Nevar pievienot vairāk kā 25 tēmas Tēmai ir jāsākas ar burtu vai ciparu, tā var saturēt domu zīmes ('-') un var būt līdz 35 simboliem gara.

tool_providers.py 38KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070
  1. import io
  2. from urllib.parse import urlparse
  3. from flask import make_response, redirect, request, send_file
  4. from flask_login import current_user
  5. from flask_restful import (
  6. Resource,
  7. reqparse,
  8. )
  9. from werkzeug.exceptions import Forbidden
  10. from configs import dify_config
  11. from controllers.console import api
  12. from controllers.console.wraps import (
  13. account_initialization_required,
  14. enterprise_license_required,
  15. setup_required,
  16. )
  17. from core.mcp.auth.auth_flow import auth, handle_callback
  18. from core.mcp.auth.auth_provider import OAuthClientProvider
  19. from core.mcp.error import MCPAuthError, MCPError
  20. from core.mcp.mcp_client import MCPClient
  21. from core.model_runtime.utils.encoders import jsonable_encoder
  22. from core.plugin.entities.plugin import ToolProviderID
  23. from core.plugin.impl.oauth import OAuthHandler
  24. from core.tools.entities.tool_entities import CredentialType
  25. from libs.helper import StrLen, alphanumeric, uuid_value
  26. from libs.login import login_required
  27. from services.plugin.oauth_service import OAuthProxyService
  28. from services.tools.api_tools_manage_service import ApiToolManageService
  29. from services.tools.builtin_tools_manage_service import BuiltinToolManageService
  30. from services.tools.mcp_tools_mange_service import MCPToolManageService
  31. from services.tools.tool_labels_service import ToolLabelsService
  32. from services.tools.tools_manage_service import ToolCommonService
  33. from services.tools.tools_transform_service import ToolTransformService
  34. from services.tools.workflow_tools_manage_service import WorkflowToolManageService
  35. def is_valid_url(url: str) -> bool:
  36. if not url:
  37. return False
  38. try:
  39. parsed = urlparse(url)
  40. return all([parsed.scheme, parsed.netloc]) and parsed.scheme in ["http", "https"]
  41. except Exception:
  42. return False
  43. class ToolProviderListApi(Resource):
  44. @setup_required
  45. @login_required
  46. @account_initialization_required
  47. def get(self):
  48. user = current_user
  49. user_id = user.id
  50. tenant_id = user.current_tenant_id
  51. req = reqparse.RequestParser()
  52. req.add_argument(
  53. "type",
  54. type=str,
  55. choices=["builtin", "model", "api", "workflow", "mcp"],
  56. required=False,
  57. nullable=True,
  58. location="args",
  59. )
  60. args = req.parse_args()
  61. return ToolCommonService.list_tool_providers(user_id, tenant_id, args.get("type", None))
  62. class ToolBuiltinProviderListToolsApi(Resource):
  63. @setup_required
  64. @login_required
  65. @account_initialization_required
  66. def get(self, provider):
  67. user = current_user
  68. tenant_id = user.current_tenant_id
  69. return jsonable_encoder(
  70. BuiltinToolManageService.list_builtin_tool_provider_tools(
  71. tenant_id,
  72. provider,
  73. )
  74. )
  75. class ToolBuiltinProviderInfoApi(Resource):
  76. @setup_required
  77. @login_required
  78. @account_initialization_required
  79. def get(self, provider):
  80. user = current_user
  81. user_id = user.id
  82. tenant_id = user.current_tenant_id
  83. return jsonable_encoder(BuiltinToolManageService.get_builtin_tool_provider_info(tenant_id, provider))
  84. class ToolBuiltinProviderDeleteApi(Resource):
  85. @setup_required
  86. @login_required
  87. @account_initialization_required
  88. def post(self, provider):
  89. user = current_user
  90. if not user.is_admin_or_owner:
  91. raise Forbidden()
  92. tenant_id = user.current_tenant_id
  93. req = reqparse.RequestParser()
  94. req.add_argument("credential_id", type=str, required=True, nullable=False, location="json")
  95. args = req.parse_args()
  96. return BuiltinToolManageService.delete_builtin_tool_provider(
  97. tenant_id,
  98. provider,
  99. args["credential_id"],
  100. )
  101. class ToolBuiltinProviderAddApi(Resource):
  102. @setup_required
  103. @login_required
  104. @account_initialization_required
  105. def post(self, provider):
