dify/api/core/helper/code_executor
Devbyteai 26444d8b6c fix(template-transform): use base64 encoding for Jinja2 templates
When Jinja2 templates containing special characters (quotes, newlines)
were embedded directly in the generated Python script using triple-quoted
strings, the script would break. This fix encodes the template as base64
before embedding, then decodes it at runtime.

Root cause: Templates were inserted via string replacement into a Python
script like `jinja2.Template('''...''')`. If the template contained `'''`,
the generated script had a syntax error.

Solution: Add serialize_code() method to base64-encode templates, then
override assemble_runner_script() in Jinja2TemplateTransformer to use
the encoded template with runtime decoding.

This specifically affects Jinja2 templates - Python3 and JavaScript
transformers insert user code at the top level (not inside strings),
so they don't have this vulnerability.

Fixes #26818
2025-12-26 20:08:12 +02:00
..
javascript Fix/template transformer line number (#27867) 2025-11-05 15:21:47 +08:00
jinja2 fix(template-transform): use base64 encoding for Jinja2 templates 2025-12-26 20:08:12 +02:00
python3 Fix/template transformer line number (#27867) 2025-11-05 15:21:47 +08:00
__init__.py refactor(code_executor): update input type annotations to use Mapping for better type safety (#10478) 2024-11-11 13:10:39 +08:00
code_executor.py Refactor: centralize node data hydration (#27771) 2025-11-27 15:41:56 +08:00
code_node_provider.py feat: knowledge pipeline (#25360) 2025-09-18 12:49:10 +08:00
template_transformer.py fix(template-transform): use base64 encoding for Jinja2 templates 2025-12-26 20:08:12 +02:00