environ.get( "USER_PERMISSIONS_WORKSPACE_MODELS_ALLOW_PUBLIC_SHARING", "False" @@ -1237,8 +1289,10 @@ USER_PERMISSIONS_WORKSPACE_MODELS_ALLOW_PUBLIC_SHARING = ( == "true" ) -USER_PERMISSIONS_NOTES_ALLOW_PUBLIC_SHARING = ( - os.environ.get("USER_PERMISSIONS_NOTES_ALLOW_PUBLIC_SHARING", "False").lower() +USER_PERMISSIONS_WORKSPACE_KNOWLEDGE_ALLOW_SHARING = ( + os.environ.get( + "USER_PERMISSIONS_WORKSPACE_KNOWLEDGE_ALLOW_PUBLIC_SHARING", "False" + ).lower() == "true" ) @@ -1249,6 +1303,11 @@ USER_PERMISSIONS_WORKSPACE_KNOWLEDGE_ALLOW_PUBLIC_SHARING = ( == "true" ) +USER_PERMISSIONS_WORKSPACE_PROMPTS_ALLOW_SHARING = ( + os.environ.get("USER_PERMISSIONS_WORKSPACE_PROMPTS_ALLOW_SHARING", "False").lower() + == "true" +) + USER_PERMISSIONS_WORKSPACE_PROMPTS_ALLOW_PUBLIC_SHARING = ( os.environ.get( "USER_PERMISSIONS_WORKSPACE_PROMPTS_ALLOW_PUBLIC_SHARING", "False" @@ -1256,6 +1315,12 @@ USER_PERMISSIONS_WORKSPACE_PROMPTS_ALLOW_PUBLIC_SHARING = ( == "true" ) + +USER_PERMISSIONS_WORKSPACE_TOOLS_ALLOW_SHARING = ( + os.environ.get("USER_PERMISSIONS_WORKSPACE_TOOLS_ALLOW_SHARING", "False").lower() + == "true" +) + USER_PERMISSIONS_WORKSPACE_TOOLS_ALLOW_PUBLIC_SHARING = ( os.environ.get( "USER_PERMISSIONS_WORKSPACE_TOOLS_ALLOW_PUBLIC_SHARING", "False" @@ -1264,6 +1329,17 @@ USER_PERMISSIONS_WORKSPACE_TOOLS_ALLOW_PUBLIC_SHARING = ( ) +USER_PERMISSIONS_NOTES_ALLOW_SHARING = ( + os.environ.get("USER_PERMISSIONS_NOTES_ALLOW_PUBLIC_SHARING", "False").lower() + == "true" +) + +USER_PERMISSIONS_NOTES_ALLOW_PUBLIC_SHARING = ( + os.environ.get("USER_PERMISSIONS_NOTES_ALLOW_PUBLIC_SHARING", "False").lower() + == "true" +) + + USER_PERMISSIONS_CHAT_CONTROLS = ( os.environ.get("USER_PERMISSIONS_CHAT_CONTROLS", "True").lower() == "true" ) @@ -1366,6 +1442,10 @@ USER_PERMISSIONS_FEATURES_NOTES = ( os.environ.get("USER_PERMISSIONS_FEATURES_NOTES", "True").lower() == "true" ) +USER_PERMISSIONS_FEATURES_API_KEYS = ( + os.environ.get("USER_PERMISSIONS_FEATURES_API_KEYS", "False").lower() == "true" +) + DEFAULT_USER_PERMISSIONS = { "workspace": { @@ -1373,12 +1453,23 @@ DEFAULT_USER_PERMISSIONS = { "knowledge": USER_PERMISSIONS_WORKSPACE_KNOWLEDGE_ACCESS, "prompts": USER_PERMISSIONS_WORKSPACE_PROMPTS_ACCESS, "tools": USER_PERMISSIONS_WORKSPACE_TOOLS_ACCESS, + "models_import": USER_PERMISSIONS_WORKSPACE_MODELS_IMPORT, + "models_export": USER_PERMISSIONS_WORKSPACE_MODELS_EXPORT, + "prompts_import": USER_PERMISSIONS_WORKSPACE_PROMPTS_IMPORT, + "prompts_export": USER_PERMISSIONS_WORKSPACE_PROMPTS_EXPORT, + "tools_import": USER_PERMISSIONS_WORKSPACE_TOOLS_IMPORT, + "tools_export": USER_PERMISSIONS_WORKSPACE_TOOLS_EXPORT, }, "sharing": { + "models": USER_PERMISSIONS_WORKSPACE_MODELS_ALLOW_SHARING, "public_models": USER_PERMISSIONS_WORKSPACE_MODELS_ALLOW_PUBLIC_SHARING, + "knowledge": USER_PERMISSIONS_WORKSPACE_KNOWLEDGE_ALLOW_SHARING, "public_knowledge": USER_PERMISSIONS_WORKSPACE_KNOWLEDGE_ALLOW_PUBLIC_SHARING, + "prompts": USER_PERMISSIONS_WORKSPACE_PROMPTS_ALLOW_SHARING, "public_prompts": USER_PERMISSIONS_WORKSPACE_PROMPTS_ALLOW_PUBLIC_SHARING, + "tools": USER_PERMISSIONS_WORKSPACE_TOOLS_ALLOW_SHARING, "public_tools": USER_PERMISSIONS_WORKSPACE_TOOLS_ALLOW_PUBLIC_SHARING, + "notes": USER_PERMISSIONS_NOTES_ALLOW_SHARING, "public_notes": USER_PERMISSIONS_NOTES_ALLOW_PUBLIC_SHARING, }, "chat": { @@ -1403,6 +1494,7 @@ DEFAULT_USER_PERMISSIONS = { "temporary_enforced": USER_PERMISSIONS_CHAT_TEMPORARY_ENFORCED, }, "features": { + "api_keys": USER_PERMISSIONS_FEATURES_API_KEYS, "direct_tool_servers": USER_PERMISSIONS_FEATURES_DIRECT_TOOL_SERVERS, "web_search": USER_PERMISSIONS_FEATURES_WEB_SEARCH, "image_generation": USER_PERMISSIONS_FEATURES_IMAGE_GENERATION, @@ -1816,6 +1908,38 @@ Output: #### Output: """ + +VOICE_MODE_PROMPT_TEMPLATE = PersistentConfig( + "VOICE_MODE_PROMPT_TEMPLATE", + "task.voice.prompt_template", + os.environ.get("VOICE_MODE_PROMPT_TEMPLATE", ""), +) + +DEFAULT_VOICE_MODE_PROMPT_TEMPLATE = """You are a friendly, concise voice assistant. + +Everything you say will be spoken aloud. +Keep responses short, clear, and natural. + +STYLE: +- Use simple words and short sentences. +- Sound warm and conversational. +- Avoid long explanations, lists, or complex phrasing. + +BEHAVIOR: +- Give the quickest helpful answer first. +- Offer extra detail only if needed. +- Ask for clarification only when necessary. + +VOICE OPTIMIZATION: +- Break information into small, easy-to-hear chunks. +- Avoid dense wording or anything that sounds like reading text. + +ERROR HANDLING: +- If unsure, say so briefly and offer options. +- If something is unsafe or impossible, decline kindly and suggest a safe alternative. + +Stay consistent, helpful, and easy to listen to.""" + TOOLS_FUNCTION_CALLING_PROMPT_TEMPLATE = PersistentConfig( "TOOLS_FUNCTION_CALLING_PROMPT_TEMPLATE", "task.tools.prompt_template", @@ -2056,6 +2180,11 @@ ENABLE_QDRANT_MULTITENANCY_MODE = ( ) QDRANT_COLLECTION_PREFIX = os.environ.get("QDRANT_COLLECTION_PREFIX", "open-webui") +WEAVIATE_HTTP_HOST = os.environ.get("WEAVIATE_HTTP_HOST", "") +WEAVIATE_HTTP_PORT = int(os.environ.get("WEAVIATE_HTTP_PORT", "8080")) +WEAVIATE_GRPC_PORT = int(os.environ.get("WEAVIATE_GRPC_PORT", "50051")) +WEAVIATE_API_KEY = os.environ.get("WEAVIATE_API_KEY") + # OpenSearch OPENSEARCH_URI = os.environ.get("OPENSEARCH_URI", "https://localhost:9200") OPENSEARCH_SSL = os.environ.get("OPENSEARCH_SSL", "true").lower() == "true" @@ -2086,6 +2215,16 @@ PGVECTOR_INITIALIZE_MAX_VECTOR_LENGTH = int( os.environ.get("PGVECTOR_INITIALIZE_MAX_VECTOR_LENGTH", "1536") ) +PGVECTOR_USE_HALFVEC = os.getenv("PGVECTOR_USE_HALFVEC", "false").lower() == "true" + +if PGVECTOR_INITIALIZE_MAX_VECTOR_LENGTH > 2000 and not PGVECTOR_USE_HALFVEC: + raise ValueError( + "PGVECTOR_INITIALIZE_MAX_VECTOR_LENGTH is set to " + f"{PGVECTOR_INITIALIZE_MAX_VECTOR_LENGTH}, which exceeds the 2000 dimension limit of the " + "'vector' type. Set PGVECTOR_USE_HALFVEC=true to enable the 'halfvec' " + "type required for high-dimensional embeddings." + ) + PGVECTOR_CREATE_EXTENSION = ( os.getenv("PGVECTOR_CREATE_EXTENSION", "true").lower() == "true" ) @@ -2135,6 +2274,40 @@ else: except Exception: PGVECTOR_POOL_RECYCLE = 3600 +PGVECTOR_INDEX_METHOD = os.getenv("PGVECTOR_INDEX_METHOD", "").strip().lower() +if PGVECTOR_INDEX_METHOD not in ("ivfflat", "hnsw", ""): + PGVECTOR_INDEX_METHOD = "" + +PGVECTOR_HNSW_M = os.environ.get("PGVECTOR_HNSW_M", 16) + +if PGVECTOR_HNSW_M == "": + PGVECTOR_HNSW_M = 16 +else: + try: + PGVECTOR_HNSW_M = int(PGVECTOR_HNSW_M) + except Exception: + PGVECTOR_HNSW_M = 16 + +PGVECTOR_HNSW_EF_CONSTRUCTION = os.environ.get("PGVECTOR_HNSW_EF_CONSTRUCTION", 64) + +if PGVECTOR_HNSW_EF_CONSTRUCTION == "": + PGVECTOR_HNSW_EF_CONSTRUCTION = 64 +else: + try: + PGVECTOR_HNSW_EF_CONSTRUCTION = int(PGVECTOR_HNSW_EF_CONSTRUCTION) + except Exception: + PGVECTOR_HNSW_EF_CONSTRUCTION = 64 + +PGVECTOR_IVFFLAT_LISTS = os.environ.get("PGVECTOR_IVFFLAT_LISTS", 100) + +if PGVECTOR_IVFFLAT_LISTS == "": + PGVECTOR_IVFFLAT_LISTS = 100 +else: + try: + PGVECTOR_IVFFLAT_LISTS = int(PGVECTOR_IVFFLAT_LISTS) + except Exception: + PGVECTOR_IVFFLAT_LISTS = 100 + # Pinecone PINECONE_API_KEY = os.environ.get("PINECONE_API_KEY", None) PINECONE_ENVIRONMENT = os.environ.get("PINECONE_ENVIRONMENT", None) @@ -2510,6 +2683,13 @@ ENABLE_RAG_HYBRID_SEARCH = PersistentConfig( os.environ.get("ENABLE_RAG_HYBRID_SEARCH", "").lower() == "true", ) +ENABLE_RAG_HYBRID_SEARCH_ENRICHED_TEXTS = PersistentConfig( + "ENABLE_RAG_HYBRID_SEARCH_ENRICHED_TEXTS", + "rag.enable_hybrid_search_enriched_texts", + os.environ.get("ENABLE_RAG_HYBRID_SEARCH_ENRICHED_TEXTS", "False").lower() + == "true", +) + RAG_FULL_CONTEXT = PersistentConfig( "RAG_FULL_CONTEXT", "rag.full_context", @@ -2697,10 +2877,6 @@ Provide a clear and direct response to the user's query, including inline citati {{CONTEXT}} - - -{{QUERY}} - """ RAG_TEMPLATE = PersistentConfig( @@ -2753,6 +2929,26 @@ ENABLE_RAG_LOCAL_WEB_FETCH = ( os.getenv("ENABLE_RAG_LOCAL_WEB_FETCH", "False").lower() == "true" ) + +DEFAULT_WEB_FETCH_FILTER_LIST = [ + "!169.254.169.254", + "!fd00:ec2::254", + "!metadata.google.internal", + "!metadata.azure.com", + "!100.100.100.200", +] + +web_fetch_filter_list = os.getenv("WEB_FETCH_FILTER_LIST", "") +if web_fetch_filter_list == "": + web_fetch_filter_list = [] +else: + web_fetch_filter_list = [ + item.strip() for item in web_fetch_filter_list.split(",") if item.strip() + ] + +WEB_FETCH_FILTER_LIST = list(set(DEFAULT_WEB_FETCH_FILTER_LIST + web_fetch_filter_list)) + + YOUTUBE_LOADER_LANGUAGE = PersistentConfig( "YOUTUBE_LOADER_LANGUAGE", "rag.youtube_loader_language", @@ -2811,6 +3007,7 @@ WEB_SEARCH_DOMAIN_FILTER_LIST = PersistentConfig( # "wikipedia.com", # "wikimedia.org", # "wikidata.org", + # "!stackoverflow.com", ], ) @@ -2982,6 +3179,24 @@ BING_SEARCH_V7_SUBSCRIPTION_KEY = PersistentConfig( os.environ.get("BING_SEARCH_V7_SUBSCRIPTION_KEY", ""), ) +AZURE_AI_SEARCH_API_KEY = PersistentConfig( + "AZURE_AI_SEARCH_API_KEY", + "rag.web.search.azure_ai_search_api_key", + os.environ.get("AZURE_AI_SEARCH_API_KEY", ""), +) + +AZURE_AI_SEARCH_ENDPOINT = PersistentConfig( + "AZURE_AI_SEARCH_ENDPOINT", + "rag.web.search.azure_ai_search_endpoint", + os.environ.get("AZURE_AI_SEARCH_ENDPOINT", ""), +) + +AZURE_AI_SEARCH_INDEX_NAME = PersistentConfig( + "AZURE_AI_SEARCH_INDEX_NAME", + "rag.web.search.azure_ai_search_index_name", + os.environ.get("AZURE_AI_SEARCH_INDEX_NAME", ""), +) + EXA_API_KEY = PersistentConfig( "EXA_API_KEY", "rag.web.search.exa_api_key", @@ -3006,6 +3221,12 @@ PERPLEXITY_SEARCH_CONTEXT_USAGE = PersistentConfig( os.getenv("PERPLEXITY_SEARCH_CONTEXT_USAGE", "medium"), ) +PERPLEXITY_SEARCH_API_URL = PersistentConfig( + "PERPLEXITY_SEARCH_API_URL", + "rag.web.search.perplexity_search_api_url", + os.getenv("PERPLEXITY_SEARCH_API_URL", "https://api.perplexity.ai/search"), +) + SOUGOU_API_SID = PersistentConfig( "SOUGOU_API_SID", "rag.web.search.sougou_api_sid", @@ -3131,10 +3352,9 @@ try: except json.JSONDecodeError: automatic1111_params = {} - AUTOMATIC1111_PARAMS = PersistentConfig( "AUTOMATIC1111_PARAMS", - "image_generation.automatic1111.api_auth", + "image_generation.automatic1111.api_params", automatic1111_params, ) @@ -3290,6 +3510,18 @@ IMAGES_OPENAI_API_KEY = PersistentConfig( os.getenv("IMAGES_OPENAI_API_KEY", OPENAI_API_KEY), ) +images_openai_params = os.getenv("IMAGES_OPENAI_PARAMS", "") +try: + images_openai_params = json.loads(images_openai_params) +except json.JSONDecodeError: + images_openai_params = {} + + +IMAGES_OPENAI_API_PARAMS = PersistentConfig( + "IMAGES_OPENAI_API_PARAMS", "image_generation.openai.params", images_openai_params +) + + IMAGES_GEMINI_API_BASE_URL = PersistentConfig( "IMAGES_GEMINI_API_BASE_URL", "image_generation.gemini.api_base_url", @@ -3307,6 +3539,11 @@ IMAGES_GEMINI_ENDPOINT_METHOD = PersistentConfig( os.getenv("IMAGES_GEMINI_ENDPOINT_METHOD", ""), ) +ENABLE_IMAGE_EDIT = PersistentConfig( + "ENABLE_IMAGE_EDIT", + "images.edit.enable", + os.environ.get("ENABLE_IMAGE_EDIT", "").lower() == "true", +) IMAGE_EDIT_ENGINE = PersistentConfig( "IMAGE_EDIT_ENGINE", diff --git a/backend/open_webui/constants.py b/backend/open_webui/constants.py index 6d63295ab8..4d39d16cdb 100644 --- a/backend/open_webui/constants.py +++ b/backend/open_webui/constants.py @@ -45,7 +45,7 @@ class ERROR_MESSAGES(str, Enum): ) INVALID_CRED = "The email or password provided is incorrect. Please check for typos and try logging in again." INVALID_EMAIL_FORMAT = "The email format you entered is invalid. Please double-check and make sure you're using a valid email address (e.g., yourname@example.com)." - INVALID_PASSWORD = ( + INCORRECT_PASSWORD = ( "The password provided is incorrect. Please check for typos and try again." ) INVALID_TRUSTED_HEADER = "Your provider has not provided a trusted header. Please contact your administrator for assistance." @@ -105,6 +105,10 @@ class ERROR_MESSAGES(str, Enum): ) FILE_NOT_PROCESSED = "Extracted content is not available for this file. Please ensure that the file is processed before proceeding." + INVALID_PASSWORD = lambda err="": ( + err if err else "The password does not meet the required validation criteria." + ) + class TASKS(str, Enum): def __str__(self) -> str: diff --git a/backend/open_webui/env.py b/backend/open_webui/env.py index 8f9c1fbc44..651629b950 100644 --- a/backend/open_webui/env.py +++ b/backend/open_webui/env.py @@ -8,6 +8,8 @@ import shutil from uuid import uuid4 from pathlib import Path from cryptography.hazmat.primitives import serialization +import re + import markdown from bs4 import BeautifulSoup @@ -135,6 +137,9 @@ else: PACKAGE_DATA = {"version": "0.0.0"} VERSION = PACKAGE_DATA["version"] + + +DEPLOYMENT_ID = os.environ.get("DEPLOYMENT_ID", "") INSTANCE_ID = os.environ.get("INSTANCE_ID", str(uuid4())) @@ -426,6 +431,17 @@ WEBUI_AUTH_TRUSTED_GROUPS_HEADER = os.environ.get( ) +ENABLE_PASSWORD_VALIDATION = ( + os.environ.get("ENABLE_PASSWORD_VALIDATION", "False").lower() == "true" +) +PASSWORD_VALIDATION_REGEX_PATTERN = os.environ.get( + "PASSWORD_VALIDATION_REGEX_PATTERN", + "^(?=.*[a-z])(?=.*[A-Z])(?=.*\d)(?=.*[^\w\s]).{8,}$", +) + +PASSWORD_VALIDATION_REGEX_PATTERN = re.compile(PASSWORD_VALIDATION_REGEX_PATTERN) + + BYPASS_MODEL_ACCESS_CONTROL = ( os.environ.get("BYPASS_MODEL_ACCESS_CONTROL", "False").lower() == "true" ) @@ -493,7 +509,10 @@ OAUTH_SESSION_TOKEN_ENCRYPTION_KEY = os.environ.get( # SCIM Configuration #################################### -SCIM_ENABLED = os.environ.get("SCIM_ENABLED", "False").lower() == "true" +ENABLE_SCIM = ( + os.environ.get("ENABLE_SCIM", os.environ.get("SCIM_ENABLED", "False")).lower() + == "true" +) SCIM_TOKEN = os.environ.get("SCIM_TOKEN", "") #################################### @@ -541,6 +560,10 @@ else: # CHAT #################################### +ENABLE_CHAT_RESPONSE_BASE64_IMAGE_URL_CONVERSION = ( + os.environ.get("REPLACE_IMAGE_URLS_IN_CHAT_RESPONSE", "False").lower() == "true" +) + CHAT_RESPONSE_STREAM_DELTA_CHUNK_SIZE = os.environ.get( "CHAT_RESPONSE_STREAM_DELTA_CHUNK_SIZE", "1" ) @@ -569,6 +592,21 @@ else: CHAT_RESPONSE_MAX_TOOL_CALL_RETRIES = 30 +CHAT_STREAM_RESPONSE_CHUNK_MAX_BUFFER_SIZE = os.environ.get( + "CHAT_STREAM_RESPONSE_CHUNK_MAX_BUFFER_SIZE", "" +) + +if CHAT_STREAM_RESPONSE_CHUNK_MAX_BUFFER_SIZE == "": + CHAT_STREAM_RESPONSE_CHUNK_MAX_BUFFER_SIZE = None +else: + try: + CHAT_STREAM_RESPONSE_CHUNK_MAX_BUFFER_SIZE = int( + CHAT_STREAM_RESPONSE_CHUNK_MAX_BUFFER_SIZE + ) + except Exception: + CHAT_STREAM_RESPONSE_CHUNK_MAX_BUFFER_SIZE = None + + #################################### # WEBSOCKET SUPPORT #################################### @@ -580,6 +618,17 @@ ENABLE_WEBSOCKET_SUPPORT = ( WEBSOCKET_MANAGER = os.environ.get("WEBSOCKET_MANAGER", "") +WEBSOCKET_REDIS_OPTIONS = os.environ.get("WEBSOCKET_REDIS_OPTIONS", "") +if WEBSOCKET_REDIS_OPTIONS == "": + log.debug("No WEBSOCKET_REDIS_OPTIONS provided, defaulting to None") + WEBSOCKET_REDIS_OPTIONS = None +else: + try: + WEBSOCKET_REDIS_OPTIONS = json.loads(WEBSOCKET_REDIS_OPTIONS) + except Exception: + log.warning("Invalid WEBSOCKET_REDIS_OPTIONS, defaulting to None") + WEBSOCKET_REDIS_OPTIONS = None + WEBSOCKET_REDIS_URL = os.environ.get("WEBSOCKET_REDIS_URL", REDIS_URL) WEBSOCKET_REDIS_CLUSTER = ( os.environ.get("WEBSOCKET_REDIS_CLUSTER", str(REDIS_CLUSTER)).lower() == "true" @@ -594,6 +643,23 @@ except ValueError: WEBSOCKET_SENTINEL_HOSTS = os.environ.get("WEBSOCKET_SENTINEL_HOSTS", "") WEBSOCKET_SENTINEL_PORT = os.environ.get("WEBSOCKET_SENTINEL_PORT", "26379") +WEBSOCKET_SERVER_LOGGING = ( + os.environ.get("WEBSOCKET_SERVER_LOGGING", "False").lower() == "true" +) +WEBSOCKET_SERVER_ENGINEIO_LOGGING = ( + os.environ.get("WEBSOCKET_SERVER_LOGGING", "False").lower() == "true" +) +WEBSOCKET_SERVER_PING_TIMEOUT = os.environ.get("WEBSOCKET_SERVER_PING_TIMEOUT", "20") +try: + WEBSOCKET_SERVER_PING_TIMEOUT = int(WEBSOCKET_SERVER_PING_TIMEOUT) +except ValueError: + WEBSOCKET_SERVER_PING_TIMEOUT = 20 + +WEBSOCKET_SERVER_PING_INTERVAL = os.environ.get("WEBSOCKET_SERVER_PING_INTERVAL", "25") +try: + WEBSOCKET_SERVER_PING_INTERVAL = int(WEBSOCKET_SERVER_PING_INTERVAL) +except ValueError: + WEBSOCKET_SERVER_PING_INTERVAL = 25 AIOHTTP_CLIENT_TIMEOUT = os.environ.get("AIOHTTP_CLIENT_TIMEOUT", "") @@ -706,7 +772,9 @@ if OFFLINE_MODE: # AUDIT LOGGING #################################### # Where to store log file -AUDIT_LOGS_FILE_PATH = f"{DATA_DIR}/audit.log" +# Defaults to the DATA_DIR/audit.log. To set AUDIT_LOGS_FILE_PATH you need to +# provide the whole path, like: /app/audit.log +AUDIT_LOGS_FILE_PATH = os.getenv("AUDIT_LOGS_FILE_PATH", f"{DATA_DIR}/audit.log") # Maximum size of a file before rotating into a new log file AUDIT_LOG_FILE_ROTATION_SIZE = os.getenv("AUDIT_LOG_FILE_ROTATION_SIZE", "10MB") diff --git a/backend/open_webui/main.py b/backend/open_webui/main.py index f0aeeab02a..b14c18947c 100644 --- a/backend/open_webui/main.py +++ b/backend/open_webui/main.py @@ -160,9 +160,11 @@ from open_webui.config import ( IMAGES_OPENAI_API_BASE_URL, IMAGES_OPENAI_API_VERSION, IMAGES_OPENAI_API_KEY, + IMAGES_OPENAI_API_PARAMS, IMAGES_GEMINI_API_BASE_URL, IMAGES_GEMINI_API_KEY, IMAGES_GEMINI_ENDPOINT_METHOD, + ENABLE_IMAGE_EDIT, IMAGE_EDIT_ENGINE, IMAGE_EDIT_MODEL, IMAGE_EDIT_SIZE, @@ -319,6 +321,7 @@ from open_webui.config import ( PERPLEXITY_API_KEY, PERPLEXITY_MODEL, PERPLEXITY_SEARCH_CONTEXT_USAGE, + PERPLEXITY_SEARCH_API_URL, SOUGOU_API_SID, SOUGOU_API_SK, KAGI_SEARCH_API_KEY, @@ -336,6 +339,7 @@ from open_webui.config import ( ENABLE_ONEDRIVE_PERSONAL, ENABLE_ONEDRIVE_BUSINESS, ENABLE_RAG_HYBRID_SEARCH, + ENABLE_RAG_HYBRID_SEARCH_ENRICHED_TEXTS, ENABLE_RAG_LOCAL_WEB_FETCH, ENABLE_WEB_LOADER_SSL_VERIFICATION, ENABLE_GOOGLE_DRIVE_INTEGRATION, @@ -354,9 +358,9 @@ from open_webui.config import ( JWT_EXPIRES_IN, ENABLE_SIGNUP, ENABLE_LOGIN_FORM, - ENABLE_API_KEY, - ENABLE_API_KEY_ENDPOINT_RESTRICTIONS, - API_KEY_ALLOWED_ENDPOINTS, + ENABLE_API_KEYS, + ENABLE_API_KEYS_ENDPOINT_RESTRICTIONS, + API_KEYS_ALLOWED_ENDPOINTS, ENABLE_CHANNELS, ENABLE_NOTES, ENABLE_COMMUNITY_SHARING, @@ -366,10 +370,12 @@ from open_webui.config import ( BYPASS_ADMIN_ACCESS_CONTROL, USER_PERMISSIONS, DEFAULT_USER_ROLE, + DEFAULT_GROUP_ID, PENDING_USER_OVERLAY_CONTENT, PENDING_USER_OVERLAY_TITLE, DEFAULT_PROMPT_SUGGESTIONS, DEFAULT_MODELS, + DEFAULT_PINNED_MODELS, DEFAULT_ARENA_MODEL, MODEL_ORDER_LIST, EVALUATION_ARENA_MODELS, @@ -428,6 +434,7 @@ from open_webui.config import ( TAGS_GENERATION_PROMPT_TEMPLATE, IMAGE_PROMPT_GENERATION_PROMPT_TEMPLATE, TOOLS_FUNCTION_CALLING_PROMPT_TEMPLATE, + VOICE_MODE_PROMPT_TEMPLATE, QUERY_GENERATION_PROMPT_TEMPLATE, AUTOCOMPLETE_GENERATION_PROMPT_TEMPLATE, AUTOCOMPLETE_GENERATION_INPUT_MAX_LENGTH, @@ -449,6 +456,7 @@ from open_webui.env import ( SAFE_MODE, SRC_LOG_LEVELS, VERSION, + DEPLOYMENT_ID, INSTANCE_ID, WEBUI_BUILD_HASH, WEBUI_SECRET_KEY, @@ -459,7 +467,7 @@ from open_webui.env import ( WEBUI_AUTH_TRUSTED_NAME_HEADER, WEBUI_AUTH_SIGNOUT_REDIRECT_URL, # SCIM - SCIM_ENABLED, + ENABLE_SCIM, SCIM_TOKEN, ENABLE_COMPRESSION_MIDDLEWARE, ENABLE_WEBSOCKET_SUPPORT, @@ -715,7 +723,7 @@ app.state.config.ENABLE_DIRECT_CONNECTIONS = ENABLE_DIRECT_CONNECTIONS # ######################################## -app.state.SCIM_ENABLED = SCIM_ENABLED +app.state.ENABLE_SCIM = ENABLE_SCIM app.state.SCIM_TOKEN = SCIM_TOKEN ######################################## @@ -737,11 +745,11 @@ app.state.config.WEBUI_URL = WEBUI_URL app.state.config.ENABLE_SIGNUP = ENABLE_SIGNUP app.state.config.ENABLE_LOGIN_FORM = ENABLE_LOGIN_FORM -app.state.config.ENABLE_API_KEY = ENABLE_API_KEY -app.state.config.ENABLE_API_KEY_ENDPOINT_RESTRICTIONS = ( - ENABLE_API_KEY_ENDPOINT_RESTRICTIONS +app.state.config.ENABLE_API_KEYS = ENABLE_API_KEYS +app.state.config.ENABLE_API_KEYS_ENDPOINT_RESTRICTIONS = ( + ENABLE_API_KEYS_ENDPOINT_RESTRICTIONS ) -app.state.config.API_KEY_ALLOWED_ENDPOINTS = API_KEY_ALLOWED_ENDPOINTS +app.state.config.API_KEYS_ALLOWED_ENDPOINTS = API_KEYS_ALLOWED_ENDPOINTS app.state.config.JWT_EXPIRES_IN = JWT_EXPIRES_IN @@ -750,8 +758,13 @@ app.state.config.ADMIN_EMAIL = ADMIN_EMAIL app.state.config.DEFAULT_MODELS = DEFAULT_MODELS +app.state.config.DEFAULT_PINNED_MODELS = DEFAULT_PINNED_MODELS +app.state.config.MODEL_ORDER_LIST = MODEL_ORDER_LIST + + app.state.config.DEFAULT_PROMPT_SUGGESTIONS = DEFAULT_PROMPT_SUGGESTIONS app.state.config.DEFAULT_USER_ROLE = DEFAULT_USER_ROLE +app.state.config.DEFAULT_GROUP_ID = DEFAULT_GROUP_ID app.state.config.PENDING_USER_OVERLAY_CONTENT = PENDING_USER_OVERLAY_CONTENT app.state.config.PENDING_USER_OVERLAY_TITLE = PENDING_USER_OVERLAY_TITLE @@ -761,7 +774,6 @@ app.state.config.RESPONSE_WATERMARK = RESPONSE_WATERMARK app.state.config.USER_PERMISSIONS = USER_PERMISSIONS app.state.config.WEBHOOK_URL = WEBHOOK_URL app.state.config.BANNERS = WEBUI_BANNERS -app.state.config.MODEL_ORDER_LIST = MODEL_ORDER_LIST app.state.config.ENABLE_CHANNELS = ENABLE_CHANNELS @@ -839,6 +851,9 @@ app.state.config.FILE_IMAGE_COMPRESSION_HEIGHT = FILE_IMAGE_COMPRESSION_HEIGHT app.state.config.RAG_FULL_CONTEXT = RAG_FULL_CONTEXT app.state.config.BYPASS_EMBEDDING_AND_RETRIEVAL = BYPASS_EMBEDDING_AND_RETRIEVAL app.state.config.ENABLE_RAG_HYBRID_SEARCH = ENABLE_RAG_HYBRID_SEARCH +app.state.config.ENABLE_RAG_HYBRID_SEARCH_ENRICHED_TEXTS = ( + ENABLE_RAG_HYBRID_SEARCH_ENRICHED_TEXTS +) app.state.config.ENABLE_WEB_LOADER_SSL_VERIFICATION = ENABLE_WEB_LOADER_SSL_VERIFICATION app.state.config.CONTENT_EXTRACTION_ENGINE = CONTENT_EXTRACTION_ENGINE @@ -958,6 +973,7 @@ app.state.config.EXA_API_KEY = EXA_API_KEY app.state.config.PERPLEXITY_API_KEY = PERPLEXITY_API_KEY app.state.config.PERPLEXITY_MODEL = PERPLEXITY_MODEL app.state.config.PERPLEXITY_SEARCH_CONTEXT_USAGE = PERPLEXITY_SEARCH_CONTEXT_USAGE +app.state.config.PERPLEXITY_SEARCH_API_URL = PERPLEXITY_SEARCH_API_URL app.state.config.SOUGOU_API_SID = SOUGOU_API_SID app.state.config.SOUGOU_API_SK = SOUGOU_API_SK app.state.config.EXTERNAL_WEB_SEARCH_URL = EXTERNAL_WEB_SEARCH_URL @@ -1087,6 +1103,7 @@ app.state.config.IMAGE_STEPS = IMAGE_STEPS app.state.config.IMAGES_OPENAI_API_BASE_URL = IMAGES_OPENAI_API_BASE_URL app.state.config.IMAGES_OPENAI_API_VERSION = IMAGES_OPENAI_API_VERSION app.state.config.IMAGES_OPENAI_API_KEY = IMAGES_OPENAI_API_KEY +app.state.config.IMAGES_OPENAI_API_PARAMS = IMAGES_OPENAI_API_PARAMS app.state.config.IMAGES_GEMINI_API_BASE_URL = IMAGES_GEMINI_API_BASE_URL app.state.config.IMAGES_GEMINI_API_KEY = IMAGES_GEMINI_API_KEY @@ -1102,6 +1119,7 @@ app.state.config.COMFYUI_WORKFLOW = COMFYUI_WORKFLOW app.state.config.COMFYUI_WORKFLOW_NODES = COMFYUI_WORKFLOW_NODES +app.state.config.ENABLE_IMAGE_EDIT = ENABLE_IMAGE_EDIT app.state.config.IMAGE_EDIT_ENGINE = IMAGE_EDIT_ENGINE app.state.config.IMAGE_EDIT_MODEL = IMAGE_EDIT_MODEL app.state.config.IMAGE_EDIT_SIZE = IMAGE_EDIT_SIZE @@ -1206,6 +1224,7 @@ app.state.config.AUTOCOMPLETE_GENERATION_PROMPT_TEMPLATE = ( app.state.config.AUTOCOMPLETE_GENERATION_INPUT_MAX_LENGTH = ( AUTOCOMPLETE_GENERATION_INPUT_MAX_LENGTH ) +app.state.config.VOICE_MODE_PROMPT_TEMPLATE = VOICE_MODE_PROMPT_TEMPLATE ######################################## @@ -1216,6 +1235,10 @@ app.state.config.AUTOCOMPLETE_GENERATION_INPUT_MAX_LENGTH = ( app.state.MODELS = {} +# Add the middleware to the app +if ENABLE_COMPRESSION_MIDDLEWARE: + app.add_middleware(CompressMiddleware) + class RedirectMiddleware(BaseHTTPMiddleware): async def dispatch(self, request: Request, call_next): @@ -1257,14 +1280,53 @@ class RedirectMiddleware(BaseHTTPMiddleware): return response -# Add the middleware to the app -if ENABLE_COMPRESSION_MIDDLEWARE: - app.add_middleware(CompressMiddleware) - app.add_middleware(RedirectMiddleware) app.add_middleware(SecurityHeadersMiddleware) +class APIKeyRestrictionMiddleware(BaseHTTPMiddleware): + async def dispatch(self, request: Request, call_next): + auth_header = request.headers.get("Authorization") + token = None + + if auth_header: + scheme, token = auth_header.split(" ") + + # Only apply restrictions if an sk- API key is used + if token and token.startswith("sk-"): + # Check if restrictions are enabled + if request.app.state.config.ENABLE_API_KEYS_ENDPOINT_RESTRICTIONS: + allowed_paths = [ + path.strip() + for path in str( + request.app.state.config.API_KEYS_ALLOWED_ENDPOINTS + ).split(",") + if path.strip() + ] + + request_path = request.url.path + + # Match exact path or prefix path + is_allowed = any( + request_path == allowed or request_path.startswith(allowed + "/") + for allowed in allowed_paths + ) + + if not is_allowed: + return JSONResponse( + status_code=status.HTTP_403_FORBIDDEN, + content={ + "detail": "API key not allowed to access this endpoint." + }, + ) + + response = await call_next(request) + return response + + +app.add_middleware(APIKeyRestrictionMiddleware) + + @app.middleware("http") async def commit_session_after_request(request: Request, call_next): response = await call_next(request) @@ -1280,7 +1342,7 @@ async def check_url(request: Request, call_next): request.headers.get("Authorization") ) - request.state.enable_api_key = app.state.config.ENABLE_API_KEY + request.state.enable_api_keys = app.state.config.ENABLE_API_KEYS response = await call_next(request) process_time = int(time.time()) - start_time response.headers["X-Process-Time"] = str(process_time) @@ -1355,7 +1417,7 @@ app.include_router( app.include_router(utils.router, prefix="/api/v1/utils", tags=["utils"]) # SCIM 2.0 API for identity management -if SCIM_ENABLED: +if ENABLE_SCIM: app.include_router(scim.router, prefix="/api/v1/scim/v2", tags=["scim"]) @@ -1392,6 +1454,10 @@ async def get_models( if "pipeline" in model and model["pipeline"].get("type", None) == "filter": continue + # Remove profile image URL to reduce payload size + if model.get("info", {}).get("meta", {}).get("profile_image_url"): + model["info"]["meta"].pop("profile_image_url", None) + try: model_tags = [ tag.get("name") @@ -1514,6 +1580,9 @@ async def chat_completion( reasoning_tags = form_data.get("params", {}).get("reasoning_tags") # Model Params + if model_info_params.get("stream_response") is not None: + form_data["stream"] = model_info_params.get("stream_response") + if model_info_params.get("stream_delta_chunk_size"): stream_delta_chunk_size = model_info_params.get("stream_delta_chunk_size") @@ -1783,7 +1852,7 @@ async def get_app_config(request: Request): "auth_trusted_header": bool(app.state.AUTH_TRUSTED_EMAIL_HEADER), "enable_signup_password_confirmation": ENABLE_SIGNUP_PASSWORD_CONFIRMATION, "enable_ldap": app.state.config.ENABLE_LDAP, - "enable_api_key": app.state.config.ENABLE_API_KEY, + "enable_api_keys": app.state.config.ENABLE_API_KEYS, "enable_signup": app.state.config.ENABLE_SIGNUP, "enable_login_form": app.state.config.ENABLE_LOGIN_FORM, "enable_websocket": ENABLE_WEBSOCKET_SUPPORT, @@ -1821,6 +1890,7 @@ async def get_app_config(request: Request): **( { "default_models": app.state.config.DEFAULT_MODELS, + "default_pinned_models": app.state.config.DEFAULT_PINNED_MODELS, "default_prompt_suggestions": app.state.config.DEFAULT_PROMPT_SUGGESTIONS, "user_count": user_count, "code": { @@ -1922,6 +1992,7 @@ async def update_webhook_url(form_data: UrlForm, user=Depends(get_admin_user)): async def get_app_version(): return { "version": VERSION, + "deployment_id": DEPLOYMENT_ID, } diff --git a/backend/open_webui/migrations/versions/37f288994c47_add_group_member_table.py b/backend/open_webui/migrations/versions/37f288994c47_add_group_member_table.py new file mode 100644 index 0000000000..0c5cec1941 --- /dev/null +++ b/backend/open_webui/migrations/versions/37f288994c47_add_group_member_table.py @@ -0,0 +1,146 @@ +"""add_group_member_table + +Revision ID: 37f288994c47 +Revises: a5c220713937 +Create Date: 2025-11-17 03:45:25.123939 + +""" + +import uuid +import time +import json +from typing import Sequence, Union + +from alembic import op +import sqlalchemy as sa + + +# revision identifiers, used by Alembic. +revision: str = "37f288994c47" +down_revision: Union[str, None] = "a5c220713937" +branch_labels: Union[str, Sequence[str], None] = None +depends_on: Union[str, Sequence[str], None] = None + + +def upgrade() -> None: + # 1. Create new table + op.create_table( + "group_member", + sa.Column("id", sa.Text(), primary_key=True, unique=True, nullable=False), + sa.Column( + "group_id", + sa.Text(), + sa.ForeignKey("group.id", ondelete="CASCADE"), + nullable=False, + ), + sa.Column( + "user_id", + sa.Text(), + sa.ForeignKey("user.id", ondelete="CASCADE"), + nullable=False, + ), + sa.Column("created_at", sa.BigInteger(), nullable=True), + sa.Column("updated_at", sa.BigInteger(), nullable=True), + sa.UniqueConstraint("group_id", "user_id", name="uq_group_member_group_user"), + ) + + connection = op.get_bind() + + # 2. Read existing group with user_ids JSON column + group_table = sa.Table( + "group", + sa.MetaData(), + sa.Column("id", sa.Text()), + sa.Column("user_ids", sa.JSON()), # JSON stored as text in SQLite + PG + ) + + results = connection.execute( + sa.select(group_table.c.id, group_table.c.user_ids) + ).fetchall() + + print(results) + + # 3. Insert members into group_member table + gm_table = sa.Table( + "group_member", + sa.MetaData(), + sa.Column("id", sa.Text()), + sa.Column("group_id", sa.Text()), + sa.Column("user_id", sa.Text()), + sa.Column("created_at", sa.BigInteger()), + sa.Column("updated_at", sa.BigInteger()), + ) + + now = int(time.time()) + for group_id, user_ids in results: + if not user_ids: + continue + + if isinstance(user_ids, str): + try: + user_ids = json.loads(user_ids) + except Exception: + continue # skip invalid JSON + + if not isinstance(user_ids, list): + continue + + rows = [ + { + "id": str(uuid.uuid4()), + "group_id": group_id, + "user_id": uid, + "created_at": now, + "updated_at": now, + } + for uid in user_ids + ] + + if rows: + connection.execute(gm_table.insert(), rows) + + # 4. Optionally drop the old column + with op.batch_alter_table("group") as batch: + batch.drop_column("user_ids") + + +def downgrade(): + # Reverse: restore user_ids column + with op.batch_alter_table("group") as batch: + batch.add_column(sa.Column("user_ids", sa.JSON())) + + connection = op.get_bind() + gm_table = sa.Table( + "group_member", + sa.MetaData(), + sa.Column("group_id", sa.Text()), + sa.Column("user_id", sa.Text()), + sa.Column("created_at", sa.BigInteger()), + sa.Column("updated_at", sa.BigInteger()), + ) + + group_table = sa.Table( + "group", + sa.MetaData(), + sa.Column("id", sa.Text()), + sa.Column("user_ids", sa.JSON()), + ) + + # Build JSON arrays again + results = connection.execute(sa.select(group_table.c.id)).fetchall() + + for (group_id,) in results: + members = connection.execute( + sa.select(gm_table.c.user_id).where(gm_table.c.group_id == group_id) + ).fetchall() + + member_ids = [m[0] for m in members] + + connection.execute( + group_table.update() + .where(group_table.c.id == group_id) + .values(user_ids=member_ids) + ) + + # Drop the new table + op.drop_table("group_member") diff --git a/backend/open_webui/models/auths.py b/backend/open_webui/models/auths.py index 6517e21345..39ff1cc7fb 100644 --- a/backend/open_webui/models/auths.py +++ b/backend/open_webui/models/auths.py @@ -7,7 +7,6 @@ from open_webui.models.users import UserModel, Users from open_webui.env import SRC_LOG_LEVELS from pydantic import BaseModel from sqlalchemy import Boolean, Column, String, Text -from open_webui.utils.auth import verify_password log = logging.getLogger(__name__) log.setLevel(SRC_LOG_LEVELS["MODELS"]) @@ -20,7 +19,7 @@ log.setLevel(SRC_LOG_LEVELS["MODELS"]) class Auth(Base): __tablename__ = "auth" - id = Column(String, primary_key=True) + id = Column(String, primary_key=True, unique=True) email = Column(String) password = Column(Text) active = Column(Boolean) @@ -122,7 +121,9 @@ class AuthsTable: else: return None - def