  106. user = current_user
  107. user_id = user.id
  108. tenant_id = user.current_tenant_id
  109. parser = reqparse.RequestParser()
  110. parser.add_argument("credentials", type=dict, required=True, nullable=False, location="json")
  111. parser.add_argument("name", type=StrLen(30), required=False, nullable=False, location="json")
  112. parser.add_argument("type", type=str, required=True, nullable=False, location="json")
  113. args = parser.parse_args()
  114. if args["type"] not in CredentialType.values():
  115. raise ValueError(f"Invalid credential type: {args['type']}")
  116. return BuiltinToolManageService.add_builtin_tool_provider(
  117. user_id=user_id,
  118. tenant_id=tenant_id,
  119. provider=provider,
  120. credentials=args["credentials"],
  121. name=args["name"],
  122. api_type=CredentialType.of(args["type"]),
  123. )
  124. class ToolBuiltinProviderUpdateApi(Resource):
  125. @setup_required
  126. @login_required
  127. @account_initialization_required
  128. def post(self, provider):
  129. user = current_user
  130. if not user.is_admin_or_owner:
  131. raise Forbidden()
  132. user_id = user.id
  133. tenant_id = user.current_tenant_id
  134. parser = reqparse.RequestParser()
  135. parser.add_argument("credential_id", type=str, required=True, nullable=False, location="json")
  136. parser.add_argument("credentials", type=dict, required=False, nullable=True, location="json")
  137. parser.add_argument("name", type=StrLen(30), required=False, nullable=True, location="json")
  138. args = parser.parse_args()
  139. result = BuiltinToolManageService.update_builtin_tool_provider(
  140. user_id=user_id,
  141. tenant_id=tenant_id,
  142. provider=provider,
  143. credential_id=args["credential_id"],
  144. credentials=args.get("credentials", None),
  145. name=args.get("name", ""),
  146. )
  147. return result
  148. class ToolBuiltinProviderGetCredentialsApi(Resource):
  149. @setup_required
  150. @login_required
  151. @account_initialization_required
  152. def get(self, provider):
  153. tenant_id = current_user.current_tenant_id
  154. return jsonable_encoder(
  155. BuiltinToolManageService.get_builtin_tool_provider_credentials(
  156. tenant_id=tenant_id,
  157. provider_name=provider,
  158. )
  159. )
  160. class ToolBuiltinProviderIconApi(Resource):
  161. @setup_required
  162. def get(self, provider):
  163. icon_bytes, mimetype = BuiltinToolManageService.get_builtin_tool_provider_icon(provider)
  164. icon_cache_max_age = dify_config.TOOL_ICON_CACHE_MAX_AGE
  165. return send_file(io.BytesIO(icon_bytes), mimetype=mimetype, max_age=icon_cache_max_age)
  166. class ToolApiProviderAddApi(Resource):
  167. @setup_required
  168. @login_required
  169. @account_initialization_required
  170. def post(self):
  171. user = current_user
  172. if not user.is_admin_or_owner:
  173. raise Forbidden()
  174. user_id = user.id
  175. tenant_id = user.current_tenant_id
  176. parser = reqparse.RequestParser()
  177. parser.add_argument("credentials", type=dict, required=True, nullable=False, location="json")
  178. parser.add_argument("schema_type", type=str, required=True, nullable=False, location="json")
  179. parser.add_argument("schema", type=str, required=True, nullable=False, location="json")
  180. parser.add_argument("provider", type=str, required=True, nullable=False, location="json")
  181. parser.add_argument("icon", type=dict, required=True, nullable=False, location="json")
  182. parser.add_argument("privacy_policy", type=str, required=False, nullable=True, location="json")
  183. parser.add_argument("labels", type=list[str], required=False, nullable=True, location="json", default=[])
  184. parser.add_argument("custom_disclaimer", type=str, required=False, nullable=True, location="json")
  185. args = parser.parse_args()
  186. return ApiToolManageService.create_api_tool_provider(
  187. user_id,
  188. tenant_id,
  189. args["provider"],
  190. args["icon"],
  191. args["credentials"],
  192. args["schema_type"],
  193. args["schema"],
  194. args.get("privacy_policy", ""),
  195. args.get("custom_disclaimer", ""),
  196. args.get("labels", []),
  197. )
  198. class ToolApiProviderGetRemoteSchemaApi(Resource):
  199. @setup_required
