You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

configuration.py 9.4KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267
  1. from copy import deepcopy
  2. from typing import Any
  3. from pydantic import BaseModel
  4. from core.entities.provider_entities import BasicProviderConfig
  5. from core.helper import encrypter
  6. from core.helper.tool_parameter_cache import ToolParameterCache, ToolParameterCacheType
  7. from core.helper.tool_provider_cache import ToolProviderCredentialsCache, ToolProviderCredentialsCacheType
  8. from core.tools.__base.tool import Tool
  9. from core.tools.entities.tool_entities import (
  10. ToolParameter,
  11. ToolProviderType,
  12. )
  13. class ProviderConfigEncrypter(BaseModel):
  14. tenant_id: str
  15. config: list[BasicProviderConfig]
  16. provider_type: str
  17. provider_identity: str
  18. def _deep_copy(self, data: dict[str, str]) -> dict[str, str]:
  19. """
  20. deep copy data
  21. """
  22. return deepcopy(data)
  23. def encrypt(self, data: dict[str, str]) -> dict[str, str]:
  24. """
  25. encrypt tool credentials with tenant id
  26. return a deep copy of credentials with encrypted values
  27. """
  28. data = self._deep_copy(data)
  29. # get fields need to be decrypted
  30. fields = dict[str, BasicProviderConfig]()
  31. for credential in self.config:
  32. fields[credential.name] = credential
  33. for field_name, field in fields.items():
  34. if field.type == BasicProviderConfig.Type.SECRET_INPUT:
  35. if field_name in data:
  36. encrypted = encrypter.encrypt_token(self.tenant_id, data[field_name] or "")
  37. data[field_name] = encrypted
  38. return data
  39. def mask_tool_credentials(self, data: dict[str, Any]) -> dict[str, Any]:
  40. """
  41. mask tool credentials
  42. return a deep copy of credentials with masked values
  43. """
  44. data = self._deep_copy(data)
  45. # get fields need to be decrypted
  46. fields = dict[str, BasicProviderConfig]()
  47. for credential in self.config:
  48. fields[credential.name] = credential
  49. for field_name, field in fields.items():
  50. if field.type == BasicProviderConfig.Type.SECRET_INPUT:
  51. if field_name in data:
  52. if len(data[field_name]) > 6:
  53. data[field_name] = (
  54. data[field_name][:2] + "*" * (len(data[field_name]) - 4) + data[field_name][-2:]
  55. )
  56. else:
  57. data[field_name] = "*" * len(data[field_name])
  58. return data
  59. def decrypt(self, data: dict[str, str], use_cache: bool = True) -> dict[str, str]:
  60. """
  61. decrypt tool credentials with tenant id
  62. return a deep copy of credentials with decrypted values
  63. """
  64. if use_cache:
  65. cache = ToolProviderCredentialsCache(
  66. tenant_id=self.tenant_id,
  67. identity_id=f"{self.provider_type}.{self.provider_identity}",
  68. cache_type=ToolProviderCredentialsCacheType.PROVIDER,
  69. )
  70. cached_credentials = cache.get()
  71. if cached_credentials:
  72. return cached_credentials
  73. data = self._deep_copy(data)
  74. # get fields need to be decrypted
  75. fields = dict[str, BasicProviderConfig]()
  76. for credential in self.config:
  77. fields[credential.name] = credential
  78. for field_name, field in fields.items():
  79. if field.type == BasicProviderConfig.Type.SECRET_INPUT:
  80. if field_name in data:
  81. try:
  82. # if the value is None or empty string, skip decrypt
  83. if not data[field_name]:
  84. continue
  85. data[field_name] = encrypter.decrypt_token(self.tenant_id, data[field_name])
  86. except Exception:
  87. pass
  88. if use_cache:
  89. cache.set(data)
  90. return data
  91. def delete_tool_credentials_cache(self):
  92. cache = ToolProviderCredentialsCache(
  93. tenant_id=self.tenant_id,
  94. identity_id=f"{self.provider_type}.{self.provider_identity}",
  95. cache_type=ToolProviderCredentialsCacheType.PROVIDER,
  96. )
  97. cache.delete()
  98. class ToolParameterConfigurationManager:
  99. """
  100. Tool parameter configuration manager
  101. """
  102. tenant_id: str
  103. tool_runtime: Tool
  104. provider_name: str
  105. provider_type: ToolProviderType
  106. identity_id: str
  107. def __init__(
  108. self, tenant_id: str, tool_runtime: Tool, provider_name: str, provider_type: ToolProviderType, identity_id: str
  109. ) -> None:
  110. self.tenant_id = tenant_id
  111. self.tool_runtime = tool_runtime
