mirror of https://github.com/kortix-ai/suna.git
290 lines
9.3 KiB
Python
290 lines
9.3 KiB
Python
from dotenv import load_dotenv
|
|
load_dotenv()
|
|
|
|
from fastapi import FastAPI, Request, HTTPException, Response, Depends, APIRouter
|
|
from fastapi.middleware.cors import CORSMiddleware
|
|
from fastapi.responses import JSONResponse, StreamingResponse
|
|
from services import redis
|
|
import sentry
|
|
from contextlib import asynccontextmanager
|
|
from agentpress.thread_manager import ThreadManager
|
|
from services.supabase import DBConnection
|
|
from datetime import datetime, timezone
|
|
from utils.config import config, EnvMode
|
|
import asyncio
|
|
from utils.logger import logger, structlog
|
|
import time
|
|
from collections import OrderedDict
|
|
|
|
from pydantic import BaseModel
|
|
import uuid
|
|
|
|
from agent import api as agent_api
|
|
|
|
from sandbox import api as sandbox_api
|
|
from services import billing as billing_api
|
|
from flags import api as feature_flags_api
|
|
from services import transcription as transcription_api
|
|
import sys
|
|
from services import email_api
|
|
from triggers import api as triggers_api
|
|
from services import api_keys_api
|
|
|
|
|
|
if sys.platform == "win32":
|
|
asyncio.set_event_loop_policy(asyncio.WindowsProactorEventLoopPolicy())
|
|
|
|
# Initialize managers
|
|
db = DBConnection()
|
|
instance_id = "single"
|
|
|
|
# Rate limiter state
|
|
ip_tracker = OrderedDict()
|
|
MAX_CONCURRENT_IPS = 25
|
|
|
|
@asynccontextmanager
|
|
async def lifespan(app: FastAPI):
|
|
logger.debug(f"Starting up FastAPI application with instance ID: {instance_id} in {config.ENV_MODE.value} mode")
|
|
try:
|
|
await db.initialize()
|
|
|
|
agent_api.initialize(
|
|
db,
|
|
instance_id
|
|
)
|
|
|
|
|
|
sandbox_api.initialize(db)
|
|
|
|
# Initialize Redis connection
|
|
from services import redis
|
|
try:
|
|
await redis.initialize_async()
|
|
logger.debug("Redis connection initialized successfully")
|
|
except Exception as e:
|
|
logger.error(f"Failed to initialize Redis connection: {e}")
|
|
# Continue without Redis - the application will handle Redis failures gracefully
|
|
|
|
# Start background tasks
|
|
# asyncio.create_task(agent_api.restore_running_agent_runs())
|
|
|
|
triggers_api.initialize(db)
|
|
pipedream_api.initialize(db)
|
|
credentials_api.initialize(db)
|
|
template_api.initialize(db)
|
|
composio_api.initialize(db)
|
|
|
|
yield
|
|
|
|
# Clean up agent resources
|
|
logger.debug("Cleaning up agent resources")
|
|
await agent_api.cleanup()
|
|
|
|
# Clean up Redis connection
|
|
try:
|
|
logger.debug("Closing Redis connection")
|
|
await redis.close()
|
|
logger.debug("Redis connection closed successfully")
|
|
except Exception as e:
|
|
logger.error(f"Error closing Redis connection: {e}")
|
|
|
|
# Clean up database connection
|
|
logger.debug("Disconnecting from database")
|
|
await db.disconnect()
|
|
except Exception as e:
|
|
logger.error(f"Error during application startup: {e}")
|
|
raise
|
|
|
|
app = FastAPI(lifespan=lifespan)
|
|
|
|
@app.middleware("http")
|
|
async def log_requests_middleware(request: Request, call_next):
|
|
structlog.contextvars.clear_contextvars()
|
|
|
|
request_id = str(uuid.uuid4())
|
|
start_time = time.time()
|
|
client_ip = request.client.host if request.client else "unknown"
|
|
method = request.method
|
|
path = request.url.path
|
|
query_params = str(request.query_params)
|
|
|
|
structlog.contextvars.bind_contextvars(
|
|
request_id=request_id,
|
|
client_ip=client_ip,
|
|
method=method,
|
|
path=path,
|
|
query_params=query_params
|
|
)
|
|
|
|
# Log the incoming request
|
|
logger.debug(f"Request started: {method} {path} from {client_ip} | Query: {query_params}")
|
|
|
|
try:
|
|
response = await call_next(request)
|
|
process_time = time.time() - start_time
|
|
logger.debug(f"Request completed: {method} {path} | Status: {response.status_code} | Time: {process_time:.2f}s")
|
|
return response
|
|
except Exception as e:
|
|
process_time = time.time() - start_time
|
|
logger.error(f"Request failed: {method} {path} | Error: {str(e)} | Time: {process_time:.2f}s")
|
|
raise
|
|
|
|
# Define allowed origins based on environment
|
|
allowed_origins = ["https://www.suna.so", "https://suna.so"]
|
|
allow_origin_regex = None
|
|
|
|
# Add Claude Code origins for MCP
|
|
allowed_origins.extend([
|
|
"https://claude.ai",
|
|
"https://www.claude.ai",
|
|
"https://app.claude.ai",
|
|
"http://localhost",
|
|
"http://127.0.0.1",
|
|
"http://192.168.1.1"
|
|
])
|
|
|
|
# Add wildcard for local development and Claude Code CLI
|
|
allow_origin_regex = r"https://.*\.claude\.ai|http://localhost.*|http://127\.0\.0\.1.*|http://192\.168\..*|http://10\..*"
|
|
|
|
# Add local environment origins
|
|
if config.ENV_MODE == EnvMode.LOCAL:
|
|
allowed_origins.append("http://localhost:3000")
