| 12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025 |
- import json
- import logging
- import mimetypes
- import time
- from collections.abc import Generator, Mapping
- from os import listdir, path
- from threading import Lock
- from typing import TYPE_CHECKING, Any, Literal, Optional, Union, cast
-
- import sqlalchemy as sa
- from pydantic import TypeAdapter
- from sqlalchemy import select
- from sqlalchemy.orm import Session
- from yarl import URL
-
- import contexts
- from configs import dify_config
- from core.agent.entities import AgentToolEntity
- from core.app.entities.app_invoke_entities import InvokeFrom
- from core.helper.module_import_helper import load_single_subclass_from_source
- from core.helper.position_helper import is_filtered
- from core.helper.provider_cache import ToolProviderCredentialsCache
- from core.model_runtime.utils.encoders import jsonable_encoder
- from core.tools.__base.tool import Tool
- from core.tools.__base.tool_provider import ToolProviderController
- from core.tools.__base.tool_runtime import ToolRuntime
- from core.tools.builtin_tool.provider import BuiltinToolProviderController
- from core.tools.builtin_tool.providers._positions import BuiltinToolProviderSort
- from core.tools.builtin_tool.tool import BuiltinTool
- from core.tools.custom_tool.provider import ApiToolProviderController
- from core.tools.custom_tool.tool import ApiTool
- from core.tools.entities.api_entities import ToolProviderApiEntity, ToolProviderTypeApiLiteral
- from core.tools.entities.common_entities import I18nObject
- from core.tools.entities.tool_entities import (
- ApiProviderAuthType,
- CredentialType,
- ToolInvokeFrom,
- ToolParameter,
- ToolProviderType,
- )
- from core.tools.errors import ToolProviderNotFoundError
- from core.tools.mcp_tool.provider import MCPToolProviderController
- from core.tools.mcp_tool.tool import MCPTool
- from core.tools.plugin_tool.provider import PluginToolProviderController
- from core.tools.plugin_tool.tool import PluginTool
- from core.tools.tool_label_manager import ToolLabelManager
- from core.tools.utils.configuration import (
- ToolParameterConfigurationManager,
- )
- from core.tools.utils.encryption import create_provider_encrypter, create_tool_provider_encrypter
- from core.tools.utils.uuid_utils import is_valid_uuid
- from core.tools.workflow_as_tool.provider import WorkflowToolProviderController
- from core.tools.workflow_as_tool.tool import WorkflowTool
- from extensions.ext_database import db
- from models.provider_ids import ToolProviderID
- from models.tools import ApiToolProvider, BuiltinToolProvider, MCPToolProvider, WorkflowToolProvider
- from services.tools.mcp_tools_manage_service import MCPToolManageService
- from services.tools.tools_transform_service import ToolTransformService
-
- if TYPE_CHECKING:
- from core.workflow.entities import VariablePool
- from core.workflow.nodes.tool.entities import ToolEntity
-
- logger = logging.getLogger(__name__)
-
-
- class ToolManager:
- _builtin_provider_lock = Lock()
- _hardcoded_providers: dict[str, BuiltinToolProviderController] = {}
- _builtin_providers_loaded = False
- _builtin_tools_labels: dict[str, Union[I18nObject, None]] = {}
-
- @classmethod
- def get_hardcoded_provider(cls, provider: str) -> BuiltinToolProviderController:
- """
-
- get the hardcoded provider
-
- """
-
- if len(cls._hardcoded_providers) == 0:
- # init the builtin providers
- cls.load_hardcoded_providers_cache()
-
- return cls._hardcoded_providers[provider]
-
- @classmethod
- def get_builtin_provider(
- cls, provider: str, tenant_id: str
- ) -> BuiltinToolProviderController | PluginToolProviderController:
- """
- get the builtin provider
-
- :param provider: the name of the provider
- :param tenant_id: the id of the tenant
- :return: the provider
- """
- # split provider to
-
- if len(cls._hardcoded_providers) == 0:
- # init the builtin providers
- cls.load_hardcoded_providers_cache()
-
- if provider not in cls._hardcoded_providers:
- # get plugin provider
- plugin_provider = cls.get_plugin_provider(provider, tenant_id)
- if plugin_provider:
- return plugin_provider
-
- return cls._hardcoded_providers[provider]
-
- @classmethod
- def get_plugin_provider(cls, provider: str, tenant_id: str) -> PluginToolProviderController:
- """
- get the plugin provider
- """
- # check if context is set
- from core.plugin.impl.tool import PluginToolManager
-
- try:
- contexts.plugin_tool_providers.get()
- except LookupError:
- contexts.plugin_tool_providers.set({})
- contexts.plugin_tool_providers_lock.set(Lock())
-
- plugin_tool_providers = contexts.plugin_tool_providers.get()
- if provider in plugin_tool_providers:
- return plugin_tool_providers[provider]
-
- with contexts.plugin_tool_providers_lock.get():
- # double check
- plugin_tool_providers = contexts.plugin_tool_providers.get()
- if provider in plugin_tool_providers:
- return plugin_tool_providers[provider]
-
- manager = PluginToolManager()
- provider_entity = manager.fetch_tool_provider(tenant_id, provider)
- if not provider_entity:
- raise ToolProviderNotFoundError(f"plugin provider {provider} not found")
-
- controller = PluginToolProviderController(
- entity=provider_entity.declaration,
- plugin_id=provider_entity.plugin_id,
- plugin_unique_identifier=provider_entity.plugin_unique_identifier,
- tenant_id=tenant_id,
- )
-
- plugin_tool_providers[provider] = controller
- return controller
-
- @classmethod
- def get_tool_runtime(
- cls,
- provider_type: ToolProviderType,
- provider_id: str,
- tool_name: str,
- tenant_id: str,
- invoke_from: InvokeFrom = InvokeFrom.DEBUGGER,
- tool_invoke_from: ToolInvokeFrom = ToolInvokeFrom.AGENT,
- credential_id: Optional[str] = None,
- ) -> Union[BuiltinTool, PluginTool, ApiTool, WorkflowTool, MCPTool]:
- """
- get the tool runtime
-
- :param provider_type: the type of the provider
- :param provider_id: the id of the provider
- :param tool_name: the name of the tool
- :param tenant_id: the tenant id
- :param invoke_from: invoke from
- :param tool_invoke_from: the tool invoke from
- :param credential_id: the credential id
-
- :return: the tool
- """
-
- if provider_type == ToolProviderType.BUILT_IN:
- # check if the builtin tool need credentials
- provider_controller = cls.get_builtin_provider(provider_id, tenant_id)
-
- builtin_tool = provider_controller.get_tool(tool_name)
- if not builtin_tool:
- raise ToolProviderNotFoundError(f"builtin tool {tool_name} not found")
-
- if not provider_controller.need_credentials:
- return cast(
- BuiltinTool,
- builtin_tool.fork_tool_runtime(
- runtime=ToolRuntime(
- tenant_id=tenant_id,
- credentials={},
- invoke_from=invoke_from,
- tool_invoke_from=tool_invoke_from,
- )
- ),
- )
- builtin_provider = None
- if isinstance(provider_controller, PluginToolProviderController):
- provider_id_entity = ToolProviderID(provider_id)
- # get specific credentials
- if is_valid_uuid(credential_id):
- try:
- builtin_provider_stmt = select(BuiltinToolProvider).where(
- BuiltinToolProvider.tenant_id == tenant_id,
- BuiltinToolProvider.id == credential_id,
- )
- builtin_provider = db.session.scalar(builtin_provider_stmt)
- except Exception as e:
- builtin_provider = None
- logger.info("Error getting builtin provider %s:%s", credential_id, e, exc_info=True)
- # if the provider has been deleted, raise an error
- if builtin_provider is None:
- raise ToolProviderNotFoundError(f"provider has been deleted: {credential_id}")
-
- # fallback to the default provider
- if builtin_provider is None:
- # use the default provider
- with Session(db.engine) as session:
- builtin_provider = session.scalar(
- sa.select(BuiltinToolProvider)
- .where(
- BuiltinToolProvider.tenant_id == tenant_id,
- (BuiltinToolProvider.provider == str(provider_id_entity))
- | (BuiltinToolProvider.provider == provider_id_entity.provider_name),
- )
- .order_by(BuiltinToolProvider.is_default.desc(), BuiltinToolProvider.created_at.asc())
- )
- if builtin_provider is None:
- raise ToolProviderNotFoundError(f"no default provider for {provider_id}")
- else:
- builtin_provider = (
- db.session.query(BuiltinToolProvider)
- .where(BuiltinToolProvider.tenant_id == tenant_id, (BuiltinToolProvider.provider == provider_id))
- .order_by(BuiltinToolProvider.is_default.desc(), BuiltinToolProvider.created_at.asc())
- .first()
- )
-
- if builtin_provider is None:
- raise ToolProviderNotFoundError(f"builtin provider {provider_id} not found")
-
- encrypter, cache = create_provider_encrypter(
- tenant_id=tenant_id,
- config=[
- x.to_basic_provider_config()
- for x in provider_controller.get_credentials_schema_by_type(builtin_provider.credential_type)
- ],
- cache=ToolProviderCredentialsCache(
- tenant_id=tenant_id, provider=provider_id, credential_id=builtin_provider.id
- ),
- )
-
- # decrypt the credentials
- decrypted_credentials: Mapping[str, Any] = encrypter.decrypt(builtin_provider.credentials)
-
- # check if the credentials is expired
- if builtin_provider.expires_at != -1 and (builtin_provider.expires_at - 60) < int(time.time()):
- # TODO: circular import
- from core.plugin.impl.oauth import OAuthHandler
- from services.tools.builtin_tools_manage_service import BuiltinToolManageService
-
- # refresh the credentials
- tool_provider = ToolProviderID(provider_id)
- provider_name = tool_provider.provider_name
- redirect_uri = f"{dify_config.CONSOLE_API_URL}/console/api/oauth/plugin/{provider_id}/tool/callback"
- system_credentials = BuiltinToolManageService.get_oauth_client(tenant_id, provider_id)
-
- oauth_handler = OAuthHandler()
- # refresh the credentials
- refreshed_credentials = oauth_handler.refresh_credentials(
- tenant_id=tenant_id,
- user_id=builtin_provider.user_id,
- plugin_id=tool_provider.plugin_id,
- provider=provider_name,
- redirect_uri=redirect_uri,
- system_credentials=system_credentials or {},
- credentials=decrypted_credentials,
- )
- # update the credentials
- builtin_provider.encrypted_credentials = (
- TypeAdapter(dict[str, Any])
- .dump_json(encrypter.encrypt(dict(refreshed_credentials.credentials)))
- .decode("utf-8")
- )
- builtin_provider.expires_at = refreshed_credentials.expires_at
- db.session.commit()
- decrypted_credentials = refreshed_credentials.credentials
- cache.delete()
-
- return cast(
- BuiltinTool,
- builtin_tool.fork_tool_runtime(
- runtime=ToolRuntime(
- tenant_id=tenant_id,
- credentials=dict(decrypted_credentials),
- credential_type=CredentialType.of(builtin_provider.credential_type),
- runtime_parameters={},
- invoke_from=invoke_from,
- tool_invoke_from=tool_invoke_from,
- )
- ),
- )
-
- elif provider_type == ToolProviderType.API:
- api_provider, credentials = cls.get_api_provider_controller(tenant_id, provider_id)
- encrypter, _ = create_tool_provider_encrypter(
- tenant_id=tenant_id,
- controller=api_provider,
- )
- return api_provider.get_tool(tool_name).fork_tool_runtime(
- runtime=ToolRuntime(
- tenant_id=tenant_id,
- credentials=encrypter.decrypt(credentials),
- invoke_from=invoke_from,
- tool_invoke_from=tool_invoke_from,
- )
- )
- elif provider_type == ToolProviderType.WORKFLOW:
- workflow_provider_stmt = select(WorkflowToolProvider).where(
- WorkflowToolProvider.tenant_id == tenant_id, WorkflowToolProvider.id == provider_id
- )
- workflow_provider = db.session.scalar(workflow_provider_stmt)
-
- if workflow_provider is None:
- raise ToolProviderNotFoundError(f"workflow provider {provider_id} not found")
-
- controller = ToolTransformService.workflow_provider_to_controller(db_provider=workflow_provider)
- controller_tools: list[WorkflowTool] = controller.get_tools(tenant_id=workflow_provider.tenant_id)
- if controller_tools is None or len(controller_tools) == 0:
- raise ToolProviderNotFoundError(f"workflow provider {provider_id} not found")
-
- return controller.get_tools(tenant_id=workflow_provider.tenant_id)[0].fork_tool_runtime(
- runtime=ToolRuntime(
- tenant_id=tenant_id,
- credentials={},
- invoke_from=invoke_from,
- tool_invoke_from=tool_invoke_from,
- )
- )
- elif provider_type == ToolProviderType.APP:
- raise NotImplementedError("app provider not implemented")
- elif provider_type == ToolProviderType.PLUGIN:
- return cls.get_plugin_provider(provider_id, tenant_id).get_tool(tool_name)
- elif provider_type == ToolProviderType.MCP:
- return cls.get_mcp_provider_controller(tenant_id, provider_id).get_tool(tool_name)
- else:
- raise ToolProviderNotFoundError(f"provider type {provider_type.value} not found")
-
- @classmethod
- def get_agent_tool_runtime(
- cls,
- tenant_id: str,
- app_id: str,
- agent_tool: AgentToolEntity,
- invoke_from: InvokeFrom = InvokeFrom.DEBUGGER,