  200. @login_required
  201. @account_initialization_required
  202. def get(self):
  203. user = current_user
  204. user_id = user.id
  205. tenant_id = user.current_tenant_id
  206. parser = reqparse.RequestParser()
  207. parser.add_argument("url", type=str, required=True, nullable=False, location="args")
  208. args = parser.parse_args()
  209. return ApiToolManageService.get_api_tool_provider_remote_schema(
  210. user_id,
  211. tenant_id,
  212. args["url"],
  213. )
  214. class ToolApiProviderListToolsApi(Resource):
  215. @setup_required
  216. @login_required
  217. @account_initialization_required
  218. def get(self):
  219. user = current_user
  220. user_id = user.id
  221. tenant_id = user.current_tenant_id
  222. parser = reqparse.RequestParser()
  223. parser.add_argument("provider", type=str, required=True, nullable=False, location="args")
  224. args = parser.parse_args()
  225. return jsonable_encoder(
  226. ApiToolManageService.list_api_tool_provider_tools(
  227. user_id,
  228. tenant_id,
  229. args["provider"],
  230. )
  231. )
  232. class ToolApiProviderUpdateApi(Resource):
  233. @setup_required
  234. @login_required
  235. @account_initialization_required
  236. def post(self):
  237. user = current_user
  238. if not user.is_admin_or_owner:
  239. raise Forbidden()
  240. user_id = user.id
  241. tenant_id = user.current_tenant_id
  242. parser = reqparse.RequestParser()
  243. parser.add_argument("credentials", type=dict, required=True, nullable=False, location="json")
  244. parser.add_argument("schema_type", type=str, required=True, nullable=False, location="json")
  245. parser.add_argument("schema", type=str, required=True, nullable=False, location="json")
  246. parser.add_argument("provider", type=str, required=True, nullable=False, location="json")
  247. parser.add_argument("original_provider", type=str, required=True, nullable=False, location="json")
  248. parser.add_argument("icon", type=dict, required=True, nullable=False, location="json")
  249. parser.add_argument("privacy_policy", type=str, required=True, nullable=True, location="json")
  250. parser.add_argument("labels", type=list[str], required=False, nullable=True, location="json")
  251. parser.add_argument("custom_disclaimer", type=str, required=True, nullable=True, location="json")
  252. args = parser.parse_args()
  253. return ApiToolManageService.update_api_tool_provider(
  254. user_id,
  255. tenant_id,
  256. args["provider"],
  257. args["original_provider"],
  258. args["icon"],
  259. args["credentials"],
  260. args["schema_type"],
  261. args["schema"],
  262. args["privacy_policy"],
  263. args["custom_disclaimer"],
  264. args.get("labels", []),
  265. )
  266. class ToolApiProviderDeleteApi(Resource):
  267. @setup_required
  268. @login_required
  269. @account_initialization_required
  270. def post(self):
  271. user = current_user
  272. if not user.is_admin_or_owner:
  273. raise Forbidden()
  274. user_id = user.id
  275. tenant_id = user.current_tenant_id
  276. parser = reqparse.RequestParser()
  277. parser.add_argument("provider", type=str, required=True, nullable=False, location="json")
  278. args = parser.parse_args()
  279. return ApiToolManageService.delete_api_tool_provider(
  280. user_id,
  281. tenant_id,
  282. args["provider"],
  283. )
  284. class ToolApiProviderGetApi(Resource):
  285. @setup_required
  286. @login_required
  287. @account_initialization_required
  288. def get(self):
  289. user = current_user
  290. user_id = user.id
  291. tenant_id = user.current_tenant_id
  292. parser = reqparse.RequestParser()
  293. parser.add_argument("provider", type=str, required=True, nullable=False, location="args")
  294. args = parser.parse_args()
  295. return ApiToolManageService.get_api_tool_provider(
  296. user_id,
  297. tenant_id,
  298. args["provider"],
  299. )
  300. class ToolBuiltinProviderCredentialsSchemaApi(Resource):
  301. @setup_required
  302. @login_required
  303. @account_initialization_required
  304. def get(self, provider, credential_type):
  305. user = current_user
  306. tenant_id = user.current_tenant_id
  307. return jsonable_encoder(
  308. BuiltinToolManageService.list_builtin_provider_credentials_schema(
  309. provider, CredentialType.of(credential_type), tenant_id
  310. )
  311. )
  312. class ToolApiProviderSchemaApi(Resource):
  313. @setup_required
  314. @login_required
  315. @account_initialization_required
  316. def post(self):
  317. parser = reqparse.RequestParser()
  318. parser.add_argument("schema", type=str, required=True, nullable=False, location="json")
  319. args = parser.parse_args()
  320. return ApiToolManageService.parser_api_schema(
  321. schema=args["schema"],
  322. )
  323. class ToolApiProviderPreviousTestApi(Resource):
  324. @setup_required
  325. @login_required
  326. @account_initialization_required
  327. def post(self):
  328. parser = reqparse.RequestParser()
  329. parser.add_argument("tool_name", type=str, required=True, nullable=False, location="json")
  330. parser.add_argument("provider_name", type=str, required=False, nullable=False, location="json")
  331. parser.add_argument("credentials", type=dict, required=True, nullable=False, location="json")
  332. parser.add_argument("parameters", type=dict, required=True, nullable=False, location="json")
  333. parser.add_argument("schema_type", type=str, required=True, nullable=False, location="json")
  334. parser.add_argument("schema", type=str, required=True, nullable=False, location="json")
  335. args = parser.parse_args()
  336. return ApiToolManageService.test_api_tool_preview(
  337. current_user.current_tenant_id,
  338. args["provider_name"] or "",
  339. args["tool_name"],
  340. args["credentials"],
  341. args["parameters"],
  342. args["schema_type"],
  343. args["schema"],
  344. )
  345. class ToolWorkflowProviderCreateApi(Resource):
  346. @setup_required
  347. @login_required
  348. @account_initialization_required
  349. def post(self):
  350. user = current_user
  351. if not user.is_admin_or_owner:
  352. raise Forbidden()
  353. user_id = user.id
  354. tenant_id = user.current_tenant_id
  355. reqparser = reqparse.RequestParser()
  356. reqparser.add_argument("workflow_app_id", type=uuid_value, required=True, nullable=False, location="json")
  357. reqparser.add_argument("name", type=alphanumeric, required=True, nullable=False, location="json")
  358. reqparser.add_argument("label", type=str, required=True, nullable=False, location="json")
  359. reqparser.add_argument("description", type=str, required=True, nullable=False, location="json")
  360. reqparser.add_argument("icon", type=dict, required=True, nullable=False, location="json")
  361. reqparser.add_argument("parameters", type=list[dict], required=True, nullable=False, location="json")
  362. reqparser.add_argument("privacy_policy", type=str, required=False, nullable=True, location="json", default="")
  363. reqparser.add_argument("labels", type=list[str], required=False, nullable=True, location="json")
  364. args = reqparser.parse_args()
  365. return WorkflowToolManageService.create_workflow_tool(
  366. user_id=user_id,
  367. tenant_id=tenant_id,
  368. workflow_app_id=args["workflow_app_id"],
  369. name=args["name"],
  370. label=args["label"],
  371. icon=args["icon"],
  372. description=args["description"],
  373. parameters=args["parameters"],
  374. privacy_policy=args["privacy_policy"],
  375. labels=args["labels"],
  376. )
  377. class ToolWorkflowProviderUpdateApi(Resource):
  378. @setup_required
  379. @login_required
  380. @account_initialization_required
  381. def post(self):
  382. user = current_user
  383. if not user.is_admin_or_owner:
  384. raise Forbidden()
  385. user_id = user.id
  386. tenant_id = user.current_tenant_id
  387. reqparser = reqparse.RequestParser()
  388. reqparser.add_argument("workflow_tool_id", type=uuid_value, required=True, nullable=False, location="json")
  389. reqparser.add_argument("name", type=alphanumeric, required=True, nullable=False, location="json")
  390. reqparser.add_argument("label", type=str, required=True, nullable=False, location="json")
  391. reqparser.add_argument("description", type=str, required=True, nullable=False, location="json")
  392. reqparser.add_argument("icon", type=dict, required=True, nullable=False, location="json")
  393. reqparser.add_argument("parameters", type=list[dict], required=True, nullable=False, location="json")
