From d3a51621033dba9ccb3664dfd44a400e1de3f39f Mon Sep 17 00:00:00 2001 From: Ishaan Jaff Date: Wed, 28 Aug 2024 14:07:53 -0700 Subject: [PATCH] add checks for safe request body --- litellm/proxy/auth/user_api_key_auth.py | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/litellm/proxy/auth/user_api_key_auth.py b/litellm/proxy/auth/user_api_key_auth.py index 9623267ee3..7b1eb56786 100644 --- a/litellm/proxy/auth/user_api_key_auth.py +++ b/litellm/proxy/auth/user_api_key_auth.py @@ -54,6 +54,7 @@ from litellm.proxy.auth.auth_checks import ( get_org_object, get_team_object, get_user_object, + is_request_body_safe, log_to_opentelemetry, ) from litellm.proxy.auth.auth_utils import ( @@ -122,6 +123,9 @@ async def user_api_key_auth( try: route: str = get_request_route(request=request) + # get the request body + request_data = await _read_request_body(request=request) + is_request_body_safe(request_body=request_data) ### LiteLLM Enterprise Security Checks # Check 1. Check if request size is under max_request_size_mb @@ -353,9 +357,6 @@ async def user_api_key_auth( user_info=user_info, ) ) - # get the request body - request_data = await _read_request_body(request=request) - # run through common checks _ = common_checks( request_body=request_data, @@ -448,7 +449,6 @@ async def user_api_key_auth( ) ## Check END-USER OBJECT - request_data = await _read_request_body(request=request) _end_user_object = None end_user_params = {} if "user" in request_data: