Du kan inte välja fler än 25 ämnen Ämnen måste starta med en bokstav eller siffra, kan innehålla bindestreck ('-') och vara max 35 tecken långa.

tool_providers.py 29KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839
  1. import io
  2. from urllib.parse import urlparse
  3. from flask import redirect, send_file
  4. from flask_login import current_user
  5. from flask_restful import Resource, reqparse
  6. from sqlalchemy.orm import Session
  7. from werkzeug.exceptions import Forbidden
  8. from configs import dify_config
  9. from controllers.console import api
  10. from controllers.console.wraps import account_initialization_required, enterprise_license_required, setup_required
  11. from core.mcp.auth.auth_flow import auth, handle_callback
  12. from core.mcp.auth.auth_provider import OAuthClientProvider
  13. from core.mcp.error import MCPAuthError, MCPError
  14. from core.mcp.mcp_client import MCPClient
  15. from core.model_runtime.utils.encoders import jsonable_encoder
  16. from extensions.ext_database import db
  17. from libs.helper import alphanumeric, uuid_value
  18. from libs.login import login_required
  19. from services.tools.api_tools_manage_service import ApiToolManageService
  20. from services.tools.builtin_tools_manage_service import BuiltinToolManageService
  21. from services.tools.mcp_tools_mange_service import MCPToolManageService
  22. from services.tools.tool_labels_service import ToolLabelsService
  23. from services.tools.tools_manage_service import ToolCommonService
  24. from services.tools.tools_transform_service import ToolTransformService
  25. from services.tools.workflow_tools_manage_service import WorkflowToolManageService
  26. def is_valid_url(url: str) -> bool:
  27. if not url:
  28. return False
  29. try:
  30. parsed = urlparse(url)
  31. return all([parsed.scheme, parsed.netloc]) and parsed.scheme in ["http", "https"]
  32. except Exception:
  33. return False
  34. class ToolProviderListApi(Resource):
  35. @setup_required
  36. @login_required
  37. @account_initialization_required
  38. def get(self):
  39. user = current_user
  40. user_id = user.id
  41. tenant_id = user.current_tenant_id
  42. req = reqparse.RequestParser()
  43. req.add_argument(
  44. "type",
  45. type=str,
  46. choices=["builtin", "model", "api", "workflow", "mcp"],
  47. required=False,
  48. nullable=True,
  49. location="args",
  50. )
  51. args = req.parse_args()
  52. return ToolCommonService.list_tool_providers(user_id, tenant_id, args.get("type", None))
  53. class ToolBuiltinProviderListToolsApi(Resource):
  54. @setup_required
  55. @login_required
  56. @account_initialization_required
  57. def get(self, provider):
  58. user = current_user
  59. tenant_id = user.current_tenant_id
  60. return jsonable_encoder(
  61. BuiltinToolManageService.list_builtin_tool_provider_tools(
  62. tenant_id,
  63. provider,
  64. )
  65. )
  66. class ToolBuiltinProviderInfoApi(Resource):
  67. @setup_required
  68. @login_required
  69. @account_initialization_required
  70. def get(self, provider):
  71. user = current_user
  72. user_id = user.id
  73. tenant_id = user.current_tenant_id
  74. return jsonable_encoder(BuiltinToolManageService.get_builtin_tool_provider_info(user_id, tenant_id, provider))
  75. class ToolBuiltinProviderDeleteApi(Resource):
  76. @setup_required
  77. @login_required
  78. @account_initialization_required
  79. def post(self, provider):
  80. user = current_user
  81. if not user.is_admin_or_owner:
  82. raise Forbidden()
  83. user_id = user.id
  84. tenant_id = user.current_tenant_id
  85. return BuiltinToolManageService.delete_builtin_tool_provider(
  86. user_id,
  87. tenant_id,
  88. provider,
  89. )
  90. class ToolBuiltinProviderUpdateApi(Resource):
  91. @setup_required
  92. @login_required
  93. @account_initialization_required
  94. def post(self, provider):
  95. user = current_user
  96. if not user.is_admin_or_owner:
  97. raise Forbidden()
  98. user_id = user.id
  99. tenant_id = user.current_tenant_id
  100. parser = reqparse.RequestParser()
  101. parser.add_argument("credentials", type=dict, required=True, nullable=False, location="json")
  102. args = parser.parse_args()
  103. with Session(db.engine) as session:
  104. result = BuiltinToolManageService.update_builtin_tool_provider(
  105. session=session,
  106. user_id=user_id,
  107. tenant_id=tenant_id,
  108. provider_name=provider,