  394. reqparser.add_argument("privacy_policy", type=str, required=False, nullable=True, location="json", default="")
  395. reqparser.add_argument("labels", type=list[str], required=False, nullable=True, location="json")
  396. args = reqparser.parse_args()
  397. if not args["workflow_tool_id"]:
  398. raise ValueError("incorrect workflow_tool_id")
  399. return WorkflowToolManageService.update_workflow_tool(
  400. user_id,
  401. tenant_id,
  402. args["workflow_tool_id"],
  403. args["name"],
  404. args["label"],
  405. args["icon"],
  406. args["description"],
  407. args["parameters"],
  408. args["privacy_policy"],
  409. args.get("labels", []),
  410. )
  411. class ToolWorkflowProviderDeleteApi(Resource):
  412. @setup_required
  413. @login_required
  414. @account_initialization_required
  415. def post(self):
  416. user = current_user
  417. if not user.is_admin_or_owner:
  418. raise Forbidden()
  419. user_id = user.id
  420. tenant_id = user.current_tenant_id
  421. reqparser = reqparse.RequestParser()
  422. reqparser.add_argument("workflow_tool_id", type=uuid_value, required=True, nullable=False, location="json")
  423. args = reqparser.parse_args()
  424. return WorkflowToolManageService.delete_workflow_tool(
  425. user_id,
  426. tenant_id,
  427. args["workflow_tool_id"],
  428. )
  429. class ToolWorkflowProviderGetApi(Resource):
  430. @setup_required
  431. @login_required
  432. @account_initialization_required
  433. def get(self):
  434. user = current_user
  435. user_id = user.id
  436. tenant_id = user.current_tenant_id
  437. parser = reqparse.RequestParser()
  438. parser.add_argument("workflow_tool_id", type=uuid_value, required=False, nullable=True, location="args")
  439. parser.add_argument("workflow_app_id", type=uuid_value, required=False, nullable=True, location="args")
  440. args = parser.parse_args()
  441. if args.get("workflow_tool_id"):
  442. tool = WorkflowToolManageService.get_workflow_tool_by_tool_id(
  443. user_id,
  444. tenant_id,
  445. args["workflow_tool_id"],
  446. )
  447. elif args.get("workflow_app_id"):
  448. tool = WorkflowToolManageService.get_workflow_tool_by_app_id(
  449. user_id,
  450. tenant_id,
  451. args["workflow_app_id"],
  452. )
  453. else:
  454. raise ValueError("incorrect workflow_tool_id or workflow_app_id")
  455. return jsonable_encoder(tool)
  456. class ToolWorkflowProviderListToolApi(Resource):
  457. @setup_required
  458. @login_required
  459. @account_initialization_required
  460. def get(self):
  461. user = current_user
  462. user_id = user.id
  463. tenant_id = user.current_tenant_id
  464. parser = reqparse.RequestParser()
  465. parser.add_argument("workflow_tool_id", type=uuid_value, required=True, nullable=False, location="args")
  466. args = parser.parse_args()
  467. return jsonable_encoder(
  468. WorkflowToolManageService.list_single_workflow_tools(
  469. user_id,
  470. tenant_id,
  471. args["workflow_tool_id"],
  472. )
  473. )
  474. class ToolBuiltinListApi(Resource):
  475. @setup_required
  476. @login_required
  477. @account_initialization_required
  478. def get(self):
  479. user = current_user
  480. user_id = user.id
  481. tenant_id = user.current_tenant_id
  482. return jsonable_encoder(
  483. [
  484. provider.to_dict()
  485. for provider in BuiltinToolManageService.list_builtin_tools(
  486. user_id,
  487. tenant_id,
  488. )
  489. ]
  490. )
  491. class ToolApiListApi(Resource):
  492. @setup_required
  493. @login_required
  494. @account_initialization_required
  495. def get(self):
  496. user = current_user
  497. tenant_id = user.current_tenant_id
  498. return jsonable_encoder(
  499. [
  500. provider.to_dict()
  501. for provider in ApiToolManageService.list_api_tools(
  502. tenant_id,
  503. )
  504. ]
  505. )
  506. class ToolWorkflowListApi(Resource):
  507. @setup_required
  508. @login_required
  509. @account_initialization_required
  510. def get(self):
  511. user = current_user
  512. user_id = user.id
  513. tenant_id = user.current_tenant_id
  514. return jsonable_encoder(
  515. [
  516. provider.to_dict()
  517. for provider in WorkflowToolManageService.list_tenant_workflow_tools(
  518. user_id,
  519. tenant_id,
  520. )
  521. ]
  522. )
  523. class ToolLabelsApi(Resource):