authenticate_user(self, email: str, password: str) -> Optional[UserModel]: + def authenticate_user( + self, email: str, verify_password: callable + ) -> Optional[UserModel]: log.info(f"authenticate_user: {email}") user = Users.get_user_by_email(email) @@ -133,7 +134,7 @@ class AuthsTable: with get_db() as db: auth = db.query(Auth).filter_by(id=user.id, active=True).first() if auth: - if verify_password(password, auth.password): + if verify_password(auth.password): return user else: return None diff --git a/backend/open_webui/models/channels.py b/backend/open_webui/models/channels.py index e75266be78..2a14e7a2d5 100644 --- a/backend/open_webui/models/channels.py +++ b/backend/open_webui/models/channels.py @@ -19,7 +19,7 @@ from sqlalchemy.sql import exists class Channel(Base): __tablename__ = "channel" - id = Column(Text, primary_key=True) + id = Column(Text, primary_key=True, unique=True) user_id = Column(Text) type = Column(Text, nullable=True) diff --git a/backend/open_webui/models/chats.py b/backend/open_webui/models/chats.py index c559932bcd..187a4522c9 100644 --- a/backend/open_webui/models/chats.py +++ b/backend/open_webui/models/chats.py @@ -26,7 +26,7 @@ log.setLevel(SRC_LOG_LEVELS["MODELS"]) class Chat(Base): __tablename__ = "chat" - id = Column(String, primary_key=True) + id = Column(String, primary_key=True, unique=True) user_id = Column(String) title = Column(Text) chat = Column(JSON) @@ -92,6 +92,10 @@ class ChatImportForm(ChatForm): updated_at: Optional[int] = None +class ChatsImportForm(BaseModel): + chats: list[ChatImportForm] + + class ChatTitleMessagesForm(BaseModel): title: str messages: list[dict] @@ -123,6 +127,43 @@ class ChatTitleIdResponse(BaseModel): class ChatTable: + def _clean_null_bytes(self, obj): + """ + Recursively remove actual null bytes (\x00) and unicode escape \\u0000 + from strings inside dict/list structures. + Safe for JSON objects. + """ + if isinstance(obj, str): + return obj.replace("\x00", "").replace("\u0000", "") + elif isinstance(obj, dict): + return {k: self._clean_null_bytes(v) for k, v in obj.items()} + elif isinstance(obj, list): + return [self._clean_null_bytes(v) for v in obj] + return obj + + def _sanitize_chat_row(self, chat_item): + """ + Clean a Chat SQLAlchemy model's title + chat JSON, + and return True if anything changed. + """ + changed = False + + # Clean title + if chat_item.title: + cleaned = self._clean_null_bytes(chat_item.title) + if cleaned != chat_item.title: + chat_item.title = cleaned + changed = True + + # Clean JSON + if chat_item.chat: + cleaned = self._clean_null_bytes(chat_item.chat) + if cleaned != chat_item.chat: + chat_item.chat = cleaned + changed = True + + return changed + def insert_new_chat(self, user_id: str, form_data: ChatForm) -> Optional[ChatModel]: with get_db() as db: id = str(uuid.uuid4()) @@ -130,68 +171,76 @@ class ChatTable: **{ "id": id, "user_id": user_id, - "title": ( + "title": self._clean_null_bytes( form_data.chat["title"] if "title" in form_data.chat else "New Chat" ), - "chat": form_data.chat, + "chat": self._clean_null_bytes(form_data.chat), "folder_id": form_data.folder_id, "created_at": int(time.time()), "updated_at": int(time.time()), } ) - result = Chat(**chat.model_dump()) - db.add(result) + chat_item = Chat(**chat.model_dump()) + db.add(chat_item) db.commit() - db.refresh(result) - return ChatModel.model_validate(result) if result else None + db.refresh(chat_item) + return ChatModel.model_validate(chat_item) if chat_item else None - def import_chat( + def _chat_import_form_to_chat_model( self, user_id: str, form_data: ChatImportForm - ) -> Optional[ChatModel]: - with get_db() as db: - id = str(uuid.uuid4()) - chat = ChatModel( - **{ - "id": id, - "user_id": user_id, - "title": ( - form_data.chat["title"] - if "title" in form_data.chat - else "New Chat" - ), - "chat": form_data.chat, - "meta": form_data.meta, - "pinned": form_data.pinned, - "folder_id": form_data.folder_id, - "created_at": ( - form_data.created_at - if form_data.created_at - else int(time.time()) - ), - "updated_at": ( - form_data.updated_at - if form_data.updated_at - else int(time.time()) - ), - } - ) + ) -> ChatModel: + id = str(uuid.uuid4()) + chat = ChatModel( + **{ + "id": id, + "user_id": user_id, + "title": self._clean_null_bytes( + form_data.chat["title"] if "title" in form_data.chat else "New Chat" + ), + "chat": self._clean_null_bytes(form_data.chat), + "meta": form_data.meta, + "pinned": form_data.pinned, + "folder_id": form_data.folder_id, + "created_at": ( + form_data.created_at if form_data.created_at else int(time.time()) + ), + "updated_at": ( + form_data.updated_at if form_data.updated_at else int(time.time()) + ), + } + ) + return chat - result = Chat(**chat.model_dump()) - db.add(result) + def import_chats( + self, user_id: str, chat_import_forms: list[ChatImportForm] + ) -> list[ChatModel]: + with get_db() as db: + chats = [] + + for form_data in chat_import_forms: + chat = self._chat_import_form_to_chat_model(user_id, form_data) + chats.append(Chat(**chat.model_dump())) + + db.add_all(chats) db.commit() - db.refresh(result) - return ChatModel.model_validate(result) if result else None + return [ChatModel.model_validate(chat) for chat in chats] def update_chat_by_id(self, id: str, chat: dict) -> Optional[ChatModel]: try: with get_db() as db: chat_item = db.get(Chat, id) - chat_item.chat = chat - chat_item.title = chat["title"] if "title" in chat else "New Chat" + chat_item.chat = self._clean_null_bytes(chat) + chat_item.title = ( + self._clean_null_bytes(chat["title"]) + if "title" in chat + else "New Chat" + ) + chat_item.updated_at = int(time.time()) + db.commit() db.refresh(chat_item) @@ -297,6 +346,27 @@ class ChatTable: chat["history"] = history return self.update_chat_by_id(id, chat) + def add_message_files_by_id_and_message_id( + self, id: str, message_id: str, files: list[dict] + ) -> list[dict]: + chat = self.get_chat_by_id(id) + if chat is None: + return None + + chat = chat.chat + history = chat.get("history", {}) + + message_files = [] + + if message_id in history.get("messages", {}): + message_files = history["messages"][message_id].get("files", []) + message_files = message_files + files + history["messages"][message_id]["files"] = message_files + + chat["history"] = history + self.update_chat_by_id(id, chat) + return message_files + def insert_shared_chat_by_chat_id(self, chat_id: str) -> Optional[ChatModel]: with get_db() as db: # Get the existing chat to share @@ -405,6 +475,7 @@ class ChatTable: with get_db() as db: chat = db.get(Chat, id) chat.archived = not chat.archived + chat.folder_id = None chat.updated_at = int(time.time()) db.commit() db.refresh(chat) @@ -561,8 +632,15 @@ class ChatTable: def get_chat_by_id(self, id: str) -> Optional[ChatModel]: try: with get_db() as db: - chat = db.get(Chat, id) - return ChatModel.model_validate(chat) + chat_item = db.get(Chat, id) + if chat_item is None: + return None + + if self._sanitize_chat_row(chat_item): + db.commit() + db.refresh(chat_item) + + return ChatModel.model_validate(chat_item) except Exception: return None @@ -767,24 +845,30 @@ class ChatTable: elif dialect_name == "postgresql": # PostgreSQL doesn't allow null bytes in text. We filter those out by checking # the JSON representation for \u0000 before attempting text extraction - postgres_content_sql = ( - "EXISTS (" - " SELECT 1 " - " FROM json_array_elements(Chat.chat->'messages') AS message " - " WHERE message->'content' IS NOT NULL " - " AND (message->'content')::text NOT LIKE '%\\u0000%' " - " AND LOWER(message->>'content') LIKE '%' || :content_key || '%'" - ")" - ) - postgres_content_clause = text(postgres_content_sql) - # Also filter out chats with null bytes in title + + # Safety filter: JSON field must not contain \u0000 + query = query.filter(text("Chat.chat::text NOT LIKE '%\\\\u0000%'")) + + # Safety filter: title must not contain actual null bytes query = query.filter(text("Chat.title::text NOT LIKE '%\\x00%'")) + + postgres_content_sql = """ + EXISTS ( + SELECT 1 + FROM json_array_elements(Chat.chat->'messages') AS message + WHERE json_typeof(message->'content') = 'string' + AND LOWER(message->>'content') LIKE '%' || :content_key || '%' + ) + """ + + postgres_content_clause = text(postgres_content_sql) + query = query.filter( or_( Chat.title.ilike(bindparam("title_key")), postgres_content_clause, - ).params(title_key=f"%{search_text}%", content_key=search_text) - ) + ) + ).params(title_key=f"%{search_text}%", content_key=search_text.lower()) # Check if there are any tags to filter, it should have all the tags if "none" in tag_ids: @@ -1059,6 +1143,20 @@ class ChatTable: except Exception: return False + def move_chats_by_user_id_and_folder_id( + self, user_id: str, folder_id: str, new_folder_id: Optional[str] + ) -> bool: + try: + with get_db() as db: + db.query(Chat).filter_by(user_id=user_id, folder_id=folder_id).update( + {"folder_id": new_folder_id} + ) + db.commit() + + return True + except Exception: + return False + def delete_shared_chats_by_user_id(self, user_id: str) -> bool: try: with get_db() as db: diff --git a/backend/open_webui/models/feedbacks.py b/backend/open_webui/models/feedbacks.py index 215e36aa24..5a91804b56 100644 --- a/backend/open_webui/models/feedbacks.py +++ b/backend/open_webui/models/feedbacks.py @@ -4,7 +4,7 @@ import uuid from typing import Optional from open_webui.internal.db import Base, get_db -from open_webui.models.chats import Chats +from open_webui.models.users import User from open_webui.env import SRC_LOG_LEVELS from pydantic import BaseModel, ConfigDict @@ -21,7 +21,7 @@ log.setLevel(SRC_LOG_LEVELS["MODELS"]) class Feedback(Base): __tablename__ = "feedback" - id = Column(Text, primary_key=True) + id = Column(Text, primary_key=True, unique=True) user_id = Column(Text) version = Column(BigInteger, default=0) type = Column(Text) @@ -92,6 +92,28 @@ class FeedbackForm(BaseModel): model_config = ConfigDict(extra="allow") +class UserResponse(BaseModel): + id: str + name: str + email: str + role: str = "pending" + + last_active_at: int # timestamp in epoch + updated_at: int # timestamp in epoch + created_at: int # timestamp in epoch + + model_config = ConfigDict(from_attributes=True) + + +class FeedbackUserResponse(FeedbackResponse): + user: Optional[UserResponse] = None + + +class FeedbackListResponse(BaseModel): + items: list[FeedbackUserResponse] + total: int + + class FeedbackTable: def insert_new_feedback( self, user_id: str, form_data: FeedbackForm @@ -143,6 +165,70 @@ class FeedbackTable: except Exception: return None + def get_feedback_items( + self, filter: dict = {}, skip: int = 0, limit: int = 30 + ) -> FeedbackListResponse: + with get_db() as db: + query = db.query(Feedback, User).join(User, Feedback.user_id == User.id) + + if filter: + order_by = filter.get("order_by") + direction = filter.get("direction") + + if order_by == "username": + if direction == "asc": + query = query.order_by(User.name.asc()) + else: + query = query.order_by(User.name.desc()) + elif order_by == "model_id": + # it's stored in feedback.data['model_id'] + if direction == "asc": + query = query.order_by( + Feedback.data["model_id"].as_string().asc() + ) + else: + query = query.order_by( + Feedback.data["model_id"].as_string().desc() + ) + elif order_by == "rating": + # it's stored in feedback.data['rating'] + if direction == "asc": + query = query.order_by( + Feedback.data["rating"].as_string().asc() + ) + else: + query = query.order_by( + Feedback.data["rating"].as_string().desc() + ) + elif order_by == "updated_at": + if direction == "asc": + query = query.order_by(Feedback.updated_at.asc()) + else: + query = query.order_by(Feedback.updated_at.desc()) + + else: + query = query.order_by(Feedback.created_at.desc()) + + # Count BEFORE pagination + total = query.count() + + if skip: + query = query.offset(skip) + if limit: + query = query.limit(limit) + + items = query.all() + + feedbacks = [] + for feedback, user in items: + feedback_model = FeedbackModel.model_validate(feedback) + user_model = UserResponse.model_validate(user) + feedbacks.append( + FeedbackUserResponse(**feedback_model.model_dump(), user=user_model) + ) + + return FeedbackListResponse(items=feedbacks, total=total) + def get_all_feedbacks(self) -> list[FeedbackModel]: with get_db() as db: return [ diff --git a/backend/open_webui/models/files.py b/backend/open_webui/models/files.py index 171810fde7..1ed743df87 100644 --- a/backend/open_webui/models/files.py +++ b/backend/open_webui/models/files.py @@ -17,7 +17,7 @@ log.setLevel(SRC_LOG_LEVELS["MODELS"]) class File(Base): __tablename__ = "file" - id = Column(String, primary_key=True) + id = Column(String, primary_key=True, unique=True) user_id = Column(String) hash = Column(Text, nullable=True) @@ -98,6 +98,12 @@ class FileForm(BaseModel): access_control: Optional[dict] = None +class FileUpdateForm(BaseModel): + hash: Optional[str] = None + data: Optional[dict] = None + meta: Optional[dict] = None + + class FilesTable: def insert_new_file(self, user_id: str, form_data: FileForm) -> Optional[FileModel]: with get_db() as db: @@ -204,6 +210,29 @@ class FilesTable: for file in db.query(File).filter_by(user_id=user_id).all() ] + def update_file_by_id( + self, id: str, form_data: FileUpdateForm + ) -> Optional[FileModel]: + with get_db() as db: + try: + file = db.query(File).filter_by(id=id).first() + + if form_data.hash is not None: + file.hash = form_data.hash + + if form_data.data is not None: + file.data = {**(file.data if file.data else {}), **form_data.data} + + if form_data.meta is not None: + file.meta = {**(file.meta if file.meta else {}), **form_data.meta} + + file.updated_at = int(time.time()) + db.commit() + return FileModel.model_validate(file) + except Exception as e: + log.exception(f"Error updating file completely by id: {e}") + return None + def update_file_hash_by_id(self, id: str, hash: str) -> Optional[FileModel]: with get_db() as db: try: diff --git a/backend/open_webui/models/folders.py b/backend/open_webui/models/folders.py index 45f8247080..6e1735ecea 100644 --- a/backend/open_webui/models/folders.py +++ b/backend/open_webui/models/folders.py @@ -23,7 +23,7 @@ log.setLevel(SRC_LOG_LEVELS["MODELS"]) class Folder(Base): __tablename__ = "folder" - id = Column(Text, primary_key=True) + id = Column(Text, primary_key=True, unique=True) parent_id = Column(Text, nullable=True) user_id = Column(Text) name = Column(Text) diff --git a/backend/open_webui/models/functions.py b/backend/open_webui/models/functions.py index 2020a29633..91736f949a 100644 --- a/backend/open_webui/models/functions.py +++ b/backend/open_webui/models/functions.py @@ -19,7 +19,7 @@ log.setLevel(SRC_LOG_LEVELS["MODELS"]) class Function(Base): __tablename__ = "function" - id = Column(String, primary_key=True) + id = Column(String, primary_key=True, unique=True) user_id = Column(String) name = Column(Text) type = Column(Text) diff --git a/backend/open_webui/models/groups.py b/backend/open_webui/models/groups.py index a09b2b73f9..1d96f5cfaa 100644 --- a/backend/open_webui/models/groups.py +++ b/backend/open_webui/models/groups.py @@ -11,7 +11,7 @@ from open_webui.models.files import FileMetadataResponse from pydantic import BaseModel, ConfigDict -from sqlalchemy import BigInteger, Column, String, Text, JSON, func +from sqlalchemy import BigInteger, Column, String, Text, JSON, func, ForeignKey log = logging.getLogger(__name__) @@ -35,7 +35,6 @@ class Group(Base): meta = Column(JSON, nullable=True) permissions = Column(JSON, nullable=True) - user_ids = Column(JSON, nullable=True) created_at = Column(BigInteger) updated_at = Column(BigInteger) @@ -53,12 +52,33 @@ class GroupModel(BaseModel): meta: Optional[dict] = None permissions: Optional[dict] = None - user_ids: list[str] = [] created_at: int # timestamp in epoch updated_at: int # timestamp in epoch +class GroupMember(Base): + __tablename__ = "group_member" + + id = Column(Text, unique=True, primary_key=True) + group_id = Column( + Text, + ForeignKey("group.id", ondelete="CASCADE"), + nullable=False, + ) + user_id = Column(Text, nullable=False) + created_at = Column(BigInteger, nullable=True) + updated_at = Column(BigInteger, nullable=True) + + +class GroupMemberModel(BaseModel): + id: str + group_id: str + user_id: str + created_at: Optional[int] = None # timestamp in epoch + updated_at: Optional[int] = None # timestamp in epoch + + #################### # Forms #################### @@ -72,7 +92,7 @@ class GroupResponse(BaseModel): permissions: Optional[dict] = None data: Optional[dict] = None meta: Optional[dict] = None - user_ids: list[str] = [] + member_count: Optional[int] = None created_at: int # timestamp in epoch updated_at: int # timestamp in epoch @@ -81,13 +101,14 @@ class GroupForm(BaseModel): name: str description: str permissions: Optional[dict] = None + data: Optional[dict] = None class UserIdsForm(BaseModel): user_ids: Optional[list[str]] = None -class GroupUpdateForm(GroupForm, UserIdsForm): +class GroupUpdateForm(GroupForm): pass @@ -131,12 +152,8 @@ class GroupTable: return [ GroupModel.model_validate(group) for group in db.query(Group) - .filter( - func.json_array_length(Group.user_ids) > 0 - ) # Ensure array exists - .filter( - Group.user_ids.cast(String).like(f'%"{user_id}"%') - ) # String-based check + .join(GroupMember, GroupMember.group_id == Group.id) + .filter(GroupMember.user_id == user_id) .order_by(Group.updated_at.desc()) .all() ] @@ -149,12 +166,46 @@ class GroupTable: except Exception: return None - def get_group_user_ids_by_id(self, id: str) -> Optional[str]: - group = self.get_group_by_id(id) - if group: - return group.user_ids - else: - return None + def get_group_user_ids_by_id(self, id: str) -> Optional[list[str]]: + with get_db() as db: + members = ( + db.query(GroupMember.user_id).filter(GroupMember.group_id == id).all() + ) + + if not members: + return None + + return [m[0] for m in members] + + def set_group_user_ids_by_id(self, group_id: str, user_ids: list[str]) -> None: + with get_db() as db: + # Delete existing members + db.query(GroupMember).filter(GroupMember.group_id == group_id).delete() + + # Insert new members + now = int(time.time()) + new_members = [ + GroupMember( + id=str(uuid.uuid4()), + group_id=group_id, + user_id=user_id, + created_at=now, + updated_at=now, + ) + for user_id in user_ids + ] + + db.add_all(new_members) + db.commit() + + def get_group_member_count_by_id(self, id: str) -> int: + with get_db() as db: + count = ( + db.query(func.count(GroupMember.user_id)) + .filter(GroupMember.group_id == id) + .scalar() + ) + return count if count else 0 def update_group_by_id( self, id: str, form_data: GroupUpdateForm, overwrite: bool = False @@ -195,20 +246,29 @@ class GroupTable: def remove_user_from_all_groups(self, user_id: str) -> bool: with get_db() as db: try: - groups = self.get_groups_by_member_id(user_id) + # Find all groups the user belongs to + groups = ( + db.query(Group) + .join(GroupMember, GroupMember.group_id == Group.id) + .filter(GroupMember.user_id == user_id) + .all() + ) + # Remove the user from each group for group in groups: - group.user_ids.remove(user_id) - db.query(Group).filter_by(id=group.id).update( - { - "user_ids": group.user_ids, - "updated_at": int(time.time()), - } - ) - db.commit() + db.query(GroupMember).filter( + GroupMember.group_id == group.id, GroupMember.user_id == user_id + ).delete() + db.query(Group).filter_by(id=group.id).update( + {"updated_at": int(time.time())} + ) + + db.commit() return True + except Exception: + db.rollback() return False def create_groups_by_group_names( @@ -246,37 +306,61 @@ class GroupTable: def sync_groups_by_group_names(self, user_id: str, group_names: list[str]) -> bool: with get_db() as db: try: - groups = db.query(Group).filter(Group.name.in_(group_names)).all() - group_ids = [group.id for group in groups] + now = int(time.time()) - # Remove user from groups not in the new list - existing_groups = self.get_groups_by_member_id(user_id) + # 1. Groups that SHOULD contain the user + target_groups = ( + db.query(Group).filter(Group.name.in_(group_names)).all() + ) + target_group_ids = {g.id for g in target_groups} - for group in existing_groups: - if group.id not in group_ids: - group.user_ids.remove(user_id) - db.query(Group).filter_by(id=group.id).update( - { - "user_ids": group.user_ids, - "updated_at": int(time.time()), - } + # 2. Groups the user is CURRENTLY in + existing_group_ids = { + g.id + for g in db.query(Group) + .join(GroupMember, GroupMember.group_id == Group.id) + .filter(GroupMember.user_id == user_id) + .all() + } + + # 3. Determine adds + removals + groups_to_add = target_group_ids - existing_group_ids + groups_to_remove = existing_group_ids - target_group_ids + + # 4. Remove in one bulk delete + if groups_to_remove: + db.query(GroupMember).filter( + GroupMember.user_id == user_id, + GroupMember.group_id.in_(groups_to_remove), + ).delete(synchronize_session=False) + + db.query(Group).filter(Group.id.in_(groups_to_remove)).update( + {"updated_at": now}, synchronize_session=False + ) + + # 5. Bulk insert missing memberships + for group_id in groups_to_add: + db.add( + GroupMember( + id=str(uuid.uuid4()), + group_id=group_id, + user_id=user_id, + created_at=now, + updated_at=now, ) + ) - # Add user to new groups - for group in groups: - if user_id not in group.user_ids: - group.user_ids.append(user_id) - db.query(Group).filter_by(id=group.id).update( - { - "user_ids": group.user_ids, - "updated_at": int(time.time()), - } - ) + if groups_to_add: + db.query(Group).filter(Group.id.in_(groups_to_add)).update( + {"updated_at": now}, synchronize_session=False + ) db.commit() return True + except Exception as e: log.exception(e) + db.rollback() return False def add_users_to_group( @@ -288,21 +372,31 @@ class GroupTable: if not group: return None - group_user_ids = group.user_ids - if not group_user_ids or not isinstance(group_user_ids, list): - group_user_ids = [] + now = int(time.time()) - group_user_ids = list(set(group_user_ids)) # Deduplicate + for user_id in user_ids or []: + try: + db.add( + GroupMember( + id=str(uuid.uuid4()), + group_id=id, + user_id=user_id, + created_at=now, + updated_at=now, + ) + ) + db.flush() # Detect unique constraint violation early + except Exception: + db.rollback() # Clear failed INSERT + db.begin() # Start a new transaction + continue # Duplicate → ignore - for user_id in user_ids: - if user_id not in group_user_ids: - group_user_ids.append(user_id) - - group.user_ids = group_user_ids - group.updated_at = int(time.time()) + group.updated_at = now db.commit() db.refresh(group) + return GroupModel.model_validate(group) + except Exception as e: log.exception(e) return None @@ -316,23 +410,22 @@ class GroupTable: if not group: return None - group_user_ids = group.user_ids - - if not group_user_ids or not isinstance(group_user_ids, list): + if not user_ids: return GroupModel.model_validate(group) - group_user_ids = list(set(group_user_ids)) # Deduplicate - + # Remove each user from group_member for user_id in user_ids: - if user_id in group_user_ids: - group_user_ids.remove(user_id) + db.query(GroupMember).filter( + GroupMember.group_id == id, GroupMember.user_id == user_id + ).delete() - group.user_ids = group_user_ids + # Update group timestamp group.updated_at = int(time.time()) db.commit() db.refresh(group) return GroupModel.model_validate(group) + except Exception as e: log.exception(e) return None diff --git a/backend/open_webui/models/memories.py b/backend/open_webui/models/memories.py index 253371c680..f5f2492b99 100644 --- a/backend/open_webui/models/memories.py +++ b/backend/open_webui/models/memories.py @@ -14,7 +14,7 @@ from sqlalchemy import BigInteger, Column, String, Text class Memory(Base): __tablename__ = "memory" - id = Column(String, primary_key=True) + id = Column(String, primary_key=True, unique=True) user_id = Column(String) content = Column(Text) updated_at = Column(BigInteger) diff --git a/backend/open_webui/models/messages.py b/backend/open_webui/models/messages.py index 8b0027b8e7..6aaf09ca46 100644 --- a/backend/open_webui/models/messages.py +++ b/backend/open_webui/models/messages.py @@ -20,7 +20,7 @@ from sqlalchemy.sql import exists class MessageReaction(Base): __tablename__ = "message_reaction" - id = Column(Text, primary_key=True) + id = Column(Text, primary_key=True, unique=True) user_id = Column(Text) message_id = Column(Text) name = Column(Text) diff --git a/backend/open_webui/models/models.py b/backend/open_webui/models/models.py index 93dafe0f05..f9390b405d 100755 --- a/backend/open_webui/models/models.py +++ b/backend/open_webui/models/models.py @@ -6,12 +6,12 @@ from open_webui.internal.db import Base, JSONField, get_db from open_webui.env import SRC_LOG_LEVELS from open_webui.models.groups import Groups -from open_webui.models.users import Users, UserResponse +from open_webui.models.users import User, UserModel, Users, UserResponse from pydantic import BaseModel, ConfigDict -from sqlalchemy import or_, and_, func +from sqlalchemy import String, cast, or_, and_, func from sqlalchemy.dialects import postgresql, sqlite from sqlalchemy import BigInteger, Column, Text, JSON, Boolean @@ -133,6 +133,11 @@ class ModelResponse(ModelModel): pass +class ModelListResponse(BaseModel): + items: list[ModelUserResponse] + total: int + + class ModelForm(BaseModel): id: str base_model_id: Optional[str] = None @@ -215,6 +220,84 @@ class ModelsTable: or has_access(user_id, permission, model.access_control, user_group_ids) ] + def search_models( + self, user_id: str, filter: dict = {}, skip: int = 0, limit: int = 30 + ) -> ModelListResponse: + with get_db() as db: + # Join GroupMember so we can order by group_id when requested + query = db.query(Model, User).outerjoin(User, User.id == Model.user_id) + query = query.filter(Model.base_model_id != None) + + if filter: + query_key = filter.get("query") + if query_key: + query = query.filter( + or_( + Model.name.ilike(f"%{query_key}%"), + Model.base_model_id.ilike(f"%{query_key}%"), + ) + ) + + if filter.get("user_id"): + query = query.filter(Model.user_id == filter.get("user_id")) + + view_option = filter.get("view_option") + + if view_option == "created": + query = query.filter(Model.user_id == user_id) + elif view_option == "shared": + query = query.filter(Model.user_id != user_id) + + tag = filter.get("tag") + if tag: + # TODO: This is a simple implementation and should be improved for performance + like_pattern = f'%"{tag.lower()}"%' # `"tag"` inside JSON array + meta_text = func.lower(cast(Model.meta, String)) + + query = query.filter(meta_text.like(like_pattern)) + + order_by = filter.get("order_by") + direction = filter.get("direction") + + if order_by == "name": + if direction == "asc": + query = query.order_by(Model.name.asc()) + else: + query = query.order_by(Model.name.desc()) + elif order_by == "created_at": + if direction == "asc": + query = query.order_by(Model.created_at.asc()) + else: + query = query.order_by(Model.created_at.desc()) + elif order_by == "updated_at": + if direction == "asc": + query = query.order_by(Model.updated_at.asc()) + else: + query = query.order_by(Model.updated_at.desc()) + + else: + query = query.order_by(Model.created_at.desc()) + + # Count BEFORE pagination + total = query.count() + + if skip: + query = query.offset(skip) + if limit: + query = query.limit(limit) + + items = query.all() + + models = [] + for model, user in items: + model_model = ModelModel.model_validate(model) + user_model = UserResponse(**UserModel.model_validate(user).model_dump()) + models.append( + ModelUserResponse(**model_model.model_dump(), user=user_model) + ) + + return ModelListResponse(items=models, total=total) + def get_model_by_id(self, id: str) -> Optional[ModelModel]: try: with get_db() as db: @@ -244,11 +327,9 @@ class ModelsTable: try: with get_db() as db: # update only the fields that are present in the model - result = ( - db.query(Model) - .filter_by(id=id) - .update(model.model_dump(exclude={"id"})) - ) + data = model.model_dump(exclude={"id"}) + result = db.query(Model).filter_by(id=id).update(data) + db.commit() model = db.get(Model, id) diff --git a/backend/open_webui/models/users.py b/backend/open_webui/models/users.py index 05000744dd..256d3bc75e 100644 --- a/backend/open_webui/models/users.py +++ b/backend/open_webui/models/users.py @@ -6,7 +6,7 @@ from open_webui.internal.db import Base, JSONField, get_db from open_webui.env import DATABASE_USER_ACTIVE_STATUS_UPDATE_INTERVAL from open_webui.models.chats import Chats -from open_webui.models.groups import Groups +from open_webui.models.groups import Groups, GroupMember from open_webui.utils.misc import throttle @@ -95,8 +95,12 @@ class UpdateProfileForm(BaseModel): date_of_birth: Optional[datetime.date] = None +class UserGroupIdsModel(UserModel): + group_ids: list[str] = [] + + class UserListResponse(BaseModel): - users: list[UserModel] + users: list[UserGroupIdsModel] total: int @@ -222,7 +226,10 @@ class UsersTable: limit: Optional[int] = None, ) -> dict: with get_db() as db: - query = db.query(User) + # Join GroupMember so we can order by group_id when requested + query = db.query(User).outerjoin( + GroupMember, GroupMember.user_id == User.id + ) if filter: query_key = filter.get("query") @@ -237,7 +244,16 @@ class UsersTable: order_by = filter.get("order_by") direction = filter.get("direction") - if order_by == "name": + if order_by and order_by.startswith("group_id:"): + group_id = order_by.split(":", 1)[1] + + if direction == "asc": + query = query.order_by((GroupMember.group_id == group_id).asc()) + else: + query = query.order_by( + (GroupMember.group_id == group_id).desc() + ) + elif order_by == "name": if direction == "asc": query = query.order_by(User.name.asc()) else: @@ -274,6 +290,9 @@ class UsersTable: else: query = query.order_by(User.created_at.desc()) + # Count BEFORE pagination + total = query.count() + if skip: query = query.offset(skip) if limit: @@ -282,7 +301,7 @@ class UsersTable: users = query.all() return { "users": [UserModel.model_validate(user) for user in users], - "total": db.query(User).count(), + "total": total, } def get_users_by_user_ids(self, user_ids: list[str]) -> list[UserModel]: @@ -322,6 +341,15 @@ class UsersTable: except Exception: return None + def get_num_users_active_today(self) -> Optional[int]: + with get_db() as db: + current_timestamp = int(datetime.datetime.now().timestamp()) + today_midnight_timestamp = current_timestamp - (current_timestamp % 86400) + query = db.query(User).filter( + User.last_active_at > today_midnight_timestamp + ) + return query.count() + def update_user_role_by_id(self, id: str, role: str) -> Optional[UserModel]: try: with get_db() as db: diff --git a/backend/open_webui/retrieval/loaders/mineru.py b/backend/open_webui/retrieval/loaders/mineru.py index 437f44ae6b..360af804c7 100644 --- a/backend/open_webui/retrieval/loaders/mineru.py +++ b/backend/open_webui/retrieval/loaders/mineru.py @@ -33,13 +33,14 @@ class MinerULoader: self.api_key = api_key # Parse params dict with defaults - params = params or {} + self.params = params or {} self.enable_ocr = params.get("enable_ocr", False) self.enable_formula = params.get("enable_formula", True) self.enable_table = params.get("enable_table", True) self.language = params.get("language", "en") self.model_version = params.get("model_version", "pipeline") - self.page_ranges = params.get("page_ranges", "") + + self.page_ranges = self.params.pop("page_ranges", "") # Validate API mode if self.api_mode not in ["local", "cloud"]: @@ -76,27 +77,10 @@ class MinerULoader: # Build form data for Local API form_data = { + **self.params, "return_md": "true", - "formula_enable": str(self.enable_formula).lower(), - "table_enable": str(self.enable_table).lower(), } - # Parse method based on OCR setting - if self.enable_ocr: - form_data["parse_method"] = "ocr" - else: - form_data["parse_method"] = "auto" - - # Language configuration (Local API uses lang_list array) - if self.language: - form_data["lang_list"] = self.language - - # Backend/model version (Local API uses "backend" parameter) - if self.model_version == "vlm": - form_data["backend"] = "vlm-vllm-engine" - else: - form_data["backend"] = "pipeline" - # Page ranges (Local API uses start_page_id and end_page_id) if self.page_ranges: # For simplicity, if page_ranges is specified, log a warning @@ -236,10 +220,7 @@ class MinerULoader: # Build request body request_body = { - "enable_formula": self.enable_formula, - "enable_table": self.enable_table, - "language": self.language, - "model_version": self.model_version, + **self.params, "files": [ { "name": filename, diff --git a/backend/open_webui/retrieval/models/external.py b/backend/open_webui/retrieval/models/external.py index a9be526b6d..822cb3e3dd 100644 --- a/backend/open_webui/retrieval/models/external.py +++ b/backend/open_webui/retrieval/models/external.py @@ -6,6 +6,7 @@ from urllib.parse import quote from open_webui.env import ENABLE_FORWARD_USER_INFO_HEADERS, SRC_LOG_LEVELS from open_webui.retrieval.models.base_reranker import BaseReranker +from open_webui.utils.headers import include_user_info_headers log = logging.getLogger(__name__) @@ -40,22 +41,17 @@ class ExternalReranker(BaseReranker): log.info(f"ExternalReranker:predict:model {self.model}") log.info(f"ExternalReranker:predict:query {query}") + headers = { + "Content-Type": "application/json", + "Authorization": f"Bearer {self.api_key}", + } + + if ENABLE_FORWARD_USER_INFO_HEADERS and user: + headers = include_user_info_headers(headers, user) + r = requests.post( f"{self.url}", - headers={ - "Content-Type": "application/json", - "Authorization": f"Bearer {self.api_key}", - **( - { - "X-OpenWebUI-User-Name": quote(user.name, safe=" "), - "X-OpenWebUI-User-Id": user.id, - "X-OpenWebUI-User-Email": user.email, - "X-OpenWebUI-User-Role": user.role, - } - if ENABLE_FORWARD_USER_INFO_HEADERS and user - else {} - ), - }, + headers=headers, json=payload, ) diff --git a/backend/open_webui/retrieval/utils.py b/backend/open_webui/retrieval/utils.py index da570330b3..0587317bf6 100644 --- a/backend/open_webui/retrieval/utils.py +++ b/backend/open_webui/retrieval/utils.py @@ -1,8 +1,10 @@ import logging import os -from typing import Optional, Union +from typing import Awaitable, Optional, Union import requests +import aiohttp +import asyncio import hashlib from concurrent.futures import ThreadPoolExecutor import time @@ -27,6 +29,7 @@ from open_webui.models.notes import Notes from open_webui.retrieval.vector.main import GetResult from open_webui.utils.access_control import has_access +from open_webui.utils.headers import include_user_info_headers from open_webui.utils.misc import get_message_list from open_webui.retrieval.web.utils import get_web_loader @@ -87,15 +90,16 @@ class VectorSearchRetriever(BaseRetriever): embedding_function: Any top_k: int - def _get_relevant_documents( + async def _aget_relevant_documents( self, query: str, *, run_manager: CallbackManagerForRetrieverRun, ) -> list[Document]: + embedding = await self.embedding_function(query, RAG_EMBEDDING_QUERY_PREFIX) result = VECTOR_DB_CLIENT.search( collection_name=self.collection_name, - vectors=[self.embedding_function(query, RAG_EMBEDDING_QUERY_PREFIX)], + vectors=[embedding], limit=self.top_k, ) @@ -148,7 +152,45 @@ def get_doc(collection_name: str, user: UserModel = None): raise e -def query_doc_with_hybrid_search( +def get_enriched_texts(collection_result: GetResult) -> list[str]: + enriched_texts = [] + for idx, text in enumerate(collection_result.documents[0]): + metadata = collection_result.metadatas[0][idx] + metadata_parts = [text] + + # Add filename (repeat twice for extra weight in BM25 scoring) + if metadata.get("name"): + filename = metadata["name"] + filename_tokens = ( + filename.replace("_", " ").replace("-", " ").replace(".", " ") + ) + metadata_parts.append( + f"Filename: {filename} {filename_tokens} {filename_tokens}" + ) + + # Add title if available + if metadata.get("title"): + metadata_parts.append(f"Title: {metadata['title']}") + + # Add document section headings if available (from markdown splitter) + if metadata.get("headings") and isinstance(metadata["headings"], list): + headings = " > ".join(str(h) for h in metadata["headings"]) + metadata_parts.append(f"Section: {headings}") + + # Add source URL/path if available + if metadata.get("source"): + metadata_parts.append(f"Source: {metadata['source']}") + + # Add snippet for web search results + if metadata.get("snippet"): + metadata_parts.append(f"Snippet: {metadata['snippet']}") + + enriched_texts.append(" ".join(metadata_parts)) + + return enriched_texts + + +async def query_doc_with_hybrid_search( collection_name: str, collection_result: GetResult, query: str, @@ -158,12 +200,21 @@ def query_doc_with_hybrid_search( k_reranker: int, r: float, hybrid_bm25_weight: float, + enable_enriched_texts: bool = False, ) -> dict: try: + # First check if collection_result has the required attributes if ( not collection_result or not hasattr(collection_result, "documents") - or not collection_result.documents + or not hasattr(collection_result, "metadatas") + ): + log.warning(f"query_doc_with_hybrid_search:no_docs {collection_name}") + return {"documents": [], "metadatas": [], "distances": []} + + # Now safely check the documents content after confirming attributes exist + if ( + not collection_result.documents or len(collection_result.documents) == 0 or not collection_result.documents[0] ): @@ -172,8 +223,14 @@ def query_doc_with_hybrid_search( log.debug(f"query_doc_with_hybrid_search:doc {collection_name}") + bm25_texts = ( + get_enriched_texts(collection_result) + if enable_enriched_texts + else collection_result.documents[0] + ) + bm25_retriever = BM25Retriever.from_texts( - texts=collection_result.documents[0], + texts=bm25_texts, metadatas=collection_result.metadatas[0], ) bm25_retriever.k = k @@ -209,7 +266,7 @@ def query_doc_with_hybrid_search( base_compressor=compressor, base_retriever=ensemble_retriever ) - result = compression_retriever.invoke(query) + result = await compression_retriever.ainvoke(query) distances = [d.metadata.get("score") for d in result] documents = [d.page_content for d in result] @@ -328,7 +385,7 @@ def get_all_items_from_collections(collection_names: list[str]) -> dict: return merge_get_results(results) -def query_collection( +async def query_collection( collection_names: list[str], queries: list[str], embedding_function, @@ -353,7 +410,9 @@ def query_collection( return None, e # Generate all query embeddings (in one call) - query_embeddings = embedding_function(queries, prefix=RAG_EMBEDDING_QUERY_PREFIX) + query_embeddings = await embedding_function( + queries, prefix=RAG_EMBEDDING_QUERY_PREFIX + ) log.debug( f"query_collection: processing {len(queries)} queries across {len(collection_names)} collections" ) @@ -380,7 +439,7 @@ def query_collection( return merge_and_sort_query_results(results, k=k) -def query_collection_with_hybrid_search( +async def query_collection_with_hybrid_search( collection_names: list[str], queries: list[str], embedding_function, @@ -389,6 +448,7 @@ def query_collection_with_hybrid_search( k_reranker: int, r: float, hybrid_bm25_weight: float, + enable_enriched_texts: bool = False, ) -> dict: results = [] error = False @@ -411,9 +471,9 @@ def query_collection_with_hybrid_search( f"Starting hybrid search for {len(queries)} queries in {len(collection_names)} collections..." ) - def process_query(collection_name, query): + async def process_query(collection_name, query): try: - result = query_doc_with_hybrid_search( + result = await query_doc_with_hybrid_search( collection_name=collection_name, collection_result=collection_results[collection_name], query=query, @@ -423,6 +483,7 @@ def query_collection_with_hybrid_search( k_reranker=k_reranker, r=r, hybrid_bm25_weight=hybrid_bm25_weight, + enable_enriched_texts=enable_enriched_texts, ) return result, None except Exception as e: @@ -432,15 +493,16 @@ def query_collection_with_hybrid_search( # Prepare tasks for all collections and queries # Avoid running any tasks for collections that failed to fetch data (have assigned None) tasks = [ - (cn, q) - for cn in collection_names - if collection_results[cn] is not None - for q in queries + (collection_name, query) + for collection_name in collection_names + if collection_results[collection_name] is not None + for query in queries ] - with ThreadPoolExecutor() as executor: - future_results = [executor.submit(process_query, cn, q) for cn, q in tasks] - task_results = [future.result() for future in future_results] + # Run all queries in parallel using asyncio.gather + task_results = await asyncio.gather( + *[process_query(collection_name, query) for collection_name, query in tasks] + ) for result, err in task_results: if err is not None: @@ -456,6 +518,248 @@ def query_collection_with_hybrid_search( return merge_and_sort_query_results(results, k=k) +def generate_openai_batch_embeddings( + model: str, + texts: list[str], + url: str = "https://api.openai.com/v1", + key: str = "", + prefix: str = None, + user: UserModel = None, +) -> Optional[list[list[float]]]: + try: + log.debug( + f"generate_openai_batch_embeddings:model {model} batch size: {len(texts)}" + ) + json_data = {"input": texts, "model": model} + if isinstance(RAG_EMBEDDING_PREFIX_FIELD_NAME, str) and isinstance(prefix, str): + json_data[RAG_EMBEDDING_PREFIX_FIELD_NAME] = prefix + + headers = { + "Content-Type": "application/json", + "Authorization": f"Bearer {key}", + } + if ENABLE_FORWARD_USER_INFO_HEADERS and user: + headers = include_user_info_headers(headers, user) + + r = requests.post( + f"{url}/embeddings", + headers=headers, + json=json_data, + ) + r.raise_for_status() + data = r.json() + if "data" in data: + return [elem["embedding"] for elem in data["data"]] + else: + raise "Something went wrong :/" + except Exception as e: + log.exception(f"Error generating openai batch embeddings: {e}") + return None + + +async def agenerate_openai_batch_embeddings( + model: str, + texts: list[str], + url: str = "https://api.openai.com/v1", + key: str = "", + prefix: str = None, + user: UserModel = None, +) -> Optional[list[list[float]]]: + try: + log.debug( + f"agenerate_openai_batch_embeddings:model {model} batch size: {len(texts)}" + ) + form_data = {"input": texts, "model": model} + if isinstance(RAG_EMBEDDING_PREFIX_FIELD_NAME, str) and isinstance(prefix, str): + form_data[RAG_EMBEDDING_PREFIX_FIELD_NAME] = prefix + + headers = { + "Content-Type": "application/json", + "Authorization": f"Bearer {key}", + } + if ENABLE_FORWARD_USER_INFO_HEADERS and user: + headers = include_user_info_headers(headers, user) + + async with aiohttp.ClientSession(trust_env=True) as session: + async with session.post( + f"{url}/embeddings", headers=headers, json=form_data + ) as r: + r.raise_for_status() + data = await r.json() + if "data" in data: + return [item["embedding"] for item in data["data"]] + else: + raise Exception("Something went wrong :/") + except Exception as e: + log.exception(f"Error generating openai batch embeddings: {e}") + return None + + +def generate_azure_openai_batch_embeddings( + model: str, + texts: list[str], + url: str, + key: str = "", + version: str = "", + prefix: str = None, + user: UserModel = None, +) -> Optional[list[list[float]]]: + try: + log.debug( + f"generate_azure_openai_batch_embeddings:deployment {model} batch size: {len(texts)}" + ) + json_data = {"input": texts} + if isinstance(RAG_EMBEDDING_PREFIX_FIELD_NAME, str) and isinstance(prefix, str): + json_data[RAG_EMBEDDING_PREFIX_FIELD_NAME] = prefix + + url = f"{url}/openai/deployments/{model}/embeddings?api-version={version}" + + for _ in range(5): + headers = { + "Content-Type": "application/json", + "api-key": key, + } + if ENABLE_FORWARD_USER_INFO_HEADERS and user: + headers = include_user_info_headers(headers, user) + + r = requests.post( + url, + headers=headers, + json=json_data, + ) + if r.status_code == 429: + retry = float(r.headers.get("Retry-After", "1")) + time.sleep(retry) + continue + r.raise_for_status() + data = r.json() + if "data" in data: + return [elem["embedding"] for elem in data["data"]] + else: + raise Exception("Something went wrong :/") + return None + except Exception as e: + log.exception(f"Error generating azure openai batch embeddings: {e}") + return None + + +async def agenerate_azure_openai_batch_embeddings( + model: str, + texts: list[str], + url: str, + key: str = "", + version: str = "", + prefix: str = None, + user: UserModel = None, +) -> Optional[list[list[float]]]: + try: + log.debug( + f"agenerate_azure_openai_batch_embeddings:deployment {model} batch size: {len(texts)}" + ) + form_data = {"input": texts} + if isinstance(RAG_EMBEDDING_PREFIX_FIELD_NAME, str) and isinstance(prefix, str): + form_data[RAG_EMBEDDING_PREFIX_FIELD_NAME] = prefix + + full_url = f"{url}/openai/deployments/{model}/embeddings?api-version={version}" + + headers = { + "Content-Type": "application/json", + "api-key": key, + } + if ENABLE_FORWARD_USER_INFO_HEADERS and user: + headers = include_user_info_headers(headers, user) + + async with aiohttp.ClientSession(trust_env=True) as session: + async with session.post(full_url, headers=headers, json=form_data) as r: + r.raise_for_status() + data = await r.json() + if "data" in data: + return [item["embedding"] for item in data["data"]] + else: + raise Exception("Something went wrong :/") + except Exception as e: + log.exception(f"Error generating azure openai batch embeddings: {e}") + return None + + +def generate_ollama_batch_embeddings( + model: str, + texts: list[str], + url: str, + key: str = "", + prefix: str = None, + user: UserModel = None, +) -> Optional[list[list[float]]]: + try: + log.debug( + f"generate_ollama_batch_embeddings:model {model} batch size: {len(texts)}" + ) + json_data = {"input": texts, "model": model} + if isinstance(RAG_EMBEDDING_PREFIX_FIELD_NAME, str) and isinstance(prefix, str): + json_data[RAG_EMBEDDING_PREFIX_FIELD_NAME] = prefix + + headers = { + "Content-Type": "application/json", + "Authorization": f"Bearer {key}", + } + if ENABLE_FORWARD_USER_INFO_HEADERS and user: + headers = include_user_info_headers(headers, user) + + r = requests.post( + f"{url}/api/embed", + headers=headers, + json=json_data, + ) + r.raise_for_status() + data = r.json() + + if "embeddings" in data: + return data["embeddings"] + else: + raise "Something went wrong :/" + except Exception as e: + log.exception(f"Error generating ollama batch embeddings: {e}") + return None + + +async def agenerate_ollama_batch_embeddings( + model: str, + texts: list[str], + url: str, + key: str = "", + prefix: str = None, + user: UserModel = None, +) -> Optional[list[list[float]]]: + try: + log.debug( + f"agenerate_ollama_batch_embeddings:model {model} batch size: {len(texts)}" + ) + form_data = {"input": texts, "model": model} + if isinstance(RAG_EMBEDDING_PREFIX_FIELD_NAME, str) and isinstance(prefix, str): + form_data[RAG_EMBEDDING_PREFIX_FIELD_NAME] = prefix + + headers = { + "Content-Type": "application/json", + "Authorization": f"Bearer {key}", + } + if ENABLE_FORWARD_USER_INFO_HEADERS and user: + headers = include_user_info_headers(headers, user) + + async with aiohttp.ClientSession(trust_env=True) as session: + async with session.post( + f"{url}/api/embed", headers=headers, json=form_data + ) as r: + r.raise_for_status() + data = await r.json() + if "embeddings" in data: + return data["embeddings"] + else: + raise Exception("Something went wrong :/") + except Exception as e: + log.exception(f"Error generating ollama batch embeddings: {e}") + return None + + def get_embedding_function( embedding_engine, embedding_model, @@ -464,13 +768,23 @@ def get_embedding_function( key, embedding_batch_size, azure_api_version=None, -): +) -> Awaitable: if embedding_engine == "": - return lambda query, prefix=None, user=None: embedding_function.encode( - query, **({"prompt": prefix} if prefix else {}) - ).tolist() + # Sentence transformers: CPU-bound sync operation + async def async_embedding_function(query, prefix=None, user=None): + return await asyncio.to_thread( + ( + lambda query, prefix=None: embedding_function.encode( + query, **({"prompt": prefix} if prefix else {}) + ).tolist() + ), + query, + prefix, + ) + + return async_embedding_function elif embedding_engine in ["ollama", "openai", "azure_openai"]: - func = lambda query, prefix=None, user=None: generate_embeddings( + embedding_function = lambda query, prefix=None, user=None: generate_embeddings( engine=embedding_engine, model=embedding_model, text=query, @@ -481,41 +795,104 @@ def get_embedding_function( azure_api_version=azure_api_version, ) - def generate_multiple(query, prefix, user, func): + async def async_embedding_function(query, prefix=None, user=None): if isinstance(query, list): - embeddings = [] - for i in range(0, len(query), embedding_batch_size): - batch_embeddings = func( - query[i : i + embedding_batch_size], - prefix=prefix, - user=user, - ) + # Create batches + batches = [ + query[i : i + embedding_batch_size] + for i in range(0, len(query), embedding_batch_size) + ] + log.debug( + f"generate_multiple_async: Processing {len(batches)} batches in parallel" + ) + # Execute all batches in parallel + tasks = [ + embedding_function(batch, prefix=prefix, user=user) + for batch in batches + ] + batch_results = await asyncio.gather(*tasks) + + # Flatten results + embeddings = [] + for batch_embeddings in batch_results: if isinstance(batch_embeddings, list): embeddings.extend(batch_embeddings) + + log.debug( + f"generate_multiple_async: Generated {len(embeddings)} embeddings from {len(batches)} parallel batches" + ) return embeddings else: - return func(query, prefix, user) + return await embedding_function(query, prefix, user) - return lambda query, prefix=None, user=None: generate_multiple( - query, prefix, user, func - ) + return async_embedding_function else: raise ValueError(f"Unknown embedding engine: {embedding_engine}") +async def generate_embeddings( + engine: str, + model: str, + text: Union[str, list[str]], + prefix: Union[str, None] = None, + **kwargs, +): + url = kwargs.get("url", "") + key = kwargs.get("key", "") + user = kwargs.get("user") + + if prefix is not None and RAG_EMBEDDING_PREFIX_FIELD_NAME is None: + if isinstance(text, list): + text = [f"{prefix}{text_element}" for text_element in text] + else: + text = f"{prefix}{text}" + + if engine == "ollama": + embeddings = await agenerate_ollama_batch_embeddings( + **{ + "model": model, + "texts": text if isinstance(text, list) else [text], + "url": url, + "key": key, + "prefix": prefix, + "user": user, + } + ) + return embeddings[0] if isinstance(text, str) else embeddings + elif engine == "openai": + embeddings = await agenerate_openai_batch_embeddings( + model, text if isinstance(text, list) else [text], url, key, prefix, user + ) + return embeddings[0] if isinstance(text, str) else embeddings + elif engine == "azure_openai": + azure_api_version = kwargs.get("azure_api_version", "") + embeddings = await agenerate_azure_openai_batch_embeddings( + model, + text if isinstance(text, list) else [text], + url, + key, + azure_api_version, + prefix, + user, + ) + return embeddings[0] if isinstance(text, str) else embeddings + + def get_reranking_function(reranking_engine, reranking_model, reranking_function): if reranking_function is None: return None if reranking_engine == "external": - return lambda sentences, user=None: reranking_function.predict( - sentences, user=user + return lambda query, documents, user=None: reranking_function.predict( + [(query, doc.page_content) for doc in documents], user=user ) else: - return lambda sentences, user=None: reranking_function.predict(sentences) + return lambda query, documents, user=None: reranking_function.predict( + [(query, doc.page_content) for doc in documents] + ) -def get_sources_from_items( +async def get_sources_from_items( request, items, queries, @@ -743,7 +1120,7 @@ def get_sources_from_items( query_result = None # Initialize to None if hybrid_search: try: - query_result = query_collection_with_hybrid_search( + query_result = await query_collection_with_hybrid_search( collection_names=collection_names, queries=queries, embedding_function=embedding_function, @@ -752,6 +1129,7 @@ def get_sources_from_items( k_reranker=k_reranker, r=r, hybrid_bm25_weight=hybrid_bm25_weight, + enable_enriched_texts=request.app.state.config.ENABLE_RAG_HYBRID_SEARCH_ENRICHED_TEXTS, ) except Exception as e: log.debug( @@ -760,7 +1138,7 @@ def get_sources_from_items( # fallback to non-hybrid search if not hybrid_search and query_result is None: - query_result = query_collection( + query_result = await query_collection( collection_names=collection_names, queries=queries, embedding_function=embedding_function, @@ -836,199 +1214,6 @@ def get_model_path(model: str, update_model: bool = False): return model -def generate_openai_batch_embeddings( - model: str, - texts: list[str], - url: str = "https://api.openai.com/v1", - key: str = "", - prefix: str = None, - user: UserModel = None, -) -> Optional[list[list[float]]]: - try: - log.debug( - f"generate_openai_batch_embeddings:model {model} batch size: {len(texts)}" - ) - json_data = {"input": texts, "model": model} - if isinstance(RAG_EMBEDDING_PREFIX_FIELD_NAME, str) and isinstance(prefix, str): - json_data[RAG_EMBEDDING_PREFIX_FIELD_NAME] = prefix - - r = requests.post( - f"{url}/embeddings", - headers={ - "Content-Type": "application/json", - "Authorization": f"Bearer {key}", - **( - { - "X-OpenWebUI-User-Name": quote(user.name, safe=" "), - "X-OpenWebUI-User-Id": user.id, - "X-OpenWebUI-User-Email": user.email, - "X-OpenWebUI-User-Role": user.role, - } - if ENABLE_FORWARD_USER_INFO_HEADERS and user - else {} - ), - }, - json=json_data, - ) - r.raise_for_status() - data = r.json() - if "data" in data: - return [elem["embedding"] for elem in data["data"]] - else: - raise "Something went wrong :/" - except Exception as e: - log.exception(f"Error generating openai batch embeddings: {e}") - return None - - -def generate_azure_openai_batch_embeddings( - model: str, - texts: list[str], - url: str, - key: str = "", - version: str = "", - prefix: str = None, - user: UserModel = None, -) -> Optional[list[list[float]]]: - try: - log.debug( - f"generate_azure_openai_batch_embeddings:deployment {model} batch size: {len(texts)}" - ) - json_data = {"input": texts} - if isinstance(RAG_EMBEDDING_PREFIX_FIELD_NAME, str) and isinstance(prefix, str): - json_data[RAG_EMBEDDING_PREFIX_FIELD_NAME] = prefix - - url = f"{url}/openai/deployments/{model}/embeddings?api-version={version}" - - for _ in range(5): - r = requests.post( - url, - headers={ - "Content-Type": "application/json", - "api-key": key, - **( - { - "X-OpenWebUI-User-Name": quote(user.name, safe=" "), - "X-OpenWebUI-User-Id": user.id, - "X-OpenWebUI-User-Email": user.email, - "X-OpenWebUI-User-Role": user.role, - } - if ENABLE_FORWARD_USER_INFO_HEADERS and user - else {} - ), - }, - json=json_data, - ) - if r.status_code == 429: - retry = float(r.headers.get("Retry-After", "1")) - time.sleep(retry) - continue - r.raise_for_status() - data = r.json() - if "data" in data: - return [elem["embedding"] for elem in data["data"]] - else: - raise Exception("Something went wrong :/") - return None - except Exception as e: - log.exception(f"Error generating azure openai batch embeddings: {e}") - return None - - -def generate_ollama_batch_embeddings( - model: str, - texts: list[str], - url: str, - key: str = "", - prefix: str = None, - user: UserModel = None, -) -> Optional[list[list[float]]]: - try: - log.debug( - f"generate_ollama_batch_embeddings:model {model} batch size: {len(texts)}" - ) - json_data = {"input": texts, "model": model} - if isinstance(RAG_EMBEDDING_PREFIX_FIELD_NAME, str) and isinstance(prefix, str): - json_data[RAG_EMBEDDING_PREFIX_FIELD_NAME] = prefix - - r = requests.post( - f"{url}/api/embed", - headers={ - "Content-Type": "application/json", - "Authorization": f"Bearer {key}", - **( - { - "X-OpenWebUI-User-Name": quote(user.name, safe=" "), - "X-OpenWebUI-User-Id": user.id, - "X-OpenWebUI-User-Email": user.email, - "X-OpenWebUI-User-Role": user.role, - } - if ENABLE_FORWARD_USER_INFO_HEADERS - else {} - ), - }, - json=json_data, - ) - r.raise_for_status() - data = r.json() - - if "embeddings" in data: - return data["embeddings"] - else: - raise "Something went wrong :/" - except Exception as e: - log.exception(f"Error generating ollama batch embeddings: {e}") - return None - - -def generate_embeddings( - engine: str, - model: str, - text: Union[str, list[str]], - prefix: Union[str, None] = None, - **kwargs, -): - url = kwargs.get("url", "") - key = kwargs.get("key", "") - user = kwargs.get("user") - - if prefix is not None and RAG_EMBEDDING_PREFIX_FIELD_NAME is None: - if isinstance(text, list): - text = [f"{prefix}{text_element}" for text_element in text] - else: - text = f"{prefix}{text}" - - if engine == "ollama": - embeddings = generate_ollama_batch_embeddings( - **{ - "model": model, - "texts": text if isinstance(text, list) else [text], - "url": url, - "key": key, - "prefix": prefix, - "user": user, - } - ) - return embeddings[0] if isinstance(text, str) else embeddings - elif engine == "openai": - embeddings = generate_openai_batch_embeddings( - model, text if isinstance(text, list) else [text], url, key, prefix, user - ) - return embeddings[0] if isinstance(text, str) else embeddings - elif engine == "azure_openai": - azure_api_version = kwargs.get("azure_api_version", "") - embeddings = generate_azure_openai_batch_embeddings( - model, - text if isinstance(text, list) else [text], - url, - key, - azure_api_version, - prefix, - user, - ) - return embeddings[0] if isinstance(text, str) else embeddings - - import operator from typing import Optional, Sequence @@ -1046,7 +1231,7 @@ class RerankCompressor(BaseDocumentCompressor): extra = "forbid" arbitrary_types_allowed = True - def compress_documents( + async def acompress_documents( self, documents: Sequence[Document], query: str, @@ -1062,8 +1247,10 @@ class RerankCompressor(BaseDocumentCompressor): else: from sentence_transformers import util - query_embedding = self.embedding_function(query, RAG_EMBEDDING_QUERY_PREFIX) - document_embedding = self.embedding_function( + query_embedding = await self.embedding_function( + query, RAG_EMBEDDING_QUERY_PREFIX + ) + document_embedding = await self.embedding_function( [doc.page_content for doc in documents], RAG_EMBEDDING_CONTENT_PREFIX ) scores = util.cos_sim(query_embedding, document_embedding)[0] diff --git a/backend/open_webui/retrieval/vector/dbs/pgvector.py b/backend/open_webui/retrieval/vector/dbs/pgvector.py index 312b48944c..85c2ef009d 100644 --- a/backend/open_webui/retrieval/vector/dbs/pgvector.py +++ b/backend/open_webui/retrieval/vector/dbs/pgvector.py @@ -1,4 +1,4 @@ -from typing import Optional, List, Dict, Any +from typing import Optional, List, Dict, Any, Tuple import logging import json from sqlalchemy import ( @@ -22,7 +22,7 @@ from sqlalchemy.pool import NullPool, QueuePool from sqlalchemy.orm import declarative_base, scoped_session, sessionmaker from sqlalchemy.dialects.postgresql import JSONB, array -from pgvector.sqlalchemy import Vector +from pgvector.sqlalchemy import Vector, HALFVEC from sqlalchemy.ext.mutable import MutableDict from sqlalchemy.exc import NoSuchTableError @@ -44,11 +44,20 @@ from open_webui.config import ( PGVECTOR_POOL_MAX_OVERFLOW, PGVECTOR_POOL_TIMEOUT, PGVECTOR_POOL_RECYCLE, + PGVECTOR_INDEX_METHOD, + PGVECTOR_HNSW_M, + PGVECTOR_HNSW_EF_CONSTRUCTION, + PGVECTOR_IVFFLAT_LISTS, + PGVECTOR_USE_HALFVEC, ) from open_webui.env import SRC_LOG_LEVELS VECTOR_LENGTH = PGVECTOR_INITIALIZE_MAX_VECTOR_LENGTH +USE_HALFVEC = PGVECTOR_USE_HALFVEC + +VECTOR_TYPE_FACTORY = HALFVEC if USE_HALFVEC else Vector +VECTOR_OPCLASS = "halfvec_cosine_ops" if USE_HALFVEC else "vector_cosine_ops" Base = declarative_base() log = logging.getLogger(__name__) @@ -67,7 +76,7 @@ class DocumentChunk(Base): __tablename__ = "document_chunk" id = Column(Text, primary_key=True) - vector = Column(Vector(dim=VECTOR_LENGTH), nullable=True) + vector = Column(VECTOR_TYPE_FACTORY(dim=VECTOR_LENGTH), nullable=True) collection_name = Column(Text, nullable=False) if PGVECTOR_PGCRYPTO: @@ -157,13 +166,9 @@ class PgvectorClient(VectorDBBase): connection = self.session.connection() Base.metadata.create_all(bind=connection) - # Create an index on the vector column if it doesn't exist - self.session.execute( - text( - "CREATE INDEX IF NOT EXISTS idx_document_chunk_vector " - "ON document_chunk USING ivfflat (vector vector_cosine_ops) WITH (lists = 100);" - ) - ) + index_method, index_options = self._vector_index_configuration() + self._ensure_vector_index(index_method, index_options) + self.session.execute( text( "CREATE INDEX IF NOT EXISTS idx_document_chunk_collection_name " @@ -177,6 +182,78 @@ class PgvectorClient(VectorDBBase): log.exception(f"Error during initialization: {e}") raise + @staticmethod + def _extract_index_method(index_def: Optional[str]) -> Optional[str]: + if not index_def: + return None + try: + after_using = index_def.lower().split("using ", 1)[1] + return after_using.split()[0] + except (IndexError, AttributeError): + return None + + def _vector_index_configuration(self) -> Tuple[str, str]: + if PGVECTOR_INDEX_METHOD: + index_method = PGVECTOR_INDEX_METHOD + log.info( + "Using vector index method '%s' from PGVECTOR_INDEX_METHOD.", + index_method, + ) + elif USE_HALFVEC: + index_method = "hnsw" + log.info( + "VECTOR_LENGTH=%s exceeds 2000; using halfvec column type with hnsw index.", + VECTOR_LENGTH, + ) + else: + index_method = "ivfflat" + + if index_method == "hnsw": + index_options = f"WITH (m = {PGVECTOR_HNSW_M}, ef_construction = {PGVECTOR_HNSW_EF_CONSTRUCTION})" + else: + index_options = f"WITH (lists = {PGVECTOR_IVFFLAT_LISTS})" + + return index_method, index_options + + def _ensure_vector_index(self, index_method: str, index_options: str) -> None: + index_name = "idx_document_chunk_vector" + existing_index_def = self.session.execute( + text( + """ + SELECT indexdef + FROM pg_indexes + WHERE schemaname = current_schema() + AND tablename = 'document_chunk' + AND indexname = :index_name + """ + ), + {"index_name": index_name}, + ).scalar() + + existing_method = self._extract_index_method(existing_index_def) + if existing_method and existing_method != index_method: + raise RuntimeError( + f"Existing pgvector index '{index_name}' uses method '{existing_method}' but configuration now " + f"requires '{index_method}'. Automatic rebuild is disabled to prevent long-running maintenance. " + "Drop the index manually (optionally after tuning maintenance_work_mem/max_parallel_maintenance_workers) " + "and recreate it with the new method before restarting Open WebUI." + ) + + if not existing_index_def: + index_sql = ( + f"CREATE INDEX IF NOT EXISTS {index_name} " + f"ON document_chunk USING {index_method} (vector {VECTOR_OPCLASS})" + ) + if index_options: + index_sql = f"{index_sql} {index_options}" + self.session.execute(text(index_sql)) + log.info( + "Ensured vector index '%s' using %s%s.", + index_name, + index_method, + f" {index_options}" if index_options else "", + ) + def check_vector_length(self) -> None: """ Check if the VECTOR_LENGTH matches the existing vector column dimension in the database. @@ -196,16 +273,19 @@ class PgvectorClient(VectorDBBase): if "vector" in document_chunk_table.columns: vector_column = document_chunk_table.columns["vector"] vector_type = vector_column.type - if isinstance(vector_type, Vector): - db_vector_length = vector_type.dim - if db_vector_length != VECTOR_LENGTH: - raise Exception( - f"VECTOR_LENGTH {VECTOR_LENGTH} does not match existing vector column dimension {db_vector_length}. " - "Cannot change vector size after initialization without migrating the data." - ) - else: + expected_type = HALFVEC if USE_HALFVEC else Vector + + if not isinstance(vector_type, expected_type): raise Exception( - "The 'vector' column exists but is not of type 'Vector'." + "The 'vector' column type does not match the expected type " + f"('{expected_type.