  109. credentials=args["credentials"],
  110. )
  111. session.commit()
  112. return result
  113. class ToolBuiltinProviderGetCredentialsApi(Resource):
  114. @setup_required
  115. @login_required
  116. @account_initialization_required
  117. def get(self, provider):
  118. tenant_id = current_user.current_tenant_id
  119. return BuiltinToolManageService.get_builtin_tool_provider_credentials(
  120. tenant_id=tenant_id,
  121. provider_name=provider,
  122. )
  123. class ToolBuiltinProviderIconApi(Resource):
  124. @setup_required
  125. def get(self, provider):
  126. icon_bytes, mimetype = BuiltinToolManageService.get_builtin_tool_provider_icon(provider)
  127. icon_cache_max_age = dify_config.TOOL_ICON_CACHE_MAX_AGE
  128. return send_file(io.BytesIO(icon_bytes), mimetype=mimetype, max_age=icon_cache_max_age)
  129. class ToolApiProviderAddApi(Resource):
  130. @setup_required
  131. @login_required
  132. @account_initialization_required
  133. def post(self):
  134. user = current_user
  135. if not user.is_admin_or_owner:
  136. raise Forbidden()
  137. user_id = user.id
  138. tenant_id = user.current_tenant_id
  139. parser = reqparse.RequestParser()
  140. parser.add_argument("credentials", type=dict, required=True, nullable=False, location="json")
  141. parser.add_argument("schema_type", type=str, required=True, nullable=False, location="json")
  142. parser.add_argument("schema", type=str, required=True, nullable=False, location="json")
  143. parser.add_argument("provider", type=str, required=True, nullable=False, location="json")
  144. parser.add_argument("icon", type=dict, required=True, nullable=False, location="json")
  145. parser.add_argument("privacy_policy", type=str, required=False, nullable=True, location="json")
  146. parser.add_argument("labels", type=list[str], required=False, nullable=True, location="json", default=[])
  147. parser.add_argument("custom_disclaimer", type=str, required=False, nullable=True, location="json")
  148. args = parser.parse_args()
  149. return ApiToolManageService.create_api_tool_provider(
  150. user_id,
  151. tenant_id,
  152. args["provider"],
  153. args["icon"],
  154. args["credentials"],
  155. args["schema_type"],
  156. args["schema"],
  157. args.get("privacy_policy", ""),
  158. args.get("custom_disclaimer", ""),
  159. args.get("labels", []),
  160. )
  161. class ToolApiProviderGetRemoteSchemaApi(Resource):
  162. @setup_required
  163. @login_required
  164. @account_initialization_required
  165. def get(self):
  166. user = current_user
  167. user_id = user.id
  168. tenant_id = user.current_tenant_id
  169. parser = reqparse.RequestParser()
  170. parser.add_argument("url", type=str, required=True, nullable=False, location="args")
  171. args = parser.parse_args()
  172. return ApiToolManageService.get_api_tool_provider_remote_schema(
  173. user_id,
  174. tenant_id,
  175. args["url"],
  176. )
  177. class ToolApiProviderListToolsApi(Resource):
  178. @setup_required
  179. @login_required
  180. @account_initialization_required
  181. def get(self):
  182. user = current_user
  183. user_id = user.id
  184. tenant_id = user.current_tenant_id
  185. parser = reqparse.RequestParser()
  186. parser.add_argument("provider", type=str, required=True, nullable=False, location="args")
  187. args = parser.parse_args()
  188. return jsonable_encoder(
  189. ApiToolManageService.list_api_tool_provider_tools(
  190. user_id,
  191. tenant_id,
  192. args["provider"],
  193. )
  194. )
  195. class ToolApiProviderUpdateApi(Resource):
  196. @setup_required
  197. @login_required
  198. @account_initialization_required
  199. def post(self):
  200. user = current_user
  201. if not user.is_admin_or_owner:
  202. raise Forbidden()
  203. user_id = user.id
  204. tenant_id = user.current_tenant_id
  205. parser = reqparse.RequestParser()
  206. parser.add_argument("credentials", type=dict, required=True, nullable=False, location="json")
  207. parser.add_argument("schema_type", type=str, required=True, nullable=False, location="json")
  208. parser.add_argument("schema", type=str, required=True, nullable=False, location="json")
  209. parser.add_argument("provider", type=str, required=True, nullable=False, location="json")
  210. parser.add_argument("original_provider", type=str, required=True, nullable=False, location="json")
  211. parser.add_argument("icon", type=dict, required=True, nullable=False, location="json")
  212. parser.add_argument("privacy_policy", type=str, required=True, nullable=True, location="json")
  213. parser.add_argument("labels", type=list[str], required=False, nullable=True, location="json")
  214. parser.add_argument("custom_disclaimer", type=str, required=True, nullable=True, location="json")
  215. args = parser.parse_args()
  216. return ApiToolManageService.update_api_tool_provider(
  217. user_id,
  218. tenant_id,
  219. args["provider"],
  220. args["original_provider"],
  221. args["icon"],
  222. args["credentials"],
  223. args["schema_type"],
  224. args["schema"],
  225. args["privacy_policy"],
  226. args["custom_disclaimer"],
  227. args.get("labels", []),
  228. )
  229. class ToolApiProviderDeleteApi(Resource):
  230. @setup_required
  231. @login_required
  232. @account_initialization_required
  233. def post(self):
  234. user = current_user
  235. if not user.is_admin_or_owner:
  236. raise Forbidden()
  237. user_id = user.id
  238. tenant_id = user.current_tenant_id
  239. parser = reqparse.RequestParser()
  240. parser.add_argument("provider", type=str, required=True, nullable=False, location="json")
  241. args = parser.parse_args()
  242. return ApiToolManageService.delete_api_tool_provider(
  243. user_id,
  244. tenant_id,
  245. args["provider"],
  246. )
  247. class ToolApiProviderGetApi(Resource):
  248. @setup_required
  249. @login_required
  250. @account_initialization_required
  251. def get(self):
  252. user = current_user
  253. user_id = user.id
  254. tenant_id = user.current_tenant_id
  255. parser = reqparse.RequestParser()
  256. parser.add_argument("provider", type=str, required=True, nullable=False, location="args")
  257. args = parser.parse_args()
  258. return ApiToolManageService.get_api_tool_provider(
  259. user_id,
  260. tenant_id,
  261. args["provider"],
  262. )
  263. class ToolBuiltinProviderCredentialsSchemaApi(Resource):
  264. @setup_required
  265. @login_required
  266. @account_initialization_required
  267. def get(self, provider):
  268. user = current_user
  269. tenant_id = user.current_tenant_id
  270. return BuiltinToolManageService.list_builtin_provider_credentials_schema(provider, tenant_id)
  271. class ToolApiProviderSchemaApi(Resource):
  272. @setup_required
  273. @login_required
  274. @account_initialization_required
  275. def post(self):
  276. parser = reqparse.RequestParser()
  277. parser.add_argument("schema", type=str, required=True, nullable=False, location="json")
  278. args = parser.parse_args()
  279. return ApiToolManageService.parser_api_schema(
  280. schema=args["schema"],
  281. )
  282. class ToolApiProviderPreviousTestApi(Resource):
  283. @setup_required
  284. @login_required
  285. @account_initialization_required
  286. def post(self):
  287. parser = reqparse.RequestParser()
  288. parser.add_argument("tool_name", type=str, required=True, nullable=False, location="json")
  289. parser.add_argument("provider_name", type=str, required=False, nullable=False, location="json")
  290. parser.add_argument("credentials", type=dict, required=True, nullable=False, location="json")
  291. parser.add_argument("parameters", type=dict, required=True, nullable=False, location="json")
  292. parser.add_argument("schema_type", type=str, required=True, nullable=False, location="json")
  293. parser.add_argument("schema", type=str, required=True, nullable=False, location="json")
  294. args = parser.parse_args()
  295. return ApiToolManageService.test_api_tool_preview(
  296. current_user.current_tenant_id,
  297. args["provider_name"] or "",
  298. args["tool_name"],
  299. args["credentials"],
  300. args["parameters"],
  301. args["schema_type"],
  302. args["schema"],
  303. )
  304. class ToolWorkflowProviderCreateApi(Resource):
  305. @setup_required
  306. @login_required
  307. @account_initialization_required
  308. def post(self):
  309. user = current_user
  310. if not user.is_admin_or_owner:
  311. raise Forbidden()
  312. user_id = user.id
  313. tenant_id = user.current_tenant_id
  314. reqparser = reqparse.RequestParser()
  315. reqparser.add_argument("workflow_app_id", type=uuid_value, required=True, nullable=False, location="json")
  316. reqparser.add_argument("name", type=alphanumeric, required=True, nullable=False, location="json")
  317. reqparser.add_argument("label", type=str, required=True, nullable=False, location="json")
  318. reqparser.add_argument("description", type=str, required=True, nullable=False, location="json")
  319. reqparser.add_argument("icon", type=dict, required=True, nullable=False, location="json")
  320. reqparser.add_argument("parameters", type=list[dict], required=True, nullable=False, location="json")
  321. reqparser.add_argument("privacy_policy", type=str, required=False, nullable=True, location="json", default="")
  322. reqparser.add_argument("labels", type=list[str], required=False, nullable=True, location="json")
  323. args = reqparser.parse_args()
  324. return WorkflowToolManageService.create_workflow_tool(
  325. user_id=user_id,
  326. tenant_id=tenant_id,
  327. workflow_app_id=args["workflow_app_id"],
  328. name=args["name"],
  329. label=args["label"],
  330. icon=args["icon"],
  331. description=args["description"],
  332. parameters=args["parameters"],
  333. privacy_policy=args["privacy_policy"],
  334. labels=args["labels"],
  335. )
  336. class ToolWorkflowProviderUpdateApi(Resource):
  337. @setup_required
  338. @login_required
  339. @account_initialization_required
  340. def post(self):
  341. user = current_user
  342. if not user.is_admin_or_owner:
  343. raise Forbidden()
  344. user_id = user.id
  345. tenant_id = user.current_tenant_id
  346. reqparser = reqparse.RequestParser()
  347. reqparser.add_argument("workflow_tool_id", type=uuid_value, required=True, nullable=False, location="json")
  348. reqparser.add_argument("name", type=alphanumeric, required=True, nullable=False, location="json")
  349. reqparser.add_argument("label", type=str, required=True, nullable=False, location="json")
  350. reqparser.add_argument("description", type=str, required=True, nullable=False, location="json")
  351. reqparser.add_argument("icon", type=dict, required=True, nullable=False, location="json")
  352. reqparser.add_argument("parameters", type=list[dict], required=True, nullable=False, location="json")
  353. reqparser.add_argument("privacy_policy", type=str, required=False, nullable=True, location="json", default="")
  354. reqparser.add_argument("labels", type=list[str], required=False, nullable=True, location="json")
  355. args = reqparser.parse_args()
  356. if not args["workflow_tool_id"]:
  357. raise ValueError("incorrect workflow_tool_id")
  358. return WorkflowToolManageService.update_workflow_tool(
  359. user_id,
  360. tenant_id,
  361. args["workflow_tool_id"],
  362. args["name"],
  363. args["label"],
  364. args["icon"],
  365. args["description"],
  366. args["parameters"],
  367. args["privacy_policy"],
  368. args.get("labels", []),
  369. )
  370. class ToolWorkflowProviderDeleteApi(Resource):
  371. @setup_required
  372. @login_required
  373. @account_initialization_required
  374. def post(self):
  375. user = current_user
  376. if not user.is_admin_or_owner:
  377. raise Forbidden()
  378. user_id = user.id
  379. tenant_id = user.current_tenant_id
  380. reqparser = reqparse.RequestParser()
  381. reqparser.add_argument("workflow_tool_id", type=uuid_value, required=True, nullable=False, location="json")
  382. args = reqparser.parse_args()
  383. return WorkflowToolManageService.delete_workflow_tool(
  384. user_id,
  385. tenant_id,
  386. args["workflow_tool_id"],
  387. )
  388. class ToolWorkflowProviderGetApi(Resource):
  389. @setup_required
  390. @login_required
  391. @account_initialization_required
  392. def get(self):
  393. user = current_user
  394. user_id = user.id
  395. tenant_id = user.current_tenant_id
  396. parser = reqparse.RequestParser()
  397. parser.add_argument("workflow_tool_id", type=uuid_value, required=False, nullable=True, location="args")
  398. parser.add_argument("workflow_app_id", type=uuid_value, required=False, nullable=True, location="args")
  399. args = parser.parse_args()
  400. if args.get("workflow_tool_id"):
  401. tool = WorkflowToolManageService.get_workflow_tool_by_tool_id(
  402. user_id,
  403. tenant_id,
  404. args["workflow_tool_id"],
  405. )
  406. elif args.get("workflow_app_id"):
  407. tool = WorkflowToolManageService.get_workflow_tool_by_app_id(
  408. user_id,
  409. tenant_id,
  410. args["workflow_app_id"],
  411. )
  412. else:
  413. raise ValueError("incorrect workflow_tool_id or workflow_app_id")
  414. return jsonable_encoder(tool)
  415. class ToolWorkflowProviderListToolApi(Resource):
  416. @setup_required
  417. @login_required
  418. @account_initialization_required
