| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289 | 
							- import os
 - from typing import Any, Union
 - 
 - from pydantic import BaseModel
 - from yaml import FullLoader, load
 - 
 - from core.helper import encrypter
 - from core.helper.tool_parameter_cache import ToolParameterCache, ToolParameterCacheType
 - from core.helper.tool_provider_cache import ToolProviderCredentialsCache, ToolProviderCredentialsCacheType
 - from core.tools.entities.tool_entities import (
 -     ModelToolConfiguration,
 -     ModelToolProviderConfiguration,
 -     ToolParameter,
 -     ToolProviderCredentials,
 - )
 - from core.tools.provider.tool_provider import ToolProviderController
 - from core.tools.tool.tool import Tool
 - 
 - 
 - class ToolConfigurationManager(BaseModel):
 -     tenant_id: str
 -     provider_controller: ToolProviderController
 - 
 -     def _deep_copy(self, credentials: dict[str, str]) -> dict[str, str]:
 -         """
 -         deep copy credentials
 -         """
 -         return {key: value for key, value in credentials.items()}
 -     
 -     def encrypt_tool_credentials(self, credentials: dict[str, str]) -> dict[str, str]:
 -         """
 -         encrypt tool credentials with tenant id
 - 
 -         return a deep copy of credentials with encrypted values
 -         """
 -         credentials = self._deep_copy(credentials)
 - 
 -         # get fields need to be decrypted
 -         fields = self.provider_controller.get_credentials_schema()
 -         for field_name, field in fields.items():
 -             if field.type == ToolProviderCredentials.CredentialsType.SECRET_INPUT:
 -                 if field_name in credentials:
 -                     encrypted = encrypter.encrypt_token(self.tenant_id, credentials[field_name])
 -                     credentials[field_name] = encrypted
 -         
 -         return credentials
 -     
 -     def mask_tool_credentials(self, credentials: dict[str, Any]) -> dict[str, Any]:
 -         """
 -         mask tool credentials
 - 
 -         return a deep copy of credentials with masked values
 -         """
 -         credentials = self._deep_copy(credentials)
 - 
 -         # get fields need to be decrypted
 -         fields = self.provider_controller.get_credentials_schema()
 -         for field_name, field in fields.items():
 -             if field.type == ToolProviderCredentials.CredentialsType.SECRET_INPUT:
 -                 if field_name in credentials:
 -                     if len(credentials[field_name]) > 6:
 -                         credentials[field_name] = \
 -                             credentials[field_name][:2] + \
 -                             '*' * (len(credentials[field_name]) - 4) +\
 -                             credentials[field_name][-2:]
 -                     else:
 -                         credentials[field_name] = '*' * len(credentials[field_name])
 - 
 -         return credentials
 - 
 -     def decrypt_tool_credentials(self, credentials: dict[str, str]) -> dict[str, str]:
 -         """
 -         decrypt tool credentials with tenant id
 - 
 -         return a deep copy of credentials with decrypted values
 -         """
 -         cache = ToolProviderCredentialsCache(
 -             tenant_id=self.tenant_id, 
 -             identity_id=f'{self.provider_controller.app_type.value}.{self.provider_controller.identity.name}',
 -             cache_type=ToolProviderCredentialsCacheType.PROVIDER
 -         )
 -         cached_credentials = cache.get()
 -         if cached_credentials:
 -             return cached_credentials
 -         credentials = self._deep_copy(credentials)
 -         # get fields need to be decrypted
 -         fields = self.provider_controller.get_credentials_schema()
 -         for field_name, field in fields.items():
 -             if field.type == ToolProviderCredentials.CredentialsType.SECRET_INPUT:
 -                 if field_name in credentials:
 -                     try:
 -                         credentials[field_name] = encrypter.decrypt_token(self.tenant_id, credentials[field_name])
 -                     except:
 -                         pass
 - 
 -         cache.set(credentials)
 -         return credentials
 -     
 -     def delete_tool_credentials_cache(self):
 -         cache = ToolProviderCredentialsCache(
 -             tenant_id=self.tenant_id, 
 -             identity_id=f'{self.provider_controller.app_type.value}.{self.provider_controller.identity.name}',
 -             cache_type=ToolProviderCredentialsCacheType.PROVIDER
 -         )
 -         cache.delete()
 - 
 - class ToolParameterConfigurationManager(BaseModel):
 -     """
 -     Tool parameter configuration manager
 -     """
 -     tenant_id: str
 -     tool_runtime: Tool
 -     provider_name: str
 -     provider_type: str
 - 
 -     def _deep_copy(self, parameters: dict[str, Any]) -> dict[str, Any]:
 -         """
 -         deep copy parameters
 -         """
 -         return {key: value for key, value in parameters.items()}
 -     
 -     def _merge_parameters(self) -> list[ToolParameter]:
 -         """
 -         merge parameters
 -         """
 -         # get tool parameters
 -         tool_parameters = self.tool_runtime.parameters or []
 -         # get tool runtime parameters
 -         runtime_parameters = self.tool_runtime.get_runtime_parameters() or []
 -         # override parameters
 -         current_parameters = tool_parameters.copy()
 -         for runtime_parameter in runtime_parameters:
 -             found = False
 -             for index, parameter in enumerate(current_parameters):
 -                 if parameter.name == runtime_parameter.name and parameter.form == runtime_parameter.form:
 -                     current_parameters[index] = runtime_parameter
 -                     found = True
 -                     break
 - 
 -             if not found and runtime_parameter.form == ToolParameter.ToolParameterForm.FORM:
 -                 current_parameters.append(runtime_parameter)
 - 
 -         return current_parameters
 -     
 -     def mask_tool_parameters(self, parameters: dict[str, Any]) -> dict[str, Any]:
 -         """
 -         mask tool parameters
 - 
 -         return a deep copy of parameters with masked values
 -         """
 -         parameters = self._deep_copy(parameters)
 - 
 -         # override parameters
 -         current_parameters = self._merge_parameters()
 - 
 -         for parameter in current_parameters:
 -             if parameter.form == ToolParameter.ToolParameterForm.FORM and parameter.type == ToolParameter.ToolParameterType.SECRET_INPUT:
 -                 if parameter.name in parameters:
 -                     if len(parameters[parameter.name]) > 6:
 -                         parameters[parameter.name] = \
 -                             parameters[parameter.name][:2] + \
 -                             '*' * (len(parameters[parameter.name]) - 4) +\
 -                             parameters[parameter.name][-2:]
 -                     else:
 -                         parameters[parameter.name] = '*' * len(parameters[parameter.name])
 - 
 -         return parameters
 -     
 -     def encrypt_tool_parameters(self, parameters: dict[str, Any]) -> dict[str, Any]:
 -         """
 -         encrypt tool parameters with tenant id
 - 
 -         return a deep copy of parameters with encrypted values
 -         """
 -         # override parameters
 -         current_parameters = self._merge_parameters()
 - 
 -         for parameter in current_parameters:
 -             if parameter.form == ToolParameter.ToolParameterForm.FORM and parameter.type == ToolParameter.ToolParameterType.SECRET_INPUT:
 -                 if parameter.name in parameters:
 -                     encrypted = encrypter.encrypt_token(self.tenant_id, parameters[parameter.name])
 -                     parameters[parameter.name] = encrypted
 -         
 -         return parameters
 -     
 -     def decrypt_tool_parameters(self, parameters: dict[str, Any]) -> dict[str, Any]:
 -         """
 -         decrypt tool parameters with tenant id
 - 
 -         return a deep copy of parameters with decrypted values
 -         """
 -         cache = ToolParameterCache(
 -             tenant_id=self.tenant_id, 
 -             provider=f'{self.provider_type}.{self.provider_name}',
 -             tool_name=self.tool_runtime.identity.name,
 -             cache_type=ToolParameterCacheType.PARAMETER
 -         )
 -         cached_parameters = cache.get()
 -         if cached_parameters:
 -             return cached_parameters
 - 
 -         # override parameters
 -         current_parameters = self._merge_parameters()
 -         has_secret_input = False
 - 
 -         for parameter in current_parameters:
 -             if parameter.form == ToolParameter.ToolParameterForm.FORM and parameter.type == ToolParameter.ToolParameterType.SECRET_INPUT:
 -                 if parameter.name in parameters:
 -                     try:
 -                         has_secret_input = True
 -                         parameters[parameter.name] = encrypter.decrypt_token(self.tenant_id, parameters[parameter.name])
 -                     except:
 -                         pass
 -         
 -         if has_secret_input:
 -             cache.set(parameters)
 - 
 -         return parameters
 -     
 -     def delete_tool_parameters_cache(self):
 -         cache = ToolParameterCache(
 -             tenant_id=self.tenant_id, 
 -             provider=f'{self.provider_type}.{self.provider_name}',
 -             tool_name=self.tool_runtime.identity.name,
 -             cache_type=ToolParameterCacheType.PARAMETER
 -         )
 -         cache.delete()
 - 
 - class ModelToolConfigurationManager:
 -     """
 -     Model as tool configuration
 -     """
 -     _configurations: dict[str, ModelToolProviderConfiguration] = {}
 -     _model_configurations: dict[str, ModelToolConfiguration] = {}
 -     _inited = False
 - 
 -     @classmethod
 -     def _init_configuration(cls):
 -         """
 -         init configuration
 -         """
 -         
 -         absolute_path = os.path.abspath(os.path.dirname(__file__))
 -         model_tools_path = os.path.join(absolute_path, '..', 'model_tools')
 - 
 -         # get all .yaml file
 -         files = [f for f in os.listdir(model_tools_path) if f.endswith('.yaml')]
 - 
 -         for file in files:
 -             provider = file.split('.')[0]
 -             with open(os.path.join(model_tools_path, file), encoding='utf-8') as f:
 -                 configurations = ModelToolProviderConfiguration(**load(f, Loader=FullLoader))
 -                 models = configurations.models or []
 -                 for model in models:
 -                     model_key = f'{provider}.{model.model}'
 -                     cls._model_configurations[model_key] = model
 - 
 -                 cls._configurations[provider] = configurations
 -         cls._inited = True
 - 
 -     @classmethod
 -     def get_configuration(cls, provider: str) -> Union[ModelToolProviderConfiguration, None]:
 -         """
 -         get configuration by provider
 -         """
 -         if not cls._inited:
 -             cls._init_configuration()
 -         return cls._configurations.get(provider, None)
 -     
 -     @classmethod
 -     def get_all_configuration(cls) -> dict[str, ModelToolProviderConfiguration]:
 -         """
 -         get all configurations
 -         """
 -         if not cls._inited:
 -             cls._init_configuration()
 -         return cls._configurations
 -     
 -     @classmethod
 -     def get_model_configuration(cls, provider: str, model: str) -> Union[ModelToolConfiguration, None]:
 -         """
 -         get model configuration
 -         """
 -         key = f'{provider}.{model}'
 - 
 -         if not cls._inited:
 -             cls._init_configuration()
 - 
 -         return cls._model_configurations.get(key, None)
 
 
  |