- variable_pool: Optional["VariablePool"] = None,
- ) -> Tool:
- """
- get the agent tool runtime
- """
- tool_entity = cls.get_tool_runtime(
- provider_type=agent_tool.provider_type,
- provider_id=agent_tool.provider_id,
- tool_name=agent_tool.tool_name,
- tenant_id=tenant_id,
- invoke_from=invoke_from,
- tool_invoke_from=ToolInvokeFrom.AGENT,
- credential_id=agent_tool.credential_id,
- )
- runtime_parameters = {}
- parameters = tool_entity.get_merged_runtime_parameters()
- runtime_parameters = cls._convert_tool_parameters_type(
- parameters, variable_pool, agent_tool.tool_parameters, typ="agent"
- )
- # decrypt runtime parameters
- encryption_manager = ToolParameterConfigurationManager(
- tenant_id=tenant_id,
- tool_runtime=tool_entity,
- provider_name=agent_tool.provider_id,
- provider_type=agent_tool.provider_type,
- identity_id=f"AGENT.{app_id}",
- )
- runtime_parameters = encryption_manager.decrypt_tool_parameters(runtime_parameters)
- if tool_entity.runtime is None or tool_entity.runtime.runtime_parameters is None:
- raise ValueError("runtime not found or runtime parameters not found")
-
- tool_entity.runtime.runtime_parameters.update(runtime_parameters)
- return tool_entity
-
- @classmethod
- def get_workflow_tool_runtime(
- cls,
- tenant_id: str,
- app_id: str,
- node_id: str,
- workflow_tool: "ToolEntity",
- invoke_from: InvokeFrom = InvokeFrom.DEBUGGER,
- variable_pool: Optional["VariablePool"] = None,
- ) -> Tool:
- """
- get the workflow tool runtime
- """
-
- tool_runtime = cls.get_tool_runtime(
- provider_type=workflow_tool.provider_type,
- provider_id=workflow_tool.provider_id,
- tool_name=workflow_tool.tool_name,
- tenant_id=tenant_id,
- invoke_from=invoke_from,
- tool_invoke_from=ToolInvokeFrom.WORKFLOW,
- credential_id=workflow_tool.credential_id,
- )
-
- parameters = tool_runtime.get_merged_runtime_parameters()
- runtime_parameters = cls._convert_tool_parameters_type(
- parameters, variable_pool, workflow_tool.tool_configurations, typ="workflow"
- )
- # decrypt runtime parameters
- encryption_manager = ToolParameterConfigurationManager(
- tenant_id=tenant_id,
- tool_runtime=tool_runtime,
- provider_name=workflow_tool.provider_id,
- provider_type=workflow_tool.provider_type,
- identity_id=f"WORKFLOW.{app_id}.{node_id}",
- )
-
- if runtime_parameters:
- runtime_parameters = encryption_manager.decrypt_tool_parameters(runtime_parameters)
-
- tool_runtime.runtime.runtime_parameters.update(runtime_parameters)
- return tool_runtime
-
- @classmethod
- def get_tool_runtime_from_plugin(
- cls,
- tool_type: ToolProviderType,
- tenant_id: str,
- provider: str,
- tool_name: str,
- tool_parameters: dict[str, Any],
- credential_id: Optional[str] = None,
- ) -> Tool:
- """
- get tool runtime from plugin
- """
- tool_entity = cls.get_tool_runtime(
- provider_type=tool_type,
- provider_id=provider,
- tool_name=tool_name,
- tenant_id=tenant_id,
- invoke_from=InvokeFrom.SERVICE_API,
- tool_invoke_from=ToolInvokeFrom.PLUGIN,
- credential_id=credential_id,
- )
- runtime_parameters = {}
- parameters = tool_entity.get_merged_runtime_parameters()
- for parameter in parameters:
- if parameter.form == ToolParameter.ToolParameterForm.FORM:
- # save tool parameter to tool entity memory
- value = parameter.init_frontend_parameter(tool_parameters.get(parameter.name))
- runtime_parameters[parameter.name] = value
-
- tool_entity.runtime.runtime_parameters.update(runtime_parameters)
- return tool_entity
-
- @classmethod
- def get_hardcoded_provider_icon(cls, provider: str) -> tuple[str, str]:
- """
- get the absolute path of the icon of the hardcoded provider
-
- :param provider: the name of the provider
- :return: the absolute path of the icon, the mime type of the icon
- """
- # get provider
- provider_controller = cls.get_hardcoded_provider(provider)
-
- absolute_path = path.join(
- path.dirname(path.realpath(__file__)),
- "builtin_tool",
- "providers",
- provider,
- "_assets",
- provider_controller.entity.identity.icon,
- )
- # check if the icon exists
- if not path.exists(absolute_path):
- raise ToolProviderNotFoundError(f"builtin provider {provider} icon not found")
-
- # get the mime type
- mime_type, _ = mimetypes.guess_type(absolute_path)