  524. @setup_required
  525. @login_required
  526. @account_initialization_required
  527. @enterprise_license_required
  528. def get(self):
  529. return jsonable_encoder(ToolLabelsService.list_tool_labels())
  530. class ToolPluginOAuthApi(Resource):
  531. @setup_required
  532. @login_required
  533. @account_initialization_required
  534. def get(self, provider):
  535. tool_provider = ToolProviderID(provider)
  536. plugin_id = tool_provider.plugin_id
  537. provider_name = tool_provider.provider_name
  538. # todo check permission
  539. user = current_user
  540. if not user.is_admin_or_owner:
  541. raise Forbidden()
  542. tenant_id = user.current_tenant_id
  543. oauth_client_params = BuiltinToolManageService.get_oauth_client(tenant_id=tenant_id, provider=provider)
  544. if oauth_client_params is None:
  545. raise Forbidden("no oauth available client config found for this tool provider")
  546. oauth_handler = OAuthHandler()
  547. context_id = OAuthProxyService.create_proxy_context(
  548. user_id=current_user.id, tenant_id=tenant_id, plugin_id=plugin_id, provider=provider_name
  549. )
  550. redirect_uri = f"{dify_config.CONSOLE_API_URL}/console/api/oauth/plugin/{provider}/tool/callback"
  551. authorization_url_response = oauth_handler.get_authorization_url(
  552. tenant_id=tenant_id,
  553. user_id=user.id,
  554. plugin_id=plugin_id,
  555. provider=provider_name,
  556. redirect_uri=redirect_uri,
  557. system_credentials=oauth_client_params,
  558. )
  559. response = make_response(jsonable_encoder(authorization_url_response))
  560. response.set_cookie(
  561. "context_id",
  562. context_id,
  563. httponly=True,
  564. samesite="Lax",
  565. max_age=OAuthProxyService.__MAX_AGE__,
  566. )
  567. return response
  568. class ToolOAuthCallback(Resource):
  569. @setup_required
  570. def get(self, provider):
  571. context_id = request.cookies.get("context_id")
  572. if not context_id:
  573. raise Forbidden("context_id not found")
  574. context = OAuthProxyService.use_proxy_context(context_id)
  575. if context is None:
  576. raise Forbidden("Invalid context_id")
  577. tool_provider = ToolProviderID(provider)
  578. plugin_id = tool_provider.plugin_id
  579. provider_name = tool_provider.provider_name
  580. user_id, tenant_id = context.get("user_id"), context.get("tenant_id")
  581. oauth_handler = OAuthHandler()
  582. oauth_client_params = BuiltinToolManageService.get_oauth_client(tenant_id, provider)
  583. if oauth_client_params is None:
  584. raise Forbidden("no oauth available client config found for this tool provider")
  585. redirect_uri = f"{dify_config.CONSOLE_API_URL}/console/api/oauth/plugin/{provider}/tool/callback"
  586. credentials = oauth_handler.get_credentials(
  587. tenant_id=tenant_id,
  588. user_id=user_id,
  589. plugin_id=plugin_id,
  590. provider=provider_name,
  591. redirect_uri=redirect_uri,
  592. system_credentials=oauth_client_params,
  593. request=request,
  594. ).credentials
  595. if not credentials:
  596. raise Exception("the plugin credentials failed")
  597. # add credentials to database
  598. BuiltinToolManageService.add_builtin_tool_provider(
  599. user_id=user_id,
  600. tenant_id=tenant_id,
  601. provider=provider,
  602. credentials=dict(credentials),
  603. api_type=CredentialType.OAUTH2,
  604. )
  605. return redirect(f"{dify_config.CONSOLE_WEB_URL}/oauth-callback")
  606. class ToolBuiltinProviderSetDefaultApi(Resource):
  607. @setup_required
  608. @login_required
  609. @account_initialization_required
  610. def post(self, provider):
  611. parser = reqparse.RequestParser()
  612. parser.add_argument("id", type=str, required=True, nullable=False, location="json")
  613. args = parser.parse_args()
  614. return BuiltinToolManageService.set_default_provider(
  615. tenant_id=current_user.current_tenant_id, user_id=current_user.id, provider=provider, id=args["id"]
  616. )
  617. class ToolOAuthCustomClient(Resource):
  618. @setup_required
  619. @login_required
  620. @account_initialization_required
  621. def post(self, provider):
  622. parser = reqparse.RequestParser()
  623. parser.add_argument("client_params", type=dict, required=False, nullable=True, location="json")
  624. parser.add_argument("enable_oauth_custom_client", type=bool, required=False, nullable=True, location="json")
  625. args = parser.parse_args()
  626. user = current_user
  627. if not user.is_admin_or_owner:
  628. raise Forbidden()
  629. return BuiltinToolManageService.save_custom_oauth_client_params(
  630. tenant_id=user.current_tenant_id,
  631. provider=provider,
  632. client_params=args.get("client_params", {}),
  633. enable_oauth_custom_client=args.get("enable_oauth_custom_client", True),
  634. )
  635. @setup_required
  636. @login_required
  637. @account_initialization_required
  638. def get(self, provider):
  639. return jsonable_encoder(
  640. BuiltinToolManageService.get_custom_oauth_client_params(
  641. tenant_id=current_user.current_tenant_id, provider=provider
  642. )
  643. )
  644. @setup_required
  645. @login_required
  646. @account_initialization_required
  647. def delete(self, provider):
  648. return jsonable_encoder(
  649. BuiltinToolManageService.delete_custom_oauth_client_params(
  650. tenant_id=current_user.current_tenant_id, provider=provider
  651. )
  652. )
  653. class ToolBuiltinProviderGetOauthClientSchemaApi(Resource):
  654. @setup_required
  655. @login_required
  656. @account_initialization_required
  657. def get(self, provider):
  658. return jsonable_encoder(
  659. BuiltinToolManageService.get_builtin_tool_provider_oauth_client_schema(
  660. tenant_id=current_user.current_tenant_id, provider_name=provider
  661. )
  662. )
  663. class ToolBuiltinProviderGetCredentialInfoApi(Resource):
  664. @setup_required
  665. @login_required
  666. @account_initialization_required
  667. def get(self, provider):
  668. tenant_id = current_user.current_tenant_id
  669. return jsonable_encoder(
  670. BuiltinToolManageService.get_builtin_tool_provider_credential_info(
  671. tenant_id=tenant_id,
  672. provider=provider,
  673. )
  674. )
  675. class ToolProviderMCPApi(Resource):
  676. @setup_required
  677. @login_required
  678. @account_initialization_required
  679. def post(self):
  680. parser = reqparse.RequestParser()
  681. parser.add_argument("server_url", type=str, required=True, nullable=False, location="json")
  682. parser.add_argument("name", type=str, required=True, nullable=False, location="json")
  683. parser.add_argument("icon", type=str, required=True, nullable=False, location="json")
  684. parser.add_argument("icon_type", type=str, required=True, nullable=False, location="json")
  685. parser.add_argument("icon_background", type=str, required=False, nullable=True, location="json", default="")
  686. parser.add_argument("server_identifier", type=str, required=True, nullable=False, location="json")
  687. args = parser.parse_args()
  688. user = current_user
  689. if not is_valid_url(args["server_url"]):
  690. raise ValueError("Server URL is not valid.")
  691. return jsonable_encoder(
  692. MCPToolManageService.create_mcp_provider(
  693. tenant_id=user.current_tenant_id,
  694. server_url=args["server_url"],
  695. name=args["name"],
  696. icon=args["icon"],
  697. icon_type=args["icon_type"],
  698. icon_background=args["icon_background"],
  699. user_id=user.id,
  700. server_identifier=args["server_identifier"],
  701. )
  702. )
  703. @setup_required
  704. @login_required
  705. @account_initialization_required
  706. def put(self):
  707. parser = reqparse.RequestParser()
  708. parser.add_argument("server_url", type=str, required=True, nullable=False, location="json")
  709. parser.add_argument("name", type=str, required=True, nullable=False, location="json")
  710. parser.add_argument("icon", type=str, required=True, nullable=False, location="json")
  711. parser.add_argument("icon_type", type=str, required=True, nullable=False, location="json")
  712. parser.add_argument("icon_background", type=str, required=False, nullable=True, location="json")
  713. parser.add_argument("provider_id", type=str, required=True, nullable=False, location="json")
  714. parser.add_argument("server_identifier", type=str, required=True, nullable=False, location="json")
  715. args = parser.parse_args()
  716. if not is_valid_url(args["server_url"]):
  717. if "[__HIDDEN__]" in args["server_url"]:
  718. pass
  719. else:
  720. raise ValueError("Server URL is not valid.")