  112. self.provider_name = provider_name
  113. self.provider_type = provider_type
  114. self.identity_id = identity_id
  115. def _deep_copy(self, parameters: dict[str, Any]) -> dict[str, Any]:
  116. """
  117. deep copy parameters
  118. """
  119. return deepcopy(parameters)
  120. def _merge_parameters(self) -> list[ToolParameter]:
  121. """
  122. merge parameters
  123. """
  124. # get tool parameters
  125. tool_parameters = self.tool_runtime.entity.parameters or []
  126. # get tool runtime parameters
  127. runtime_parameters = self.tool_runtime.get_runtime_parameters()
  128. # override parameters
  129. current_parameters = tool_parameters.copy()
  130. for runtime_parameter in runtime_parameters:
  131. found = False
  132. for index, parameter in enumerate(current_parameters):
  133. if parameter.name == runtime_parameter.name and parameter.form == runtime_parameter.form:
  134. current_parameters[index] = runtime_parameter
  135. found = True
  136. break
  137. if not found and runtime_parameter.form == ToolParameter.ToolParameterForm.FORM:
  138. current_parameters.append(runtime_parameter)
  139. return current_parameters
  140. def mask_tool_parameters(self, parameters: dict[str, Any]) -> dict[str, Any]:
  141. """
  142. mask tool parameters
  143. return a deep copy of parameters with masked values
  144. """
  145. parameters = self._deep_copy(parameters)
  146. # override parameters
  147. current_parameters = self._merge_parameters()
  148. for parameter in current_parameters:
  149. if (
  150. parameter.form == ToolParameter.ToolParameterForm.FORM
  151. and parameter.type == ToolParameter.ToolParameterType.SECRET_INPUT
  152. ):
  153. if parameter.name in parameters:
  154. if len(parameters[parameter.name]) > 6:
  155. parameters[parameter.name] = (
  156. parameters[parameter.name][:2]
  157. + "*" * (len(parameters[parameter.name]) - 4)
  158. + parameters[parameter.name][-2:]
  159. )
  160. else:
  161. parameters[parameter.name] = "*" * len(parameters[parameter.name])
  162. return parameters
  163. def encrypt_tool_parameters(self, parameters: dict[str, Any]) -> dict[str, Any]:
  164. """
  165. encrypt tool parameters with tenant id
  166. return a deep copy of parameters with encrypted values
  167. """
  168. # override parameters
  169. current_parameters = self._merge_parameters()
  170. parameters = self._deep_copy(parameters)
  171. for parameter in current_parameters:
  172. if (
  173. parameter.form == ToolParameter.ToolParameterForm.FORM
  174. and parameter.type == ToolParameter.ToolParameterType.SECRET_INPUT
  175. ):
  176. if parameter.name in parameters:
  177. encrypted = encrypter.encrypt_token(self.tenant_id, parameters[parameter.name])
  178. parameters[parameter.name] = encrypted
  179. return parameters
  180. def decrypt_tool_parameters(self, parameters: dict[str, Any]) -> dict[str, Any]:
  181. """
  182. decrypt tool parameters with tenant id
  183. return a deep copy of parameters with decrypted values
  184. """
  185. cache = ToolParameterCache(
  186. tenant_id=self.tenant_id,
  187. provider=f"{self.provider_type.value}.{self.provider_name}",
  188. tool_name=self.tool_runtime.entity.identity.name,
  189. cache_type=ToolParameterCacheType.PARAMETER,
  190. identity_id=self.identity_id,
  191. )
  192. cached_parameters = cache.get()
  193. if cached_parameters:
  194. return cached_parameters
  195. # override parameters
  196. current_parameters = self._merge_parameters()
  197. has_secret_input = False
  198. for parameter in current_parameters:
  199. if (
  200. parameter.form == ToolParameter.ToolParameterForm.FORM
  201. and parameter.type == ToolParameter.ToolParameterType.SECRET_INPUT
  202. ):
  203. if parameter.name in parameters:
  204. try:
  205. has_secret_input = True
  206. parameters[parameter.name] = encrypter.decrypt_token(self.tenant_id, parameters[parameter.name])
  207. except Exception:
  208. pass
  209. if has_secret_input:
  210. cache.set(parameters)
  211. return parameters
  212. def delete_tool_parameters_cache(self):
  213. cache = ToolParameterCache(
  214. tenant_id=self.tenant_id,
  215. provider=f"{self.provider_type.value}.{self.provider_name}",
  216. tool_name=self.tool_runtime.entity.identity.name,
  217. cache_type=ToolParameterCacheType.PARAMETER,
  218. identity_id=self.identity_id,
  219. )
  220. cache.delete()