- mime_type = mime_type or "application/octet-stream"
-
- return absolute_path, mime_type
-
- @classmethod
- def list_hardcoded_providers(cls):
- # use cache first
- if cls._builtin_providers_loaded:
- yield from list(cls._hardcoded_providers.values())
- return
-
- with cls._builtin_provider_lock:
- if cls._builtin_providers_loaded:
- yield from list(cls._hardcoded_providers.values())
- return
-
- yield from cls._list_hardcoded_providers()
-
- @classmethod
- def list_plugin_providers(cls, tenant_id: str) -> list[PluginToolProviderController]:
- """
- list all the plugin providers
- """
- from core.plugin.impl.tool import PluginToolManager
-
- manager = PluginToolManager()
- provider_entities = manager.fetch_tool_providers(tenant_id)
- return [
- PluginToolProviderController(
- entity=provider.declaration,
- plugin_id=provider.plugin_id,
- plugin_unique_identifier=provider.plugin_unique_identifier,
- tenant_id=tenant_id,
- )
- for provider in provider_entities
- ]
-
- @classmethod
- def list_builtin_providers(
- cls, tenant_id: str
- ) -> Generator[BuiltinToolProviderController | PluginToolProviderController, None, None]:
- """
- list all the builtin providers
- """
- yield from cls.list_hardcoded_providers()
- # get plugin providers
- yield from cls.list_plugin_providers(tenant_id)
-
- @classmethod
- def _list_hardcoded_providers(cls) -> Generator[BuiltinToolProviderController, None, None]:
- """
- list all the builtin providers
- """
- for provider_path in listdir(path.join(path.dirname(path.realpath(__file__)), "builtin_tool", "providers")):
- if provider_path.startswith("__"):
- continue
-
- if path.isdir(path.join(path.dirname(path.realpath(__file__)), "builtin_tool", "providers", provider_path)):
- if provider_path.startswith("__"):
- continue
-
- # init provider
- try:
- provider_class = load_single_subclass_from_source(
- module_name=f"core.tools.builtin_tool.providers.{provider_path}.{provider_path}",
- script_path=path.join(
- path.dirname(path.realpath(__file__)),
- "builtin_tool",
- "providers",
- provider_path,
- f"{provider_path}.py",
- ),
- parent_type=BuiltinToolProviderController,
- )
- provider: BuiltinToolProviderController = provider_class()
- cls._hardcoded_providers[provider.entity.identity.name] = provider
- for tool in provider.get_tools():
- cls._builtin_tools_labels[tool.entity.identity.name] = tool.entity.identity.label
- yield provider
-
- except Exception:
- logger.exception("load builtin provider %s", provider_path)
- continue
- # set builtin providers loaded
- cls._builtin_providers_loaded = True
-
- @classmethod
- def load_hardcoded_providers_cache(cls):
- for _ in cls.list_hardcoded_providers():
- pass
-
- @classmethod
- def clear_hardcoded_providers_cache(cls):
- cls._hardcoded_providers = {}
- cls._builtin_providers_loaded = False
-
- @classmethod
- def get_tool_label(cls, tool_name: str) -> Union[I18nObject, None]:
- """
- get the tool label
-
- :param tool_name: the name of the tool
-
- :return: the label of the tool
- """
- if len(cls._builtin_tools_labels) == 0:
- # init the builtin providers
- cls.load_hardcoded_providers_cache()
-
- if tool_name not in cls._builtin_tools_labels:
- return None
-
- return cls._builtin_tools_labels[tool_name]
-
- @classmethod
- def list_default_builtin_providers(cls, tenant_id: str) -> list[BuiltinToolProvider]:
- """
- list all the builtin providers
- """
- # according to multi credentials, select the one with is_default=True first, then created_at oldest
- # for compatibility with old version
- sql = """
- SELECT DISTINCT ON (tenant_id, provider) id
- FROM tool_builtin_providers
- WHERE tenant_id = :tenant_id
- ORDER BY tenant_id, provider, is_default DESC, created_at DESC
- """
- with Session(db.engine, autoflush=False) as session:
- ids = [row.id for row in session.execute(sa.text(sql), {"tenant_id": tenant_id}).all()]
- return session.query(BuiltinToolProvider).where(BuiltinToolProvider.id.in_(ids)).all()
-
- @classmethod
- def list_providers_from_api(
- cls, user_id: str, tenant_id: str, typ: ToolProviderTypeApiLiteral
- ) -> list[ToolProviderApiEntity]:
- result_providers: dict[str, ToolProviderApiEntity] = {}
-
- filters = []
- if not typ:
- filters.extend(["builtin", "api", "workflow", "mcp"])
- else:
- filters.append(typ)
-
- with db.session.no_autoflush:
- if "builtin" in filters:
- builtin_providers = cls.list_builtin_providers(tenant_id)
-
- # key: provider name, value: provider
- db_builtin_providers = {
- str(ToolProviderID(provider.provider)): provider
- for provider in cls.list_default_builtin_providers(tenant_id)
- }
-
- # append builtin providers
- for provider in builtin_providers:
- # handle include, exclude
- if is_filtered(
- include_set=dify_config.POSITION_TOOL_INCLUDES_SET,
- exclude_set=dify_config.POSITION_TOOL_EXCLUDES_SET,
- data=provider,
- name_func=lambda x: x.entity.identity.name,
- ):
- continue
- user_provider = ToolTransformService.builtin_provider_to_user_provider(
- provider_controller=provider,
- db_provider=db_builtin_providers.get(provider.entity.identity.name),
- decrypt_credentials=False,
- )
-
- if isinstance(provider, PluginToolProviderController):
- result_providers[f"plugin_provider.{user_provider.name}"] = user_provider
- else:
- result_providers[f"builtin_provider.{user_provider.name}"] = user_provider
-
- # get db api providers
- if "api" in filters:
- db_api_providers: list[ApiToolProvider] = (
- db.session.query(ApiToolProvider).where(ApiToolProvider.tenant_id == tenant_id).all()
- )
-
- api_provider_controllers: list[dict[str, Any]] = [
- {"provider": provider, "controller": ToolTransformService.api_provider_to_controller(provider)}
- for provider in db_api_providers
- ]
-
- # get labels
- labels = ToolLabelManager.get_tools_labels([x["controller"] for x in api_provider_controllers])
-
- for api_provider_controller in api_provider_controllers:
- user_provider = ToolTransformService.api_provider_to_user_provider(
- provider_controller=api_provider_controller["controller"],
- db_provider=api_provider_controller["provider"],
- decrypt_credentials=False,
- labels=labels.get(api_provider_controller["controller"].provider_id, []),
- )
- result_providers[f"api_provider.{user_provider.name}"] = user_provider
-
- if "workflow" in filters:
- # get workflow providers
- workflow_providers: list[WorkflowToolProvider] = (
- db.session.query(WorkflowToolProvider).where(WorkflowToolProvider.tenant_id == tenant_id).all()
- )
-
- workflow_provider_controllers: list[WorkflowToolProviderController] = []
- for workflow_provider in workflow_providers:
- try:
- workflow_provider_controllers.append(
- ToolTransformService.workflow_provider_to_controller(db_provider=workflow_provider)
- )
- except Exception:
- # app has been deleted
- pass
-
- labels = ToolLabelManager.get_tools_labels(
- [cast(ToolProviderController, controller) for controller in workflow_provider_controllers]
- )
-
- for provider_controller in workflow_provider_controllers:
- user_provider = ToolTransformService.workflow_provider_to_user_provider(
- provider_controller=provider_controller,
- labels=labels.get(provider_controller.provider_id, []),
- )
- result_providers[f"workflow_provider.{user_provider.name}"] = user_provider
- if "mcp" in filters:
- mcp_providers = MCPToolManageService.retrieve_mcp_tools(tenant_id, for_list=True)
- for mcp_provider in mcp_providers:
- result_providers[f"mcp_provider.{mcp_provider.name}"] = mcp_provider
-
- return BuiltinToolProviderSort.sort(list(result_providers.values()))
-
- @classmethod
- def get_api_provider_controller(
- cls, tenant_id: str, provider_id: str
- ) -> tuple[ApiToolProviderController, dict[str, Any]]:
- """
- get the api provider
-
- :param tenant_id: the id of the tenant
- :param provider_id: the id of the provider
-
- :return: the provider controller, the credentials
- """
- provider: ApiToolProvider | None = (
- db.session.query(ApiToolProvider)
- .where(
- ApiToolProvider.id == provider_id,
- ApiToolProvider.tenant_id == tenant_id,
- )
- .first()
- )
-
- if provider is None:
- raise ToolProviderNotFoundError(f"api provider {provider_id} not found")
-
- auth_type = ApiProviderAuthType.NONE
- provider_auth_type = provider.credentials.get("auth_type")
- if provider_auth_type in ("api_key_header", "api_key"): # backward compatibility
- auth_type = ApiProviderAuthType.API_KEY_HEADER
- elif provider_auth_type == "api_key_query":