__name__}') for VECTOR_LENGTH {VECTOR_LENGTH}." + ) + + db_vector_length = getattr(vector_type, "dim", None) + if db_vector_length is not None and db_vector_length != VECTOR_LENGTH: + raise Exception( + f"VECTOR_LENGTH {VECTOR_LENGTH} does not match existing vector column dimension {db_vector_length}. " + "Cannot change vector size after initialization without migrating the data." ) else: raise Exception( @@ -360,11 +440,11 @@ class PgvectorClient(VectorDBBase): num_queries = len(vectors) def vector_expr(vector): - return cast(array(vector), Vector(VECTOR_LENGTH)) + return cast(array(vector), VECTOR_TYPE_FACTORY(VECTOR_LENGTH)) # Create the values for query vectors qid_col = column("qid", Integer) - q_vector_col = column("q_vector", Vector(VECTOR_LENGTH)) + q_vector_col = column("q_vector", VECTOR_TYPE_FACTORY(VECTOR_LENGTH)) query_vectors = ( values(qid_col, q_vector_col) .data( diff --git a/backend/open_webui/retrieval/vector/dbs/s3vector.py b/backend/open_webui/retrieval/vector/dbs/s3vector.py index 519ee5abad..e2a7adfd8b 100644 --- a/backend/open_webui/retrieval/vector/dbs/s3vector.py +++ b/backend/open_webui/retrieval/vector/dbs/s3vector.py @@ -117,15 +117,16 @@ class S3VectorClient(VectorDBBase): def has_collection(self, collection_name: str) -> bool: """ - Check if a vector index (collection) exists in the S3 vector bucket. + Check if a vector index exists using direct lookup. + This avoids pagination issues with list_indexes() and is significantly faster. """ - try: - response = self.client.list_indexes(vectorBucketName=self.bucket_name) - indexes = response.get("indexes", []) - return any(idx.get("indexName") == collection_name for idx in indexes) + self.client.get_index( + vectorBucketName=self.bucket_name, indexName=collection_name + ) + return True except Exception as e: - log.error(f"Error listing indexes: {e}") + log.error(f"Error checking if index '{collection_name}' exists: {e}") return False def delete_collection(self, collection_name: str) -> None: diff --git a/backend/open_webui/retrieval/vector/dbs/weaviate.py b/backend/open_webui/retrieval/vector/dbs/weaviate.py new file mode 100644 index 0000000000..6bb8a1ecb4 --- /dev/null +++ b/backend/open_webui/retrieval/vector/dbs/weaviate.py @@ -0,0 +1,340 @@ +import weaviate +import re +import uuid +from typing import Any, Dict, List, Optional, Union + +from open_webui.retrieval.vector.main import ( + VectorDBBase, + VectorItem, + SearchResult, + GetResult, +) +from open_webui.retrieval.vector.utils import process_metadata +from open_webui.config import ( + WEAVIATE_HTTP_HOST, + WEAVIATE_HTTP_PORT, + WEAVIATE_GRPC_PORT, + WEAVIATE_API_KEY, +) + + +def _convert_uuids_to_strings(obj: Any) -> Any: + """ + Recursively convert UUID objects to strings in nested data structures. + + This function handles: + - UUID objects -> string + - Dictionaries with UUID values + - Lists/Tuples with UUID values + - Nested combinations of the above + + Args: + obj: Any object that might contain UUIDs + + Returns: + The same object structure with UUIDs converted to strings + """ + if isinstance(obj, uuid.UUID): + return str(obj) + elif isinstance(obj, dict): + return {key: _convert_uuids_to_strings(value) for key, value in obj.items()} + elif isinstance(obj, (list, tuple)): + return type(obj)(_convert_uuids_to_strings(item) for item in obj) + elif isinstance(obj, (str, int, float, bool, type(None))): + return obj + else: + return obj + + +class WeaviateClient(VectorDBBase): + def __init__(self): + self.url = WEAVIATE_HTTP_HOST + try: + # Build connection parameters + connection_params = { + "host": WEAVIATE_HTTP_HOST, + "port": WEAVIATE_HTTP_PORT, + "grpc_port": WEAVIATE_GRPC_PORT, + } + + # Only add auth_credentials if WEAVIATE_API_KEY exists and is not empty + if WEAVIATE_API_KEY: + connection_params["auth_credentials"] = ( + weaviate.classes.init.Auth.api_key(WEAVIATE_API_KEY) + ) + + self.client = weaviate.connect_to_local(**connection_params) + self.client.connect() + except Exception as e: + raise ConnectionError(f"Failed to connect to Weaviate: {e}") from e + + def _sanitize_collection_name(self, collection_name: str) -> str: + """Sanitize collection name to be a valid Weaviate class name.""" + if not isinstance(collection_name, str) or not collection_name.strip(): + raise ValueError("Collection name must be a non-empty string") + + # Requirements for a valid Weaviate class name: + # The collection name must begin with a capital letter. + # The name can only contain letters, numbers, and the underscore (_) character. Spaces are not allowed. + + # Replace hyphens with underscores and keep only alphanumeric characters + name = re.sub(r"[^a-zA-Z0-9_]", "", collection_name.replace("-", "_")) + name = name.strip("_") + + if not name: + raise ValueError( + "Could not sanitize collection name to be a valid Weaviate class name" + ) + + # Ensure it starts with a letter and is capitalized + if not name[0].isalpha(): + name = "C" + name + + return name[0].upper() + name[1:] + + def has_collection(self, collection_name: str) -> bool: + sane_collection_name = self._sanitize_collection_name(collection_name) + return self.client.collections.exists(sane_collection_name) + + def delete_collection(self, collection_name: str) -> None: + sane_collection_name = self._sanitize_collection_name(collection_name) + if self.client.collections.exists(sane_collection_name): + self.client.collections.delete(sane_collection_name) + + def _create_collection(self, collection_name: str) -> None: + self.client.collections.create( + name=collection_name, + vector_config=weaviate.classes.config.Configure.Vectors.self_provided(), + properties=[ + weaviate.classes.config.Property( + name="text", data_type=weaviate.classes.config.DataType.TEXT + ), + ], + ) + + def insert(self, collection_name: str, items: List[VectorItem]) -> None: + sane_collection_name = self._sanitize_collection_name(collection_name) + if not self.client.collections.exists(sane_collection_name): + self._create_collection(sane_collection_name) + + collection = self.client.collections.get(sane_collection_name) + + with collection.batch.fixed_size(batch_size=100) as batch: + for item in items: + item_uuid = str(uuid.uuid4()) if not item["id"] else str(item["id"]) + + properties = {"text": item["text"]} + if item["metadata"]: + clean_metadata = _convert_uuids_to_strings( + process_metadata(item["metadata"]) + ) + clean_metadata.pop("text", None) + properties.update(clean_metadata) + + batch.add_object( + properties=properties, uuid=item_uuid, vector=item["vector"] + ) + + def upsert(self, collection_name: str, items: List[VectorItem]) -> None: + sane_collection_name = self._sanitize_collection_name(collection_name) + if not self.client.collections.exists(sane_collection_name): + self._create_collection(sane_collection_name) + + collection = self.client.collections.get(sane_collection_name) + + with collection.batch.fixed_size(batch_size=100) as batch: + for item in items: + item_uuid = str(item["id"]) if item["id"] else None + + properties = {"text": item["text"]} + if item["metadata"]: + clean_metadata = _convert_uuids_to_strings( + process_metadata(item["metadata"]) + ) + clean_metadata.pop("text", None) + properties.update(clean_metadata) + + batch.add_object( + properties=properties, uuid=item_uuid, vector=item["vector"] + ) + + def search( + self, collection_name: str, vectors: List[List[Union[float, int]]], limit: int + ) -> Optional[SearchResult]: + sane_collection_name = self._sanitize_collection_name(collection_name) + if not self.client.collections.exists(sane_collection_name): + return None + + collection = self.client.collections.get(sane_collection_name) + + result_ids, result_documents, result_metadatas, result_distances = ( + [], + [], + [], + [], + ) + + for vector_embedding in vectors: + try: + response = collection.query.near_vector( + near_vector=vector_embedding, + limit=limit, + return_metadata=weaviate.classes.query.MetadataQuery(distance=True), + ) + + ids = [str(obj.uuid) for obj in response.objects] + documents = [] + metadatas = [] + distances = [] + + for obj in response.objects: + properties = dict(obj.properties) if obj.properties else {} + documents.append(properties.pop("text", "")) + metadatas.append(_convert_uuids_to_strings(properties)) + + # Weaviate has cosine distance, 2 (worst) -> 0 (best). Re-ordering to 0 -> 1 + raw_distances = [ + ( + obj.metadata.distance + if obj.metadata and obj.metadata.distance + else 2.0 + ) + for obj in response.objects + ] + distances = [(2 - dist) / 2 for dist in raw_distances] + + result_ids.append(ids) + result_documents.append(documents) + result_metadatas.append(metadatas) + result_distances.append(distances) + except Exception: + result_ids.append([]) + result_documents.append([]) + result_metadatas.append([]) + result_distances.append([]) + + return SearchResult( + **{ + "ids": result_ids, + "documents": result_documents, + "metadatas": result_metadatas, + "distances": result_distances, + } + ) + + def query( + self, collection_name: str, filter: Dict, limit: Optional[int] = None + ) -> Optional[GetResult]: + sane_collection_name = self._sanitize_collection_name(collection_name) + if not self.client.collections.exists(sane_collection_name): + return None + + collection = self.client.collections.get(sane_collection_name) + + weaviate_filter = None + if filter: + for key, value in filter.items(): + prop_filter = weaviate.classes.query.Filter.by_property(name=key).equal( + value + ) + weaviate_filter = ( + prop_filter + if weaviate_filter is None + else weaviate.classes.query.Filter.all_of( + [weaviate_filter, prop_filter] + ) + ) + + try: + response = collection.query.fetch_objects( + filters=weaviate_filter, limit=limit + ) + + ids = [str(obj.uuid) for obj in response.objects] + documents = [] + metadatas = [] + + for obj in response.objects: + properties = dict(obj.properties) if obj.properties else {} + documents.append(properties.pop("text", "")) + metadatas.append(_convert_uuids_to_strings(properties)) + + return GetResult( + **{ + "ids": [ids], + "documents": [documents], + "metadatas": [metadatas], + } + ) + except Exception: + return None + + def get(self, collection_name: str) -> Optional[GetResult]: + sane_collection_name = self._sanitize_collection_name(collection_name) + if not self.client.collections.exists(sane_collection_name): + return None + + collection = self.client.collections.get(sane_collection_name) + ids, documents, metadatas = [], [], [] + + try: + for item in collection.iterator(): + ids.append(str(item.uuid)) + properties = dict(item.properties) if item.properties else {} + documents.append(properties.pop("text", "")) + metadatas.append(_convert_uuids_to_strings(properties)) + + if not ids: + return None + + return GetResult( + **{ + "ids": [ids], + "documents": [documents], + "metadatas": [metadatas], + } + ) + except Exception: + return None + + def delete( + self, + collection_name: str, + ids: Optional[List[str]] = None, + filter: Optional[Dict] = None, + ) -> None: + sane_collection_name = self._sanitize_collection_name(collection_name) + if not self.client.collections.exists(sane_collection_name): + return + + collection = self.client.collections.get(sane_collection_name) + + try: + if ids: + for item_id in ids: + collection.data.delete_by_id(uuid=item_id) + elif filter: + weaviate_filter = None + for key, value in filter.items(): + prop_filter = weaviate.classes.query.Filter.by_property( + name=key + ).equal(value) + weaviate_filter = ( + prop_filter + if weaviate_filter is None + else weaviate.classes.query.Filter.all_of( + [weaviate_filter, prop_filter] + ) + ) + + if weaviate_filter: + collection.data.delete_many(where=weaviate_filter) + except Exception: + pass + + def reset(self) -> None: + try: + for collection_name in self.client.collections.list_all().keys(): + self.client.collections.delete(collection_name) + except Exception: + pass diff --git a/backend/open_webui/retrieval/vector/factory.py b/backend/open_webui/retrieval/vector/factory.py index 7888c22be8..b843e0926d 100644 --- a/backend/open_webui/retrieval/vector/factory.py +++ b/backend/open_webui/retrieval/vector/factory.py @@ -67,6 +67,10 @@ class Vector: from open_webui.retrieval.vector.dbs.oracle23ai import Oracle23aiClient return Oracle23aiClient() + case VectorType.WEAVIATE: + from open_webui.retrieval.vector.dbs.weaviate import WeaviateClient + + return WeaviateClient() case _: raise ValueError(f"Unsupported vector type: {vector_type}") diff --git a/backend/open_webui/retrieval/vector/type.py b/backend/open_webui/retrieval/vector/type.py index 7e517c169c..292cad1e78 100644 --- a/backend/open_webui/retrieval/vector/type.py +++ b/backend/open_webui/retrieval/vector/type.py @@ -11,3 +11,4 @@ class VectorType(StrEnum): PGVECTOR = "pgvector" ORACLE23AI = "oracle23ai" S3VECTOR = "s3vector" + WEAVIATE = "weaviate" diff --git a/backend/open_webui/retrieval/web/azure.py b/backend/open_webui/retrieval/web/azure.py new file mode 100644 index 0000000000..814cf4b63c --- /dev/null +++ b/backend/open_webui/retrieval/web/azure.py @@ -0,0 +1,128 @@ +import logging +from typing import Optional +from open_webui.retrieval.web.main import SearchResult, get_filtered_results +from open_webui.env import SRC_LOG_LEVELS + +log = logging.getLogger(__name__) +log.setLevel(SRC_LOG_LEVELS["RAG"]) + +""" +Azure AI Search integration for Open WebUI. +Documentation: https://learn.microsoft.com/en-us/python/api/overview/azure/search-documents-readme?view=azure-python + +Required package: azure-search-documents +Install: pip install azure-search-documents +""" + + +def search_azure( + api_key: str, + endpoint: str, + index_name: str, + query: str, + count: int, + filter_list: Optional[list[str]] = None, +) -> list[SearchResult]: + """ + Search using Azure AI Search. + + Args: + api_key: Azure Search API key (query key or admin key) + endpoint: Azure Search service endpoint (e.g., https://myservice.search.windows.net) + index_name: Name of the search index to query + query: Search query string + count: Number of results to return + filter_list: Optional list of domains to filter results + + Returns: + List of SearchResult objects with link, title, and snippet + """ + try: + from azure.core.credentials import AzureKeyCredential + from azure.search.documents import SearchClient + except ImportError: + log.error( + "azure-search-documents package is not installed. " + "Install it with: pip install azure-search-documents" + ) + raise ImportError( + "azure-search-documents is required for Azure AI Search. " + "Install it with: pip install azure-search-documents" + ) + + try: + # Create search client with API key authentication + credential = AzureKeyCredential(api_key) + search_client = SearchClient( + endpoint=endpoint, index_name=index_name, credential=credential + ) + + # Perform the search + results = search_client.search(search_text=query, top=count) + + # Convert results to list and extract fields + search_results = [] + for result in results: + # Azure AI Search returns documents with custom schemas + # We need to extract common fields that might represent URL, title, and content + # Common field names to look for: + result_dict = dict(result) + + # Try to find URL field (common names) + link = ( + result_dict.get("url") + or result_dict.get("link") + or result_dict.get("uri") + or result_dict.get("metadata_storage_path") + or "" + ) + + # Try to find title field (common names) + title = ( + result_dict.get("title") + or result_dict.get("name") + or result_dict.get("metadata_title") + or result_dict.get("metadata_storage_name") + or None + ) + + # Try to find content/snippet field (common names) + snippet = ( + result_dict.get("content") + or result_dict.get("snippet") + or result_dict.get("description") + or result_dict.get("summary") + or result_dict.get("text") + or None + ) + + # Truncate snippet if too long + if snippet and len(snippet) > 500: + snippet = snippet[:497] + "..." + + if link: # Only add if we found a valid link + search_results.append( + { + "link": link, + "title": title, + "snippet": snippet, + } + ) + + # Apply domain filtering if specified + if filter_list: + search_results = get_filtered_results(search_results, filter_list) + + # Convert to SearchResult objects + return [ + SearchResult( + link=result["link"], + title=result.get("title"), + snippet=result.get("snippet"), + ) + for result in search_results + ] + + except Exception as ex: + log.error(f"Azure AI Search error: {ex}") + raise ex diff --git a/backend/open_webui/retrieval/web/external.py b/backend/open_webui/retrieval/web/external.py index a5c8003e47..13f6a5aa68 100644 --- a/backend/open_webui/retrieval/web/external.py +++ b/backend/open_webui/retrieval/web/external.py @@ -2,27 +2,42 @@ import logging from typing import Optional, List import requests -from open_webui.retrieval.web.main import SearchResult, get_filtered_results + +from fastapi import Request + from open_webui.env import SRC_LOG_LEVELS +from open_webui.retrieval.web.main import SearchResult, get_filtered_results +from open_webui.utils.headers import include_user_info_headers + + log = logging.getLogger(__name__) log.setLevel(SRC_LOG_LEVELS["RAG"]) def search_external( + request: Request, external_url: str, external_api_key: str, query: str, count: int, filter_list: Optional[List[str]] = None, + user=None, ) -> List[SearchResult]: try: + headers = { + "User-Agent": "Open WebUI (https://github.com/open-webui/open-webui) RAG Bot", + "Authorization": f"Bearer {external_api_key}", + } + headers = include_user_info_headers(headers, user) + + chat_id = getattr(request.state, "chat_id", None) + if chat_id: + headers["X-OpenWebUI-Chat-Id"] = str(chat_id) + response = requests.post( external_url, - headers={ - "User-Agent": "Open WebUI (https://github.com/open-webui/open-webui) RAG Bot", - "Authorization": f"Bearer {external_api_key}", - }, + headers=headers, json={ "query": query, "count": count, diff --git a/backend/open_webui/retrieval/web/main.py b/backend/open_webui/retrieval/web/main.py index dc1eafb331..d8cfb11ba0 100644 --- a/backend/open_webui/retrieval/web/main.py +++ b/backend/open_webui/retrieval/web/main.py @@ -5,18 +5,37 @@ from urllib.parse import urlparse from pydantic import BaseModel +from open_webui.retrieval.web.utils import is_string_allowed, resolve_hostname + def get_filtered_results(results, filter_list): if not filter_list: return results + filtered_results = [] + for result in results: url = result.get("url") or result.get("link", "") or result.get("href", "") if not validators.url(url): continue + domain = urlparse(url).netloc - if any(domain.endswith(filtered_domain) for filtered_domain in filter_list): + if not domain: + continue + + hostnames = [domain] + + try: + ipv4_addresses, ipv6_addresses = resolve_hostname(domain) + hostnames.extend(ipv4_addresses) + hostnames.extend(ipv6_addresses) + except Exception: + pass + + if any(is_string_allowed(hostname, filter_list) for hostname in hostnames): filtered_results.append(result) + continue + return filtered_results diff --git a/backend/open_webui/retrieval/web/perplexity_search.py b/backend/open_webui/retrieval/web/perplexity_search.py index e3e0caa2b3..97961f478b 100644 --- a/backend/open_webui/retrieval/web/perplexity_search.py +++ b/backend/open_webui/retrieval/web/perplexity_search.py @@ -3,6 +3,7 @@ from typing import Optional, Literal import requests from open_webui.retrieval.web.main import SearchResult, get_filtered_results +from open_webui.utils.headers import include_user_info_headers from open_webui.env import SRC_LOG_LEVELS @@ -15,6 +16,8 @@ def search_perplexity_search( query: str, count: int, filter_list: Optional[list[str]] = None, + api_url: str = "https://api.perplexity.ai/search", + user=None, ) -> list[SearchResult]: """Search using Perplexity API and return the results as a list of SearchResult objects. @@ -23,6 +26,8 @@ def search_perplexity_search( query (str): The query to search for count (int): Maximum number of results to return filter_list (Optional[list[str]]): List of domains to filter results + api_url (str): Custom API URL (defaults to https://api.perplexity.ai/search) + user: Optional user object for forwarding user info headers """ @@ -30,8 +35,11 @@ def search_perplexity_search( if hasattr(api_key, "__str__"): api_key = str(api_key) + if hasattr(api_url, "__str__"): + api_url = str(api_url) + try: - url = "https://api.perplexity.ai/search" + url = api_url # Create payload for the API call payload = { @@ -44,6 +52,10 @@ def search_perplexity_search( "Content-Type": "application/json", } + # Forward user info headers if user is provided + if user is not None: + headers = include_user_info_headers(headers, user) + # Make the API request response = requests.request("POST", url, json=payload, headers=headers) # Parse the JSON response diff --git a/backend/open_webui/retrieval/web/utils.py b/backend/open_webui/retrieval/web/utils.py index 91699a157b..127c703442 100644 --- a/backend/open_webui/retrieval/web/utils.py +++ b/backend/open_webui/retrieval/web/utils.py @@ -24,6 +24,7 @@ import validators from langchain_community.document_loaders import PlaywrightURLLoader, WebBaseLoader from langchain_community.document_loaders.base import BaseLoader from langchain_core.documents import Document + from open_webui.retrieval.loaders.tavily import TavilyLoader from open_webui.retrieval.loaders.external_web import ExternalWebLoader from open_webui.constants import ERROR_MESSAGES @@ -38,6 +39,7 @@ from open_webui.config import ( TAVILY_EXTRACT_DEPTH, EXTERNAL_WEB_LOADER_URL, EXTERNAL_WEB_LOADER_API_KEY, + WEB_FETCH_FILTER_LIST, ) from open_webui.env import SRC_LOG_LEVELS @@ -46,10 +48,70 @@ log = logging.getLogger(__name__) log.setLevel(SRC_LOG_LEVELS["RAG"]) +def resolve_hostname(hostname): + # Get address information + addr_info = socket.getaddrinfo(hostname, None) + + # Extract IP addresses from address information + ipv4_addresses = [info[4][0] for info in addr_info if info[0] == socket.AF_INET] + ipv6_addresses = [info[4][0] for info in addr_info if info[0] == socket.AF_INET6] + + return ipv4_addresses, ipv6_addresses + + +def get_allow_block_lists(filter_list): + allow_list = [] + block_list = [] + + if filter_list: + for d in filter_list: + if d.startswith("!"): + # Domains starting with "!" → blocked + block_list.append(d[1:]) + else: + # Domains starting without "!" → allowed + allow_list.append(d) + + return allow_list, block_list + + +def is_string_allowed(string: str, filter_list: Optional[list[str]] = None) -> bool: + if not filter_list: + return True + + allow_list, block_list = get_allow_block_lists(filter_list) + # If allow list is non-empty, require domain to match one of them + if allow_list: + if not any(string.endswith(allowed) for allowed in allow_list): + return False + + # Block list always removes matches + if any(string.endswith(blocked) for blocked in block_list): + return False + + return True + + def validate_url(url: Union[str, Sequence[str]]): if isinstance(url, str): if isinstance(validators.url(url), validators.ValidationError): raise ValueError(ERROR_MESSAGES.INVALID_URL) + + parsed_url = urllib.parse.urlparse(url) + + # Protocol validation - only allow http/https + if parsed_url.scheme not in ["http", "https"]: + log.warning( + f"Blocked non-HTTP(S) protocol: {parsed_url.scheme} in URL: {url}" + ) + raise ValueError(ERROR_MESSAGES.INVALID_URL) + + # Blocklist check using unified filtering logic + if WEB_FETCH_FILTER_LIST: + if not is_string_allowed(url, WEB_FETCH_FILTER_LIST): + log.warning(f"URL blocked by filter list: {url}") + raise ValueError(ERROR_MESSAGES.INVALID_URL) + if not ENABLE_RAG_LOCAL_WEB_FETCH: # Local web fetch is disabled, filter out any URLs that resolve to private IP addresses parsed_url = urllib.parse.urlparse(url) @@ -82,17 +144,6 @@ def safe_validate_urls(url: Sequence[str]) -> Sequence[str]: return valid_urls -def resolve_hostname(hostname): - # Get address information - addr_info = socket.getaddrinfo(hostname, None) - - # Extract IP addresses from address information - ipv4_addresses = [info[4][0] for info in addr_info if info[0] == socket.AF_INET] - ipv6_addresses = [info[4][0] for info in addr_info if info[0] == socket.AF_INET6] - - return ipv4_addresses, ipv6_addresses - - def extract_metadata(soup, url): metadata = {"source": url} if title := soup.find("title"): @@ -642,6 +693,10 @@ def get_web_loader( # Check if the URLs are valid safe_urls = safe_validate_urls([urls] if isinstance(urls, str) else urls) + if not safe_urls: + log.warning(f"All provided URLs were blocked or invalid: {urls}") + raise ValueError(ERROR_MESSAGES.INVALID_URL) + web_loader_args = { "web_paths": safe_urls, "verify_ssl": verify_ssl, diff --git a/backend/open_webui/routers/audio.py b/backend/open_webui/routers/audio.py index 45b4f1e692..9c84f9c704 100644 --- a/backend/open_webui/routers/audio.py +++ b/backend/open_webui/routers/audio.py @@ -16,7 +16,6 @@ import aiohttp import aiofiles import requests import mimetypes -from urllib.parse import urljoin, quote from fastapi import ( Depends, @@ -35,6 +34,7 @@ from pydantic import BaseModel from open_webui.utils.auth import get_admin_user, get_verified_user +from open_webui.utils.headers import include_user_info_headers from open_webui.config import ( WHISPER_MODEL_AUTO_UPDATE, WHISPER_MODEL_DIR, @@ -364,23 +364,17 @@ async def speech(request: Request, user=Depends(get_verified_user)): **(request.app.state.config.TTS_OPENAI_PARAMS or {}), } + headers = { + "Content-Type": "application/json", + "Authorization": f"Bearer {request.app.state.config.TTS_OPENAI_API_KEY}", + } + if ENABLE_FORWARD_USER_INFO_HEADERS: + headers = include_user_info_headers(headers, user) + r = await session.post( url=f"{request.app.state.config.TTS_OPENAI_API_BASE_URL}/audio/speech", json=payload, - headers={ - "Content-Type": "application/json", - "Authorization": f"Bearer {request.app.state.config.TTS_OPENAI_API_KEY}", - **( - { - "X-OpenWebUI-User-Name": quote(user.name, safe=" "), - "X-OpenWebUI-User-Id": user.id, - "X-OpenWebUI-User-Email": user.email, - "X-OpenWebUI-User-Role": user.role, - } - if ENABLE_FORWARD_USER_INFO_HEADERS - else {} - ), - }, + headers=headers, ssl=AIOHTTP_CLIENT_SESSION_SSL, ) @@ -570,7 +564,7 @@ async def speech(request: Request, user=Depends(get_verified_user)): return FileResponse(file_path) -def transcription_handler(request, file_path, metadata): +def transcription_handler(request, file_path, metadata, user=None): filename = os.path.basename(file_path) file_dir = os.path.dirname(file_path) id = filename.split(".")