chore: 添加虚拟环境到仓库
- 添加 backend_service/venv 虚拟环境 - 包含所有Python依赖包 - 注意:虚拟环境约393MB,包含12655个文件
This commit is contained in:
@@ -0,0 +1,86 @@
|
||||
from typing import Optional, Tuple
|
||||
|
||||
from chromadb.auth import UserIdentity
|
||||
from chromadb.config import DEFAULT_DATABASE, DEFAULT_TENANT
|
||||
from chromadb.errors import ChromaAuthError
|
||||
|
||||
|
||||
def _singleton_tenant_database_if_applicable(
|
||||
user_identity: UserIdentity,
|
||||
overwrite_singleton_tenant_database_access_from_auth: bool,
|
||||
) -> Tuple[Optional[str], Optional[str]]:
|
||||
"""
|
||||
If settings.chroma_overwrite_singleton_tenant_database_access_from_auth
|
||||
is False, this function always returns (None, None).
|
||||
|
||||
If settings.chroma_overwrite_singleton_tenant_database_access_from_auth
|
||||
is True, follows the following logic:
|
||||
- If the user only has access to a single tenant, this function will
|
||||
return that tenant as its first return value.
|
||||
- If the user only has access to a single database, this function will
|
||||
return that database as its second return value. If the user has
|
||||
access to multiple tenants and/or databases, including "*", this
|
||||
function will return None for the corresponding value(s).
|
||||
- If the user has access to multiple tenants and/or databases this
|
||||
function will return None for the corresponding value(s).
|
||||
"""
|
||||
if not overwrite_singleton_tenant_database_access_from_auth:
|
||||
return None, None
|
||||
tenant = None
|
||||
database = None
|
||||
user_tenant = user_identity.tenant
|
||||
user_databases = user_identity.databases
|
||||
if user_tenant and user_tenant != "*":
|
||||
tenant = user_tenant
|
||||
if user_databases:
|
||||
user_databases_set = set(user_databases)
|
||||
if len(user_databases_set) == 1 and "*" not in user_databases_set:
|
||||
database = list(user_databases_set)[0]
|
||||
return tenant, database
|
||||
|
||||
|
||||
def maybe_set_tenant_and_database(
|
||||
user_identity: UserIdentity,
|
||||
overwrite_singleton_tenant_database_access_from_auth: bool,
|
||||
user_provided_tenant: Optional[str] = None,
|
||||
user_provided_database: Optional[str] = None,
|
||||
) -> Tuple[Optional[str], Optional[str]]:
|
||||
(
|
||||
new_tenant,
|
||||
new_database,
|
||||
) = _singleton_tenant_database_if_applicable(
|
||||
user_identity=user_identity,
|
||||
overwrite_singleton_tenant_database_access_from_auth=overwrite_singleton_tenant_database_access_from_auth,
|
||||
)
|
||||
|
||||
# The only error case is if the user provides a tenant and database that
|
||||
# don't match what we resolved from auth. This can incorrectly happen when
|
||||
# there is no auth provider set, but overwrite_singleton_tenant_database_access_from_auth
|
||||
# is set to True. In this case, we'll resolve tenant/database to the default
|
||||
# values, which might not match the provided values. Thus, it's important
|
||||
# to ensure that the flag is set to True only when there is an auth provider.
|
||||
if (
|
||||
user_provided_tenant
|
||||
and user_provided_tenant != DEFAULT_TENANT
|
||||
and new_tenant
|
||||
and new_tenant != user_provided_tenant
|
||||
):
|
||||
raise ChromaAuthError(f"Tenant {user_provided_tenant} does not match {new_tenant} from the server. Are you sure the tenant is correct?")
|
||||
if (
|
||||
user_provided_database
|
||||
and user_provided_database != DEFAULT_DATABASE
|
||||
and new_database
|
||||
and new_database != user_provided_database
|
||||
):
|
||||
raise ChromaAuthError(f"Database {user_provided_database} does not match {new_database} from the server. Are you sure the database is correct?")
|
||||
|
||||
if (
|
||||
not user_provided_tenant or user_provided_tenant == DEFAULT_TENANT
|
||||
) and new_tenant:
|
||||
user_provided_tenant = new_tenant
|
||||
if (
|
||||
not user_provided_database or user_provided_database == DEFAULT_DATABASE
|
||||
) and new_database:
|
||||
user_provided_database = new_database
|
||||
|
||||
return user_provided_tenant, user_provided_database
|
||||
Binary file not shown.
Reference in New Issue
Block a user