Ви не можете вибрати більше 25 тем Теми мають розпочинатися з літери або цифри, можуть містити дефіси (-) і не повинні перевищувати 35 символів.

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083
  1. import io
  2. from urllib.parse import urlparse
  3. from flask import make_response, redirect, request, send_file
  4. from flask_login import current_user
  5. from flask_restx import (
  6. Resource,
  7. reqparse,
  8. )
  9. from werkzeug.exceptions import Forbidden
  10. from configs import dify_config
  11. from controllers.console import api
  12. from controllers.console.wraps import (
  13. account_initialization_required,
  14. enterprise_license_required,
  15. setup_required,
  16. )
  17. from core.mcp.auth.auth_flow import auth, handle_callback
  18. from core.mcp.auth.auth_provider import OAuthClientProvider
  19. from core.mcp.error import MCPAuthError, MCPError
  20. from core.mcp.mcp_client import MCPClient
  21. from core.model_runtime.utils.encoders import jsonable_encoder
  22. from core.plugin.entities.plugin import ToolProviderID
  23. from core.plugin.impl.oauth import OAuthHandler
  24. from core.tools.entities.tool_entities import CredentialType
  25. from libs.helper import StrLen, alphanumeric, uuid_value
  26. from libs.login import login_required
  27. from services.plugin.oauth_service import OAuthProxyService
  28. from services.tools.api_tools_manage_service import ApiToolManageService
  29. from services.tools.builtin_tools_manage_service import BuiltinToolManageService
  30. from services.tools.mcp_tools_manage_service import MCPToolManageService
  31. from services.tools.tool_labels_service import ToolLabelsService
  32. from services.tools.tools_manage_service import ToolCommonService
  33. from services.tools.tools_transform_service import ToolTransformService
  34. from services.tools.workflow_tools_manage_service import WorkflowToolManageService
  35. def is_valid_url(url: str) -> bool:
  36. if not url:
  37. return False
  38. try:
  39. parsed = urlparse(url)
  40. return all([parsed.scheme, parsed.netloc]) and parsed.scheme in ["http", "https"]
  41. except Exception:
  42. return False
  43. class ToolProviderListApi(Resource):
  44. @setup_required
  45. @login_required
  46. @account_initialization_required
  47. def get(self):
  48. user = current_user
  49. user_id = user.id
  50. tenant_id = user.current_tenant_id
  51. req = reqparse.RequestParser()
  52. req.add_argument(
  53. "type",
  54. type=str,
  55. choices=["builtin", "model", "api", "workflow", "mcp"],
  56. required=False,
  57. nullable=True,
  58. location="args",
  59. )
  60. args = req.parse_args()
  61. return ToolCommonService.list_tool_providers(user_id, tenant_id, args.get("type", None))
  62. class ToolBuiltinProviderListToolsApi(Resource):
  63. @setup_required
  64. @login_required
  65. @account_initialization_required
  66. def get(self, provider):
  67. user = current_user
  68. tenant_id = user.current_tenant_id
  69. return jsonable_encoder(
  70. BuiltinToolManageService.list_builtin_tool_provider_tools(
  71. tenant_id,
  72. provider,
  73. )
  74. )
  75. class ToolBuiltinProviderInfoApi(Resource):
  76. @setup_required
  77. @login_required
  78. @account_initialization_required
  79. def get(self, provider):
  80. user = current_user
  81. tenant_id = user.current_tenant_id
  82. return jsonable_encoder(BuiltinToolManageService.get_builtin_tool_provider_info(tenant_id, provider))
  83. class ToolBuiltinProviderDeleteApi(Resource):
  84. @setup_required
  85. @login_required
  86. @account_initialization_required
  87. def post(self, provider):
  88. user = current_user
  89. if not user.is_admin_or_owner:
  90. raise Forbidden()
  91. tenant_id = user.current_tenant_id
  92. req = reqparse.RequestParser()
  93. req.add_argument("credential_id", type=str, required=True, nullable=False, location="json")
  94. args = req.parse_args()
  95. return BuiltinToolManageService.delete_builtin_tool_provider(
  96. tenant_id,
  97. provider,
  98. args["credential_id"],
  99. )
  100. class ToolBuiltinProviderAddApi(Resource):
  101. @setup_required
  102. @login_required
  103. @account_initialization_required
  104. def post(self, provider):
  105. user = current_user
  106. user_id = user.id
  107. tenant_id = user.current_tenant_id
  108. parser = reqparse.RequestParser()
  109. parser.add_argument("credentials", type=dict, required=True, nullable=False, location="json")
  110. parser.add_argument("name", type=StrLen(30), required=False, nullable=False, location="json")
  111. parser.add_argument("type", type=str, required=True, nullable=False, location="json")
  112. args = parser.parse_args()
  113. if args["type"] not in CredentialType.values():
  114. raise ValueError(f"Invalid credential type: {args['type']}")
  115. return BuiltinToolManageService.add_builtin_tool_provider(
  116. user_id=user_id,
  117. tenant_id=tenant_id,
  118. provider=provider,
  119. credentials=args["credentials"],
  120. name=args["name"],
  121. api_type=CredentialType.of(args["type"]),