[0] @@ -621,11 +615,15 @@ def transcription_handler(request, file_path, metadata): if language: payload["language"] = language + headers = { + "Authorization": f"Bearer {request.app.state.config.STT_OPENAI_API_KEY}" + } + if user and ENABLE_FORWARD_USER_INFO_HEADERS: + headers = include_user_info_headers(headers, user) + r = requests.post( url=f"{request.app.state.config.STT_OPENAI_API_BASE_URL}/audio/transcriptions", - headers={ - "Authorization": f"Bearer {request.app.state.config.STT_OPENAI_API_KEY}" - }, + headers=headers, files={"file": (filename, open(file_path, "rb"))}, data=payload, ) @@ -1027,7 +1025,9 @@ def transcription_handler(request, file_path, metadata): ) -def transcribe(request: Request, file_path: str, metadata: Optional[dict] = None): +def transcribe( + request: Request, file_path: str, metadata: Optional[dict] = None, user=None +): log.info(f"transcribe: {file_path} {metadata}") if is_audio_conversion_required(file_path): @@ -1054,7 +1054,9 @@ def transcribe(request: Request, file_path: str, metadata: Optional[dict] = None with ThreadPoolExecutor() as executor: # Submit tasks for each chunk_path futures = [ - executor.submit(transcription_handler, request, chunk_path, metadata) + executor.submit( + transcription_handler, request, chunk_path, metadata, user + ) for chunk_path in chunk_paths ] # Gather results as they complete @@ -1189,7 +1191,7 @@ def transcription( if language: metadata = {"language": language} - result = transcribe(request, file_path, metadata) + result = transcribe(request, file_path, metadata, user) return { **result, diff --git a/backend/open_webui/routers/auths.py b/backend/open_webui/routers/auths.py index f261673f38..764196c5f1 100644 --- a/backend/open_webui/routers/auths.py +++ b/backend/open_webui/routers/auths.py @@ -4,6 +4,7 @@ import time import datetime import logging from aiohttp import ClientSession +import urllib from open_webui.models.auths import ( AddUserForm, @@ -35,12 +36,20 @@ from open_webui.env import ( ) from fastapi import APIRouter, Depends, HTTPException, Request, status from fastapi.responses import RedirectResponse, Response, JSONResponse -from open_webui.config import OPENID_PROVIDER_URL, ENABLE_OAUTH_SIGNUP, ENABLE_LDAP +from open_webui.config import ( + OPENID_PROVIDER_URL, + ENABLE_OAUTH_SIGNUP, + ENABLE_LDAP, + ENABLE_PASSWORD_AUTH, +) from pydantic import BaseModel from open_webui.utils.misc import parse_duration, validate_email_format from open_webui.utils.auth import ( + validate_password, + verify_password, decode_token, + invalidate_token, create_api_key, create_token, get_admin_user, @@ -50,7 +59,7 @@ from open_webui.utils.auth import ( get_http_authorization_cred, ) from open_webui.utils.webhook import post_webhook -from open_webui.utils.access_control import get_permissions +from open_webui.utils.access_control import get_permissions, has_permission from typing import Optional, List @@ -169,13 +178,19 @@ async def update_password( if WEBUI_AUTH_TRUSTED_EMAIL_HEADER: raise HTTPException(400, detail=ERROR_MESSAGES.ACTION_PROHIBITED) if session_user: - user = Auths.authenticate_user(session_user.email, form_data.password) + user = Auths.authenticate_user( + session_user.email, lambda pw: verify_password(form_data.password, pw) + ) if user: + try: + validate_password(form_data.password) + except Exception as e: + raise HTTPException(400, detail=str(e)) hashed = get_password_hash(form_data.new_password) return Auths.update_user_password_by_id(user.id, hashed) else: - raise HTTPException(400, detail=ERROR_MESSAGES.INVALID_PASSWORD) + raise HTTPException(400, detail=ERROR_MESSAGES.INCORRECT_PASSWORD) else: raise HTTPException(400, detail=ERROR_MESSAGES.INVALID_CRED) @@ -185,7 +200,17 @@ async def update_password( ############################ @router.post("/ldap", response_model=SessionUserResponse) async def ldap_auth(request: Request, response: Response, form_data: LdapForm): - ENABLE_LDAP = request.app.state.config.ENABLE_LDAP + # Security checks FIRST - before loading any config + if not request.app.state.config.ENABLE_LDAP: + raise HTTPException(400, detail="LDAP authentication is not enabled") + + if not ENABLE_PASSWORD_AUTH: + raise HTTPException( + status_code=status.HTTP_403_FORBIDDEN, + detail=ERROR_MESSAGES.ACTION_PROHIBITED, + ) + + # NOW load LDAP config variables LDAP_SERVER_LABEL = request.app.state.config.LDAP_SERVER_LABEL LDAP_SERVER_HOST = request.app.state.config.LDAP_SERVER_HOST LDAP_SERVER_PORT = request.app.state.config.LDAP_SERVER_PORT @@ -206,9 +231,6 @@ async def ldap_auth(request: Request, response: Response, form_data: LdapForm): else "ALL" ) - if not ENABLE_LDAP: - raise HTTPException(400, detail="LDAP authentication is not enabled") - try: tls = Tls( validate=LDAP_VALIDATE_CERT, @@ -463,6 +485,12 @@ async def ldap_auth(request: Request, response: Response, form_data: LdapForm): @router.post("/signin", response_model=SessionUserResponse) async def signin(request: Request, response: Response, form_data: SigninForm): + if not ENABLE_PASSWORD_AUTH: + raise HTTPException( + status_code=status.HTTP_403_FORBIDDEN, + detail=ERROR_MESSAGES.ACTION_PROHIBITED, + ) + if WEBUI_AUTH_TRUSTED_EMAIL_HEADER: if WEBUI_AUTH_TRUSTED_EMAIL_HEADER not in request.headers: raise HTTPException(400, detail=ERROR_MESSAGES.INVALID_TRUSTED_HEADER) @@ -472,6 +500,10 @@ async def signin(request: Request, response: Response, form_data: SigninForm): if WEBUI_AUTH_TRUSTED_NAME_HEADER: name = request.headers.get(WEBUI_AUTH_TRUSTED_NAME_HEADER, email) + try: + name = urllib.parse.unquote(name, encoding="utf-8") + except Exception as e: + pass if not Users.get_user_by_email(email.lower()): await signup( @@ -495,7 +527,9 @@ async def signin(request: Request, response: Response, form_data: SigninForm): admin_password = "admin" if Users.get_user_by_email(admin_email.lower()): - user = Auths.authenticate_user(admin_email.lower(), admin_password) + user = Auths.authenticate_user( + admin_email.lower(), lambda pw: verify_password(admin_password, pw) + ) else: if Users.has_users(): raise HTTPException(400, detail=ERROR_MESSAGES.EXISTING_USERS) @@ -506,7 +540,9 @@ async def signin(request: Request, response: Response, form_data: SigninForm): SignupForm(email=admin_email, password=admin_password, name="User"), ) - user = Auths.authenticate_user(admin_email.lower(), admin_password) + user = Auths.authenticate_user( + admin_email.lower(), lambda pw: verify_password(admin_password, pw) + ) else: password_bytes = form_data.password.encode("utf-8") if len(password_bytes) > 72: @@ -517,7 +553,9 @@ async def signin(request: Request, response: Response, form_data: SigninForm): # decode safely — ignore incomplete UTF-8 sequences form_data.password = password_bytes.decode("utf-8", errors="ignore") - user = Auths.authenticate_user(form_data.email.lower(), form_data.password) + user = Auths.authenticate_user( + form_data.email.lower(), lambda pw: verify_password(form_data.password, pw) + ) if user: @@ -599,16 +637,14 @@ async def signup(request: Request, response: Response, form_data: SignupForm): raise HTTPException(400, detail=ERROR_MESSAGES.EMAIL_TAKEN) try: - role = "admin" if not has_users else request.app.state.config.DEFAULT_USER_ROLE - - # The password passed to bcrypt must be 72 bytes or fewer. If it is longer, it will be truncated before hashing. - if len(form_data.password.encode("utf-8")) > 72: - raise HTTPException( - status.HTTP_400_BAD_REQUEST, - detail=ERROR_MESSAGES.PASSWORD_TOO_LONG, - ) + try: + validate_password(form_data.password) + except Exception as e: + raise HTTPException(400, detail=str(e)) hashed = get_password_hash(form_data.password) + + role = "admin" if not has_users else request.app.state.config.DEFAULT_USER_ROLE user = Auths.insert_new_auth( form_data.email.lower(), hashed, @@ -664,6 +700,10 @@ async def signup(request: Request, response: Response, form_data: SignupForm): # Disable signup after the first user is created request.app.state.config.ENABLE_SIGNUP = False + default_group_id = getattr(request.app.state.config, "DEFAULT_GROUP_ID", "") + if default_group_id and default_group_id: + Groups.add_users_to_group(default_group_id, [user.id]) + return { "token": token, "token_type": "Bearer", @@ -684,6 +724,19 @@ async def signup(request: Request, response: Response, form_data: SignupForm): @router.get("/signout") async def signout(request: Request, response: Response): + + # get auth token from headers or cookies + token = None + auth_header = request.headers.get("Authorization") + if auth_header: + auth_cred = get_http_authorization_cred(auth_header) + token = auth_cred.credentials + else: + token = request.cookies.get("token") + + if token: + await invalidate_token(request, token) + response.delete_cookie("token") response.delete_cookie("oui-session") response.delete_cookie("oauth_id_token") @@ -764,6 +817,11 @@ async def add_user(form_data: AddUserForm, user=Depends(get_admin_user)): raise HTTPException(400, detail=ERROR_MESSAGES.EMAIL_TAKEN) try: + try: + validate_password(form_data.password) + except Exception as e: + raise HTTPException(400, detail=str(e)) + hashed = get_password_hash(form_data.password) user = Auths.insert_new_auth( form_data.email.lower(), @@ -835,10 +893,11 @@ async def get_admin_config(request: Request, user=Depends(get_admin_user)): "SHOW_ADMIN_DETAILS": request.app.state.config.SHOW_ADMIN_DETAILS, "WEBUI_URL": request.app.state.config.WEBUI_URL, "ENABLE_SIGNUP": request.app.state.config.ENABLE_SIGNUP, - "ENABLE_API_KEY": request.app.state.config.ENABLE_API_KEY, - "ENABLE_API_KEY_ENDPOINT_RESTRICTIONS": request.app.state.config.ENABLE_API_KEY_ENDPOINT_RESTRICTIONS, - "API_KEY_ALLOWED_ENDPOINTS": request.app.state.config.API_KEY_ALLOWED_ENDPOINTS, + "ENABLE_API_KEYS": request.app.state.config.ENABLE_API_KEYS, + "ENABLE_API_KEYS_ENDPOINT_RESTRICTIONS": request.app.state.config.ENABLE_API_KEYS_ENDPOINT_RESTRICTIONS, + "API_KEYS_ALLOWED_ENDPOINTS": request.app.state.config.API_KEYS_ALLOWED_ENDPOINTS, "DEFAULT_USER_ROLE": request.app.state.config.DEFAULT_USER_ROLE, + "DEFAULT_GROUP_ID": request.app.state.config.DEFAULT_GROUP_ID, "JWT_EXPIRES_IN": request.app.state.config.JWT_EXPIRES_IN, "ENABLE_COMMUNITY_SHARING": request.app.state.config.ENABLE_COMMUNITY_SHARING, "ENABLE_MESSAGE_RATING": request.app.state.config.ENABLE_MESSAGE_RATING, @@ -855,10 +914,11 @@ class AdminConfig(BaseModel): SHOW_ADMIN_DETAILS: bool WEBUI_URL: str ENABLE_SIGNUP: bool - ENABLE_API_KEY: bool - ENABLE_API_KEY_ENDPOINT_RESTRICTIONS: bool - API_KEY_ALLOWED_ENDPOINTS: str + ENABLE_API_KEYS: bool + ENABLE_API_KEYS_ENDPOINT_RESTRICTIONS: bool + API_KEYS_ALLOWED_ENDPOINTS: str DEFAULT_USER_ROLE: str + DEFAULT_GROUP_ID: str JWT_EXPIRES_IN: str ENABLE_COMMUNITY_SHARING: bool ENABLE_MESSAGE_RATING: bool @@ -878,12 +938,12 @@ async def update_admin_config( request.app.state.config.WEBUI_URL = form_data.WEBUI_URL request.app.state.config.ENABLE_SIGNUP = form_data.ENABLE_SIGNUP - request.app.state.config.ENABLE_API_KEY = form_data.ENABLE_API_KEY - request.app.state.config.ENABLE_API_KEY_ENDPOINT_RESTRICTIONS = ( - form_data.ENABLE_API_KEY_ENDPOINT_RESTRICTIONS + request.app.state.config.ENABLE_API_KEYS = form_data.ENABLE_API_KEYS + request.app.state.config.ENABLE_API_KEYS_ENDPOINT_RESTRICTIONS = ( + form_data.ENABLE_API_KEYS_ENDPOINT_RESTRICTIONS ) - request.app.state.config.API_KEY_ALLOWED_ENDPOINTS = ( - form_data.API_KEY_ALLOWED_ENDPOINTS + request.app.state.config.API_KEYS_ALLOWED_ENDPOINTS = ( + form_data.API_KEYS_ALLOWED_ENDPOINTS ) request.app.state.config.ENABLE_CHANNELS = form_data.ENABLE_CHANNELS @@ -892,6 +952,8 @@ async def update_admin_config( if form_data.DEFAULT_USER_ROLE in ["pending", "user", "admin"]: request.app.state.config.DEFAULT_USER_ROLE = form_data.DEFAULT_USER_ROLE + request.app.state.config.DEFAULT_GROUP_ID = form_data.DEFAULT_GROUP_ID + pattern = r"^(-1|0|(-?\d+(\.\d+)?)(ms|s|m|h|d|w))$" # Check if the input string matches the pattern @@ -918,10 +980,11 @@ async def update_admin_config( "SHOW_ADMIN_DETAILS": request.app.state.config.SHOW_ADMIN_DETAILS, "WEBUI_URL": request.app.state.config.WEBUI_URL, "ENABLE_SIGNUP": request.app.state.config.ENABLE_SIGNUP, - "ENABLE_API_KEY": request.app.state.config.ENABLE_API_KEY, - "ENABLE_API_KEY_ENDPOINT_RESTRICTIONS": request.app.state.config.ENABLE_API_KEY_ENDPOINT_RESTRICTIONS, - "API_KEY_ALLOWED_ENDPOINTS": request.app.state.config.API_KEY_ALLOWED_ENDPOINTS, + "ENABLE_API_KEYS": request.app.state.config.ENABLE_API_KEYS, + "ENABLE_API_KEYS_ENDPOINT_RESTRICTIONS": request.app.state.config.ENABLE_API_KEYS_ENDPOINT_RESTRICTIONS, + "API_KEYS_ALLOWED_ENDPOINTS": request.app.state.config.API_KEYS_ALLOWED_ENDPOINTS, "DEFAULT_USER_ROLE": request.app.state.config.DEFAULT_USER_ROLE, + "DEFAULT_GROUP_ID": request.app.state.config.DEFAULT_GROUP_ID, "JWT_EXPIRES_IN": request.app.state.config.JWT_EXPIRES_IN, "ENABLE_COMMUNITY_SHARING": request.app.state.config.ENABLE_COMMUNITY_SHARING, "ENABLE_MESSAGE_RATING": request.app.state.config.ENABLE_MESSAGE_RATING, @@ -1045,9 +1108,11 @@ async def update_ldap_config( # create api key @router.post("/api_key", response_model=ApiKey) async def generate_api_key(request: Request, user=Depends(get_current_user)): - if not request.app.state.config.ENABLE_API_KEY: + if not request.app.state.config.ENABLE_API_KEYS or not has_permission( + user.id, "features.api_keys", request.app.state.config.USER_PERMISSIONS + ): raise HTTPException( - status.HTTP_403_FORBIDDEN, + status_code=status.HTTP_403_FORBIDDEN, detail=ERROR_MESSAGES.API_KEY_CREATION_NOT_ALLOWED, ) diff --git a/backend/open_webui/routers/chats.py b/backend/open_webui/routers/chats.py index 2587c5ff8e..78cd8bdb1a 100644 --- a/backend/open_webui/routers/chats.py +++ b/backend/open_webui/routers/chats.py @@ -7,6 +7,7 @@ from open_webui.socket.main import get_event_emitter from open_webui.models.chats import ( ChatForm, ChatImportForm, + ChatsImportForm, ChatResponse, Chats, ChatTitleIdResponse, @@ -142,26 +143,15 @@ async def create_new_chat(form_data: ChatForm, user=Depends(get_verified_user)): ############################ -# ImportChat +# ImportChats ############################ -@router.post("/import", response_model=Optional[ChatResponse]) -async def import_chat(form_data: ChatImportForm, user=Depends(get_verified_user)): +@router.post("/import", response_model=list[ChatResponse]) +async def import_chats(form_data: ChatsImportForm, user=Depends(get_verified_user)): try: - chat = Chats.import_chat(user.id, form_data) - if chat: - tags = chat.meta.get("tags", []) - for tag_id in tags: - tag_id = tag_id.replace(" ", "_").lower() - tag_name = " ".join([word.capitalize() for word in tag_id.split("_")]) - if ( - tag_id != "none" - and Tags.get_tag_by_name_and_user_id(tag_name, user.id) is None - ): - Tags.insert_new_tag(tag_name, user.id) - - return ChatResponse(**chat.model_dump()) + chats = Chats.import_chats(user.id, form_data.chats) + return chats except Exception as e: log.exception(e) raise HTTPException( @@ -228,7 +218,7 @@ async def get_chat_list_by_folder_id( folder_id: str, page: Optional[int] = 1, user=Depends(get_verified_user) ): try: - limit = 60 + limit = 10 skip = (page - 1) * limit return [ @@ -658,19 +648,28 @@ async def clone_chat_by_id( "title": form_data.title if form_data.title else f"Clone of {chat.title}", } - chat = Chats.import_chat( + chats = Chats.import_chats( user.id, - ChatImportForm( - **{ - "chat": updated_chat, - "meta": chat.meta, - "pinned": chat.pinned, - "folder_id": chat.folder_id, - } - ), + [ + ChatImportForm( + **{ + "chat": updated_chat, + "meta": chat.meta, + "pinned": chat.pinned, + "folder_id": chat.folder_id, + } + ) + ], ) - return ChatResponse(**chat.model_dump()) + if chats: + chat = chats[0] + return ChatResponse(**chat.model_dump()) + else: + raise HTTPException( + status_code=status.HTTP_500_INTERNAL_SERVER_ERROR, + detail=ERROR_MESSAGES.DEFAULT(), + ) else: raise HTTPException( status_code=status.HTTP_401_UNAUTHORIZED, detail=ERROR_MESSAGES.DEFAULT() @@ -698,18 +697,28 @@ async def clone_shared_chat_by_id(id: str, user=Depends(get_verified_user)): "title": f"Clone of {chat.title}", } - chat = Chats.import_chat( + chats = Chats.import_chats( user.id, - ChatImportForm( - **{ - "chat": updated_chat, - "meta": chat.meta, - "pinned": chat.pinned, - "folder_id": chat.folder_id, - } - ), + [ + ChatImportForm( + **{ + "chat": updated_chat, + "meta": chat.meta, + "pinned": chat.pinned, + "folder_id": chat.folder_id, + } + ) + ], ) - return ChatResponse(**chat.model_dump()) + + if chats: + chat = chats[0] + return ChatResponse(**chat.model_dump()) + else: + raise HTTPException( + status_code=status.HTTP_500_INTERNAL_SERVER_ERROR, + detail=ERROR_MESSAGES.DEFAULT(), + ) else: raise HTTPException( status_code=status.HTTP_401_UNAUTHORIZED, detail=ERROR_MESSAGES.DEFAULT() diff --git a/backend/open_webui/routers/configs.py b/backend/open_webui/routers/configs.py index 5fd744c793..0eb88e767e 100644 --- a/backend/open_webui/routers/configs.py +++ b/backend/open_webui/routers/configs.py @@ -144,6 +144,7 @@ class ToolServerConnection(BaseModel): path: str type: Optional[str] = "openapi" # openapi, mcp auth_type: Optional[str] + headers: Optional[dict | str] = None key: Optional[str] config: Optional[dict] @@ -270,18 +271,26 @@ async def verify_tool_servers_config( elif form_data.auth_type == "session": token = request.state.token.credentials elif form_data.auth_type == "system_oauth": + oauth_token = None try: if request.cookies.get("oauth_session_id", None): - token = await request.app.state.oauth_manager.get_oauth_token( + oauth_token = await request.app.state.oauth_manager.get_oauth_token( user.id, request.cookies.get("oauth_session_id", None), ) + + if oauth_token: + token = oauth_token.get("access_token", "") except Exception as e: pass - if token: headers = {"Authorization": f"Bearer {token}"} + if form_data.headers and isinstance(form_data.headers, dict): + if headers is None: + headers = {} + headers.update(form_data.headers) + await client.connect(form_data.url, headers=headers) specs = await client.list_tool_specs() return { @@ -299,6 +308,7 @@ async def verify_tool_servers_config( await client.disconnect() else: # openapi token = None + headers = None if form_data.auth_type == "bearer": token = form_data.key elif form_data.auth_type == "session": @@ -306,15 +316,29 @@ async def verify_tool_servers_config( elif form_data.auth_type == "system_oauth": try: if request.cookies.get("oauth_session_id", None): - token = await request.app.state.oauth_manager.get_oauth_token( - user.id, - request.cookies.get("oauth_session_id", None), + oauth_token = ( + await request.app.state.oauth_manager.get_oauth_token( + user.id, + request.cookies.get("oauth_session_id", None), + ) ) + + if oauth_token: + token = oauth_token.get("access_token", "") + except Exception as e: pass + if token: + headers = {"Authorization": f"Bearer {token}"} + + if form_data.headers and isinstance(form_data.headers, dict): + if headers is None: + headers = {} + headers.update(form_data.headers) + url = get_tool_server_url(form_data.url, form_data.path) - return await get_tool_server_data(token, url) + return await get_tool_server_data(url, headers=headers) except HTTPException as e: raise e except Exception as e: @@ -439,6 +463,7 @@ async def set_code_execution_config( ############################ class ModelsConfigForm(BaseModel): DEFAULT_MODELS: Optional[str] + DEFAULT_PINNED_MODELS: Optional[str] MODEL_ORDER_LIST: Optional[list[str]] @@ -446,6 +471,7 @@ class ModelsConfigForm(BaseModel): async def get_models_config(request: Request, user=Depends(get_admin_user)): return { "DEFAULT_MODELS": request.app.state.config.DEFAULT_MODELS, + "DEFAULT_PINNED_MODELS": request.app.state.config.DEFAULT_PINNED_MODELS, "MODEL_ORDER_LIST": request.app.state.config.MODEL_ORDER_LIST, } @@ -455,9 +481,11 @@ async def set_models_config( request: Request, form_data: ModelsConfigForm, user=Depends(get_admin_user) ): request.app.state.config.DEFAULT_MODELS = form_data.DEFAULT_MODELS + request.app.state.config.DEFAULT_PINNED_MODELS = form_data.DEFAULT_PINNED_MODELS request.app.state.config.MODEL_ORDER_LIST = form_data.MODEL_ORDER_LIST return { "DEFAULT_MODELS": request.app.state.config.DEFAULT_MODELS, + "DEFAULT_PINNED_MODELS": request.app.state.config.DEFAULT_PINNED_MODELS, "MODEL_ORDER_LIST": request.app.state.config.MODEL_ORDER_LIST, } diff --git a/backend/open_webui/routers/evaluations.py b/backend/open_webui/routers/evaluations.py index c76a1f6915..3e5e14801c 100644 --- a/backend/open_webui/routers/evaluations.py +++ b/backend/open_webui/routers/evaluations.py @@ -7,6 +7,8 @@ from open_webui.models.feedbacks import ( FeedbackModel, FeedbackResponse, FeedbackForm, + FeedbackUserResponse, + FeedbackListResponse, Feedbacks, ) @@ -56,35 +58,10 @@ async def update_config( } -class UserResponse(BaseModel): - id: str - name: str - email: str - role: str = "pending" - - last_active_at: int # timestamp in epoch - updated_at: int # timestamp in epoch - created_at: int # timestamp in epoch - - -class FeedbackUserResponse(FeedbackResponse): - user: Optional[UserResponse] = None - - -@router.get("/feedbacks/all", response_model=list[FeedbackUserResponse]) +@router.get("/feedbacks/all", response_model=list[FeedbackResponse]) async def get_all_feedbacks(user=Depends(get_admin_user)): feedbacks = Feedbacks.get_all_feedbacks() - - feedback_list = [] - for feedback in feedbacks: - user = Users.get_user_by_id(feedback.user_id) - feedback_list.append( - FeedbackUserResponse( - **feedback.model_dump(), - user=UserResponse(**user.model_dump()) if user else None, - ) - ) - return feedback_list + return feedbacks @router.delete("/feedbacks/all") @@ -111,6 +88,31 @@ async def delete_feedbacks(user=Depends(get_verified_user)): return success +PAGE_ITEM_COUNT = 30 + + +@router.get("/feedbacks/list", response_model=FeedbackListResponse) +async def get_feedbacks( + order_by: Optional[str] = None, + direction: Optional[str] = None, + page: Optional[int] = 1, + user=Depends(get_admin_user), +): + limit = PAGE_ITEM_COUNT + + page = max(1, page) + skip = (page - 1) * limit + + filter = {} + if order_by: + filter["order_by"] = order_by + if direction: + filter["direction"] = direction + + result = Feedbacks.get_feedback_items(filter=filter, skip=skip, limit=limit) + return result + + @router.post("/feedback", response_model=FeedbackModel) async def create_feedback( request: Request, diff --git a/backend/open_webui/routers/files.py b/backend/open_webui/routers/files.py index 2a5c3e5bb1..54084941fe 100644 --- a/backend/open_webui/routers/files.py +++ b/backend/open_webui/routers/files.py @@ -102,7 +102,7 @@ def process_uploaded_file(request, file, file_path, file_item, file_metadata, us ) ): file_path = Storage.get_file(file_path) - result = transcribe(request, file_path, file_metadata) + result = transcribe(request, file_path, file_metadata, user) process_file( request, diff --git a/backend/open_webui/routers/folders.py b/backend/open_webui/routers/folders.py index b242b08e3a..03212bdb7c 100644 --- a/backend/open_webui/routers/folders.py +++ b/backend/open_webui/routers/folders.py @@ -258,7 +258,10 @@ async def update_folder_is_expanded_by_id( @router.delete("/{id}") async def delete_folder_by_id( - request: Request, id: str, user=Depends(get_verified_user) + request: Request, + id: str, + delete_contents: Optional[bool] = True, + user=Depends(get_verified_user), ): if Chats.count_chats_by_folder_id_and_user_id(id, user.id): chat_delete_permission = has_permission( @@ -277,8 +280,14 @@ async def delete_folder_by_id( if folder: try: folder_ids = Folders.delete_folder_by_id_and_user_id(id, user.id) + for folder_id in folder_ids: - Chats.delete_chats_by_user_id_and_folder_id(user.id, folder_id) + if delete_contents: + Chats.delete_chats_by_user_id_and_folder_id(user.id, folder_id) + else: + Chats.move_chats_by_user_id_and_folder_id( + user.id, folder_id, None + ) return True except Exception as e: diff --git a/backend/open_webui/routers/groups.py b/backend/open_webui/routers/groups.py index bf286fe001..2b531b462b 100755 --- a/backend/open_webui/routers/groups.py +++ b/backend/open_webui/routers/groups.py @@ -31,11 +31,32 @@ router = APIRouter() @router.get("/", response_model=list[GroupResponse]) -async def get_groups(user=Depends(get_verified_user)): +async def get_groups(share: Optional[bool] = None, user=Depends(get_verified_user)): if user.role == "admin": - return Groups.get_groups() + groups = Groups.get_groups() else: - return Groups.get_groups_by_member_id(user.id) + groups = Groups.get_groups_by_member_id(user.id) + + group_list = [] + + for group in groups: + if share is not None: + # Check if the group has data and a config with share key + if ( + group.data + and "share" in group.data.get("config", {}) + and group.data["config"]["share"] != share + ): + continue + + group_list.append( + GroupResponse( + **group.model_dump(), + member_count=Groups.get_group_member_count_by_id(group.id), + ) + ) + + return group_list ############################ @@ -48,7 +69,10 @@ async def create_new_group(form_data: GroupForm, user=Depends(get_admin_user)): try: group = Groups.insert_new_group(user.id, form_data) if group: - return group + return GroupResponse( + **group.model_dump(), + member_count=Groups.get_group_member_count_by_id(group.id), + ) else: raise HTTPException( status_code=status.HTTP_400_BAD_REQUEST, @@ -71,7 +95,10 @@ async def create_new_group(form_data: GroupForm, user=Depends(get_admin_user)): async def get_group_by_id(id: str, user=Depends(get_admin_user)): group = Groups.get_group_by_id(id) if group: - return group + return GroupResponse( + **group.model_dump(), + member_count=Groups.get_group_member_count_by_id(group.id), + ) else: raise HTTPException( status_code=status.HTTP_401_UNAUTHORIZED, @@ -89,12 +116,12 @@ async def update_group_by_id( id: str, form_data: GroupUpdateForm, user=Depends(get_admin_user) ): try: - if form_data.user_ids: - form_data.user_ids = Users.get_valid_user_ids(form_data.user_ids) - group = Groups.update_group_by_id(id, form_data) if group: - return group + return GroupResponse( + **group.model_dump(), + member_count=Groups.get_group_member_count_by_id(group.id), + ) else: raise HTTPException( status_code=status.HTTP_400_BAD_REQUEST, @@ -123,7 +150,10 @@ async def add_user_to_group( group = Groups.add_users_to_group(id, form_data.user_ids) if group: - return group + return GroupResponse( + **group.model_dump(), + member_count=Groups.get_group_member_count_by_id(group.id), + ) else: raise HTTPException( status_code=status.HTTP_400_BAD_REQUEST, @@ -144,7 +174,10 @@ async def remove_users_from_group( try: group = Groups.remove_users_from_group(id, form_data.user_ids) if group: - return group + return GroupResponse( + **group.model_dump(), + member_count=Groups.get_group_member_count_by_id(group.id), + ) else: raise HTTPException( status_code=status.HTTP_400_BAD_REQUEST, diff --git a/backend/open_webui/routers/images.py b/backend/open_webui/routers/images.py index b1b3994968..4cc2a99101 100644 --- a/backend/open_webui/routers/images.py +++ b/backend/open_webui/routers/images.py @@ -44,18 +44,23 @@ def set_image_model(request: Request, model: str): request.app.state.config.IMAGE_GENERATION_MODEL = model if request.app.state.config.IMAGE_GENERATION_ENGINE in ["", "automatic1111"]: api_auth = get_automatic1111_api_auth(request) - r = requests.get( - url=f"{request.app.state.config.AUTOMATIC1111_BASE_URL}/sdapi/v1/options", - headers={"authorization": api_auth}, - ) - options = r.json() - if model != options["sd_model_checkpoint"]: - options["sd_model_checkpoint"] = model - r = requests.post( + + try: + r = requests.get( url=f"{request.app.state.config.AUTOMATIC1111_BASE_URL}/sdapi/v1/options", - json=options, headers={"authorization": api_auth}, ) + options = r.json() + if model != options["sd_model_checkpoint"]: + options["sd_model_checkpoint"] = model + r = requests.post( + url=f"{request.app.state.config.AUTOMATIC1111_BASE_URL}/sdapi/v1/options", + json=options, + headers={"authorization": api_auth}, + ) + except Exception as e: + log.debug(f"{e}") + return request.app.state.config.IMAGE_GENERATION_MODEL @@ -106,9 +111,10 @@ class ImagesConfig(BaseModel): IMAGES_OPENAI_API_BASE_URL: str IMAGES_OPENAI_API_KEY: str IMAGES_OPENAI_API_VERSION: str + IMAGES_OPENAI_API_PARAMS: Optional[dict | str] AUTOMATIC1111_BASE_URL: str - AUTOMATIC1111_API_AUTH: str + AUTOMATIC1111_API_AUTH: Optional[dict | str] AUTOMATIC1111_PARAMS: Optional[dict | str] COMFYUI_BASE_URL: str @@ -120,6 +126,7 @@ class ImagesConfig(BaseModel): IMAGES_GEMINI_API_KEY: str IMAGES_GEMINI_ENDPOINT_METHOD: str + ENABLE_IMAGE_EDIT: bool IMAGE_EDIT_ENGINE: str IMAGE_EDIT_MODEL: str IMAGE_EDIT_SIZE: Optional[str] @@ -147,6 +154,7 @@ async def get_config(request: Request, user=Depends(get_admin_user)): "IMAGES_OPENAI_API_BASE_URL": request.app.state.config.IMAGES_OPENAI_API_BASE_URL, "IMAGES_OPENAI_API_KEY": request.app.state.config.IMAGES_OPENAI_API_KEY, "IMAGES_OPENAI_API_VERSION": request.app.state.config.IMAGES_OPENAI_API_VERSION, + "IMAGES_OPENAI_API_PARAMS": request.app.state.config.IMAGES_OPENAI_API_PARAMS, "AUTOMATIC1111_BASE_URL": request.app.state.config.AUTOMATIC1111_BASE_URL, "AUTOMATIC1111_API_AUTH": request.app.state.config.AUTOMATIC1111_API_AUTH, "AUTOMATIC1111_PARAMS": request.app.state.config.AUTOMATIC1111_PARAMS, @@ -157,6 +165,7 @@ async def get_config(request: Request, user=Depends(get_admin_user)): "IMAGES_GEMINI_API_BASE_URL": request.app.state.config.IMAGES_GEMINI_API_BASE_URL, "IMAGES_GEMINI_API_KEY": request.app.state.config.IMAGES_GEMINI_API_KEY, "IMAGES_GEMINI_ENDPOINT_METHOD": request.app.state.config.IMAGES_GEMINI_ENDPOINT_METHOD, + "ENABLE_IMAGE_EDIT": request.app.state.config.ENABLE_IMAGE_EDIT, "IMAGE_EDIT_ENGINE": request.app.state.config.IMAGE_EDIT_ENGINE, "IMAGE_EDIT_MODEL": request.app.state.config.IMAGE_EDIT_MODEL, "IMAGE_EDIT_SIZE": request.app.state.config.IMAGE_EDIT_SIZE, @@ -224,6 +233,9 @@ async def update_config( request.app.state.config.IMAGES_OPENAI_API_VERSION = ( form_data.IMAGES_OPENAI_API_VERSION ) + request.app.state.config.IMAGES_OPENAI_API_PARAMS = ( + form_data.IMAGES_OPENAI_API_PARAMS + ) request.app.state.config.AUTOMATIC1111_BASE_URL = form_data.AUTOMATIC1111_BASE_URL request.app.state.config.AUTOMATIC1111_API_AUTH = form_data.AUTOMATIC1111_API_AUTH @@ -243,15 +255,16 @@ async def update_config( ) # Edit Image + request.app.state.config.ENABLE_IMAGE_EDIT = form_data.ENABLE_IMAGE_EDIT request.app.state.config.IMAGE_EDIT_ENGINE = form_data.IMAGE_EDIT_ENGINE request.app.state.config.IMAGE_EDIT_MODEL = form_data.IMAGE_EDIT_MODEL request.app.state.config.IMAGE_EDIT_SIZE = form_data.IMAGE_EDIT_SIZE request.app.state.config.IMAGES_EDIT_OPENAI_API_BASE_URL = ( - form_data.IMAGES_OPENAI_API_BASE_URL + form_data.IMAGES_EDIT_OPENAI_API_BASE_URL ) request.app.state.config.IMAGES_EDIT_OPENAI_API_KEY = ( - form_data.IMAGES_OPENAI_API_KEY + form_data.IMAGES_EDIT_OPENAI_API_KEY ) request.app.state.config.IMAGES_EDIT_OPENAI_API_VERSION = ( form_data.IMAGES_EDIT_OPENAI_API_VERSION @@ -287,6 +300,7 @@ async def update_config( "IMAGES_OPENAI_API_BASE_URL": request.app.state.config.IMAGES_OPENAI_API_BASE_URL, "IMAGES_OPENAI_API_KEY": request.app.state.config.IMAGES_OPENAI_API_KEY, "IMAGES_OPENAI_API_VERSION": request.app.state.config.IMAGES_OPENAI_API_VERSION, + "IMAGES_OPENAI_API_PARAMS": request.app.state.config.IMAGES_OPENAI_API_PARAMS, "AUTOMATIC1111_BASE_URL": request.app.state.config.AUTOMATIC1111_BASE_URL, "AUTOMATIC1111_API_AUTH": request.app.state.config.AUTOMATIC1111_API_AUTH, "AUTOMATIC1111_PARAMS": request.app.state.config.AUTOMATIC1111_PARAMS, @@ -297,6 +311,7 @@ async def update_config( "IMAGES_GEMINI_API_BASE_URL": request.app.state.config.IMAGES_GEMINI_API_BASE_URL, "IMAGES_GEMINI_API_KEY": request.app.state.config.IMAGES_GEMINI_API_KEY, "IMAGES_GEMINI_ENDPOINT_METHOD": request.app.state.config.IMAGES_GEMINI_ENDPOINT_METHOD, + "ENABLE_IMAGE_EDIT": request.app.state.config.ENABLE_IMAGE_EDIT, "IMAGE_EDIT_ENGINE": request.app.state.config.IMAGE_EDIT_ENGINE, "IMAGE_EDIT_MODEL": request.app.state.config.IMAGE_EDIT_MODEL, "IMAGE_EDIT_SIZE": request.app.state.config.IMAGE_EDIT_SIZE, @@ -534,6 +549,12 @@ async def image_generations( if ENABLE_FORWARD_USER_INFO_HEADERS: headers = include_user_info_headers(headers, user) + url = ( + f"{request.app.state.config.IMAGES_OPENAI_API_BASE_URL}/images/generations", + ) + if request.app.state.config.IMAGES_OPENAI_API_VERSION: + url = f"{url}?api-version={request.app.state.config.IMAGES_OPENAI_API_VERSION}" + data = { "model": model, "prompt": form_data.prompt, @@ -548,18 +569,17 @@ async def image_generations( if "gpt-image-1" in request.app.state.config.IMAGE_GENERATION_MODEL else {"response_format": "b64_json"} ), + **( + {} + if not request.app.state.config.IMAGES_OPENAI_API_PARAMS + else request.app.state.config.IMAGES_OPENAI_API_PARAMS + ), } - api_version_query_param = "" - if request.app.state.config.IMAGES_OPENAI_API_VERSION: - api_version_query_param = ( - f"?api-version={request.app.state.config.IMAGES_OPENAI_API_VERSION}" - ) - # Use asyncio.to_thread for the requests.post call r = await asyncio.to_thread( requests.post, - url=f"{request.app.state.config.IMAGES_OPENAI_API_BASE_URL}/images/generations{api_version_query_param}", + url=url, json=data, headers=headers, ) @@ -818,13 +838,13 @@ async def image_edits( except Exception as e: raise HTTPException(status_code=400, detail=ERROR_MESSAGES.DEFAULT(e)) - def get_image_file_item(base64_string): + def get_image_file_item(base64_string, param_name="image"): data = base64_string header, encoded = data.split(",", 1) mime_type = header.split(";")[0].lstrip("data:") image_data = base64.b64decode(encoded) return ( - "image", + param_name, ( f"{uuid.uuid4()}.png", io.BytesIO(image_data), @@ -859,7 +879,7 @@ async def image_edits( files = [get_image_file_item(form_data.image)] elif isinstance(form_data.image, list): for img in form_data.image: - files.append(get_image_file_item(img)) + files.append(get_image_file_item(img, "image[]")) url_search_params = "" if request.app.state.config.IMAGES_EDIT_OPENAI_API_VERSION: diff --git a/backend/open_webui/routers/memories.py b/backend/open_webui/routers/memories.py index 11b3d0c96c..8e45a14dfb 100644 --- a/backend/open_webui/routers/memories.py +++ b/backend/open_webui/routers/memories.py @@ -1,6 +1,7 @@ from fastapi import APIRouter, Depends, HTTPException, Request from pydantic import BaseModel import logging +import asyncio from typing import Optional from open_webui.models.memories import Memories, MemoryModel @@ -17,7 +18,7 @@ router = APIRouter() @router.get("/ef") async def get_embeddings(request: Request): - return {"result": request.app.state.EMBEDDING_FUNCTION("hello world")} + return {"result": await request.app.state.EMBEDDING_FUNCTION("hello world")} ############################ @@ -51,15 +52,15 @@ async def add_memory( ): memory = Memories.insert_new_memory(user.id, form_data.content) + vector = await request.app.state.EMBEDDING_FUNCTION(memory.content, user=user) + VECTOR_DB_CLIENT.upsert( collection_name=f"user-memory-{user.id}", items=[ { "id": memory.id, "text": memory.content, - "vector": request.app.state.EMBEDDING_FUNCTION( - memory.content, user=user - ), + "vector": vector, "metadata": {"created_at": memory.created_at}, } ], @@ -86,9 +87,11 @@ async def query_memory( if not memories: raise HTTPException(status_code=404, detail="No memories found for user") + vector = await request.app.state.EMBEDDING_FUNCTION(form_data.content, user=user) + results = VECTOR_DB_CLIENT.search( collection_name=f"user-memory-{user.id}", - vectors=[request.app.state.EMBEDDING_FUNCTION(form_data.content, user=user)], + vectors=[vector], limit=form_data.k, ) @@ -105,21 +108,28 @@ async def reset_memory_from_vector_db( VECTOR_DB_CLIENT.delete_collection(f"user-memory-{user.id}") memories = Memories.get_memories_by_user_id(user.id) + + # Generate vectors in parallel + vectors = await asyncio.gather( + *[ + request.app.state.EMBEDDING_FUNCTION(memory.content, user=user) + for memory in memories + ] + ) + VECTOR_DB_CLIENT.upsert( collection_name=f"user-memory-{user.id}", items=[ { "id": memory.id, "text": memory.content, - "vector": request.app.state.EMBEDDING_FUNCTION( - memory.content, user=user - ), + "vector": vectors[idx], "metadata": { "created_at": memory.created_at, "updated_at": memory.updated_at, }, } - for memory in memories + for idx, memory in enumerate(memories) ], ) @@ -164,15 +174,15 @@ async def update_memory_by_id( raise HTTPException(status_code=404, detail="Memory not found") if form_data.content is not None: + vector = await request.app.state.EMBEDDING_FUNCTION(memory.content, user=user) + VECTOR_DB_CLIENT.upsert( collection_name=f"user-memory-{user.id}", items=[ { "id": memory.id, "text": memory.content, - "vector": request.app.state.EMBEDDING_FUNCTION( - memory.content, user=user - ), + "vector": vector, "metadata": { "created_at": memory.created_at, "updated_at": memory.updated_at, diff --git a/backend/open_webui/routers/models.py b/backend/open_webui/routers/models.py index d69cd4ee42..93d8cb8bf7 100644 --- a/backend/open_webui/routers/models.py +++ b/backend/open_webui/routers/models.py @@ -9,7 +9,7 @@ from open_webui.models.models import ( ModelForm, ModelModel, ModelResponse, - ModelUserResponse, + ModelListResponse, Models, ) @@ -35,7 +35,7 @@ log = logging.getLogger(__name__) router = APIRouter() -def validate_model_id(model_id: str) -> bool: +def is_valid_model_id(model_id: str) -> bool: return model_id and len(model_id) <= 256 @@ -44,14 +44,43 @@ def validate_model_id(model_id: str) -> bool: ########################### +PAGE_ITEM_COUNT = 30 + + @router.get( - "/list", response_model=list[ModelUserResponse] + "/list", response_model=ModelListResponse ) # do NOT use "/" as path, conflicts with main.py -async def get_models(id: Optional[str] = None, user=Depends(get_verified_user)): - if user.role == "admin" and BYPASS_ADMIN_ACCESS_CONTROL: - return Models.get_models() - else: - return Models.get_models_by_user_id(user.id) +async def get_models( + query: Optional[str] = None, + view_option: Optional[str] = None, + tag: Optional[str] = None, + order_by: Optional[str] = None, + direction: Optional[str] = None, + page: Optional[int] = 1, + user=Depends(get_verified_user), +): + + limit = PAGE_ITEM_COUNT + + page = max(1, page) + skip = (page - 1) * limit + + filter = {} + if query: + filter["query"] = query + if view_option: + filter["view_option"] = view_option + if tag: + filter["tag"] = tag + if order_by: + filter["order_by"] = order_by + if direction: + filter["direction"] = direction + + if not user.role == "admin" or not BYPASS_ADMIN_ACCESS_CONTROL: + filter["user_id"] = user.id + + return Models.search_models(user.id, filter=filter, skip=skip, limit=limit) ########################### @@ -64,6 +93,30 @@ async def get_base_models(user=Depends(get_admin_user)): return Models.get_base_models() +########################### +# GetModelTags +########################### + + +@router.get("/tags", response_model=list[str]) +async def get_model_tags(user=Depends(get_verified_user)): + if user.role == "admin" and BYPASS_ADMIN_ACCESS_CONTROL: + models = Models.get_models() + else: + models = Models.get_models_by_user_id(user.id) + + tags_set = set() + for model in models: + if model.meta: + meta = model.meta.model_dump() + for tag in meta.get("tags", []): + tags_set.add((tag.get("name"))) + + tags = [tag for tag in tags_set] + tags.sort() + return tags + + ############################ # CreateNewModel ############################ @@ -90,7 +143,7 @@ async def create_new_model( detail=ERROR_MESSAGES.MODEL_ID_TAKEN, ) - if not validate_model_id(form_data.id): + if not is_valid_model_id(form_data.id): raise HTTPException( status_code=status.HTTP_400_BAD_REQUEST, detail=ERROR_MESSAGES.MODEL_ID_TOO_LONG, @@ -113,8 +166,19 @@ async def create_new_model( @router.get("/export", response_model=list[ModelModel]) -async def export_models(user=Depends(get_admin_user)): - return Models.get_models() +async def export_models(request: Request, user=Depends(get_verified_user)): + if user.role != "admin" and not has_permission( + user.id, "workspace.models_export", request.app.state.config.USER_PERMISSIONS + ): + raise HTTPException( + status_code=status.HTTP_401_UNAUTHORIZED, + detail=ERROR_MESSAGES.UNAUTHORIZED, + ) + + if user.role == "admin" and BYPASS_ADMIN_ACCESS_CONTROL: + return Models.get_models() + else: + return Models.get_models_by_user_id(user.id) ############################ @@ -128,8 +192,17 @@ class ModelsImportForm(BaseModel): @router.post("/import", response_model=bool) async def import_models( - user: str = Depends(get_admin_user), form_data: ModelsImportForm = (...) + request: Request, + user=Depends(get_verified_user), + form_data: ModelsImportForm = (...), ): + if user.role != "admin" and not has_permission( + user.id, "workspace.models_import", request.app.state.config.USER_PERMISSIONS + ): + raise HTTPException( + status_code=status.HTTP_401_UNAUTHORIZED, + detail=ERROR_MESSAGES.UNAUTHORIZED, + ) try: data = form_data.models if isinstance(data, list): @@ -137,7 +210,7 @@ async def import_models( # Here, you can add logic to validate model_data if needed model_id = model_data.get("id") - if model_id and validate_model_id(model_id): + if model_id and is_valid_model_id(model_id): existing_model = Models.get_model_by_id(model_id) if existing_model: # Update existing model @@ -183,6 +256,10 @@ async def sync_models( ########################### +class ModelIdForm(BaseModel): + id: str + + # Note: We're not using the typical url path param here, but instead using a query parameter to allow '/' in the id @router.get("/model", response_model=Optional[ModelResponse]) async def get_model_by_id(id: str, user=Depends(get_verified_user)): @@ -229,6 +306,7 @@ async def get_model_profile_image(id: str, user=Depends(get_verified_user)): ) except Exception as e: pass + return FileResponse(f"{STATIC_DIR}/favicon.png") else: return FileResponse(f"{STATIC_DIR}/favicon.png") @@ -276,12 +354,10 @@ async def toggle_model_by_id(id: str, user=Depends(get_verified_user)): @router.post("/model/update", response_model=Optional[ModelModel]) async def update_model_by_id( - id: str, form_data: ModelForm, user=Depends(get_verified_user), ): - model = Models.get_model_by_id(id) - + model = Models.get_model_by_id(form_data.id) if not model: raise HTTPException( status_code=status.HTTP_401_UNAUTHORIZED, @@ -298,7 +374,7 @@ async def update_model_by_id( detail=ERROR_MESSAGES.ACCESS_PROHIBITED, ) - model = Models.update_model_by_id(id, form_data) + model = Models.update_model_by_id(form_data.id, ModelForm(**form_data.model_dump())) return model @@ -307,9 +383,9 @@ async def update_model_by_id( ############################ -@router.delete("/model/delete", response_model=bool) -async def delete_model_by_id(id: str, user=Depends(get_verified_user)): - model = Models.get_model_by_id(id) +@router.post("/model/delete", response_model=bool) +async def delete_model_by_id(form_data: ModelIdForm, user=Depends(get_verified_user)): + model = Models.get_model_by_id(form_data.id) if not model: raise HTTPException( status_code=status.HTTP_401_UNAUTHORIZED, @@ -326,7 +402,7 @@ async def delete_model_by_id(id: str, user=Depends(get_verified_user)): detail=ERROR_MESSAGES.UNAUTHORIZED, ) - result = Models.delete_model_by_id(id) + result = Models.delete_model_by_id(form_data.id) return result diff --git a/backend/open_webui/routers/ollama.py b/backend/open_webui/routers/ollama.py index 64b0687afa..9606763b00 100644 --- a/backend/open_webui/routers/ollama.py +++ b/backend/open_webui/routers/ollama.py @@ -16,8 +16,8 @@ from urllib.parse import urlparse import aiohttp from aiocache import cached import requests -from urllib.parse import quote +from open_webui.utils.headers import include_user_info_headers from open_webui.models.chats import Chats from open_webui.models.users import UserModel @@ -82,22 +82,17 @@ async def send_get_request(url, key=None, user: UserModel = None): timeout = aiohttp.ClientTimeout(total=AIOHTTP_CLIENT_TIMEOUT_MODEL_LIST) try: async with aiohttp.ClientSession(timeout=timeout, trust_env=True) as session: + headers = { + "Content-Type": "application/json", + **({"Authorization": f"Bearer {key}"} if key else {}), + } + + if ENABLE_FORWARD_USER_INFO_HEADERS and user: + headers = include_user_info_headers(headers, user) + async with session.get( url, - headers={ - "Content-Type": "application/json", - **({"Authorization": f"Bearer {key}"} if key else {}), - **( - { - "X-OpenWebUI-User-Name": quote(user.name, safe=" "), - "X-OpenWebUI-User-Id": user.id, - "X-OpenWebUI-User-Email": user.email, - "X-OpenWebUI-User-Role": user.role, - } - if ENABLE_FORWARD_USER_INFO_HEADERS and user - else {} - ), - }, + headers=headers, ssl=AIOHTTP_CLIENT_SESSION_SSL, ) as response: return await response.json() @@ -133,28 +128,20 @@ async def send_post_request( trust_env=True, timeout=aiohttp.ClientTimeout(total=AIOHTTP_CLIENT_TIMEOUT) ) + headers = { + "Content-Type": "application/json", + **({"Authorization": f"Bearer {key}"} if key else {}), + } + + if ENABLE_FORWARD_USER_INFO_HEADERS and user: + headers = include_user_info_headers(headers, user) + if metadata and metadata.get("chat_id"): + headers["X-OpenWebUI-Chat-Id"] = metadata.get("chat_id") + r = await session.post( url, data=payload, - headers={ - "Content-Type": "application/json", - **({"Authorization": f"Bearer {key}"} if key else {}), - **( - { - "X-OpenWebUI-User-Name": quote(user.name, safe=" "), - "X-OpenWebUI-User-Id": user.id, - "X-OpenWebUI-User-Email": user.email, - "X-OpenWebUI-User-Role": user.role, - **( - {"X-OpenWebUI-Chat-Id": metadata.get("chat_id")} - if metadata and metadata.get("chat_id") - else {} - ), - } - if ENABLE_FORWARD_USER_INFO_HEADERS and user - else {} - ), - }, + headers=headers, ssl=AIOHTTP_CLIENT_SESSION_SSL, ) @@ -246,21 +233,16 @@ async def verify_connection( timeout=aiohttp.ClientTimeout(total=AIOHTTP_CLIENT_TIMEOUT_MODEL_LIST), ) as session: try: + headers = { + **({"Authorization": f"Bearer {key}"} if key else {}), + } + + if ENABLE_FORWARD_USER_INFO_HEADERS and user: + headers = include_user_info_headers(headers, user) + async with session.get( f"{url}/api/version", - headers={ - **({"Authorization": f"Bearer {key}"} if key else {}), - **( - { - "X-OpenWebUI-User-Name": quote(user.name, safe=" "), - "X-OpenWebUI-User-Id": user.id, - "X-OpenWebUI-User-Email": user.email, - "X-OpenWebUI-User-Role": user.role, - } - if ENABLE_FORWARD_USER_INFO_HEADERS and user - else {} - ), - }, + headers=headers, ssl=AIOHTTP_CLIENT_SESSION_SSL, ) as r: if r.status != 200: @@ -469,22 +451,17 @@ async def get_ollama_tags( r = None try: + headers = { + **({"Authorization": f"Bearer {key}"} if key else {}), + } + + if ENABLE_FORWARD_USER_INFO_HEADERS and user: + headers = include_user_info_headers(headers, user) + r = requests.request( method="GET", url=f"{url}/api/tags", - headers={ - **({"Authorization": f"Bearer {key}"} if key else {}), - **( - { - "X-OpenWebUI-User-Name": quote(user.name, safe=" "), - "X-OpenWebUI-User-Id": user.id, - "X-OpenWebUI-User-Email": user.email, - "X-OpenWebUI-User-Role": user.role, - } - if ENABLE_FORWARD_USER_INFO_HEADERS and user - else {} - ), - }, + headers=headers, ) r.raise_for_status() @@ -838,23 +815,18 @@ async def copy_model( key = get_api_key(url_idx, url, request.app.state.config.OLLAMA_API_CONFIGS) try: + headers = { + "Content-Type": "application/json", + **({"Authorization": f"Bearer {key}"} if key else {}), + } + + if ENABLE_FORWARD_USER_INFO_HEADERS and user: + headers = include_user_info_headers(headers, user) + r = requests.request( method="POST", url=f"{url}/api/copy", - headers={ - "Content-Type": "application/json", - **({"Authorization": f"Bearer {key}"} if key else {}), - **( - { - "X-OpenWebUI-User-Name": quote(user.name, safe=" "), - "X-OpenWebUI-User-Id": user.id, - "X-OpenWebUI-User-Email": user.email, - "X-OpenWebUI-User-Role": user.role, - } - if ENABLE_FORWARD_USER_INFO_HEADERS and user - else {} - ), - }, + headers=headers, data=form_data.model_dump_json(exclude_none=True).encode(), ) r.raise_for_status() @@ -908,24 +880,19 @@ async def delete_model( key = get_api_key(url_idx, url, request.app.state.config.OLLAMA_API_CONFIGS) try: + headers = { + "Content-Type": "application/json", + **({"Authorization": f"Bearer {key}"} if key else {}), + } + + if ENABLE_FORWARD_USER_INFO_HEADERS and user: + headers = include_user_info_headers(headers, user) + r = requests.request( method="DELETE", url=f"{url}/api/delete", - data=json.dumps(form_data).encode(), - headers={ - "Content-Type": "application/json", - **({"Authorization": f"Bearer {key}"} if key else {}), - **( - { - "X-OpenWebUI-User-Name": quote(user.name, safe=" "), - "X-OpenWebUI-User-Id": user.id, - "X-OpenWebUI-User-Email": user.email, - "X-OpenWebUI-User-Role": user.role, - } - if ENABLE_FORWARD_USER_INFO_HEADERS and user - else {} - ), - }, + headers=headers, + data=form_data.model_dump_json(exclude_none=True).encode(), ) r.raise_for_status() @@ -973,24 +940,19 @@ async def show_model_info( key = get_api_key(url_idx, url, request.app.state.config.OLLAMA_API_CONFIGS) try: + headers = { + "Content-Type": "application/json", + **({"Authorization": f"Bearer {key}"} if key else {}), + } + + if ENABLE_FORWARD_USER_INFO_HEADERS and user: + headers = include_user_info_headers(headers, user) + r = requests.request( method="POST", url=f"{url}/api/show", - headers={ - "Content-Type": "application/json", - **({"Authorization": f"Bearer {key}"} if key else {}), - **( - { - "X-OpenWebUI-User-Name": quote(user.name, safe=" "), - "X-OpenWebUI-User-Id": user.id, - "X-OpenWebUI-User-Email": user.email, - "X-OpenWebUI-User-Role": user.role, - } - if ENABLE_FORWARD_USER_INFO_HEADERS and user - else {} - ), - }, - data=json.dumps(form_data).encode(), + headers=headers, + data=form_data.model_dump_json(exclude_none=True).encode(), ) r.raise_for_status() @@ -1064,23 +1026,18 @@ async def embed( form_data.model = form_data.model.replace(f"{prefix_id}.", "") try: + headers = { + "Content-Type": "application/json", + **({"Authorization": f"Bearer {key}"} if key else {}), + } + + if ENABLE_FORWARD_USER_INFO_HEADERS and user: + headers = include_user_info_headers(headers, user) + r = requests.request( method="POST", url=f"{url}/api/embed", - headers={ - "Content-Type": "application/json", - **({"Authorization": f"Bearer {key}"} if key else {}), - **( - { - "X-OpenWebUI-User-Name": quote(user.name, safe=" "), - "X-OpenWebUI-User-Id": user.id, - "X-OpenWebUI-User-Email": user.email, - "X-OpenWebUI-User-Role": user.role, - } - if ENABLE_FORWARD_USER_INFO_HEADERS and user - else {} - ), - }, + headers=headers, data=form_data.model_dump_json(exclude_none=True).encode(), ) r.raise_for_status() @@ -1151,23 +1108,18 @@ async def embeddings( form_data.model = form_data.model.replace(f"{prefix_id}.", "") try: + headers = { + "Content-Type": "application/json", + **({"Authorization": f"Bearer {key}"} if key else {}), + } + + if ENABLE_FORWARD_USER_INFO_HEADERS and user: + headers = include_user_info_headers(headers, user) + r = requests.request( method="POST", url=f"{url}/api/embeddings", - headers={ - "Content-Type": "application/json", - **({"Authorization": f"Bearer {key}"} if key else {}), - **( - { - "X-OpenWebUI-User-Name": quote(user.name, safe=" "), - "X-OpenWebUI-User-Id": user.id, - "X-OpenWebUI-User-Email": user.email, - "X-OpenWebUI-User-Role": user.role, - } - if ENABLE_FORWARD_USER_INFO_HEADERS and user - else {} - ), - }, + headers=headers, data=form_data.model_dump_json(exclude_none=True).encode(), ) r.raise_for_status() diff --git a/backend/open_webui/routers/openai.py b/backend/open_webui/routers/openai.py index 9f94d67ee4..a74a59ca1f 100644 --- a/backend/open_webui/routers/openai.py +++ b/backend/open_webui/routers/openai.py @@ -7,7 +7,6 @@ from typing import Optional import aiohttp from aiocache import cached import requests -from urllib.parse import quote from azure.identity import DefaultAzureCredential, get_bearer_token_provider @@ -45,10 +44,12 @@ from open_webui.utils.payload import ( ) from open_webui.utils.misc import ( convert_logit_bias_input_to_json, + stream_chunks_handler, ) from open_webui.utils.auth import get_admin_user, get_verified_user from open_webui.utils.access_control import has_access +from open_webui.utils.headers import include_user_info_headers log = logging.getLogger(__name__) @@ -66,21 +67,16 @@ async def send_get_request(url, key=None, user: UserModel = None): timeout = aiohttp.ClientTimeout(total=AIOHTTP_CLIENT_TIMEOUT_MODEL_LIST) try: async with aiohttp.ClientSession(timeout=timeout, trust_env=True) as session: + headers = { + **({"Authorization": f"Bearer {key}"} if key else {}), + } + + if ENABLE_FORWARD_USER_INFO_HEADERS and user: + headers = include_user_info_headers(headers, user) + async with session.get( url, - headers={ - **({"Authorization": f"Bearer {key}"} if key else {}), - **( - { - "X-OpenWebUI-User-Name": quote(user.name, safe=" "), - "X-OpenWebUI-User-Id": user.id, - "X-OpenWebUI-User-Email": user.email, - "X-OpenWebUI-User-Role": user.role, - } - if ENABLE_FORWARD_USER_INFO_HEADERS and user - else {} - ), - }, + headers=headers, ssl=AIOHTTP_CLIENT_SESSION_SSL, ) as response: return await response.json() @@ -140,23 +136,13 @@ async def get_headers_and_cookies( if "openrouter.ai" in url else {} ), - **( - { - "X-OpenWebUI-User-Name": quote(user.name, safe=" "), - "X-OpenWebUI-User-Id": user.id, - "X-OpenWebUI-User-Email": user.email, - "X-OpenWebUI-User-Role": user.role, - **( - {"X-OpenWebUI-Chat-Id": metadata.get("chat_id")} - if metadata and metadata.get("chat_id") - else {} - ), - } - if ENABLE_FORWARD_USER_INFO_HEADERS - else {} - ), } + if ENABLE_FORWARD_USER_INFO_HEADERS and user: + headers = include_user_info_headers(headers, user) + if metadata and metadata.get("chat_id"): + headers["X-OpenWebUI-Chat-Id"] = metadata.get("chat_id") + token = None auth_type = config.get("auth_type") @@ -762,6 +748,7 @@ def get_azure_allowed_params(api_version: str) -> set[str]: "response_format", "seed", "max_completion_tokens", + "reasoning_effort", } try: @@ -952,7 +939,7 @@ async def generate_chat_completion( if "text/event-stream" in r.headers.get("Content-Type", ""): streaming = True return StreamingResponse( - r.content, + stream_chunks_handler(r.content), status_code=r.status, headers=dict(r.headers), background=BackgroundTask( diff --git a/backend/open_webui/routers/prompts.py b/backend/open_webui/routers/prompts.py index 5981f99f69..6a957f2547 100644 --- a/backend/open_webui/routers/prompts.py +++ b/backend/open_webui/routers/prompts.py @@ -48,8 +48,15 @@ async def get_prompt_list(user=Depends(get_verified_user)): async def create_new_prompt( request: Request, form_data: PromptForm, user=Depends(get_verified_user) ): - if user.role != "admin" and not has_permission( - user.id, "workspace.prompts", request.app.state.config.USER_PERMISSIONS + if user.role != "admin" and not ( + has_permission( + user.id, "workspace.prompts", request.app.state.config.USER_PERMISSIONS + ) + or has_permission( + user.id, + "workspace.prompts_import", + request.app.state.config.USER_PERMISSIONS, + ) ): raise HTTPException( status_code=status.HTTP_401_UNAUTHORIZED, diff --git a/backend/open_webui/routers/retrieval.py b/backend/open_webui/routers/retrieval.py index f8147372fd..358b8aca49 100644 --- a/backend/open_webui/routers/retrieval.py +++ b/backend/open_webui/routers/retrieval.py @@ -32,7 +32,7 @@ from langchain.text_splitter import RecursiveCharacterTextSplitter, TokenTextSpl from langchain_text_splitters import MarkdownHeaderTextSplitter from langchain_core.documents import Document -from open_webui.models.files import FileModel, Files +from open_webui.models.files import FileModel, FileUpdateForm, Files from open_webui.models.knowledge import Knowledges from open_webui.storage.provider import Storage @@ -64,6 +64,7 @@ from open_webui.retrieval.web.serply import search_serply from open_webui.retrieval.web.serpstack import search_serpstack from open_webui.retrieval.web.tavily import search_tavily from open_webui.retrieval.web.bing import search_bing +from open_webui.retrieval.web.azure import search_azure from open_webui.retrieval.web.exa import search_exa from open_webui.retrieval.web.perplexity import search_perplexity from open_webui.retrieval.web.sougou import search_sougou @@ -430,6 +431,7 @@ async def get_rag_config(request: Request, user=Depends(get_admin_user)): "RAG_FULL_CONTEXT": request.app.state.config.RAG_FULL_CONTEXT, # Hybrid search settings "ENABLE_RAG_HYBRID_SEARCH": request.app.state.config.ENABLE_RAG_HYBRID_SEARCH, + "ENABLE_RAG_HYBRID_SEARCH_ENRICHED_TEXTS": request.app.state.config.ENABLE_RAG_HYBRID_SEARCH_ENRICHED_TEXTS, "TOP_K_RERANKER": request.app.state.config.TOP_K_RERANKER, "RELEVANCE_THRESHOLD": request.app.state.config.RELEVANCE_THRESHOLD, "HYBRID_BM25_WEIGHT": request.app.state.config.HYBRID_BM25_WEIGHT, @@ -528,6 +530,7 @@ async def get_rag_config(request: Request, user=Depends(get_admin_user)): "PERPLEXITY_API_KEY": request.app.state.config.PERPLEXITY_API_KEY, "PERPLEXITY_MODEL": request.app.state.config.PERPLEXITY_MODEL, "PERPLEXITY_SEARCH_CONTEXT_USAGE": request.app.state.config.PERPLEXITY_SEARCH_CONTEXT_USAGE, + "PERPLEXITY_SEARCH_API_URL": request.app.state.config.PERPLEXITY_SEARCH_API_URL, "SOUGOU_API_SID": request.app.state.config.SOUGOU_API_SID, "SOUGOU_API_SK": request.app.state.config.SOUGOU_API_SK, "WEB_LOADER_ENGINE": request.app.state.config.WEB_LOADER_ENGINE, @@ -585,6 +588,7 @@ class WebConfig(BaseModel): PERPLEXITY_API_KEY: Optional[str] = None PERPLEXITY_MODEL: Optional[str] = None PERPLEXITY_SEARCH_CONTEXT_USAGE: Optional[str] = None + PERPLEXITY_SEARCH_API_URL: Optional[str] = None SOUGOU_API_SID: Optional[str] = None SOUGOU_API_SK: Optional[str] = None WEB_LOADER_ENGINE: Optional[str] = None @@ -612,6 +616,7 @@ class ConfigForm(BaseModel): # Hybrid search settings ENABLE_RAG_HYBRID_SEARCH: Optional[bool] = None + ENABLE_RAG_HYBRID_SEARCH_ENRICHED_TEXTS: Optional[bool] = None TOP_K_RERANKER: Optional[int] = None RELEVANCE_THRESHOLD: Optional[float] = None HYBRID_BM25_WEIGHT: Optional[float] = None @@ -718,6 +723,11 @@ async def update_rag_config( if form_data.ENABLE_RAG_HYBRID_SEARCH is not None else request.app.state.config.ENABLE_RAG_HYBRID_SEARCH ) + request.app.state.config.ENABLE_RAG_HYBRID_SEARCH_ENRICHED_TEXTS = ( + form_data.ENABLE_RAG_HYBRID_SEARCH_ENRICHED_TEXTS + if form_data.ENABLE_RAG_HYBRID_SEARCH_ENRICHED_TEXTS is not None + else request.app.state.config.ENABLE_RAG_HYBRID_SEARCH_ENRICHED_TEXTS + ) request.app.state.config.TOP_K_RERANKER = ( form_data.TOP_K_RERANKER @@ -1108,6 +1118,9 @@ async def update_rag_config( request.app.state.config.PERPLEXITY_SEARCH_CONTEXT_USAGE = ( form_data.web.PERPLEXITY_SEARCH_CONTEXT_USAGE ) + request.app.state.config.PERPLEXITY_SEARCH_API_URL = ( + form_data.web.PERPLEXITY_SEARCH_API_URL + ) request.app.state.config.SOUGOU_API_SID = form_data.web.SOUGOU_API_SID request.app.state.config.SOUGOU_API_SK = form_data.web.SOUGOU_API_SK @@ -1253,6 +1266,7 @@ async def update_rag_config( "PERPLEXITY_API_KEY": request.app.state.config.PERPLEXITY_API_KEY, "PERPLEXITY_MODEL": request.app.state.config.PERPLEXITY_MODEL, "PERPLEXITY_SEARCH_CONTEXT_USAGE": request.app.state.config.PERPLEXITY_SEARCH_CONTEXT_USAGE, + "PERPLEXITY_SEARCH_API_URL": request.app.state.config.PERPLEXITY_SEARCH_API_URL, "SOUGOU_API_SID": request.app.state.config.SOUGOU_API_SID, "SOUGOU_API_SK": request.app.state.config.SOUGOU_API_SK, "WEB_LOADER_ENGINE": request.app.state.config.WEB_LOADER_ENGINE, @@ -1453,10 +1467,13 @@ def save_docs_to_vector_db( ), ) - embeddings = embedding_function( - list(map(lambda x: x.replace("\n", " "), texts)), - prefix=RAG_EMBEDDING_CONTENT_PREFIX, - user=user, + # Run async embedding in sync context + embeddings = asyncio.run( + embedding_function( + list(map(lambda x: x.replace("\n", " "), texts)), + prefix=RAG_EMBEDDING_CONTENT_PREFIX, + user=user, + ) ) log.info(f"embeddings generated {len(embeddings)} for {len(texts)} items") @@ -1811,7 +1828,9 @@ def process_web( ) -def search_web(request: Request, engine: str, query: str) -> list[SearchResult]: +def search_web( + request: Request, engine: str, query: str, user=None +) -> list[SearchResult]: """Search the web using a search engine and return the results as a list of SearchResult objects. Will look for a search engine API key in environment variables in the following order: - SEARXNG_QUERY_URL @@ -1850,6 +1869,8 @@ def search_web(request: Request, engine: str, query: str) -> list[SearchResult]: query, request.app.state.config.WEB_SEARCH_RESULT_COUNT, request.app.state.config.WEB_SEARCH_DOMAIN_FILTER_LIST, + request.app.state.config.PERPLEXITY_SEARCH_API_URL, + user, ) else: raise Exception("No PERPLEXITY_API_KEY found in environment variables") @@ -2027,6 +2048,24 @@ def search_web(request: Request, engine: str, query: str) -> list[SearchResult]: request.app.state.config.WEB_SEARCH_RESULT_COUNT, request.app.state.config.WEB_SEARCH_DOMAIN_FILTER_LIST, ) + elif engine == "azure": + if ( + request.app.state.config.AZURE_AI_SEARCH_API_KEY + and request.app.state.config.AZURE_AI_SEARCH_ENDPOINT + and request.app.state.config.AZURE_AI_SEARCH_INDEX_NAME + ): + return search_azure( + request.app.state.config.AZURE_AI_SEARCH_API_KEY, + request.app.state.config.AZURE_AI_SEARCH_ENDPOINT, + request.app.state.config.AZURE_AI_SEARCH_INDEX_NAME, + query, + request.app.state.config.WEB_SEARCH_RESULT_COUNT, + request.app.state.config.WEB_SEARCH_DOMAIN_FILTER_LIST, + ) + else: + raise Exception( + "AZURE_AI_SEARCH_API_KEY, AZURE_AI_SEARCH_ENDPOINT, and AZURE_AI_SEARCH_INDEX_NAME are required for Azure AI Search" + ) elif engine == "exa": return search_exa( request.app.state.config.EXA_API_KEY, @@ -2069,11 +2108,13 @@ def search_web(request: Request, engine: str, query: str) -> list[SearchResult]: ) elif engine == "external": return search_external( + request, request.app.state.config.EXTERNAL_WEB_SEARCH_URL, request.app.state.config.EXTERNAL_WEB_SEARCH_API_KEY, query, request.app.state.config.WEB_SEARCH_RESULT_COUNT, request.app.state.config.WEB_SEARCH_DOMAIN_FILTER_LIST, + user=user, ) else: raise Exception("No search engine API key found in environment variables") @@ -2098,6 +2139,7 @@ async def process_web_search( request, request.app.state.config.WEB_SEARCH_ENGINE, query, + user, ) for query in form_data.queries ] @@ -2223,7 +2265,7 @@ class QueryDocForm(BaseModel): @router.post("/query/doc") -def query_doc_handler( +async def query_doc_handler( request: Request, form_data: QueryDocForm, user=Depends(get_verified_user), @@ -2236,7 +2278,7 @@ def query_doc_handler( collection_results[form_data.collection_name] = VECTOR_DB_CLIENT.get( collection_name=form_data.collection_name ) - return query_doc_with_hybrid_search( + return await query_doc_with_hybrid_search( collection_name=form_data.collection_name, collection_result=collection_results[form_data.collection_name], query=form_data.query, @@ -2246,8 +2288,8 @@ def query_doc_handler( k=form_data.k if form_data.k else request.app.state.config.TOP_K, reranking_function=( ( - lambda sentences: request.app.state.RERANKING_FUNCTION( - sentences, user=user + lambda query, documents: request.app.state.RERANKING_FUNCTION( + query, documents, user=user ) ) if request.app.state.RERANKING_FUNCTION @@ -2268,11 +2310,12 @@ def query_doc_handler( user=user, ) else: + query_embedding = await request.app.state.EMBEDDING_FUNCTION( + form_data.query, prefix=RAG_EMBEDDING_QUERY_PREFIX, user=user + ) return query_doc( collection_name=form_data.collection_name, - query_embedding=request.app.state.EMBEDDING_FUNCTION( - form_data.query, prefix=RAG_EMBEDDING_QUERY_PREFIX, user=user - ), + query_embedding=query_embedding, k=form_data.k if form_data.k else request.app.state.config.TOP_K, user=user, ) @@ -2292,10 +2335,11 @@ class QueryCollectionsForm(BaseModel): r: Optional[float] = None hybrid: Optional[bool] = None hybrid_bm25_weight: Optional[float] = None + enable_enriched_texts: Optional[bool] = None @router.post("/query/collection") -def query_collection_handler( +async def query_collection_handler( request: Request, form_data: QueryCollectionsForm, user=Depends(get_verified_user), @@ -2304,7 +2348,7 @@ def query_collection_handler( if request.app.state.config.ENABLE_RAG_HYBRID_SEARCH and ( form_data.hybrid is None or form_data.hybrid ): - return query_collection_with_hybrid_search( + return await query_collection_with_hybrid_search( collection_names=form_data.collection_names, queries=[form_data.query], embedding_function=lambda query, prefix: request.app.state.EMBEDDING_FUNCTION( @@ -2313,8 +2357,8 @@ def query_collection_handler( k=form_data.k if form_data.k else request.app.state.config.TOP_K, reranking_function=( ( - lambda sentences: request.app.state.RERANKING_FUNCTION( - sentences, user=user + lambda query, documents: request.app.state.RERANKING_FUNCTION( + query, documents, user=user ) ) if request.app.state.RERANKING_FUNCTION @@ -2332,9 +2376,14 @@ def query_collection_handler( if form_data.hybrid_bm25_weight else request.app.state.config.HYBRID_BM25_WEIGHT ), + enable_enriched_texts=( + form_data.enable_enriched_texts + if form_data.enable_enriched_texts is not None + else request.app.state.config.ENABLE_RAG_HYBRID_SEARCH_ENRICHED_TEXTS + ), ) else: - return query_collection( + return await query_collection( collection_names=form_data.collection_names, queries=[form_data.query], embedding_function=lambda query, prefix: request.app.state.EMBEDDING_FUNCTION( @@ -2416,7 +2465,7 @@ if ENV == "dev": @router.get("/ef/{text}") async def get_embeddings(request: Request, text: Optional[str] = "Hello World!"): return { - "result": request.app.state.EMBEDDING_FUNCTION( + "result": await request.app.state.EMBEDDING_FUNCTION( text, prefix=RAG_EMBEDDING_QUERY_PREFIX ) } @@ -2447,16 +2496,19 @@ def process_files_batch( """ Process a batch of files and save them to the vector database. """ - results: List[BatchProcessFilesResult] = [] - errors: List[BatchProcessFilesResult] = [] + collection_name = form_data.collection_name + file_results: List[BatchProcessFilesResult] = [] + file_errors: List[BatchProcessFilesResult] = [] + file_updates: List[FileUpdateForm] = [] + # Prepare all documents first all_docs: List[Document] = [] + for file in form_data.files: try: text_content = file.data.get("content", "") - docs: List[Document] = [ Document( page_content=text_content.replace("
", "\n"), @@ -2470,16 +2522,21 @@ def process_files_batch( ) ] - hash = calculate_sha256_string(text_content) - Files.update_file_hash_by_id(file.id, hash) - Files.update_file_data_by_id(file.id, {"content": text_content}) - all_docs.extend(docs) - results.append(BatchProcessFilesResult(file_id=file.id, status="prepared")) + + file_updates.append( + FileUpdateForm( + hash=calculate_sha256_string(text_content), + data={"content": text_content}, + ) + ) + file_results.append( + BatchProcessFilesResult(file_id=file.id, status="prepared") + ) except Exception as e: log.error(f"process_files_batch: Error processing file {file.id}: {str(e)}") - errors.append( + file_errors.append( BatchProcessFilesResult(file_id=file.id, status="failed", error=str(e)) ) @@ -2495,20 +2552,18 @@ def process_files_batch( ) # Update all files with collection name - for result in results: - Files.update_file_metadata_by_id( - result.file_id, {"collection_name": collection_name} - ) - result.status = "completed" + for file_update, file_result in zip(file_updates, file_results): + Files.update_file_by_id(id=file_result.file_id, form_data=file_update) + file_result.status = "completed" except Exception as e: log.error( f"process_files_batch: Error saving documents to vector DB: {str(e)}" ) - for result in results: - result.status = "failed" - errors.append( - BatchProcessFilesResult(file_id=result.file_id, error=str(e)) + for file_result in file_results: + file_result.status = "failed" + file_errors.append( + BatchProcessFilesResult(file_id=file_result.file_id, error=str(e)) ) - return BatchProcessFilesResponse(results=results, errors=errors) + return BatchProcessFilesResponse(results=file_results, errors=file_errors) diff --git a/backend/open_webui/routers/scim.py b/backend/open_webui/routers/scim.py index de1b979c86..b5d0e029ec 100644 --- a/backend/open_webui/routers/scim.py +++ b/backend/open_webui/routers/scim.py @@ -256,15 +256,16 @@ def get_scim_auth( ) # Check if SCIM is enabled - scim_enabled = getattr(request.app.state, "SCIM_ENABLED", False) + enable_scim = getattr(request.app.state, "ENABLE_SCIM", False) log.info( - f"SCIM auth check - raw SCIM_ENABLED: {scim_enabled}, type: {type(scim_enabled)}" + f"SCIM auth check - raw ENABLE_SCIM: {enable_scim}, type: {type(enable_scim)}" ) + # Handle both PersistentConfig and direct value - if hasattr(scim_enabled, "value"): - scim_enabled = scim_enabled.value - log.info(f"SCIM enabled status after conversion: {scim_enabled}") - if not scim_enabled: + if hasattr(enable_scim, "value"): + enable_scim = enable_scim.value + + if not enable_scim: raise HTTPException( status_code=status.HTTP_403_FORBIDDEN, detail="SCIM is not enabled", @@ -348,8 +349,10 @@ def user_to_scim(user: UserModel, request: Request) -> SCIMUser: def group_to_scim(group: GroupModel, request: Request) -> SCIMGroup: """Convert internal Group model to SCIM Group""" + member_ids = Groups.get_group_user_ids_by_id(group.id) members = [] - for user_id in group.user_ids: + + for user_id in member_ids: user = Users.get_user_by_id(user_id) if user: members.append( @@ -795,9 +798,11 @@ async def create_group( update_form = GroupUpdateForm( name=new_group.name, description=new_group.description, - user_ids=member_ids, ) + Groups.update_group_by_id(new_group.id, update_form) + Groups.set_group_user_ids_by_id(new_group.id, member_ids) + new_group = Groups.get_group_by_id(new_group.id) return group_to_scim(new_group, request) @@ -829,7 +834,7 @@ async def update_group( # Handle members if provided if group_data.members is not None: member_ids = [member.value for member in group_data.members] - update_form.user_ids = member_ids + Groups.set_group_user_ids_by_id(group_id, member_ids) # Update group updated_group = Groups.update_group_by_id(group_id, update_form) @@ -862,7 +867,6 @@ async def patch_group( update_form = GroupUpdateForm( name=group.name, description=group.description, - user_ids=group.user_ids.copy() if group.user_ids else [], ) for operation in patch_data.Operations: @@ -875,21 +879,22 @@ async def patch_group( update_form.name = value elif path == "members": # Replace all members - update_form.user_ids = [member["value"] for member in value] + Groups.set_group_user_ids_by_id( + group_id, [member["value"] for member in value] + ) + elif op == "add": if path == "members": # Add members if isinstance(value, list): for member in value: if isinstance(member, dict) and "value" in member: - if member["value"] not in update_form.user_ids: - update_form.user_ids.append(member["value"]) + Groups.add_users_to_group(group_id, [member["value"]]) elif op == "remove": if path and path.startswith("members[value eq"): # Remove specific member member_id = path.split('"')[1] - if member_id in update_form.user_ids: - update_form.user_ids.remove(member_id) + Groups.remove_users_from_group(group_id, [member_id]) # Update group updated_group = Groups.update_group_by_id(group_id, update_form) diff --git a/backend/open_webui/routers/tasks.py b/backend/open_webui/routers/tasks.py index 7585466f69..040c2382d7 100644 --- a/backend/open_webui/routers/tasks.py +++ b/backend/open_webui/routers/tasks.py @@ -33,6 +33,7 @@ from open_webui.config import ( DEFAULT_AUTOCOMPLETE_GENERATION_PROMPT_TEMPLATE, DEFAULT_EMOJI_GENERATION_PROMPT_TEMPLATE, DEFAULT_MOA_GENERATION_PROMPT_TEMPLATE, + DEFAULT_VOICE_MODE_PROMPT_TEMPLATE, ) from open_webui.env import SRC_LOG_LEVELS @@ -68,6 +69,7 @@ async def get_task_config(request: Request, user=Depends(get_verified_user)): "ENABLE_RETRIEVAL_QUERY_GENERATION": request.app.state.config.ENABLE_RETRIEVAL_QUERY_GENERATION, "QUERY_GENERATION_PROMPT_TEMPLATE": request.app.state.config.QUERY_GENERATION_PROMPT_TEMPLATE, "TOOLS_FUNCTION_CALLING_PROMPT_TEMPLATE": request.app.state.config.TOOLS_FUNCTION_CALLING_PROMPT_TEMPLATE, + "VOICE_MODE_PROMPT_TEMPLATE": request.app.state.config.VOICE_MODE_PROMPT_TEMPLATE, } @@ -87,6 +89,7 @@ class TaskConfigForm(BaseModel): ENABLE_RETRIEVAL_QUERY_GENERATION: bool QUERY_GENERATION_PROMPT_TEMPLATE: str TOOLS_FUNCTION_CALLING_PROMPT_TEMPLATE: str + VOICE_MODE_PROMPT_TEMPLATE: Optional[str] @router.post("/config/update") @@ -136,6 +139,10 @@ async def update_task_config( form_data.TOOLS_FUNCTION_CALLING_PROMPT_TEMPLATE ) + request.app.state.config.VOICE_MODE_PROMPT_TEMPLATE = ( + form_data.VOICE_MODE_PROMPT_TEMPLATE + ) + return { "TASK_MODEL": request.app.state.config.TASK_MODEL, "TASK_MODEL_EXTERNAL": request.app.state.config.TASK_MODEL_EXTERNAL, @@ -152,6 +159,7 @@ async def update_task_config( "ENABLE_RETRIEVAL_QUERY_GENERATION": request.app.state.config.ENABLE_RETRIEVAL_QUERY_GENERATION, "QUERY_GENERATION_PROMPT_TEMPLATE": request.app.state.config.QUERY_GENERATION_PROMPT_TEMPLATE, "TOOLS_FUNCTION_CALLING_PROMPT_TEMPLATE": request.app.state.config.TOOLS_FUNCTION_CALLING_PROMPT_TEMPLATE, + "VOICE_MODE_PROMPT_TEMPLATE": request.app.state.config.VOICE_MODE_PROMPT_TEMPLATE, } diff --git a/backend/open_webui/routers/tools.py b/backend/open_webui/routers/tools.py index 2fa3f6abf6..aa8d95943a 100644 --- a/backend/open_webui/routers/tools.py +++ b/backend/open_webui/routers/tools.py @@ -247,9 +247,19 @@ async def load_tool_from_url( @router.get("/export", response_model=list[ToolModel]) -async def export_tools(user=Depends(get_admin_user)): - tools = Tools.get_tools() - return tools +async def export_tools(request: Request, user=Depends(get_verified_user)): + if user.role != "admin" and not has_permission( + user.id, "workspace.tools_export", request.app.state.config.USER_PERMISSIONS + ): + raise HTTPException( + status_code=status.HTTP_401_UNAUTHORIZED, + detail=ERROR_MESSAGES.UNAUTHORIZED, + ) + + if user.role == "admin" and BYPASS_ADMIN_ACCESS_CONTROL: + return Tools.get_tools() + else: + return Tools.get_tools_by_user_id(user.id, "read") ############################ @@ -263,8 +273,13 @@ async def create_new_tools( form_data: ToolForm, user=Depends(get_verified_user), ): - if user.role != "admin" and not has_permission( - user.id, "workspace.tools", request.app.state.config.USER_PERMISSIONS + if user.role != "admin" and not ( + has_permission( + user.id, "workspace.tools", request.app.state.config.USER_PERMISSIONS + ) + or has_permission( + user.id, "workspace.tools_import", request.app.state.config.USER_PERMISSIONS + ) ): raise HTTPException( status_code=status.HTTP_401_UNAUTHORIZED, diff --git a/backend/open_webui/routers/users.py b/backend/open_webui/routers/users.py index 9ee3f9f88c..f53b0e2749 100644 --- a/backend/open_webui/routers/users.py +++ b/backend/open_webui/routers/users.py @@ -16,6 +16,7 @@ from open_webui.models.groups import Groups from open_webui.models.chats import Chats from open_webui.models.users import ( UserModel, + UserGroupIdsModel, UserListResponse, UserInfoListResponse, UserIdNameListResponse, @@ -35,7 +36,12 @@ from open_webui.constants import ERROR_MESSAGES from open_webui.env import SRC_LOG_LEVELS, STATIC_DIR -from open_webui.utils.auth import get_admin_user, get_password_hash, get_verified_user +from open_webui.utils.auth import ( + get_admin_user, + get_password_hash, + get_verified_user, + validate_password, +) from open_webui.utils.access_control import get_permissions, has_permission @@ -91,7 +97,25 @@ async def get_users( if direction: filter["direction"] = direction - return Users.get_users(filter=filter, skip=skip, limit=limit) + result = Users.get_users(filter=filter, skip=skip, limit=limit) + + users = result["users"] + total = result["total"] + + return { + "users": [ + UserGroupIdsModel( + **{ + **user.model_dump(), + "group_ids": [ + group.id for group in Groups.get_groups_by_member_id(user.id) + ], + } + ) + for user in users + ], + "total": total, + } @router.get("/all", response_model=UserInfoListResponse) @@ -150,13 +174,24 @@ class WorkspacePermissions(BaseModel): knowledge: bool = False prompts: bool = False tools: bool = False + models_import: bool = False + models_export: bool = False + prompts_import: bool = False + prompts_export: bool = False + tools_import: bool = False + tools_export: bool = False class SharingPermissions(BaseModel): - public_models: bool = True - public_knowledge: bool = True - public_prompts: bool = True + models: bool = False + public_models: bool = False + knowledge: bool = False + public_knowledge: bool = False + prompts: bool = False + public_prompts: bool = False + tools: bool = False public_tools: bool = True + notes: bool = False public_notes: bool = True @@ -183,6 +218,7 @@ class ChatPermissions(BaseModel): class FeaturesPermissions(BaseModel): + api_keys: bool = False direct_tool_servers: bool = False web_search: bool = True image_generation: bool = True @@ -471,8 +507,12 @@ async def update_user_by_id( ) if form_data.password: + try: + validate_password(form_data.password) + except Exception as e: + raise HTTPException(400, detail=str(e)) + hashed = get_password_hash(form_data.password) - log.debug(f"hashed: {hashed}") Auths.update_user_password_by_id(user_id, hashed) Auths.update_email_by_id(user_id, form_data.email.lower()) diff --git a/backend/open_webui/routers/utils.py b/backend/open_webui/routers/utils.py index 0e6768a671..b2a44e5488 100644 --- a/backend/open_webui/routers/utils.py +++ b/backend/open_webui/routers/utils.py @@ -124,12 +124,3 @@ async def download_db(user=Depends(get_admin_user)): media_type="application/octet-stream", filename="webui.db", ) - - -@router.get("/litellm/config") -async def download_litellm_config_yaml(user=Depends(get_admin_user)): - return FileResponse( - f"{DATA_DIR}/litellm/config.yaml", - media_type="application/octet-stream", - filename="config.yaml", - ) diff --git a/backend/open_webui/socket/main.py b/backend/open_webui/socket/main.py index 818a57807f..f79d1dd958 100644 --- a/backend/open_webui/socket/main.py +++ b/backend/open_webui/socket/main.py @@ -32,6 +32,11 @@ from open_webui.env import ( WEBSOCKET_SENTINEL_PORT, WEBSOCKET_SENTINEL_HOSTS, REDIS_KEY_PREFIX, + WEBSOCKET_REDIS_OPTIONS, + WEBSOCKET_SERVER_PING_TIMEOUT, + WEBSOCKET_SERVER_PING_INTERVAL, + WEBSOCKET_SERVER_LOGGING, + WEBSOCKET_SERVER_ENGINEIO_LOGGING, ) from open_webui.utils.auth import decode_token from open_webui.socket.utils import RedisDict, RedisLock, YdocManager @@ -61,10 +66,13 @@ if WEBSOCKET_MANAGER == "redis": mgr = socketio.AsyncRedisManager( get_sentinel_url_from_env( WEBSOCKET_REDIS_URL, WEBSOCKET_SENTINEL_HOSTS, WEBSOCKET_SENTINEL_PORT - ) + ), + redis_options=WEBSOCKET_REDIS_OPTIONS, ) else: - mgr = socketio.AsyncRedisManager(WEBSOCKET_REDIS_URL) + mgr = socketio.AsyncRedisManager( + WEBSOCKET_REDIS_URL, redis_options=WEBSOCKET_REDIS_OPTIONS + ) sio = socketio.AsyncServer( cors_allowed_origins=SOCKETIO_CORS_ORIGINS, async_mode="asgi", @@ -72,6 +80,10 @@ if WEBSOCKET_MANAGER == "redis": allow_upgrades=ENABLE_WEBSOCKET_SUPPORT, always_connect=True, client_manager=mgr, + logger=WEBSOCKET_SERVER_LOGGING, + ping_interval=WEBSOCKET_SERVER_PING_INTERVAL, + ping_timeout=WEBSOCKET_SERVER_PING_TIMEOUT, + engineio_logger=WEBSOCKET_SERVER_ENGINEIO_LOGGING, ) else: sio = socketio.AsyncServer( @@ -80,6 +92,10 @@ else: transports=(["websocket"] if ENABLE_WEBSOCKET_SUPPORT else ["polling"]), allow_upgrades=ENABLE_WEBSOCKET_SUPPORT, always_connect=True, + logger=WEBSOCKET_SERVER_LOGGING, + ping_interval=WEBSOCKET_SERVER_PING_INTERVAL, + ping_timeout=WEBSOCKET_SERVER_PING_TIMEOUT, + engineio_logger=WEBSOCKET_SERVER_ENGINEIO_LOGGING, ) @@ -282,6 +298,8 @@ async def connect(sid, environ, auth): else: USER_POOL[user.id] = [sid] + await sio.enter_room(sid, f"user:{user.id}") + @sio.on("user-join") async def user_join(sid, data): @@ -304,6 +322,7 @@ async def user_join(sid, data): else: USER_POOL[user.id] = [sid] + await sio.enter_room(sid, f"user:{user.id}") # Join all the channels channels = Channels.get_channels_by_user_id(user.id) log.debug(f"{channels=}") @@ -649,40 +668,24 @@ async def disconnect(sid): def get_event_emitter(request_info, update_db=True): async def __event_emitter__(event_data): user_id = request_info["user_id"] + chat_id = request_info["chat_id"] + message_id = request_info["message_id"] - session_ids = list( - set( - USER_POOL.get(user_id, []) - + ( - [request_info.get("session_id")] - if request_info.get("session_id") - else [] - ) - ) + await sio.emit( + "events", + { + "chat_id": chat_id, + "message_id": message_id, + "data": event_data, + }, + room=f"user:{user_id}", ) - - chat_id = request_info.get("chat_id", None) - message_id = request_info.get("message_id", None) - - emit_tasks = [ - sio.emit( - "events", - { - "chat_id": chat_id, - "message_id": message_id, - "data": event_data, - }, - to=session_id, - ) - for session_id in session_ids - ] - - await asyncio.gather(*emit_tasks) if ( update_db and message_id and not request_info.get("chat_id", "").startswith("local:") ): + if "type" in event_data and event_data["type"] == "status": Chats.add_message_status_to_chat_by_id_and_message_id( request_info["chat_id"], @@ -772,7 +775,14 @@ def get_event_emitter(request_info, update_db=True): }, ) - return __event_emitter__ + if ( + "user_id" in request_info + and "chat_id" in request_info + and "message_id" in request_info + ): + return __event_emitter__ + else: + return None def get_event_call(request_info): @@ -788,7 +798,14 @@ def get_event_call(request_info): ) return response - return __event_caller__ + if ( + "session_id" in request_info + and "chat_id" in request_info + and "message_id" in request_info + ): + return __event_caller__ + else: + return None get_event_caller = get_event_call diff --git a/backend/open_webui/utils/auth.py b/backend/open_webui/utils/auth.py index e34803ade1..f3069a093f 100644 --- a/backend/open_webui/utils/auth.py +++ b/backend/open_webui/utils/auth.py @@ -21,13 +21,18 @@ from typing import Optional, Union, List, Dict from opentelemetry import trace + +from open_webui.utils.access_control import has_permission from open_webui.models.users import Users from open_webui.constants import ERROR_MESSAGES from open_webui.env import ( + ENABLE_PASSWORD_VALIDATION, OFFLINE_MODE, LICENSE_BLOB, + PASSWORD_VALIDATION_REGEX_PATTERN, + REDIS_KEY_PREFIX, pk, WEBUI_SECRET_KEY, TRUSTED_SIGNATURE_KEY, @@ -159,6 +164,20 @@ def get_password_hash(password: str) -> str: return bcrypt.hashpw(password.encode("utf-8"), bcrypt.gensalt()).decode("utf-8") +def validate_password(password: str) -> bool: + # The password passed to bcrypt must be 72 bytes or fewer. If it is longer, it will be truncated before hashing. + if len(password.encode("utf-8")) > 72: + raise Exception( + ERROR_MESSAGES.PASSWORD_TOO_LONG, + ) + + if ENABLE_PASSWORD_VALIDATION: + if not PASSWORD_VALIDATION_REGEX_PATTERN.match(password): + raise Exception(ERROR_MESSAGES.INVALID_PASSWORD()) + + return True + + def verify_password(plain_password: str, hashed_password: str) -> bool: """Verify a password against its hash""" return ( @@ -178,6 +197,9 @@ def create_token(data: dict, expires_delta: Union[timedelta, None] = None) -> st expire = datetime.now(UTC) + expires_delta payload.update({"exp": expire}) + jti = str(uuid.uuid4()) + payload.update({"jti": jti}) + encoded_jwt = jwt.encode(payload, SESSION_SECRET, algorithm=ALGORITHM) return encoded_jwt @@ -190,6 +212,43 @@ def decode_token(token: str) -> Optional[dict]: return None +async def is_valid_token(request, decoded) -> bool: + # Require Redis to check revoked tokens + if request.app.state.redis: + jti = decoded.get("jti") + + if jti: + revoked = await request.app.state.redis.get( + f"{REDIS_KEY_PREFIX}:auth:token:{jti}:revoked" + ) + if revoked: + return False + + return True + + +async def invalidate_token(request, token): + decoded = decode_token(token) + + # Require Redis to store revoked tokens + if request.app.state.redis: + jti = decoded.get("jti") + exp = decoded.get("exp") + + if jti: + ttl = exp - int( + datetime.now(UTC).timestamp() + ) # Calculate time-to-live for the token + + if ttl > 0: + # Store the revoked token in Redis with an expiration time + await request.app.state.redis.set( + f"{REDIS_KEY_PREFIX}:auth:token:{jti}:revoked", + "1", + ex=ttl, + ) + + def extract_token_from_auth_header(auth_header: str): return auth_header[len("Bearer ") :] @@ -209,7 +268,7 @@ def get_http_authorization_cred(auth_header: Optional[str]): return None -def get_current_user( +async def get_current_user( request: Request, response: Response, background_tasks: BackgroundTasks, @@ -228,30 +287,7 @@ def get_current_user( # auth by api key if token.startswith("sk-"): - if not request.state.enable_api_key: - raise HTTPException( - status.HTTP_403_FORBIDDEN, detail=ERROR_MESSAGES.API_KEY_NOT_ALLOWED - ) - - if request.app.state.config.ENABLE_API_KEY_ENDPOINT_RESTRICTIONS: - allowed_paths = [ - path.strip() - for path in str( - request.app.state.config.API_KEY_ALLOWED_ENDPOINTS - ).split(",") - ] - - # Check if the request path matches any allowed endpoint. - if not any( - request.url.path == allowed - or request.url.path.startswith(allowed + "/") - for allowed in allowed_paths - ): - raise HTTPException( - status.HTTP_403_FORBIDDEN, detail=ERROR_MESSAGES.API_KEY_NOT_ALLOWED - ) - - user = get_current_user_by_api_key(token) + user = get_current_user_by_api_key(request, token) # Add user info to current span current_span = trace.get_current_span() @@ -264,7 +300,6 @@ def get_current_user( return user # auth by jwt token - try: try: data = decode_token(token) @@ -275,6 +310,12 @@ def get_current_user( ) if data is not None and "id" in data: + if data.get("jti") and not await is_valid_token(request, data): + raise HTTPException( + status_code=status.HTTP_401_UNAUTHORIZED, + detail="Invalid token", + ) + user = Users.get_user_by_id(data["id"]) if user is None: raise HTTPException( @@ -327,7 +368,7 @@ def get_current_user( raise e -def get_current_user_by_api_key(api_key: str): +def get_current_user_by_api_key(request, api_key: str): user = Users.get_user_by_api_key(api_key) if user is None: @@ -335,16 +376,28 @@ def get_current_user_by_api_key(api_key: str): status_code=status.HTTP_401_UNAUTHORIZED, detail=ERROR_MESSAGES.INVALID_TOKEN, ) - else: - # Add user info to current span - current_span = trace.get_current_span() - if current_span: - current_span.set_attribute("client.user.id", user.id) - current_span.set_attribute("client.user.email", user.email) - current_span.set_attribute("client.user.role", user.role) - current_span.set_attribute("client.auth.type", "api_key") - Users.update_user_last_active_by_id(user.id) + if not request.state.enable_api_keys or ( + user.role != "admin" + and not has_permission( + user.id, + "features.api_keys", + request.app.state.config.USER_PERMISSIONS, + ) + ): + raise HTTPException( + status.HTTP_403_FORBIDDEN, detail=ERROR_MESSAGES.API_KEY_NOT_ALLOWED + ) + + # Add user info to current span + current_span = trace.get_current_span() + if current_span: + current_span.set_attribute("client.user.id", user.id) + current_span.set_attribute("client.user.email", user.email) + current_span.set_attribute("client.user.role", user.role) + current_span.set_attribute("client.auth.type", "api_key") + + Users.update_user_last_active_by_id(user.id) return user diff --git a/backend/open_webui/utils/files.py b/backend/open_webui/utils/files.py index 29573cab19..4f9564b7d4 100644 --- a/backend/open_webui/utils/files.py +++ b/backend/open_webui/utils/files.py @@ -16,10 +16,15 @@ from open_webui.routers.files import upload_file_handler import mimetypes import base64 import io +import re + + +BASE64_IMAGE_URL_PREFIX = re.compile(r"data:image/\w+;base64,", re.IGNORECASE) +MARKDOWN_IMAGE_URL_PATTERN = re.compile(r"!\[(.*?)\]\((.+?)\)", re.IGNORECASE) def get_image_url_from_base64(request, base64_image_string, metadata, user): - if "data:image/png;base64" in base64_image_string: + if BASE64_IMAGE_URL_PREFIX.match(base64_image_string): image_url = "" # Extract base64 image data from the line image_data, content_type = get_image_data(base64_image_string) @@ -35,6 +40,19 @@ def get_image_url_from_base64(request, base64_image_string, metadata, user): return None +def convert_markdown_base64_images(request, content: str, metadata, user): + def replace(match): + base64_string = match.group(2) + MIN_REPLACEMENT_URL_LENGTH = 1024 + if len(base64_string) > MIN_REPLACEMENT_URL_LENGTH: + url = get_image_url_from_base64(request, base64_string, metadata, user) + if url: + return f"![{match.group(1)}]({url})" + return match.group(0) + + return MARKDOWN_IMAGE_URL_PATTERN.sub(replace, content) + + def load_b64_audio_data(b64_str): try: if "," in b64_str: diff --git a/backend/open_webui/utils/middleware.py b/backend/open_webui/utils/middleware.py index e5b84a3d79..4a4e0ea6be 100644 --- a/backend/open_webui/utils/middleware.py +++ b/backend/open_webui/utils/middleware.py @@ -58,7 +58,7 @@ from open_webui.routers.memories import query_memory, QueryMemoryForm from open_webui.utils.webhook import post_webhook from open_webui.utils.files import ( - get_audio_url_from_base64, + convert_markdown_base64_images, get_file_url_from_base64, get_image_url_from_base64, ) @@ -104,6 +104,7 @@ from open_webui.utils.mcp.client import MCPClient from open_webui.config import ( CACHE_DIR, + DEFAULT_VOICE_MODE_PROMPT_TEMPLATE, DEFAULT_TOOLS_FUNCTION_CALLING_PROMPT_TEMPLATE, DEFAULT_CODE_INTERPRETER_PROMPT, CODE_INTERPRETER_BLOCKED_MODULES, @@ -111,6 +112,7 @@ from open_webui.config import ( from open_webui.env import ( SRC_LOG_LEVELS, GLOBAL_LOG_LEVEL, + ENABLE_CHAT_RESPONSE_BASE64_IMAGE_URL_CONVERSION, CHAT_RESPONSE_STREAM_DELTA_CHUNK_SIZE, CHAT_RESPONSE_MAX_TOOL_CALL_RETRIES, BYPASS_MODEL_ACCESS_CONTROL, @@ -302,19 +304,27 @@ async def chat_completion_tools_handler( def get_tools_function_calling_payload(messages, task_model_id, content): user_message = get_last_user_message(messages) + if user_message and messages and messages[-1]["role"] == "user": + # Remove the last user message to avoid duplication + messages = messages[:-1] + recent_messages = messages[-4:] if len(messages) > 4 else messages chat_history = "\n".join( f"{message['role'].upper()}: \"\"\"{get_content_from_message(message)}\"\"\"" for message in recent_messages ) - prompt = f"History:\n{chat_history}\nQuery: {user_message}" + prompt = ( + f"History:\n{chat_history}\nQuery: {user_message}" + if chat_history + else f"Query: {user_message}" + ) return { "model": task_model_id, "messages": [ {"role": "system", "content": content}, - {"role": "user", "content": f"Query: {prompt}"}, + {"role": "user", "content": prompt}, ], "stream": False, "metadata": {"task": str(TASKS.FUNCTION_CALLING)}, @@ -733,6 +743,27 @@ def get_last_images(message_list): return images +def get_image_urls(delta_images, request, metadata, user) -> list[str]: + if not isinstance(delta_images, list): + return [] + + image_urls = [] + for img in delta_images: + if not isinstance(img, dict) or img.get("type") != "image_url": + continue + + url = img.get("image_url", {}).get("url") + if not url: + continue + + if url.startswith("data:image/png;base64"): + url = get_image_url_from_base64(request, url, metadata, user) + + image_urls.append(url) + + return image_urls + + async def chat_image_generation_handler( request: Request, form_data: dict, extra_params: dict, user ): @@ -760,42 +791,13 @@ async def chat_image_generation_handler( input_images = get_last_images(message_list) system_message_content = "" - if len(input_images) == 0: - # Create image(s) - if request.app.state.config.ENABLE_IMAGE_PROMPT_GENERATION: - try: - res = await generate_image_prompt( - request, - { - "model": form_data["model"], - "messages": form_data["messages"], - }, - user, - ) - - response = res["choices"][0]["message"]["content"] - - try: - bracket_start = response.find("{") - bracket_end = response.rfind("}") + 1 - - if bracket_start == -1 or bracket_end == -1: - raise Exception("No JSON object found in the response") - - response = response[bracket_start:bracket_end] - response = json.loads(response) - prompt = response.get("prompt", []) - except Exception as e: - prompt = user_message - - except Exception as e: - log.exception(e) - prompt = user_message + if len(input_images) > 0 and request.app.state.config.ENABLE_IMAGE_EDIT: + # Edit image(s) try: - images = await image_generations( + images = await image_edits( request=request, - form_data=CreateImageForm(**{"prompt": prompt}), + form_data=EditImageForm(**{"prompt": prompt, "image": input_images}), user=user, ) @@ -843,12 +845,43 @@ async def chat_image_generation_handler( ) system_message_content = f"Image generation was attempted but failed. The system is currently unable to generate the image. Tell the user that an error occurred: {error_message}" + else: - # Edit image(s) + # Create image(s) + if request.app.state.config.ENABLE_IMAGE_PROMPT_GENERATION: + try: + res = await generate_image_prompt( + request, + { + "model": form_data["model"], + "messages": form_data["messages"], + }, + user, + ) + + response = res["choices"][0]["message"]["content"] + + try: + bracket_start = response.find("{") + bracket_end = response.rfind("}") + 1 + + if bracket_start == -1 or bracket_end == -1: + raise Exception("No JSON object found in the response") + + response = response[bracket_start:bracket_end] + response = json.loads(response) + prompt = response.get("prompt", []) + except Exception as e: + prompt = user_message + + except Exception as e: + log.exception(e) + prompt = user_message + try: - images = await image_edits( + images = await image_generations( request=request, - form_data=EditImageForm(**{"prompt": prompt, "image": input_images}), + form_data=CreateImageForm(**{"prompt": prompt}), user=user, ) @@ -960,37 +993,32 @@ async def chat_completion_files_handler( queries = [get_last_user_message(body["messages"])] try: - # Offload get_sources_from_items to a separate thread - loop = asyncio.get_running_loop() - with ThreadPoolExecutor() as executor: - sources = await loop.run_in_executor( - executor, - lambda: get_sources_from_items( - request=request, - items=files, - queries=queries, - embedding_function=lambda query, prefix: request.app.state.EMBEDDING_FUNCTION( - query, prefix=prefix, user=user - ), - k=request.app.state.config.TOP_K, - reranking_function=( - ( - lambda sentences: request.app.state.RERANKING_FUNCTION( - sentences, user=user - ) - ) - if request.app.state.RERANKING_FUNCTION - else None - ), - k_reranker=request.app.state.config.TOP_K_RERANKER, - r=request.app.state.config.RELEVANCE_THRESHOLD, - hybrid_bm25_weight=request.app.state.config.HYBRID_BM25_WEIGHT, - hybrid_search=request.app.state.config.ENABLE_RAG_HYBRID_SEARCH, - full_context=all_full_context - or request.app.state.config.RAG_FULL_CONTEXT, - user=user, - ), - ) + # Directly await async get_sources_from_items (no thread needed - fully async now) + sources = await get_sources_from_items( + request=request, + items=files, + queries=queries, + embedding_function=lambda query, prefix: request.app.state.EMBEDDING_FUNCTION( + query, prefix=prefix, user=user + ), + k=request.app.state.config.TOP_K, + reranking_function=( + ( + lambda query, documents: request.app.state.RERANKING_FUNCTION( + query, documents, user=user + ) + ) + if request.app.state.RERANKING_FUNCTION + else None + ), + k_reranker=request.app.state.config.TOP_K_RERANKER, + r=request.app.state.config.RELEVANCE_THRESHOLD, + hybrid_bm25_weight=request.app.state.config.HYBRID_BM25_WEIGHT, + hybrid_search=request.app.state.config.ENABLE_RAG_HYBRID_SEARCH, + full_context=all_full_context + or request.app.state.config.RAG_FULL_CONTEXT, + user=user, + ) except Exception as e: log.exception(e) @@ -1097,7 +1125,7 @@ async def process_chat_payload(request, form_data, user, metadata, model): pass event_emitter = get_event_emitter(metadata) - event_call = get_event_call(metadata) + event_caller = get_event_call(metadata) oauth_token = None try: @@ -1111,14 +1139,13 @@ async def process_chat_payload(request, form_data, user, metadata, model): extra_params = { "__event_emitter__": event_emitter, - "__event_call__": event_call, + "__event_call__": event_caller, "__user__": user.model_dump() if isinstance(user, UserModel) else {}, "__metadata__": metadata, + "__oauth_token__": oauth_token, "__request__": request, "__model__": model, - "__oauth_token__": oauth_token, } - # Initialize events to store additional event to be sent to the client # Initialize contexts and citation if getattr(request.state, "direct", False) and hasattr(request.state, "model"): @@ -1229,6 +1256,18 @@ async def process_chat_payload(request, form_data, user, metadata, model): features = form_data.pop("features", None) if features: + if "voice" in features and features["voice"]: + if request.app.state.config.VOICE_MODE_PROMPT_TEMPLATE != None: + if request.app.state.config.VOICE_MODE_PROMPT_TEMPLATE != "": + template = request.app.state.config.VOICE_MODE_PROMPT_TEMPLATE + else: + template = DEFAULT_VOICE_MODE_PROMPT_TEMPLATE + + form_data["messages"] = add_or_update_system_message( + template, + form_data["messages"], + ) + if "memory" in features and features["memory"]: form_data = await chat_memory_handler( request, form_data, extra_params, user @@ -1323,7 +1362,6 @@ async def process_chat_payload(request, form_data, user, metadata, model): continue auth_type = mcp_server_connection.get("auth_type", "") - headers = {} if auth_type == "bearer": headers["Authorization"] = ( @@ -1359,6 +1397,11 @@ async def process_chat_payload(request, form_data, user, metadata, model): log.error(f"Error getting OAuth token: {e}") oauth_token = None + connection_headers = mcp_server_connection.get("headers", None) + if connection_headers and isinstance(connection_headers, dict): + for key, value in connection_headers.items(): + headers[key] = value + mcp_clients[server_id] = MCPClient() await mcp_clients[server_id].connect( url=mcp_server_connection.get("url", ""), @@ -2556,6 +2599,26 @@ async def process_chat_response( "arguments" ] += delta_arguments + image_urls = get_image_urls( + delta.get("images", []), request, metadata, user + ) + if image_urls: + message_files = Chats.add_message_files_by_id_and_message_id( + metadata["chat_id"], + metadata["message_id"], + [ + {"type": "image", "url": url} + for url in image_urls + ], + ) + + await event_emitter( + { + "type": "files", + "data": {"files": message_files}, + } + ) + value = delta.get("content") reasoning_content = ( @@ -2614,6 +2677,11 @@ async def process_chat_response( } ) + if ENABLE_CHAT_RESPONSE_BASE64_IMAGE_URL_CONVERSION: + value = convert_markdown_base64_images( + request, value, metadata, user + ) + content = f"{content}{value}" if not content_blocks: content_blocks.append( diff --git a/backend/open_webui/utils/misc.py b/backend/open_webui/utils/misc.py index 9984e378fb..ce16691365 100644 --- a/backend/open_webui/utils/misc.py +++ b/backend/open_webui/utils/misc.py @@ -8,10 +8,11 @@ from datetime import timedelta from pathlib import Path from typing import Callable, Optional import json +import aiohttp import collections.abc -from open_webui.env import SRC_LOG_LEVELS +from open_webui.env import SRC_LOG_LEVELS, CHAT_STREAM_RESPONSE_CHUNK_MAX_BUFFER_SIZE log = logging.getLogger(__name__) log.setLevel(SRC_LOG_LEVELS["MAIN"]) @@ -539,3 +540,68 @@ def extract_urls(text: str) -> list[str]: r"(https?://[^\s]+)", re.IGNORECASE ) # Matches http and https URLs return url_pattern.findall(text) + + +def stream_chunks_handler(stream: aiohttp.StreamReader): + """ + Handle stream response chunks, supporting large data chunks that exceed the original 16kb limit. + When a single line exceeds max_buffer_size, returns an empty JSON string {} and skips subsequent data + until encountering normally sized data. + + :param stream: The stream reader to handle. + :return: An async generator that yields the stream data. + """ + + max_buffer_size = CHAT_STREAM_RESPONSE_CHUNK_MAX_BUFFER_SIZE + if max_buffer_size is None or max_buffer_size <= 0: + return stream + + async def yield_safe_stream_chunks(): + buffer = b"" + skip_mode = False + + async for data, _ in stream.iter_chunks(): + if not data: + continue + + # In skip_mode, if buffer already exceeds the limit, clear it (it's part of an oversized line) + if skip_mode and len(buffer) > max_buffer_size: + buffer = b"" + + lines = (buffer + data).split(b"\n") + + # Process complete lines (except the last possibly incomplete fragment) + for i in range(len(lines) - 1): + line = lines[i] + + if skip_mode: + # Skip mode: check if current line is small enough to exit skip mode + if len(line) <= max_buffer_size: + skip_mode = False + yield line + else: + yield b"data: {}" + else: + # Normal mode: check if line exceeds limit + if len(line) > max_buffer_size: + skip_mode = True + yield b"data: {}" + log.info(f"Skip mode triggered, line size: {len(line)}") + else: + yield line + + # Save the last incomplete fragment + buffer = lines[-1] + + # Check if buffer exceeds limit + if not skip_mode and len(buffer) > max_buffer_size: + skip_mode = True + log.info(f"Skip mode triggered, buffer size: {len(buffer)}") + # Clear oversized buffer to prevent unlimited growth + buffer = b"" + + # Process remaining buffer data + if buffer and not skip_mode: + yield buffer + + return yield_safe_stream_chunks() diff --git a/backend/open_webui/utils/models.py b/backend/open_webui/utils/models.py index 6661fadb9e..8b53ce5193 100644 --- a/backend/open_webui/utils/models.py +++ b/backend/open_webui/utils/models.py @@ -12,6 +12,7 @@ from open_webui.functions import get_function_models from open_webui.models.functions import Functions from open_webui.models.models import Models +from open_webui.models.groups import Groups from open_webui.utils.plugin import ( @@ -356,6 +357,7 @@ def get_filtered_models(models, user): or (user.role == "admin" and not BYPASS_ADMIN_ACCESS_CONTROL) ) and not BYPASS_MODEL_ACCESS_CONTROL: filtered_models = [] + user_group_ids = {group.id for group in Groups.get_groups_by_member_id(user.id)} for model in models: if model.get("arena"): if has_access( @@ -364,6 +366,7 @@ def get_filtered_models(models, user): access_control=model.get("info", {}) .get("meta", {}) .get("access_control", {}), + user_group_ids=user_group_ids, ): filtered_models.append(model) continue @@ -377,6 +380,7 @@ def get_filtered_models(models, user): user.id, type="read", access_control=model_info.access_control, + user_group_ids=user_group_ids, ) ): filtered_models.append(model) diff --git a/backend/open_webui/utils/oauth.py b/backend/open_webui/utils/oauth.py index 392f4cd4bf..5add660bdf 100644 --- a/backend/open_webui/utils/oauth.py +++ b/backend/open_webui/utils/oauth.py @@ -14,7 +14,7 @@ import fnmatch import time import secrets from cryptography.fernet import Fernet - +from typing import Literal import aiohttp from authlib.integrations.starlette_client import OAuth @@ -72,13 +72,20 @@ from open_webui.utils.auth import get_password_hash, create_token from open_webui.utils.webhook import post_webhook from mcp.shared.auth import ( - OAuthClientMetadata, + OAuthClientMetadata as MCPOAuthClientMetadata, OAuthMetadata, ) from authlib.oauth2.rfc6749.errors import OAuth2Error +class OAuthClientMetadata(MCPOAuthClientMetadata): + token_endpoint_auth_method: Literal[ + "none", "client_secret_basic", "client_secret_post" + ] = "client_secret_post" + pass + + class OAuthClientInformationFull(OAuthClientMetadata): issuer: Optional[str] = None # URL of the OAuth server that issued this client @@ -238,24 +245,33 @@ def get_parsed_and_base_url(server_url) -> tuple[urllib.parse.ParseResult, str]: def get_discovery_urls(server_url) -> list[str]: parsed, base_url = get_parsed_and_base_url(server_url) - urls = [ - urllib.parse.urljoin(base_url, "/.well-known/oauth-authorization-server"), - urllib.parse.urljoin(base_url, "/.well-known/openid-configuration"), - ] + urls = [] if parsed.path and parsed.path != "/": - urls.append( - urllib.parse.urljoin( - base_url, - f"/.well-known/oauth-authorization-server{parsed.path.rstrip('/')}", - ) - ) - urls.append( - urllib.parse.urljoin( - base_url, f"/.well-known/openid-configuration{parsed.path.rstrip('/')}" - ) + # Generate discovery URLs based on https://modelcontextprotocol.io/specification/draft/basic/authorization#authorization-server-metadata-discovery + tenant = parsed.path.rstrip("/") + urls.extend( + [ + urllib.parse.urljoin( + base_url, + f"/.well-known/oauth-authorization-server{tenant}", + ), + urllib.parse.urljoin( + base_url, f"/.well-known/openid-configuration{tenant}" + ), + urllib.parse.urljoin( + base_url, f"{tenant}/.well-known/openid-configuration" + ), + ] ) + urls.extend( + [ + urllib.parse.urljoin(base_url, "/.well-known/oauth-authorization-server"), + urllib.parse.urljoin(base_url, "/.well-known/openid-configuration"), + ] + ) + return urls @@ -280,7 +296,6 @@ async def get_oauth_client_info_with_dynamic_client_registration( redirect_uris=[f"{redirect_base_url}/oauth/clients/{client_id}/callback"], grant_types=["authorization_code", "refresh_token"], response_types=["code"], - token_endpoint_auth_method="client_secret_post", ) # Attempt to fetch OAuth server metadata to get registration endpoint & scopes @@ -303,6 +318,17 @@ async def get_oauth_client_info_with_dynamic_client_registration( oauth_client_metadata.scope = " ".join( oauth_server_metadata.scopes_supported ) + + if ( + oauth_server_metadata.token_endpoint_auth_methods_supported + and oauth_client_metadata.token_endpoint_auth_method + not in oauth_server_metadata.token_endpoint_auth_methods_supported + ): + # Pick the first supported method from the server + oauth_client_metadata.token_endpoint_auth_method = oauth_server_metadata.token_endpoint_auth_methods_supported[ + 0 + ] + break except Exception as e: log.error(f"Error parsing OAuth metadata from {url}: {e}") @@ -330,6 +356,13 @@ async def get_oauth_client_info_with_dynamic_client_registration( registration_response_json = ( await oauth_client_registration_response.json() ) + + # The mcp package requires optional unset values to be None. If an empty string is passed, it gets validated and fails. + # This replaces all empty strings with None. + registration_response_json = { + k: (None if v == "" else v) + for k, v in registration_response_json.items() + } oauth_client_info = OAuthClientInformationFull.model_validate( { **registration_response_json, @@ -374,9 +407,20 @@ class OAuthClientManager: "name": client_id, "client_id": oauth_client_info.client_id, "client_secret": oauth_client_info.client_secret, - "client_kwargs": ( - {"scope": oauth_client_info.scope} if oauth_client_info.scope else {} - ), + "client_kwargs": { + **( + {"scope": oauth_client_info.scope} + if oauth_client_info.scope + else {} + ), + **( + { + "token_endpoint_auth_method": oauth_client_info.token_endpoint_auth_method + } + if oauth_client_info.token_endpoint_auth_method + else {} + ), + }, "server_metadata_url": ( oauth_client_info.issuer if oauth_client_info.issuer else None ), @@ -690,16 +734,17 @@ class OAuthClientManager: error_message = None try: client_info = self.get_client_info(client_id) - token_params = {} + + auth_params = {} if ( client_info and hasattr(client_info, "client_id") and hasattr(client_info, "client_secret") ): - token_params["client_id"] = client_info.client_id - token_params["client_secret"] = client_info.client_secret + auth_params["client_id"] = client_info.client_id + auth_params["client_secret"] = client_info.client_secret - token = await client.authorize_access_token(request, **token_params) + token = await client.authorize_access_token(request, **auth_params) if token: try: # Add timestamp for tracking @@ -978,6 +1023,10 @@ class OAuthManager: for nested_claim in nested_claims: claim_data = claim_data.get(nested_claim, {}) + # Try flat claim structure as alternative + if not claim_data: + claim_data = user_data.get(oauth_claim, {}) + oauth_roles = [] if isinstance(claim_data, list): @@ -1111,22 +1160,21 @@ class OAuthManager: f"Removing user from group {group_model.name} as it is no longer in their oauth groups" ) - user_ids = group_model.user_ids - user_ids = [i for i in user_ids if i != user.id] + Groups.remove_users_from_group(group_model.id, [user.id]) # In case a group is created, but perms are never assigned to the group by hitting "save" group_permissions = group_model.permissions if not group_permissions: group_permissions = default_permissions - update_form = GroupUpdateForm( - name=group_model.name, - description=group_model.description, - permissions=group_permissions, - user_ids=user_ids, - ) Groups.update_group_by_id( - id=group_model.id, form_data=update_form, overwrite=False + id=group_model.id, + form_data=GroupUpdateForm( + name=group_model.name, + description=group_model.description, + permissions=group_permissions, + ), + overwrite=False, ) # Add user to new groups @@ -1142,22 +1190,21 @@ class OAuthManager: f"Adding user to group {group_model.name} as it was found in their oauth groups" ) - user_ids = group_model.user_ids - user_ids.append(user.id) + Groups.add_users_to_group(group_model.id, [user.id]) # In case a group is created, but perms are never assigned to the group by hitting "save" group_permissions = group_model.permissions if not group_permissions: group_permissions = default_permissions - update_form = GroupUpdateForm( - name=group_model.name, - description=group_model.description, - permissions=group_permissions, - user_ids=user_ids, - ) Groups.update_group_by_id( - id=group_model.id, form_data=update_form, overwrite=False + id=group_model.id, + form_data=GroupUpdateForm( + name=group_model.name, + description=group_model.description, + permissions=group_permissions, + ), + overwrite=False, ) async def _process_picture_url( @@ -1224,8 +1271,16 @@ class OAuthManager: error_message = None try: client = self.get_client(provider) + + auth_params = {} + if client: + if hasattr(client, "client_id"): + auth_params["client_id"] = client.client_id + if hasattr(client, "client_secret"): + auth_params["client_secret"] = client.client_secret + try: - token = await client.authorize_access_token(request) + token = await client.authorize_access_token(request, **auth_params) except Exception as e: detailed_error = _build_oauth_callback_error_message(e) log.warning( diff --git a/backend/open_webui/utils/task.py b/backend/open_webui/utils/task.py index 84c9308dc1..7f90e96330 100644 --- a/backend/open_webui/utils/task.py +++ b/backend/open_webui/utils/task.py @@ -208,20 +208,21 @@ def rag_template(template: str, context: str, query: str): if "[query]" in context: query_placeholder = "{{QUERY" + str(uuid.uuid4()) + "}}" template = template.replace("[query]", query_placeholder) - query_placeholders.append(query_placeholder) + query_placeholders.append((query_placeholder, "[query]")) if "{{QUERY}}" in context: query_placeholder = "{{QUERY" + str(uuid.uuid4()) + "}}" template = template.replace("{{QUERY}}", query_placeholder) - query_placeholders.append(query_placeholder) + query_placeholders.append((query_placeholder, "{{QUERY}}")) template = template.replace("[context]", context) template = template.replace("{{CONTEXT}}", context) + template = template.replace("[query]", query) template = template.replace("{{QUERY}}", query) - for query_placeholder in query_placeholders: - template = template.replace(query_placeholder, query) + for query_placeholder, original_placeholder in query_placeholders: + template = template.replace(query_placeholder, original_placeholder) return template diff --git a/backend/open_webui/utils/telemetry/metrics.py b/backend/open_webui/utils/telemetry/metrics.py index c7b47c0231..85bd418844 100644 --- a/backend/open_webui/utils/telemetry/metrics.py +++ b/backend/open_webui/utils/telemetry/metrics.py @@ -99,6 +99,9 @@ def _build_meter_provider(resource: Resource) -> MeterProvider: View( instrument_name="webui.users.active", ), + View( + instrument_name="webui.users.active.today", + ), ] provider = MeterProvider( @@ -159,6 +162,18 @@ def setup_metrics(app: FastAPI, resource: Resource) -> None: callbacks=[observe_active_users], ) + def observe_users_active_today( + options: metrics.CallbackOptions, + ) -> Sequence[metrics.Observation]: + return [metrics.Observation(value=Users.get_num_users_active_today())] + + meter.create_observable_gauge( + name="webui.users.active.today", + description="Number of users active since midnight today", + unit="users", + callbacks=[observe_users_active_today], + ) + # FastAPI middleware @app.middleware("http") async def _metrics_middleware(request: Request, call_next): diff --git a/backend/open_webui/utils/tools.py b/backend/open_webui/utils/tools.py index 1d1254f184..fb623ed332 100644 --- a/backend/open_webui/utils/tools.py +++ b/backend/open_webui/utils/tools.py @@ -155,7 +155,9 @@ async def get_tools( auth_type = tool_server_connection.get("auth_type", "bearer") cookies = {} - headers = {} + headers = { + "Content-Type": "application/json", + } if auth_type == "bearer": headers["Authorization"] = ( @@ -177,7 +179,10 @@ async def get_tools( f"Bearer {oauth_token.get('access_token', '')}" ) - headers["Content-Type"] = "application/json" + connection_headers = tool_server_connection.get("headers", None) + if connection_headers and isinstance(connection_headers, dict): + for key, value in connection_headers.items(): + headers[key] = value def make_tool_function( function_name, tool_server_data, headers @@ -232,14 +237,16 @@ async def get_tools( module, _ = load_tool_module_by_id(tool_id) request.app.state.TOOLS[tool_id] = module - extra_params["__id__"] = tool_id + __user__ = { + **extra_params["__user__"], + } # Set valves for the tool if hasattr(module, "valves") and hasattr(module, "Valves"): valves = Tools.get_tool_valves_by_id(tool_id) or {} module.valves = module.Valves(**valves) if hasattr(module, "UserValves"): - extra_params["__user__"]["valves"] = module.UserValves( # type: ignore + __user__["valves"] = module.UserValves( # type: ignore **Tools.get_user_valves_by_id_and_user_id(tool_id, user.id) ) @@ -261,7 +268,12 @@ async def get_tools( function_name = spec["name"] tool_function = getattr(module, function_name) callable = get_async_tool_function_and_apply_extra_params( - tool_function, extra_params + tool_function, + { + **extra_params, + "__id__": tool_id, + "__user__": __user__, + }, ) # TODO: Support Pydantic models as parameters @@ -561,20 +573,21 @@ async def get_tool_servers(request: Request): return tool_servers -async def get_tool_server_data(token: str, url: str) -> Dict[str, Any]: - headers = { +async def get_tool_server_data(url: str, headers: Optional[dict]) -> Dict[str, Any]: + _headers = { "Accept": "application/json", "Content-Type": "application/json", } - if token: - headers["Authorization"] = f"Bearer {token}" + + if headers: + _headers.update(headers) error = None try: timeout = aiohttp.ClientTimeout(total=AIOHTTP_CLIENT_TIMEOUT_TOOL_SERVER_DATA) async with aiohttp.ClientSession(timeout=timeout, trust_env=True) as session: async with session.get( - url, headers=headers, ssl=AIOHTTP_CLIENT_SESSION_TOOL_SERVER_SSL + url, headers=_headers, ssl=AIOHTTP_CLIENT_SESSION_TOOL_SERVER_SSL ) as response: if response.status != 200: error_body = await response.json() @@ -644,7 +657,10 @@ async def get_tool_servers_data(servers: List[Dict[str, Any]]) -> List[Dict[str, openapi_path = server.get("path", "openapi.json") spec_url = get_tool_server_url(server_url, openapi_path) # Fetch from URL - task = get_tool_server_data(token, spec_url) + task = get_tool_server_data( + spec_url, + {"Authorization": f"Bearer {token}"} if token else None, + ) elif spec_type == "json" and server.get("spec", ""): # Use provided JSON spec spec_json = None diff --git a/backend/requirements-min.txt b/backend/requirements-min.txt new file mode 100644 index 0000000000..bc4732fc1d --- /dev/null +++ b/backend/requirements-min.txt @@ -0,0 +1,50 @@ +# Minimal requirements for backend to run +# WIP: use this as a reference to build a minimal docker image + +fastapi==0.118.0 +uvicorn[standard]==0.37.0 +pydantic==2.11.9 +python-multipart==0.0.20 +itsdangerous==2.2.0 + +python-socketio==5.13.0 +python-jose==3.5.0 +cryptography +bcrypt==5.0.0 +argon2-cffi==25.1.0 +PyJWT[crypto]==2.10.1 +authlib==1.6.5 + +requests==2.32.5 +aiohttp==3.12.15 +async-timeout +aiocache +aiofiles +starlette-compress==1.6.0 +httpx[socks,http2,zstd,cli,brotli]==0.28.1 +starsessions[redis]==2.2.1 + +sqlalchemy==2.0.38 +alembic==1.14.0 +peewee==3.18.1 +peewee-migrate==1.12.2 + +pycrdt==0.12.25 +redis + +APScheduler==3.10.4 +RestrictedPython==8.0 + +loguru==0.7.3 +asgiref==3.8.1 + +mcp==1.21.2 +openai + +langchain==0.3.27 +langchain-community==0.3.29 +fake-useragent==2.2.0 + +chromadb==1.1.0 +black==25.9.0 +pydub \ No newline at end of file diff --git a/backend/requirements.txt b/backend/requirements.txt index 0fdcb618fd..db32255a89 100644 --- a/backend/requirements.txt +++ b/backend/requirements.txt @@ -37,11 +37,11 @@ asgiref==3.8.1 # AI libraries tiktoken -mcp==1.14.1 +mcp==1.21.2 openai anthropic -google-genai==1.38.0 +google-genai==1.52.0 google-generativeai==0.8.5 langchain==0.3.27 @@ -49,6 +49,7 @@ langchain-community==0.3.29 fake-useragent==2.2.0 chromadb==1.1.0 +weaviate-client==4.17.0 opensearch-py==2.8.0 transformers @@ -63,7 +64,8 @@ fpdf2==2.8.2 pymdown-extensions==10.14.2 docx2txt==0.8 python-pptx==1.0.2 -unstructured==0.18.15 +unstructured==0.18.18 +msoffcrypto-tool==5.4.2 nltk==3.9.1 Markdown==3.9 pypandoc==1.15 @@ -75,7 +77,6 @@ validators==0.35.0 psutil sentencepiece soundfile==0.13.1 -azure-ai-documentintelligence==1.0.2 pillow==11.3.0 opencv-python-headless==4.11.0.86 @@ -85,7 +86,6 @@ rank-bm25==0.2.2 onnxruntime==1.20.1 faster-whisper==1.1.1 - black==25.9.0 youtube-transcript-api==1.2.2 pytube==15.0.0 @@ -93,6 +93,11 @@ pytube==15.0.0 pydub ddgs==9.0.0 +azure-ai-documentintelligence==1.0.2 +azure-identity==1.25.0 +azure-storage-blob==12.24.1 +azure-search-documents==11.6.0 + ## Google Drive google-api-python-client google-auth-httplib2 @@ -101,10 +106,7 @@ google-auth-oauthlib googleapis-common-protos==1.70.0 google-cloud-storage==2.19.0 -azure-identity==1.25.0 -azure-storage-blob==12.24.1 - - +## Databases pymongo psycopg2-binary==2.9.10 pgvector==0.4.1 diff --git a/package-lock.json b/package-lock.json index c86757e9a5..19e4faca55 100644 --- a/package-lock.json +++ b/package-lock.json @@ -1,12 +1,12 @@ { "name": "open-webui", - "version": "0.6.36", + "version": "0.6.37", "lockfileVersion": 3, "requires": true, "packages": { "": { "name": "open-webui", - "version": "0.6.36", + "version": "0.6.37", "dependencies": { "@azure/msal-browser": "^4.5.0", "@codemirror/lang-javascript": "^6.2.2", diff --git a/package.json b/package.json index 9065bda0ce..7b87463aef 100644 --- a/package.json +++ b/package.json @@ -1,6 +1,6 @@ { "name": "open-webui", - "version": "0.6.36", + "version": "0.6.37", "private": true, "scripts": { "dev": "npm run pyodide:fetch && vite dev --host", diff --git a/pyproject.toml b/pyproject.toml index 87e88a1b06..85a8044e3c 100644 --- a/pyproject.toml +++ b/pyproject.toml @@ -37,9 +37,6 @@ dependencies = [ "pycrdt==0.12.25", "redis", - "PyMySQL==1.1.1", - "boto3==1.40.5", - "APScheduler==3.10.4", "RestrictedPython==8.0", @@ -47,11 +44,11 @@ dependencies = [ "asgiref==3.8.1", "tiktoken", - "mcp==1.14.1", + "mcp==1.21.2", "openai", "anthropic", - "google-genai==1.38.0", + "google-genai==1.52.0", "google-generativeai==0.8.5", "langchain==0.3.27", @@ -60,6 +57,8 @@ dependencies = [ "fake-useragent==2.2.0", "chromadb==1.0.20", "opensearch-py==2.8.0", + "PyMySQL==1.1.1", + "boto3==1.40.5", "transformers", "sentence-transformers==5.1.1", @@ -73,7 +72,8 @@ dependencies = [ "pymdown-extensions==10.14.2", "docx2txt==0.8", "python-pptx==1.0.2", - "unstructured==0.18.15", + "unstructured==0.18.18", + "msoffcrypto-tool==5.4.2", "nltk==3.9.1", "Markdown==3.9", "pypandoc==1.15", @@ -146,12 +146,14 @@ all = [ "elasticsearch==9.1.0", "qdrant-client==1.14.3", + "weaviate-client==4.17.0", "pymilvus==2.6.2", "pinecone==6.0.2", "oracledb==3.2.0", - "colbert-ai==0.2.21", + "firecrawl-py==4.5.0", + "azure-search-documents==11.6.0", ] [project.scripts] diff --git a/src/app.css b/src/app.css index f4e3225d3b..9646c0f9ce 100644 --- a/src/app.css +++ b/src/app.css @@ -30,8 +30,33 @@ font-display: swap; } +/* --app-text-scale is updated via the UI Scale slider (Interface.svelte) */ +:root { + --app-text-scale: 1; +} + html { word-break: break-word; + /* font-size scales the entire document via the same UI control */ + font-size: calc(1rem * var(--app-text-scale, 1)); +} + +#sidebar-chat-item { + /* sidebar item sizing scales for the chat list entries */ + min-height: calc(32px * var(--app-text-scale, 1)); + padding-inline: calc(11px * var(--app-text-scale, 1)); + padding-block: calc(6px * var(--app-text-scale, 1)); +} + +#sidebar-chat-item div[dir='auto'] { + /* chat title line height follows the text scale */ + height: calc(20px * var(--app-text-scale, 1)); + line-height: calc(20px * var(--app-text-scale, 1)); +} + +#sidebar-chat-item input { + /* editing state input height is kept in sync */ + min-height: calc(20px * var(--app-text-scale, 1)); } code { diff --git a/src/app.html b/src/app.html index 9333dc8ba3..47972185c2 100644 --- a/src/app.html +++ b/src/app.html @@ -174,7 +174,6 @@ --> - + + diff --git a/src/lib/apis/chats/index.ts b/src/lib/apis/chats/index.ts index c548a71dc2..010c80a56f 100644 --- a/src/lib/apis/chats/index.ts +++ b/src/lib/apis/chats/index.ts @@ -65,15 +65,7 @@ export const unarchiveAllChats = async (token: string) => { return res; }; -export const importChat = async ( - token: string, - chat: object, - meta: object | null, - pinned?: boolean, - folderId?: string | null, - createdAt: number | null = null, - updatedAt: number | null = null -) => { +export const importChats = async (token: string, chats: object[]) => { let error = null; const res = await fetch(`${WEBUI_API_BASE_URL}/chats/import`, { @@ -84,12 +76,7 @@ export const importChat = async ( authorization: `Bearer ${token}` }, body: JSON.stringify({ - chat: chat, - meta: meta ?? {}, - pinned: pinned, - folder_id: folderId, - created_at: createdAt ?? null, - updated_at: updatedAt ?? null + chats }) }) .then(async (res) => { diff --git a/src/lib/apis/evaluations/index.ts b/src/lib/apis/evaluations/index.ts index 96a689fcb1..1f48c7bfbf 100644 --- a/src/lib/apis/evaluations/index.ts +++ b/src/lib/apis/evaluations/index.ts @@ -93,6 +93,45 @@ export const getAllFeedbacks = async (token: string = '') => { return res; }; +export const getFeedbackItems = async (token: string = '', orderBy, direction, page) => { + let error = null; + + const searchParams = new URLSearchParams(); + if (orderBy) searchParams.append('order_by', orderBy); + if (direction) searchParams.append('direction', direction); + if (page) searchParams.append('page', page.toString()); + + const res = await fetch( + `${WEBUI_API_BASE_URL}/evaluations/feedbacks/list?${searchParams.toString()}`, + { + method: 'GET', + headers: { + Accept: 'application/json', + 'Content-Type': 'application/json', + authorization: `Bearer ${token}` + } + } + ) + .then(async (res) => { + if (!res.ok) throw await res.json(); + return res.json(); + }) + .then((json) => { + return json; + }) + .catch((err) => { + error = err.detail; + console.error(err); + return null; + }); + + if (error) { + throw error; + } + + return res; +}; + export const exportAllFeedbacks = async (token: string = '') => { let error = null; diff --git a/src/lib/apis/folders/index.ts b/src/lib/apis/folders/index.ts index 0faa547141..535adbd5f6 100644 --- a/src/lib/apis/folders/index.ts +++ b/src/lib/apis/folders/index.ts @@ -239,10 +239,13 @@ export const updateFolderItemsById = async (token: string, id: string, items: Fo return res; }; -export const deleteFolderById = async (token: string, id: string) => { +export const deleteFolderById = async (token: string, id: string, deleteContents: boolean) => { let error = null; - const res = await fetch(`${WEBUI_API_BASE_URL}/folders/${id}`, { + const searchParams = new URLSearchParams(); + searchParams.append('delete_contents', deleteContents ? 'true' : 'false'); + + const res = await fetch(`${WEBUI_API_BASE_URL}/folders/${id}?${searchParams.toString()}`, { method: 'DELETE', headers: { Accept: 'application/json', diff --git a/src/lib/apis/groups/index.ts b/src/lib/apis/groups/index.ts index c55f477af5..a74c61b83d 100644 --- a/src/lib/apis/groups/index.ts +++ b/src/lib/apis/groups/index.ts @@ -31,10 +31,15 @@ export const createNewGroup = async (token: string, group: object) => { return res; }; -export const getGroups = async (token: string = '') => { +export const getGroups = async (token: string = '', share?: boolean) => { let error = null; - const res = await fetch(`${WEBUI_API_BASE_URL}/groups/`, { + const searchParams = new URLSearchParams(); + if (share !== undefined) { + searchParams.append('share', String(share)); + } + + const res = await fetch(`${WEBUI_API_BASE_URL}/groups/?${searchParams.toString()}`, { method: 'GET', headers: { Accept: 'application/json', @@ -160,3 +165,73 @@ export const deleteGroupById = async (token: string, id: string) => { return res; }; + +export const addUserToGroup = async (token: string, id: string, userIds: string[]) => { + let error = null; + + const res = await fetch(`${WEBUI_API_BASE_URL}/groups/id/${id}/users/add`, { + method: 'POST', + headers: { + Accept: 'application/json', + 'Content-Type': 'application/json', + authorization: `Bearer ${token}` + }, + body: JSON.stringify({ + user_ids: userIds + }) + }) + .then(async (res) => { + if (!res.ok) throw await res.json(); + return res.json(); + }) + .then((json) => { + return json; + }) + .catch((err) => { + error = err.detail; + + console.error(err); + return null; + }); + + if (error) { + throw error; + } + + return res; +}; + +export const removeUserFromGroup = async (token: string, id: string, userIds: string[]) => { + let error = null; + + const res = await fetch(`${WEBUI_API_BASE_URL}/groups/id/${id}/users/remove`, { + method: 'POST', + headers: { + Accept: 'application/json', + 'Content-Type': 'application/json', + authorization: `Bearer ${token}` + }, + body: JSON.stringify({ + user_ids: userIds + }) + }) + .then(async (res) => { + if (!res.ok) throw await res.json(); + return res.json(); + }) + .then((json) => { + return json; + }) + .catch((err) => { + error = err.detail; + + console.error(err); + return null; + }); + + if (error) { + throw error; + } + + return res; +}; diff --git a/src/lib/apis/index.ts b/src/lib/apis/index.ts index 126c59ad2f..e865e9ba0e 100644 --- a/src/lib/apis/index.ts +++ b/src/lib/apis/index.ts @@ -1425,7 +1425,7 @@ export const getVersion = async (token: string) => { throw error; } - return res?.version ?? null; + return res; }; export const getVersionUpdates = async (token: string) => { diff --git a/src/lib/apis/models/index.ts b/src/lib/apis/models/index.ts index 32a7151b5d..d03a83e9ca 100644 --- a/src/lib/apis/models/index.ts +++ b/src/lib/apis/models/index.ts @@ -1,9 +1,68 @@ import { WEBUI_API_BASE_URL } from '$lib/constants'; -export const getModelItems = async (token: string = '') => { +export const getModelItems = async ( + token: string = '', + query, + viewOption, + selectedTag, + orderBy, + direction, + page +) => { let error = null; - const res = await fetch(`${WEBUI_API_BASE_URL}/models/list`, { + const searchParams = new URLSearchParams(); + if (query) { + searchParams.append('query', query); + } + if (viewOption) { + searchParams.append('view_option', viewOption); + } + if (selectedTag) { + searchParams.append('tag', selectedTag); + } + if (orderBy) { + searchParams.append('order_by', orderBy); + } + if (direction) { + searchParams.append('direction', direction); + } + if (page) { + searchParams.append('page', page.toString()); + } + + const res = await fetch(`${WEBUI_API_BASE_URL}/models/list?${searchParams.toString()}`, { + method: 'GET', + headers: { + Accept: 'application/json', + 'Content-Type': 'application/json', + authorization: `Bearer ${token}` + } + }) + .then(async (res) => { + if (!res.ok) throw await res.json(); + return res.json(); + }) + .then((json) => { + return json; + }) + .catch((err) => { + error = err; + console.error(err); + return null; + }); + + if (error) { + throw error; + } + + return res; +}; + +export const getModelTags = async (token: string = '') => { + let error = null; + + const res = await fetch(`${WEBUI_API_BASE_URL}/models/tags`, { method: 'GET', headers: { Accept: 'application/json', @@ -192,17 +251,14 @@ export const toggleModelById = async (token: string, id: string) => { export const updateModelById = async (token: string, id: string, model: object) => { let error = null; - const searchParams = new URLSearchParams(); - searchParams.append('id', id); - - const res = await fetch(`${WEBUI_API_BASE_URL}/models/model/update?${searchParams.toString()}`, { + const res = await fetch(`${WEBUI_API_BASE_URL}/models/model/update`, { method: 'POST', headers: { Accept: 'application/json', 'Content-Type': 'application/json', authorization: `Bearer ${token}` }, - body: JSON.stringify(model) + body: JSON.stringify({ ...model, id }) }) .then(async (res) => { if (!res.ok) throw await res.json(); @@ -228,16 +284,14 @@ export const updateModelById = async (token: string, id: string, model: object) export const deleteModelById = async (token: string, id: string) => { let error = null; - const searchParams = new URLSearchParams(); - searchParams.append('id', id); - - const res = await fetch(`${WEBUI_API_BASE_URL}/models/model/delete?${searchParams.toString()}`, { - method: 'DELETE', + const res = await fetch(`${WEBUI_API_BASE_URL}/models/model/delete`, { + method: 'POST', headers: { Accept: 'application/json', 'Content-Type': 'application/json', authorization: `Bearer ${token}` - } + }, + body: JSON.stringify({ id }) }) .then(async (res) => { if (!res.ok) throw await res.json(); diff --git a/src/lib/apis/utils/index.ts b/src/lib/apis/utils/index.ts index 1fc30ddbba..d19f10f948 100644 --- a/src/lib/apis/utils/index.ts +++ b/src/lib/apis/utils/index.ts @@ -179,39 +179,3 @@ export const downloadDatabase = async (token: string) => { throw error; } }; - -export const downloadLiteLLMConfig = async (token: string) => { - let error = null; - - const res = await fetch(`${WEBUI_API_BASE_URL}/utils/litellm/config`, { - method: 'GET', - headers: { - 'Content-Type': 'application/json', - Authorization: `Bearer ${token}` - } - }) - .then(async (response) => { - if (!response.ok) { - throw await response.json(); - } - return response.blob(); - }) - .then((blob) => { - const url = window.URL.createObjectURL(blob); - const a = document.createElement('a'); - a.href = url; - a.download = 'config.yaml'; - document.body.appendChild(a); - a.click(); - window.URL.revokeObjectURL(url); - }) - .catch((err) => { - console.error(err); - error = err.detail; - return null; - }); - - if (error) { - throw error; - } -}; diff --git a/src/lib/components/AddConnectionModal.svelte b/src/lib/components/AddConnectionModal.svelte index 90bb60b406..5a75774fa0 100644 --- a/src/lib/components/AddConnectionModal.svelte +++ b/src/lib/components/AddConnectionModal.svelte @@ -426,7 +426,7 @@