|
|
|
|
# Add staging-specific origins
|
|
if config.ENV_MODE == EnvMode.STAGING:
|
|
allowed_origins.append("https://staging.suna.so")
|
|
allowed_origins.append("http://localhost:3000")
|
|
allow_origin_regex = r"https://suna-.*-prjcts\.vercel\.app"
|
|
|
|
app.add_middleware(
|
|
CORSMiddleware,
|
|
allow_origins=allowed_origins,
|
|
allow_origin_regex=allow_origin_regex,
|
|
allow_credentials=True,
|
|
allow_methods=["GET", "POST", "PUT", "PATCH", "DELETE", "OPTIONS"],
|
|
allow_headers=["Content-Type", "Authorization", "X-Project-Id", "X-MCP-URL", "X-MCP-Type", "X-MCP-Headers", "X-Refresh-Token", "X-API-Key", "Mcp-Session-Id"],
|
|
)
|
|
|
|
# Create a main API router
|
|
api_router = APIRouter()
|
|
|
|
# Include all API routers without individual prefixes
|
|
api_router.include_router(agent_api.router)
|
|
api_router.include_router(sandbox_api.router)
|
|
api_router.include_router(billing_api.router)
|
|
api_router.include_router(feature_flags_api.router)
|
|
api_router.include_router(api_keys_api.router)
|
|
|
|
from mcp_module import api as mcp_api
|
|
from credentials import api as credentials_api
|
|
from templates import api as template_api
|
|
|
|
api_router.include_router(mcp_api.router)
|
|
api_router.include_router(credentials_api.router, prefix="/secure-mcp")
|
|
api_router.include_router(template_api.router, prefix="/templates")
|
|
|
|
api_router.include_router(transcription_api.router)
|
|
api_router.include_router(email_api.router)
|
|
|
|
from knowledge_base import api as knowledge_base_api
|
|
api_router.include_router(knowledge_base_api.router)
|
|
|
|
api_router.include_router(triggers_api.router)
|
|
|
|
from pipedream import api as pipedream_api
|
|
api_router.include_router(pipedream_api.router)
|
|
|
|
# MFA functionality moved to frontend
|
|
|
|
|
|
|
|
from admin import api as admin_api
|
|
api_router.include_router(admin_api.router)
|
|
|
|
from composio_integration import api as composio_api
|
|
api_router.include_router(composio_api.router)
|
|
|
|
# Include MCP Kortix Layer
|
|
from mcp_kortix_layer import mcp_router
|
|
api_router.include_router(mcp_router)
|
|
|
|
# Add OAuth discovery endpoints at root level for Claude Code MCP
|
|
@api_router.get("/.well-known/oauth-authorization-server")
|
|
async def oauth_authorization_server():
|
|
"""OAuth authorization server metadata for Claude Code MCP"""
|
|
return {
|
|
"issuer": "https://api2.restoned.app",
|
|
"authorization_endpoint": "https://api2.restoned.app/api/mcp/oauth/authorize",
|
|
"token_endpoint": "https://api2.restoned.app/api/mcp/oauth/token",
|
|
"registration_endpoint": "https://api2.restoned.app/register",
|
|
"response_types_supported": ["code"],
|
|
"grant_types_supported": ["authorization_code"],
|
|
"token_endpoint_auth_methods_supported": ["none"]
|
|
}
|
|
|
|
@api_router.get("/.well-known/oauth-protected-resource")
|
|
async def oauth_protected_resource():
|
|
"""OAuth protected resource metadata for Claude Code MCP"""
|
|
return {
|
|
"resource": "https://api2.restoned.app/api/mcp",
|
|
"authorization_servers": ["https://api2.restoned.app"]
|
|
}
|
|
|
|
@api_router.post("/register")
|
|
async def oauth_register():
|
|
"""OAuth client registration for Claude Code MCP"""
|
|
return {
|
|
"client_id": "claude-code-mcp-client",
|
|
"client_secret": "not-required-for-api-key-auth",
|
|
"message": "AgentPress MCP uses API key authentication - provide your key via Authorization header"
|
|
}
|
|
|
|
@api_router.get("/health")
|
|
async def health_check():
|
|
logger.debug("Health check endpoint called")
|
|
return {
|
|
"status": "ok",
|
|
"timestamp": datetime.now(timezone.utc).isoformat(),
|
|
"instance_id": instance_id
|
|
}
|
|
|
|
@api_router.get("/health-docker")
|
|
async def health_check():
|
|
logger.debug("Health docker check endpoint called")
|
|
try:
|
|
client = await redis.get_client()
|
|
await client.ping()
|
|
db = DBConnection()
|
|
await db.initialize()
|
|
db_client = await db.client
|
|
await db_client.table("threads").select("thread_id").limit(1).execute()
|
|
logger.debug("Health docker check complete")
|
|
return {
|
|
"status": "ok",
|
|
"timestamp": datetime.now(timezone.utc).isoformat(),
|
|
"instance_id": instance_id
|
|
}
|
|
except Exception as e:
|
|
logger.error(f"Failed health docker check: {e}")
|
|
raise HTTPException(status_code=500, detail="Health check failed")
|
|
|
|
|
|
app.include_router(api_router, prefix="/api")
|
|
|
|
|
|
if __name__ == "__main__":
|
|
import uvicorn
|
|
|
|
if sys.platform == "win32":
|
|
asyncio.set_event_loop_policy(asyncio.WindowsProactorEventLoopPolicy())
|
|
|
|
workers = 4
|
|
|
|
logger.debug(f"Starting server on 0.0.0.0:8000 with {workers} workers")
|
|
uvicorn.run(
|
|
"api:app",
|
|
host="0.0.0.0",
|
|
port=8000,
|
|
workers=workers,
|
|
loop="asyncio"
|
|
) |