  419. def get(self):
  420. user = current_user
  421. user_id = user.id
  422. tenant_id = user.current_tenant_id
  423. parser = reqparse.RequestParser()
  424. parser.add_argument("workflow_tool_id", type=uuid_value, required=True, nullable=False, location="args")
  425. args = parser.parse_args()
  426. return jsonable_encoder(
  427. WorkflowToolManageService.list_single_workflow_tools(
  428. user_id,
  429. tenant_id,
  430. args["workflow_tool_id"],
  431. )
  432. )
  433. class ToolBuiltinListApi(Resource):
  434. @setup_required
  435. @login_required
  436. @account_initialization_required
  437. def get(self):
  438. user = current_user
  439. user_id = user.id
  440. tenant_id = user.current_tenant_id
  441. return jsonable_encoder(
  442. [
  443. provider.to_dict()
  444. for provider in BuiltinToolManageService.list_builtin_tools(
  445. user_id,
  446. tenant_id,
  447. )
  448. ]
  449. )
  450. class ToolApiListApi(Resource):
  451. @setup_required
  452. @login_required
  453. @account_initialization_required
  454. def get(self):
  455. user = current_user
  456. user_id = user.id
  457. tenant_id = user.current_tenant_id
  458. return jsonable_encoder(
  459. [
  460. provider.to_dict()
  461. for provider in ApiToolManageService.list_api_tools(
  462. user_id,
  463. tenant_id,
  464. )
  465. ]
  466. )
  467. class ToolWorkflowListApi(Resource):
  468. @setup_required
  469. @login_required
  470. @account_initialization_required
  471. def get(self):
  472. user = current_user
  473. user_id = user.id
  474. tenant_id = user.current_tenant_id
  475. return jsonable_encoder(
  476. [
  477. provider.to_dict()
  478. for provider in WorkflowToolManageService.list_tenant_workflow_tools(
  479. user_id,
  480. tenant_id,
  481. )
  482. ]
  483. )
  484. class ToolLabelsApi(Resource):
  485. @setup_required
  486. @login_required
  487. @account_initialization_required
  488. @enterprise_license_required
  489. def get(self):
  490. return jsonable_encoder(ToolLabelsService.list_tool_labels())
  491. class ToolProviderMCPApi(Resource):
  492. @setup_required
  493. @login_required
  494. @account_initialization_required
  495. def post(self):
  496. parser = reqparse.RequestParser()
  497. parser.add_argument("server_url", type=str, required=True, nullable=False, location="json")
  498. parser.add_argument("name", type=str, required=True, nullable=False, location="json")
  499. parser.add_argument("icon", type=str, required=True, nullable=False, location="json")
  500. parser.add_argument("icon_type", type=str, required=True, nullable=False, location="json")
  501. parser.add_argument("icon_background", type=str, required=False, nullable=True, location="json", default="")
  502. parser.add_argument("server_identifier", type=str, required=True, nullable=False, location="json")
  503. args = parser.parse_args()
  504. user = current_user
  505. if not is_valid_url(args["server_url"]):
  506. raise ValueError("Server URL is not valid.")
  507. return jsonable_encoder(
  508. MCPToolManageService.create_mcp_provider(
  509. tenant_id=user.current_tenant_id,
  510. server_url=args["server_url"],
  511. name=args["name"],
  512. icon=args["icon"],
  513. icon_type=args["icon_type"],
  514. icon_background=args["icon_background"],
  515. user_id=user.id,
  516. server_identifier=args["server_identifier"],
  517. )
  518. )
  519. @setup_required
  520. @login_required
  521. @account_initialization_required
  522. def put(self):
  523. parser = reqparse.RequestParser()
  524. parser.add_argument("server_url", type=str, required=True, nullable=False, location="json")
  525. parser.add_argument("name", type=str, required=True, nullable=False, location="json")
  526. parser.add_argument("icon", type=str, required=True, nullable=False, location="json")
  527. parser.add_argument("icon_type", type=str, required=True, nullable=False, location="json")
  528. parser.add_argument("icon_background", type=str, required=False, nullable=True, location="json")
  529. parser.add_argument("provider_id", type=str, required=True, nullable=False, location="json")
  530. parser.add_argument("server_identifier", type=str, required=True, nullable=False, location="json")
  531. args = parser.parse_args()
  532. if not is_valid_url(args["server_url"]):
  533. if "[__HIDDEN__]" in args["server_url"]:
  534. pass
  535. else:
  536. raise ValueError("Server URL is not valid.")