- auth_type = ApiProviderAuthType.API_KEY_QUERY
-
- controller = ApiToolProviderController.from_db(
- provider,
- auth_type,
- )
- controller.load_bundled_tools(provider.tools)
-
- return controller, provider.credentials
-
- @classmethod
- def get_mcp_provider_controller(cls, tenant_id: str, provider_id: str) -> MCPToolProviderController:
- """
- get the api provider
-
- :param tenant_id: the id of the tenant
- :param provider_id: the id of the provider
-
- :return: the provider controller, the credentials
- """
- provider: MCPToolProvider | None = (
- db.session.query(MCPToolProvider)
- .where(
- MCPToolProvider.server_identifier == provider_id,
- MCPToolProvider.tenant_id == tenant_id,
- )
- .first()
- )
-
- if provider is None:
- raise ToolProviderNotFoundError(f"mcp provider {provider_id} not found")
-
- controller = MCPToolProviderController.from_db(provider)
-
- return controller
-
- @classmethod
- def user_get_api_provider(cls, provider: str, tenant_id: str):
- """
- get api provider
- """
- provider_name = provider
- provider_obj: ApiToolProvider | None = (
- db.session.query(ApiToolProvider)
- .where(
- ApiToolProvider.tenant_id == tenant_id,
- ApiToolProvider.name == provider,
- )
- .first()
- )
-
- if provider_obj is None:
- raise ValueError(f"you have not added provider {provider_name}")
-
- try:
- credentials = json.loads(provider_obj.credentials_str) or {}
- except Exception:
- credentials = {}
-
- # package tool provider controller
- auth_type = ApiProviderAuthType.NONE
- credentials_auth_type = credentials.get("auth_type")
- if credentials_auth_type in ("api_key_header", "api_key"): # backward compatibility
- auth_type = ApiProviderAuthType.API_KEY_HEADER
- elif credentials_auth_type == "api_key_query":
- auth_type = ApiProviderAuthType.API_KEY_QUERY
-
- controller = ApiToolProviderController.from_db(
- provider_obj,
- auth_type,
- )
- # init tool configuration
- encrypter, _ = create_tool_provider_encrypter(
- tenant_id=tenant_id,
- controller=controller,
- )
-
- masked_credentials = encrypter.mask_tool_credentials(encrypter.decrypt(credentials))
-
- try:
- icon = json.loads(provider_obj.icon)
- except Exception:
- icon = {"background": "#252525", "content": "\ud83d\ude01"}
-
- # add tool labels
- labels = ToolLabelManager.get_tool_labels(controller)
-
- return cast(
- dict,
- jsonable_encoder(
- {
- "schema_type": provider_obj.schema_type,
- "schema": provider_obj.schema,
- "tools": provider_obj.tools,
- "icon": icon,
- "description": provider_obj.description,
- "credentials": masked_credentials,
- "privacy_policy": provider_obj.privacy_policy,
- "custom_disclaimer": provider_obj.custom_disclaimer,
- "labels": labels,
- }
- ),
- )
-
- @classmethod
- def generate_builtin_tool_icon_url(cls, provider_id: str) -> str:
- return str(
- URL(dify_config.CONSOLE_API_URL or "/")
- / "console"
- / "api"
- / "workspaces"
- / "current"
- / "tool-provider"
- / "builtin"
- / provider_id
- / "icon"
- )
-
- @classmethod
- def generate_plugin_tool_icon_url(cls, tenant_id: str, filename: str) -> str:
- return str(
- URL(dify_config.CONSOLE_API_URL or "/")
- / "console"
- / "api"
- / "workspaces"
- / "current"
- / "plugin"
- / "icon"
- % {"tenant_id": tenant_id, "filename": filename}
- )
-
- @classmethod
- def generate_workflow_tool_icon_url(cls, tenant_id: str, provider_id: str):
- try:
- workflow_provider: WorkflowToolProvider | None = (
- db.session.query(WorkflowToolProvider)
- .where(WorkflowToolProvider.tenant_id == tenant_id, WorkflowToolProvider.id == provider_id)
- .first()
- )
-
- if workflow_provider is None:
- raise ToolProviderNotFoundError(f"workflow provider {provider_id} not found")
-
- icon: dict = json.loads(workflow_provider.icon)
- return icon
- except Exception:
- return {"background": "#252525", "content": "\ud83d\ude01"}
-
- @classmethod
- def generate_api_tool_icon_url(cls, tenant_id: str, provider_id: str):
- try:
- api_provider: ApiToolProvider | None = (
- db.session.query(ApiToolProvider)
- .where(ApiToolProvider.tenant_id == tenant_id, ApiToolProvider.id == provider_id)
- .first()
- )
-
- if api_provider is None:
- raise ToolProviderNotFoundError(f"api provider {provider_id} not found")
-
- icon: dict = json.loads(api_provider.icon)