  122. )
  123. class ToolBuiltinProviderUpdateApi(Resource):
  124. @setup_required
  125. @login_required
  126. @account_initialization_required
  127. def post(self, provider):
  128. user = current_user
  129. if not user.is_admin_or_owner:
  130. raise Forbidden()
  131. user_id = user.id
  132. tenant_id = user.current_tenant_id
  133. parser = reqparse.RequestParser()
  134. parser.add_argument("credential_id", type=str, required=True, nullable=False, location="json")
  135. parser.add_argument("credentials", type=dict, required=False, nullable=True, location="json")
  136. parser.add_argument("name", type=StrLen(30), required=False, nullable=True, location="json")
  137. args = parser.parse_args()
  138. result = BuiltinToolManageService.update_builtin_tool_provider(
  139. user_id=user_id,
  140. tenant_id=tenant_id,
  141. provider=provider,
  142. credential_id=args["credential_id"],
  143. credentials=args.get("credentials", None),
  144. name=args.get("name", ""),
  145. )
  146. return result
  147. class ToolBuiltinProviderGetCredentialsApi(Resource):
  148. @setup_required
  149. @login_required
  150. @account_initialization_required
  151. def get(self, provider):
  152. tenant_id = current_user.current_tenant_id
  153. return jsonable_encoder(
  154. BuiltinToolManageService.get_builtin_tool_provider_credentials(
  155. tenant_id=tenant_id,
  156. provider_name=provider,
  157. )
  158. )
  159. class ToolBuiltinProviderIconApi(Resource):
  160. @setup_required
  161. def get(self, provider):
  162. icon_bytes, mimetype = BuiltinToolManageService.get_builtin_tool_provider_icon(provider)
  163. icon_cache_max_age = dify_config.TOOL_ICON_CACHE_MAX_AGE
  164. return send_file(io.BytesIO(icon_bytes), mimetype=mimetype, max_age=icon_cache_max_age)
  165. class ToolApiProviderAddApi(Resource):
  166. @setup_required
  167. @login_required
  168. @account_initialization_required
  169. def post(self):
  170. user = current_user
  171. if not user.is_admin_or_owner:
  172. raise Forbidden()
  173. user_id = user.id
  174. tenant_id = user.current_tenant_id
  175. parser = reqparse.RequestParser()
  176. parser.add_argument("credentials", type=dict, required=True, nullable=False, location="json")
  177. parser.add_argument("schema_type", type=str, required=True, nullable=False, location="json")
  178. parser.add_argument("schema", type=str, required=True, nullable=False, location="json")
  179. parser.add_argument("provider", type=str, required=True, nullable=False, location="json")
  180. parser.add_argument("icon", type=dict, required=True, nullable=False, location="json")
  181. parser.add_argument("privacy_policy", type=str, required=False, nullable=True, location="json")
  182. parser.add_argument("labels", type=list[str], required=False, nullable=True, location="json", default=[])
  183. parser.add_argument("custom_disclaimer", type=str, required=False, nullable=True, location="json")
  184. args = parser.parse_args()
  185. return ApiToolManageService.create_api_tool_provider(
  186. user_id,
  187. tenant_id,
  188. args["provider"],
  189. args["icon"],
  190. args["credentials"],
  191. args["schema_type"],
  192. args["schema"],
  193. args.get("privacy_policy", ""),
  194. args.get("custom_disclaimer", ""),
  195. args.get("labels", []),
  196. )
  197. class ToolApiProviderGetRemoteSchemaApi(Resource):
  198. @setup_required
  199. @login_required
  200. @account_initialization_required
  201. def get(self):
  202. user = current_user
  203. user_id = user.id
  204. tenant_id = user.current_tenant_id
  205. parser = reqparse.RequestParser()
  206. parser.add_argument("url", type=str, required=True, nullable=False, location="args")
  207. args = parser.parse_args()
  208. return ApiToolManageService.get_api_tool_provider_remote_schema(
  209. user_id,
  210. tenant_id,
  211. args["url"],
  212. )
  213. class ToolApiProviderListToolsApi(Resource):
  214. @setup_required
  215. @login_required
  216. @account_initialization_required
  217. def get(self):
  218. user = current_user
  219. user_id = user.id
  220. tenant_id = user.current_tenant_id
  221. parser = reqparse.RequestParser()
  222. parser.add_argument("provider", type=str, required=True, nullable=False, location="args")
  223. args = parser.parse_args()
  224. return jsonable_encoder(
  225. ApiToolManageService.list_api_tool_provider_tools(
  226. user_id,
  227. tenant_id,
  228. args["provider"],
  229. )
  230. )
  231. class ToolApiProviderUpdateApi(Resource):
  232. @setup_required
  233. @login_required
  234. @account_initialization_required
  235. def post(self):
  236. user = current_user
  237. if not user.is_admin_or_owner:
  238. raise Forbidden()
  239. user_id = user.id
  240. tenant_id = user.current_tenant_id
  241. parser = reqparse.RequestParser()
  242. parser.add_argument("credentials", type=dict, required=True, nullable=False, location="json")
  243. parser.add_argument("schema_type", type=str, required=True, nullable=False, location="json")
  244. parser.add_argument("schema", type=str, required=True, nullable=False, location="json")