  537. MCPToolManageService.update_mcp_provider(
  538. tenant_id=current_user.current_tenant_id,
  539. provider_id=args["provider_id"],
  540. server_url=args["server_url"],
  541. name=args["name"],
  542. icon=args["icon"],
  543. icon_type=args["icon_type"],
  544. icon_background=args["icon_background"],
  545. server_identifier=args["server_identifier"],
  546. )
  547. return {"result": "success"}
  548. @setup_required
  549. @login_required
  550. @account_initialization_required
  551. def delete(self):
  552. parser = reqparse.RequestParser()
  553. parser.add_argument("provider_id", type=str, required=True, nullable=False, location="json")
  554. args = parser.parse_args()
  555. MCPToolManageService.delete_mcp_tool(tenant_id=current_user.current_tenant_id, provider_id=args["provider_id"])
  556. return {"result": "success"}
  557. class ToolMCPAuthApi(Resource):
  558. @setup_required
  559. @login_required
  560. @account_initialization_required
  561. def post(self):
  562. parser = reqparse.RequestParser()
  563. parser.add_argument("provider_id", type=str, required=True, nullable=False, location="json")
  564. parser.add_argument("authorization_code", type=str, required=False, nullable=True, location="json")
  565. args = parser.parse_args()
  566. provider_id = args["provider_id"]
  567. tenant_id = current_user.current_tenant_id
  568. provider = MCPToolManageService.get_mcp_provider_by_provider_id(provider_id, tenant_id)
  569. if not provider:
  570. raise ValueError("provider not found")
  571. try:
  572. with MCPClient(
  573. provider.decrypted_server_url,
  574. provider_id,
  575. tenant_id,
  576. authed=False,
  577. authorization_code=args["authorization_code"],
  578. for_list=True,
  579. ):
  580. MCPToolManageService.update_mcp_provider_credentials(
  581. mcp_provider=provider,
  582. credentials=provider.decrypted_credentials,
  583. authed=True,
  584. )
  585. return {"result": "success"}
  586. except MCPAuthError:
  587. auth_provider = OAuthClientProvider(provider_id, tenant_id, for_list=True)
  588. return auth(auth_provider, provider.decrypted_server_url, args["authorization_code"])
  589. except MCPError as e:
  590. MCPToolManageService.update_mcp_provider_credentials(
  591. mcp_provider=provider,
  592. credentials={},
  593. authed=False,
  594. )
  595. raise ValueError(f"Failed to connect to MCP server: {e}") from e
  596. class ToolMCPDetailApi(Resource):
  597. @setup_required
  598. @login_required
  599. @account_initialization_required
  600. def get(self, provider_id):
  601. user = current_user
  602. provider = MCPToolManageService.get_mcp_provider_by_provider_id(provider_id, user.current_tenant_id)
  603. return jsonable_encoder(ToolTransformService.mcp_provider_to_user_provider(provider, for_list=True))
  604. class ToolMCPListAllApi(Resource):
  605. @setup_required
  606. @login_required
  607. @account_initialization_required
  608. def get(self):
  609. user = current_user
  610. tenant_id = user.current_tenant_id
  611. tools = MCPToolManageService.retrieve_mcp_tools(tenant_id=tenant_id)
  612. return [tool.to_dict() for tool in tools]
  613. class ToolMCPUpdateApi(Resource):
  614. @setup_required
  615. @login_required
  616. @account_initialization_required
  617. def get(self, provider_id):
  618. tenant_id = current_user.current_tenant_id
  619. tools = MCPToolManageService.list_mcp_tool_from_remote_server(
  620. tenant_id=tenant_id,
  621. provider_id=provider_id,
  622. )
  623. return jsonable_encoder(tools)
  624. class ToolMCPCallbackApi(Resource):
  625. def get(self):
  626. parser = reqparse.RequestParser()
