Login endpoint Part 2 - support 3 types of credentials and fix bugs (#2999)

This commit is contained in:
Shuchang Zheng
2025-07-21 00:27:04 -07:00
committed by GitHub
parent 6f48309c75
commit 85857e548d
2 changed files with 80 additions and 39 deletions

View File

@@ -10,14 +10,17 @@ from skyvern.forge.sdk.core import skyvern_context
from skyvern.forge.sdk.routes.routers import base_router
from skyvern.forge.sdk.schemas.organizations import Organization
from skyvern.forge.sdk.services import org_auth_service
from skyvern.forge.sdk.workflow.models.parameter import WorkflowParameterType
from skyvern.forge.sdk.workflow.models.workflow import WorkflowRequestBody
from skyvern.forge.sdk.workflow.models.yaml import (
CredentialParameterYAML,
BitwardenLoginCredentialParameterYAML,
LoginBlockYAML,
OnePasswordCredentialParameterYAML,
WorkflowCreateYAMLRequest,
WorkflowDefinitionYAML,
WorkflowParameterYAML,
)
from skyvern.schemas.run_blocks import LoginRequest
from skyvern.schemas.run_blocks import CredentialType, LoginRequest
from skyvern.schemas.runs import ProxyLocation, RunType, WorkflowRunRequest, WorkflowRunResponse
from skyvern.services import workflow_service
@@ -40,11 +43,6 @@ async def login(
organization: Organization = Depends(org_auth_service.get_current_org),
x_api_key: Annotated[str | None, Header()] = None,
) -> WorkflowRunResponse:
# 0. validate credential
credential = await app.DATABASE.get_credential(login_request.credential_id, organization.organization_id)
if not credential:
raise HTTPException(status_code=404, detail=f"Credential {login_request.credential_id} not found")
# 1. create empty workflow with a credential parameter
new_workflow = await app.WORKFLOW_SERVICE.create_empty_workflow(
organization,
@@ -53,38 +51,55 @@ async def login(
max_screenshot_scrolling_times=login_request.max_screenshot_scrolling_times,
extra_http_headers=login_request.extra_http_headers,
)
workflow_run = await app.WORKFLOW_SERVICE.setup_workflow_run(
request_id=None,
workflow_request=WorkflowRequestBody(
max_screenshot_scrolls=login_request.max_screenshot_scrolling_times,
browser_session_id=login_request.browser_session_id,
extra_http_headers=login_request.extra_http_headers,
),
workflow_permanent_id=new_workflow.workflow_permanent_id,
organization=organization,
version=None,
max_steps_override=10,
parent_workflow_run_id=None,
)
# 2. add a login block to the workflow
label = "login"
yaml_parameters = []
parameter_key = "credential"
if login_request.credential_type == CredentialType.skyvern:
credential = await app.DATABASE.get_credential(login_request.credential_id, organization.organization_id)
if not credential:
raise HTTPException(status_code=404, detail=f"Credential {login_request.credential_id} not found")
yaml_parameters = [
WorkflowParameterYAML(
key=parameter_key,
workflow_parameter_type=WorkflowParameterType.CREDENTIAL_ID,
description="The ID of the credential to use for login",
default_value=login_request.credential_id,
)
]
elif login_request.credential_type == CredentialType.bitwarden:
yaml_parameters = [
BitwardenLoginCredentialParameterYAML(
key=parameter_key,
collection_id=login_request.collection_id,
item_id=login_request.item_id,
url=login_request.url,
description="The ID of the bitwarden collection to use for login",
bitwarden_client_id_aws_secret_key="SKYVERN_BITWARDEN_CLIENT_ID",
bitwarden_client_secret_aws_secret_key="SKYVERN_BITWARDEN_CLIENT_SECRET",
bitwarden_master_password_aws_secret_key="SKYVERN_BITWARDEN_MASTER_PASSWORD",
)
]
elif login_request.credential_type == CredentialType.onepassword:
yaml_parameters = [
OnePasswordCredentialParameterYAML(
key=parameter_key,
vault_id=login_request.vault_id,
item_id=login_request.item_id,
)
]
login_block_yaml = LoginBlockYAML(
label=label,
title=label,
url=login_request.url,
navigation_goal=login_request.prompt or DEFAULT_LOGIN_PROMPT,
max_steps_per_run=10,
parameter_keys=[login_request.credential_id],
parameter_keys=[parameter_key],
totp_verification_url=login_request.totp_url,
totp_identifier=login_request.totp_identifier,
)
yaml_parameters = [
CredentialParameterYAML(
name="credential_id",
type="workflow",
description="The ID of the credential to use for login",
)
]
yaml_blocks = [login_block_yaml]
workflow_definition_yaml = WorkflowDefinitionYAML(
parameters=yaml_parameters,
@@ -105,14 +120,11 @@ async def login(
)
LOG.info("Workflow created", workflow_id=workflow.workflow_id)
# 3. create and run workflow with the credential_id
workflow_id = new_workflow.workflow_id
# 3. create and run workflow with the credential
workflow_id = new_workflow.workflow_permanent_id
context = skyvern_context.ensure_context()
request_id = context.request_id
legacy_workflow_request = WorkflowRequestBody(
data={
"credential_id": login_request.credential_id,
},
proxy_location=login_request.proxy_location,
webhook_callback_url=login_request.webhook_url,
totp_identifier=login_request.totp_identifier,
@@ -146,9 +158,6 @@ async def login(
modified_at=workflow_run.modified_at,
run_request=WorkflowRunRequest(
workflow_id=new_workflow.workflow_id,
parameters={
"credential_id": login_request.credential_id,
},
title=new_workflow.title,
proxy_location=login_request.proxy_location,
webhook_url=login_request.webhook_url,

View File

@@ -1,10 +1,18 @@
from pydantic import BaseModel
from enum import StrEnum
from typing import Annotated, Literal, Union
from pydantic import BaseModel, Field
from skyvern.schemas.runs import ProxyLocation
class LoginRequest(BaseModel):
credential_id: str
class CredentialType(StrEnum):
skyvern = "skyvern"
bitwarden = "bitwarden"
onepassword = "1password"
class LoginRequestBase(BaseModel):
url: str | None = None
prompt: str | None = None
webhook_url: str | None = None
@@ -14,3 +22,27 @@ class LoginRequest(BaseModel):
browser_session_id: str | None = None
extra_http_headers: dict[str, str] | None = None
max_screenshot_scrolling_times: int | None = None
class SkyvernCredentialLoginRequest(LoginRequestBase):
credential_type: Literal[CredentialType.skyvern] = CredentialType.skyvern
credential_id: str
class BitwardenLoginRequest(LoginRequestBase):
credential_type: Literal[CredentialType.bitwarden] = CredentialType.bitwarden
collection_id: str | None = None
item_id: str | None = None
url: str | None = None
class OnePasswordLoginRequest(LoginRequestBase):
credential_type: Literal[CredentialType.onepassword] = CredentialType.onepassword
vault_id: str
item_id: str
LoginRequest = Annotated[
Union[SkyvernCredentialLoginRequest, BitwardenLoginRequest, OnePasswordLoginRequest],
Field(discriminator="credential_type"),
]