  245. parser.add_argument("provider", type=str, required=True, nullable=False, location="json")
  246. parser.add_argument("original_provider", type=str, required=True, nullable=False, location="json")
  247. parser.add_argument("icon", type=dict, required=True, nullable=False, location="json")
  248. parser.add_argument("privacy_policy", type=str, required=True, nullable=True, location="json")
  249. parser.add_argument("labels", type=list[str], required=False, nullable=True, location="json")
  250. parser.add_argument("custom_disclaimer", type=str, required=True, nullable=True, location="json")
  251. args = parser.parse_args()
  252. return ApiToolManageService.update_api_tool_provider(
  253. user_id,
  254. tenant_id,
  255. args["provider"],
  256. args["original_provider"],
  257. args["icon"],
  258. args["credentials"],
  259. args["schema_type"],
  260. args["schema"],
  261. args["privacy_policy"],
  262. args["custom_disclaimer"],
  263. args.get("labels", []),
  264. )
  265. class ToolApiProviderDeleteApi(Resource):
  266. @setup_required
  267. @login_required
  268. @account_initialization_required
  269. def post(self):
  270. user = current_user
  271. if not user.is_admin_or_owner:
  272. raise Forbidden()
  273. user_id = user.id
  274. tenant_id = user.current_tenant_id
  275. parser = reqparse.RequestParser()
  276. parser.add_argument("provider", type=str, required=True, nullable=False, location="json")
  277. args = parser.parse_args()
  278. return ApiToolManageService.delete_api_tool_provider(
  279. user_id,
  280. tenant_id,
  281. args["provider"],
  282. )
  283. class ToolApiProviderGetApi(Resource):
  284. @setup_required
  285. @login_required
  286. @account_initialization_required
  287. def get(self):
  288. user = current_user
  289. user_id = user.id
  290. tenant_id = user.current_tenant_id
  291. parser = reqparse.RequestParser()
  292. parser.add_argument("provider", type=str, required=True, nullable=False, location="args")
  293. args = parser.parse_args()
  294. return ApiToolManageService.get_api_tool_provider(
  295. user_id,
  296. tenant_id,
  297. args["provider"],
  298. )
  299. class ToolBuiltinProviderCredentialsSchemaApi(Resource):
  300. @setup_required
  301. @login_required
  302. @account_initialization_required
  303. def get(self, provider, credential_type):
  304. user = current_user
  305. tenant_id = user.current_tenant_id
  306. return jsonable_encoder(
  307. BuiltinToolManageService.list_builtin_provider_credentials_schema(
  308. provider, CredentialType.of(credential_type), tenant_id
  309. )
  310. )
  311. class ToolApiProviderSchemaApi(Resource):
  312. @setup_required
  313. @login_required
  314. @account_initialization_required
  315. def post(self):
  316. parser = reqparse.RequestParser()
  317. parser.add_argument("schema", type=str, required=True, nullable=False, location="json")
  318. args = parser.parse_args()
  319. return ApiToolManageService.parser_api_schema(
  320. schema=args["schema"],
  321. )
  322. class ToolApiProviderPreviousTestApi(Resource):
  323. @setup_required
  324. @login_required
  325. @account_initialization_required
  326. def post(self):
  327. parser = reqparse.RequestParser()
  328. parser.add_argument("tool_name", type=str, required=True, nullable=False, location="json")
  329. parser.add_argument("provider_name", type=str, required=False, nullable=False, location="json")
  330. parser.add_argument("credentials", type=dict, required=True, nullable=False, location="json")
  331. parser.add_argument("parameters", type=dict, required=True, nullable=False, location="json")
  332. parser.add_argument("schema_type", type=str, required=True, nullable=False, location="json")
  333. parser.add_argument("schema", type=str, required=True, nullable=False, location="json")
  334. args = parser.parse_args()
  335. return ApiToolManageService.test_api_tool_preview(
  336. current_user.current_tenant_id,
  337. args["provider_name"] or "",
  338. args["tool_name"],
  339. args["credentials"],
  340. args["parameters"],
  341. args["schema_type"],
  342. args["schema"],
  343. )
  344. class ToolWorkflowProviderCreateApi(Resource):
  345. @setup_required
  346. @login_required
  347. @account_initialization_required
  348. def post(self):
  349. user = current_user
  350. if not user.is_admin_or_owner:
  351. raise Forbidden()
  352. user_id = user.id
  353. tenant_id = user.current_tenant_id
  354. reqparser = reqparse.RequestParser()
  355. reqparser.add_argument("workflow_app_id", type=uuid_value, required=True, nullable=False, location="json")
  356. reqparser.add_argument("name", type=alphanumeric, required=True, nullable=False, location="json")
  357. reqparser.add_argument("label", type=str, required=True, nullable=False, location="json")
  358. reqparser.add_argument("description", type=str, required=True, nullable=False, location="json")
  359. reqparser.add_argument("icon", type=dict, required=True, nullable=False, location="json")
  360. reqparser.add_argument("parameters", type=list[dict], required=True, nullable=False, location="json")
  361. reqparser.add_argument("privacy_policy", type=str, required=False, nullable=True, location="json", default="")
  362. reqparser.add_argument("labels", type=list[str], required=False, nullable=True, location="json")
  363. args = reqparser.parse_args()
  364. return WorkflowToolManageService.create_workflow_tool(
  365. user_id=user_id,
  366. tenant_id=tenant_id,
  367. workflow_app_id=args["workflow_app_id"],
  368. name=args["name"],
  369. label=args["label"],
  370. icon=args["icon"],
  371. description=args["description"],
  372. parameters=args["parameters"],
  373. privacy_policy=args["privacy_policy"],
  374. labels=args["labels"],
  375. )
  376. class ToolWorkflowProviderUpdateApi(Resource):
  377. @setup_required
  378. @login_required
  379. @account_initialization_required
  380. def post(self):
  381. user = current_user
  382. if not user.is_admin_or_owner:
  383. raise Forbidden()
  384. user_id = user.id
  385. tenant_id = user.current_tenant_id
  386. reqparser = reqparse.RequestParser()
  387. reqparser.add_argument("workflow_tool_id", type=uuid_value, required=True, nullable=False, location="json")
  388. reqparser.add_argument("name", type=alphanumeric, required=True, nullable=False, location="json")
  389. reqparser.add_argument("label", type=str, required=True, nullable=False, location="json")
  390. reqparser.add_argument("description", type=str, required=True, nullable=False, location="json")
  391. reqparser.add_argument("icon", type=dict, required=True, nullable=False, location="json")
  392. reqparser.add_argument("parameters", type=list[dict], required=True, nullable=False, location="json")
  393. reqparser.add_argument("privacy_policy", type=str, required=False, nullable=True, location="json", default="")
  394. reqparser.add_argument("labels", type=list[str], required=False, nullable=True, location="json")
  395. args = reqparser.parse_args()
  396. if not args["workflow_tool_id"]:
  397. raise ValueError("incorrect workflow_tool_id")
  398. return WorkflowToolManageService.update_workflow_tool(
  399. user_id,
  400. tenant_id,
  401. args["workflow_tool_id"],
  402. args["name"],
  403. args["label"],
  404. args["icon"],
  405. args["description"],
  406. args["parameters"],
  407. args["privacy_policy"],
  408. args.get("labels", []),
  409. )
  410. class ToolWorkflowProviderDeleteApi(Resource):
  411. @setup_required
  412. @login_required
  413. @account_initialization_required
  414. def post(self):
  415. user = current_user
  416. if not user.is_admin_or_owner:
  417. raise Forbidden()
  418. user_id = user.id
  419. tenant_id = user.current_tenant_id
  420. reqparser = reqparse.RequestParser()
  421. reqparser.add_argument("workflow_tool_id", type=uuid_value, required=True, nullable=False, location="json")
  422. args = reqparser.parse_args()
  423. return WorkflowToolManageService.delete_workflow_tool(
  424. user_id,
  425. tenant_id,
  426. args["workflow_tool_id"],
  427. )
  428. class ToolWorkflowProviderGetApi(Resource):
  429. @setup_required
  430. @login_required
  431. @account_initialization_required
  432. def get(self):
  433. user = current_user
  434. user_id = user.id
  435. tenant_id = user.current_tenant_id
  436. parser = reqparse.RequestParser()
  437. parser.add_argument("workflow_tool_id", type=uuid_value, required=False, nullable=True, location="args")
  438. parser.add_argument("workflow_app_id", type=uuid_value, required=False, nullable=True, location="args")
  439. args = parser.parse_args()
  440. if args.get("workflow_tool_id"):
  441. tool = WorkflowToolManageService.get_workflow_tool_by_tool_id(
  442. user_id,
  443. tenant_id,
  444. args["workflow_tool_id"],
  445. )
  446. elif args.get("workflow_app_id"):
  447. tool = WorkflowToolManageService.get_workflow_tool_by_app_id(
  448. user_id,
  449. tenant_id,
  450. args["workflow_app_id"],
  451. )
  452. else:
  453. raise ValueError("incorrect workflow_tool_id or workflow_app_id")
  454. return jsonable_encoder(tool)
  455. class ToolWorkflowProviderListToolApi(Resource):
  456. @setup_required
  457. @login_required
  458. @account_initialization_required
  459. def get(self):
  460. user = current_user
  461. user_id = user.id
  462. tenant_id = user.current_tenant_id
  463. parser = reqparse.RequestParser()
  464. parser.add_argument("workflow_tool_id", type=uuid_value, required=True, nullable=False, location="args")
  465. args = parser.parse_args()
  466. return jsonable_encoder(
  467. WorkflowToolManageService.list_single_workflow_tools(
  468. user_id,
  469. tenant_id,
  470. args["workflow_tool_id"],
  471. )
  472. )
  473. class ToolBuiltinListApi(Resource):
  474. @setup_required
  475. @login_required
  476. @account_initialization_required
  477. def get(self):
  478. user = current_user
  479. user_id = user.id
  480. tenant_id = user.current_tenant_id
  481. return jsonable_encoder(
  482. [
  483. provider.to_dict()
  484. for provider in BuiltinToolManageService.list_builtin_tools(
  485. user_id,
  486. tenant_id,
  487. )
  488. ]
  489. )
  490. class ToolApiListApi(Resource):
  491. @setup_required
  492. @login_required
  493. @account_initialization_required
  494. def get(self):
  495. user = current_user
  496. tenant_id = user.current_tenant_id
  497. return jsonable_encoder(
  498. [
  499. provider.to_dict()
  500. for provider in ApiToolManageService.list_api_tools(
  501. tenant_id,
  502. )
  503. ]
  504. )
  505. class ToolWorkflowListApi(Resource):
  506. @setup_required
  507. @login_required
  508. @account_initialization_required
  509. def get(self):
  510. user = current_user
  511. user_id = user.id
  512. tenant_id = user.current_tenant_id
  513. return jsonable_encoder(
  514. [
  515. provider.to_dict()
  516. for provider in WorkflowToolManageService.list_tenant_workflow_tools(
  517. user_id,
  518. tenant_id,
  519. )
  520. ]
  521. )
  522. class ToolLabelsApi(Resource):
  523. @setup_required
  524. @login_required
  525. @account_initialization_required
  526. @enterprise_license_required
  527. def get(self):
  528. return jsonable_encoder(ToolLabelsService.list_tool_labels())
  529. class ToolPluginOAuthApi(Resource):
  530. @setup_required
  531. @login_required
  532. @account_initialization_required
  533. def get(self, provider):
  534. tool_provider = ToolProviderID(provider)
  535. plugin_id = tool_provider.plugin_id
  536. provider_name = tool_provider.provider_name
  537. # todo check permission
  538. user = current_user
  539. if not user.is_admin_or_owner:
  540. raise Forbidden()
  541. tenant_id = user.current_tenant_id
  542. oauth_client_params = BuiltinToolManageService.get_oauth_client(tenant_id=tenant_id, provider=provider)
  543. if oauth_client_params is None:
  544. raise Forbidden("no oauth available client config found for this tool provider")
  545. oauth_handler = OAuthHandler()
  546. context_id = OAuthProxyService.create_proxy_context(
  547. user_id=current_user.id, tenant_id=tenant_id, plugin_id=plugin_id, provider=provider_name
  548. )
  549. redirect_uri = f"{dify_config.CONSOLE_API_URL}/console/api/oauth/plugin/{provider}/tool/callback"
  550. authorization_url_response = oauth_handler.get_authorization_url(
  551. tenant_id=tenant_id,
  552. user_id=user.id,
  553. plugin_id=plugin_id,
  554. provider=provider_name,
  555. redirect_uri=redirect_uri,
  556. system_credentials=oauth_client_params,
  557. )
  558. response = make_response(jsonable_encoder(authorization_url_response))
  559. response.set_cookie(
  560. "context_id",
  561. context_id,
  562. httponly=True,
  563. samesite="Lax",
  564. max_age=OAuthProxyService.__MAX_AGE__,
  565. )
  566. return response
  567. class ToolOAuthCallback(Resource):
  568. @setup_required
  569. def get(self, provider):
  570. context_id = request.cookies.get("context_id")
  571. if not context_id:
  572. raise Forbidden("context_id not found")
  573. context = OAuthProxyService.use_proxy_context(context_id)
  574. if context is None:
  575. raise Forbidden("Invalid context_id")
  576. tool_provider = ToolProviderID(provider)
  577. plugin_id = tool_provider.plugin_id
  578. provider_name = tool_provider.provider_name
  579. user_id, tenant_id = context.get("user_id"), context.get("tenant_id")
  580. oauth_handler = OAuthHandler()
  581. oauth_client_params = BuiltinToolManageService.get_oauth_client(tenant_id, provider)
  582. if oauth_client_params is None:
  583. raise Forbidden("no oauth available client config found for this tool provider")
  584. redirect_uri = f"{dify_config.CONSOLE_API_URL}/console/api/oauth/plugin/{provider}/tool/callback"
  585. credentials_response = oauth_handler.get_credentials(
  586. tenant_id=tenant_id,
  587. user_id=user_id,
  588. plugin_id=plugin_id,
  589. provider=provider_name,
  590. redirect_uri=redirect_uri,
  591. system_credentials=oauth_client_params,
  592. request=request,
  593. )
  594. credentials = credentials_response.credentials
  595. expires_at = credentials_response.expires_at
  596. if not credentials:
  597. raise Exception("the plugin credentials failed")
  598. # add credentials to database
  599. BuiltinToolManageService.add_builtin_tool_provider(
  600. user_id=user_id,
  601. tenant_id=tenant_id,
  602. provider=provider,
  603. credentials=dict(credentials),
  604. expires_at=expires_at,
  605. api_type=CredentialType.OAUTH2,
  606. )
  607. return redirect(f"{dify_config.CONSOLE_WEB_URL}/oauth-callback")
  608. class ToolBuiltinProviderSetDefaultApi(Resource):
  609. @setup_required
  610. @login_required
  611. @account_initialization_required
  612. def post(self, provider):
  613. parser = reqparse.RequestParser()
  614. parser.add_argument("id", type=str, required=True, nullable=False, location="json")
  615. args = parser.parse_args()
  616. return BuiltinToolManageService.set_default_provider(
  617. tenant_id=current_user.current_tenant_id, user_id=current_user.id, provider=provider, id=args["id"]
  618. )
  619. class ToolOAuthCustomClient(Resource):
  620. @setup_required
  621. @login_required
  622. @account_initialization_required
  623. def post(self, provider):
  624. parser = reqparse.RequestParser()
  625. parser.add_argument("client_params", type=dict, required=False, nullable=True, location="json")
  626. parser.add_argument("enable_oauth_custom_client", type=bool, required=False, nullable=True, location="json")
  627. args = parser.parse_args()
  628. user = current_user
  629. if not user.is_admin_or_owner:
  630. raise Forbidden()
  631. return BuiltinToolManageService.save_custom_oauth_client_params(
  632. tenant_id=user.current_tenant_id,
  633. provider=provider,
  634. client_params=args.get("client_params", {}),
  635. enable_oauth_custom_client=args.get("enable_oauth_custom_client", True),
  636. )
  637. @setup_required
  638. @login_required
  639. @account_initialization_required
  640. def get(self, provider):
  641. return jsonable_encoder(
  642. BuiltinToolManageService.get_custom_oauth_client_params(
  643. tenant_id=current_user.current_tenant_id, provider=provider
  644. )
  645. )
  646. @setup_required
  647. @login_required
  648. @account_initialization_required
  649. def delete(self, provider):
  650. return jsonable_encoder(
  651. BuiltinToolManageService.delete_custom_oauth_client_params(
  652. tenant_id=current_user.current_tenant_id, provider=provider
  653. )
  654. )
  655. class ToolBuiltinProviderGetOauthClientSchemaApi(Resource):
  656. @setup_required
  657. @login_required
  658. @account_initialization_required
  659. def get(self, provider):
  660. return jsonable_encoder(
  661. BuiltinToolManageService.get_builtin_tool_provider_oauth_client_schema(
  662. tenant_id=current_user.current_tenant_id, provider_name=provider
  663. )
  664. )
  665. class ToolBuiltinProviderGetCredentialInfoApi(Resource):
  666. @setup_required
  667. @login_required
  668. @account_initialization_required
  669. def get(self, provider):
  670. tenant_id = current_user.current_tenant_id
  671. return jsonable_encoder(
  672. BuiltinToolManageService.get_builtin_tool_provider_credential_info(
  673. tenant_id=tenant_id,
  674. provider=provider,
  675. )
  676. )
  677. class ToolProviderMCPApi(Resource):
  678. @setup_required
  679. @login_required
  680. @account_initialization_required
  681. def post(self):
  682. parser = reqparse.RequestParser()
  683. parser.add_argument("server_url", type=str, required=True, nullable=False, location="json")
  684. parser.add_argument("name", type=str, required=True, nullable=False, location="json")
  685. parser.add_argument("icon", type=str, required=True, nullable=False, location="json")
  686. parser.add_argument("icon_type", type=str, required=True, nullable=False, location="json")
  687. parser.add_argument("icon_background", type=str, required=False, nullable=True, location="json", default="")
  688. parser.add_argument("server_identifier", type=str, required=True, nullable=False, location="json")
  689. parser.add_argument("timeout", type=float, required=False, nullable=False, location="json", default=30)
  690. parser.add_argument(
  691. "sse_read_timeout", type=float, required=False, nullable=False, location="json", default=300
  692. )
  693. args = parser.parse_args()
  694. user = current_user
  695. if not is_valid_url(args["server_url"]):
  696. raise ValueError("Server URL is not valid.")
  697. return jsonable_encoder(
  698. MCPToolManageService.create_mcp_provider(
  699. tenant_id=user.current_tenant_id,
  700. server_url=args["server_url"],
  701. name=args["name"],
  702. icon=args["icon"],
  703. icon_type=args["icon_type"],
  704. icon_background=args["icon_background"],
  705. user_id=user.id,
  706. server_identifier=args["server_identifier"],
  707. timeout=args["timeout"],
  708. sse_read_timeout=args["sse_read_timeout"],
  709. )
  710. )
  711. @setup_required
  712. @login_required
  713. @account_initialization_required
  714. def put(self):
  715. parser = reqparse.RequestParser()
  716. parser.add_argument("server_url", type=str, required=True, nullable=False, location="json")
  717. parser.add_argument("name", type=str, required=True, nullable=False, location="json")
  718. parser.add_argument("icon", type=str, required=True, nullable=False, location="json")
  719. parser.add_argument("icon_type", type=str, required=True, nullable=False, location="json")
  720. parser.add_argument("icon_background", type=str, required=False, nullable=True, location="json")
  721. parser.add_argument("provider_id", type=str, required=True, nullable=False, location="json")
  722. parser.add_argument("server_identifier", type=str, required=True, nullable=False, location="json")
  723. parser.add_argument("timeout", type=float, required=False, nullable=True, location="json")
  724. parser.add_argument("sse_read_timeout", type=float, required=False, nullable=True, location="json")
  725. args = parser.parse_args()
  726. if not is_valid_url(args["server_url"]):
  727. if "[__HIDDEN__]" in args["server_url"]:
  728. pass
  729. else:
  730. raise ValueError("Server URL is not valid.")
  731. MCPToolManageService.update_mcp_provider(
  732. tenant_id=current_user.current_tenant_id,
  733. provider_id=args["provider_id"],
  734. server_url=args["server_url"],
  735. name=args["name"],
  736. icon=args["icon"],
  737. icon_type=args["icon_type"],
  738. icon_background=args["icon_background"],
  739. server_identifier=args["server_identifier"],
  740. timeout=args.get("timeout"),
  741. sse_read_timeout=args.get("sse_read_timeout"),
  742. )
  743. return {"result": "success"}
  744. @setup_required
  745. @login_required
  746. @account_initialization_required
  747. def delete(self):
  748. parser = reqparse.RequestParser()
  749. parser.add_argument("provider_id", type=str, required=True, nullable=False, location="json")
  750. args = parser.parse_args()
  751. MCPToolManageService.delete_mcp_tool(tenant_id=current_user.current_tenant_id, provider_id=args["provider_id"])
  752. return {"result": "success"}
  753. class ToolMCPAuthApi(Resource):
  754. @setup_required
  755. @login_required
  756. @account_initialization_required
  757. def post(self):
  758. parser = reqparse.RequestParser()
  759. parser.add_argument("provider_id", type=str, required=True, nullable=False, location="json")
  760. parser.add_argument("authorization_code", type=str, required=False, nullable=True, location="json")
  761. args = parser.parse_args()
  762. provider_id = args["provider_id"]
  763. tenant_id = current_user.current_tenant_id
  764. provider = MCPToolManageService.get_mcp_provider_by_provider_id(provider_id, tenant_id)
  765. if not provider:
  766. raise ValueError("provider not found")
  767. try:
  768. with MCPClient(
  769. provider.decrypted_server_url,
  770. provider_id,
  771. tenant_id,
  772. authed=False,
  773. authorization_code=args["authorization_code"],
  774. for_list=True,
  775. ):
  776. MCPToolManageService.update_mcp_provider_credentials(
  777. mcp_provider=provider,
  778. credentials=provider.decrypted_credentials,
  779. authed=True,
  780. )
  781. return {"result": "success"}
  782. except MCPAuthError:
  783. auth_provider = OAuthClientProvider(provider_id, tenant_id, for_list=True)
  784. return auth(auth_provider, provider.decrypted_server_url, args["authorization_code"])
  785. except MCPError as e:
  786. MCPToolManageService.update_mcp_provider_credentials(
  787. mcp_provider=provider,
  788. credentials={},
  789. authed=False,
  790. )
  791. raise ValueError(f"Failed to connect to MCP server: {e}") from e
  792. class ToolMCPDetailApi(Resource):
  793. @setup_required
  794. @login_required
  795. @account_initialization_required
  796. def get(self, provider_id):
  797. user = current_user
  798. provider = MCPToolManageService.get_mcp_provider_by_provider_id(provider_id, user.current_tenant_id)
  799. return jsonable_encoder(ToolTransformService.mcp_provider_to_user_provider(provider, for_list=True))
  800. class ToolMCPListAllApi(Resource):
  801. @setup_required
  802. @login_required
  803. @account_initialization_required
  804. def get(self):
  805. user = current_user
  806. tenant_id = user.current_tenant_id
  807. tools = MCPToolManageService.retrieve_mcp_tools(tenant_id=tenant_id)
  808. return [tool.to_dict() for tool in tools]
  809. class ToolMCPUpdateApi(Resource):
  810. @setup_required
  811. @login_required
  812. @account_initialization_required
  813. def get(self, provider_id):
  814. tenant_id = current_user.current_tenant_id
  815. tools = MCPToolManageService.list_mcp_tool_from_remote_server(
  816. tenant_id=tenant_id,
  817. provider_id=provider_id,
  818. )
  819. return jsonable_encoder(tools)
  820. class ToolMCPCallbackApi(Resource):
  821. def get(self):
  822. parser = reqparse.RequestParser()
  823. parser.add_argument("code", type=str, required=True, nullable=False, location="args")
  824. parser.add_argument("state", type=str, required=True, nullable=False, location="args")
  825. args = parser.parse_args()
  826. state_key = args["state"]
  827. authorization_code = args["code"]
  828. handle_callback(state_key, authorization_code)
  829. return redirect(f"{dify_config.CONSOLE_WEB_URL}/oauth-callback")
  830. # tool provider