  627. parser.add_argument("code", type=str, required=True, nullable=False, location="args")
  628. parser.add_argument("state", type=str, required=True, nullable=False, location="args")
  629. args = parser.parse_args()
  630. state_key = args["state"]
  631. authorization_code = args["code"]
  632. handle_callback(state_key, authorization_code)
  633. return redirect(f"{dify_config.CONSOLE_WEB_URL}/oauth-callback")
  634. # tool provider
  635. api.add_resource(ToolProviderListApi, "/workspaces/current/tool-providers")
  636. # builtin tool provider
  637. api.add_resource(ToolBuiltinProviderListToolsApi, "/workspaces/current/tool-provider/builtin/<path:provider>/tools")
  638. api.add_resource(ToolBuiltinProviderInfoApi, "/workspaces/current/tool-provider/builtin/<path:provider>/info")
  639. api.add_resource(ToolBuiltinProviderDeleteApi, "/workspaces/current/tool-provider/builtin/<path:provider>/delete")
  640. api.add_resource(ToolBuiltinProviderUpdateApi, "/workspaces/current/tool-provider/builtin/<path:provider>/update")
  641. api.add_resource(
  642. ToolBuiltinProviderGetCredentialsApi, "/workspaces/current/tool-provider/builtin/<path:provider>/credentials"
  643. )
  644. api.add_resource(
  645. ToolBuiltinProviderCredentialsSchemaApi,
  646. "/workspaces/current/tool-provider/builtin/<path:provider>/credentials_schema",
  647. )
  648. api.add_resource(ToolBuiltinProviderIconApi, "/workspaces/current/tool-provider/builtin/<path:provider>/icon")
  649. # api tool provider
  650. api.add_resource(ToolApiProviderAddApi, "/workspaces/current/tool-provider/api/add")
  651. api.add_resource(ToolApiProviderGetRemoteSchemaApi, "/workspaces/current/tool-provider/api/remote")
  652. api.add_resource(ToolApiProviderListToolsApi, "/workspaces/current/tool-provider/api/tools")
  653. api.add_resource(ToolApiProviderUpdateApi, "/workspaces/current/tool-provider/api/update")
  654. api.add_resource(ToolApiProviderDeleteApi, "/workspaces/current/tool-provider/api/delete")
  655. api.add_resource(ToolApiProviderGetApi, "/workspaces/current/tool-provider/api/get")
  656. api.add_resource(ToolApiProviderSchemaApi, "/workspaces/current/tool-provider/api/schema")
  657. api.add_resource(ToolApiProviderPreviousTestApi, "/workspaces/current/tool-provider/api/test/pre")
  658. # workflow tool provider
  659. api.add_resource(ToolWorkflowProviderCreateApi, "/workspaces/current/tool-provider/workflow/create")
  660. api.add_resource(ToolWorkflowProviderUpdateApi, "/workspaces/current/tool-provider/workflow/update")
  661. api.add_resource(ToolWorkflowProviderDeleteApi, "/workspaces/current/tool-provider/workflow/delete")
  662. api.add_resource(ToolWorkflowProviderGetApi, "/workspaces/current/tool-provider/workflow/get")
  663. api.add_resource(ToolWorkflowProviderListToolApi, "/workspaces/current/tool-provider/workflow/tools")
  664. # mcp tool provider
  665. api.add_resource(ToolMCPDetailApi, "/workspaces/current/tool-provider/mcp/tools/<path:provider_id>")
  666. api.add_resource(ToolProviderMCPApi, "/workspaces/current/tool-provider/mcp")
  667. api.add_resource(ToolMCPUpdateApi, "/workspaces/current/tool-provider/mcp/update/<path:provider_id>")
  668. api.add_resource(ToolMCPAuthApi, "/workspaces/current/tool-provider/mcp/auth")
  669. api.add_resource(ToolMCPCallbackApi, "/mcp/oauth/callback")
  670. api.add_resource(ToolBuiltinListApi, "/workspaces/current/tools/builtin")
  671. api.add_resource(ToolApiListApi, "/workspaces/current/tools/api")
  672. api.add_resource(ToolMCPListAllApi, "/workspaces/current/tools/mcp")
  673. api.add_resource(ToolWorkflowListApi, "/workspaces/current/tools/workflow")
  674. api.add_resource(ToolLabelsApi, "/workspaces/current/tool-labels")