- return icon
- except Exception:
- return {"background": "#252525", "content": "\ud83d\ude01"}
-
- @classmethod
- def generate_mcp_tool_icon_url(cls, tenant_id: str, provider_id: str) -> dict[str, str] | str:
- try:
- mcp_provider: MCPToolProvider | None = (
- db.session.query(MCPToolProvider)
- .where(MCPToolProvider.tenant_id == tenant_id, MCPToolProvider.server_identifier == provider_id)
- .first()
- )
-
- if mcp_provider is None:
- raise ToolProviderNotFoundError(f"mcp provider {provider_id} not found")
-
- return mcp_provider.provider_icon
- except Exception:
- return {"background": "#252525", "content": "\ud83d\ude01"}
-
- @classmethod
- def get_tool_icon(
- cls,
- tenant_id: str,
- provider_type: ToolProviderType,
- provider_id: str,
- ) -> Union[str, dict[str, Any]]:
- """
- get the tool icon
-
- :param tenant_id: the id of the tenant
- :param provider_type: the type of the provider
- :param provider_id: the id of the provider
- :return:
- """
- provider_type = provider_type
- provider_id = provider_id
- if provider_type == ToolProviderType.BUILT_IN:
- provider = ToolManager.get_builtin_provider(provider_id, tenant_id)
- if isinstance(provider, PluginToolProviderController):
- try:
- return cls.generate_plugin_tool_icon_url(tenant_id, provider.entity.identity.icon)
- except Exception:
- return {"background": "#252525", "content": "\ud83d\ude01"}
- return cls.generate_builtin_tool_icon_url(provider_id)
- elif provider_type == ToolProviderType.API:
- return cls.generate_api_tool_icon_url(tenant_id, provider_id)
- elif provider_type == ToolProviderType.WORKFLOW:
- return cls.generate_workflow_tool_icon_url(tenant_id, provider_id)
- elif provider_type == ToolProviderType.PLUGIN:
- provider = ToolManager.get_plugin_provider(provider_id, tenant_id)
- if isinstance(provider, PluginToolProviderController):
- try:
- return cls.generate_plugin_tool_icon_url(tenant_id, provider.entity.identity.icon)
- except Exception:
- return {"background": "#252525", "content": "\ud83d\ude01"}
- raise ValueError(f"plugin provider {provider_id} not found")
- elif provider_type == ToolProviderType.MCP:
- return cls.generate_mcp_tool_icon_url(tenant_id, provider_id)
- else:
- raise ValueError(f"provider type {provider_type} not found")
-
- @classmethod
- def _convert_tool_parameters_type(
- cls,
- parameters: list[ToolParameter],
- variable_pool: Optional["VariablePool"],
- tool_configurations: dict[str, Any],
- typ: Literal["agent", "workflow", "tool"] = "workflow",
- ) -> dict[str, Any]:
- """
- Convert tool parameters type
- """
- from core.workflow.nodes.tool.entities import ToolNodeData
- from core.workflow.nodes.tool.exc import ToolParameterError
-
- runtime_parameters = {}
- for parameter in parameters:
- if (
- parameter.type
- in {
- ToolParameter.ToolParameterType.SYSTEM_FILES,
- ToolParameter.ToolParameterType.FILE,
- ToolParameter.ToolParameterType.FILES,
- }
- and parameter.required
- and typ == "agent"
- ):
- raise ValueError(f"file type parameter {parameter.name} not supported in agent")
- # save tool parameter to tool entity memory
- if parameter.form == ToolParameter.ToolParameterForm.FORM:
- if variable_pool:
- config = tool_configurations.get(parameter.name, {})
- if not (config and isinstance(config, dict) and config.get("value") is not None):
- continue
- tool_input = ToolNodeData.ToolInput(**tool_configurations.get(parameter.name, {}))
- if tool_input.type == "variable":
- variable = variable_pool.get(tool_input.value)
- if variable is None:
- raise ToolParameterError(f"Variable {tool_input.value} does not exist")
- parameter_value = variable.value
- elif tool_input.type == "constant":
- parameter_value = tool_input.value
- elif tool_input.type == "mixed":
- segment_group = variable_pool.convert_template(str(tool_input.value))
- parameter_value = segment_group.text
- else:
- raise ToolParameterError(f"Unknown tool input type '{tool_input.type}'")
- runtime_parameters[parameter.name] = parameter_value
-
- else:
- value = parameter.init_frontend_parameter(tool_configurations.get(parameter.name))
- runtime_parameters[parameter.name] = value
- return runtime_parameters
-
-
- ToolManager.load_hardcoded_providers_cache()
|