  831. api.add_resource(ToolProviderListApi, "/workspaces/current/tool-providers")
  832. # tool oauth
  833. api.add_resource(ToolPluginOAuthApi, "/oauth/plugin/<path:provider>/tool/authorization-url")
  834. api.add_resource(ToolOAuthCallback, "/oauth/plugin/<path:provider>/tool/callback")
  835. api.add_resource(ToolOAuthCustomClient, "/workspaces/current/tool-provider/builtin/<path:provider>/oauth/custom-client")
  836. # builtin tool provider
  837. api.add_resource(ToolBuiltinProviderListToolsApi, "/workspaces/current/tool-provider/builtin/<path:provider>/tools")
  838. api.add_resource(ToolBuiltinProviderInfoApi, "/workspaces/current/tool-provider/builtin/<path:provider>/info")
  839. api.add_resource(ToolBuiltinProviderAddApi, "/workspaces/current/tool-provider/builtin/<path:provider>/add")
  840. api.add_resource(ToolBuiltinProviderDeleteApi, "/workspaces/current/tool-provider/builtin/<path:provider>/delete")
  841. api.add_resource(ToolBuiltinProviderUpdateApi, "/workspaces/current/tool-provider/builtin/<path:provider>/update")
  842. api.add_resource(
  843. ToolBuiltinProviderSetDefaultApi, "/workspaces/current/tool-provider/builtin/<path:provider>/default-credential"
  844. )
  845. api.add_resource(
  846. ToolBuiltinProviderGetCredentialInfoApi, "/workspaces/current/tool-provider/builtin/<path:provider>/credential/info"
  847. )
  848. api.add_resource(
  849. ToolBuiltinProviderGetCredentialsApi, "/workspaces/current/tool-provider/builtin/<path:provider>/credentials"
  850. )
  851. api.add_resource(
  852. ToolBuiltinProviderCredentialsSchemaApi,
  853. "/workspaces/current/tool-provider/builtin/<path:provider>/credential/schema/<path:credential_type>",
  854. )
  855. api.add_resource(
  856. ToolBuiltinProviderGetOauthClientSchemaApi,
  857. "/workspaces/current/tool-provider/builtin/<path:provider>/oauth/client-schema",
  858. )
  859. api.add_resource(ToolBuiltinProviderIconApi, "/workspaces/current/tool-provider/builtin/<path:provider>/icon")
  860. # api tool provider
  861. api.add_resource(ToolApiProviderAddApi, "/workspaces/current/tool-provider/api/add")
  862. api.add_resource(ToolApiProviderGetRemoteSchemaApi, "/workspaces/current/tool-provider/api/remote")
  863. api.add_resource(ToolApiProviderListToolsApi, "/workspaces/current/tool-provider/api/tools")
  864. api.add_resource(ToolApiProviderUpdateApi, "/workspaces/current/tool-provider/api/update")
  865. api.add_resource(ToolApiProviderDeleteApi, "/workspaces/current/tool-provider/api/delete")
  866. api.add_resource(ToolApiProviderGetApi, "/workspaces/current/tool-provider/api/get")
  867. api.add_resource(ToolApiProviderSchemaApi, "/workspaces/current/tool-provider/api/schema")
  868. api.add_resource(ToolApiProviderPreviousTestApi, "/workspaces/current/tool-provider/api/test/pre")
  869. # workflow tool provider
  870. api.add_resource(ToolWorkflowProviderCreateApi, "/workspaces/current/tool-provider/workflow/create")
  871. api.add_resource(ToolWorkflowProviderUpdateApi, "/workspaces/current/tool-provider/workflow/update")
  872. api.add_resource(ToolWorkflowProviderDeleteApi, "/workspaces/current/tool-provider/workflow/delete")
  873. api.add_resource(ToolWorkflowProviderGetApi, "/workspaces/current/tool-provider/workflow/get")
  874. api.add_resource(ToolWorkflowProviderListToolApi, "/workspaces/current/tool-provider/workflow/tools")
  875. # mcp tool provider
  876. api.add_resource(ToolMCPDetailApi, "/workspaces/current/tool-provider/mcp/tools/<path:provider_id>")
  877. api.add_resource(ToolProviderMCPApi, "/workspaces/current/tool-provider/mcp")
  878. api.add_resource(ToolMCPUpdateApi, "/workspaces/current/tool-provider/mcp/update/<path:provider_id>")
  879. api.add_resource(ToolMCPAuthApi, "/workspaces/current/tool-provider/mcp/auth")
  880. api.add_resource(ToolMCPCallbackApi, "/mcp/oauth/callback")
  881. api.add_resource(ToolBuiltinListApi, "/workspaces/current/tools/builtin")
  882. api.add_resource(ToolApiListApi, "/workspaces/current/tools/api")
  883. api.add_resource(ToolMCPListAllApi, "/workspaces/current/tools/mcp")
  884. api.add_resource(ToolWorkflowListApi, "/workspaces/current/tools/workflow")
  885. api.add_resource(ToolLabelsApi, "/workspaces/current/tool-labels")