  721. MCPToolManageService.update_mcp_provider(
  722. tenant_id=current_user.current_tenant_id,
  723. provider_id=args["provider_id"],
  724. server_url=args["server_url"],
  725. name=args["name"],
  726. icon=args["icon"],
  727. icon_type=args["icon_type"],
  728. icon_background=args["icon_background"],
  729. server_identifier=args["server_identifier"],
  730. )
  731. return {"result": "success"}
  732. @setup_required
  733. @login_required
  734. @account_initialization_required
  735. def delete(self):
  736. parser = reqparse.RequestParser()
  737. parser.add_argument("provider_id", type=str, required=True, nullable=False, location="json")
  738. args = parser.parse_args()
  739. MCPToolManageService.delete_mcp_tool(tenant_id=current_user.current_tenant_id, provider_id=args["provider_id"])
  740. return {"result": "success"}
  741. class ToolMCPAuthApi(Resource):
  742. @setup_required
  743. @login_required
  744. @account_initialization_required
  745. def post(self):
  746. parser = reqparse.RequestParser()
  747. parser.add_argument("provider_id", type=str, required=True, nullable=False, location="json")
  748. parser.add_argument("authorization_code", type=str, required=False, nullable=True, location="json")
  749. args = parser.parse_args()
  750. provider_id = args["provider_id"]
  751. tenant_id = current_user.current_tenant_id
  752. provider = MCPToolManageService.get_mcp_provider_by_provider_id(provider_id, tenant_id)
  753. if not provider:
  754. raise ValueError("provider not found")
  755. try:
  756. with MCPClient(
  757. provider.decrypted_server_url,
  758. provider_id,
  759. tenant_id,
  760. authed=False,
  761. authorization_code=args["authorization_code"],
  762. for_list=True,
  763. ):
  764. MCPToolManageService.update_mcp_provider_credentials(
  765. mcp_provider=provider,
  766. credentials=provider.decrypted_credentials,
  767. authed=True,
  768. )
  769. return {"result": "success"}
  770. except MCPAuthError:
  771. auth_provider = OAuthClientProvider(provider_id, tenant_id, for_list=True)
  772. return auth(auth_provider, provider.decrypted_server_url, args["authorization_code"])
  773. except MCPError as e:
  774. MCPToolManageService.update_mcp_provider_credentials(
  775. mcp_provider=provider,
  776. credentials={},
  777. authed=False,
  778. )
  779. raise ValueError(f"Failed to connect to MCP server: {e}") from e
  780. class ToolMCPDetailApi(Resource):
  781. @setup_required
  782. @login_required
  783. @account_initialization_required
  784. def get(self, provider_id):
  785. user = current_user
  786. provider = MCPToolManageService.get_mcp_provider_by_provider_id(provider_id, user.current_tenant_id)
  787. return jsonable_encoder(ToolTransformService.mcp_provider_to_user_provider(provider, for_list=True))
  788. class ToolMCPListAllApi(Resource):
  789. @setup_required
  790. @login_required
  791. @account_initialization_required
  792. def get(self):
  793. user = current_user
  794. tenant_id = user.current_tenant_id
  795. tools = MCPToolManageService.retrieve_mcp_tools(tenant_id=tenant_id)
  796. return [tool.to_dict() for tool in tools]
  797. class ToolMCPUpdateApi(Resource):
  798. @setup_required
  799. @login_required
  800. @account_initialization_required
  801. def get(self, provider_id):
  802. tenant_id = current_user.current_tenant_id
  803. tools = MCPToolManageService.list_mcp_tool_from_remote_server(
  804. tenant_id=tenant_id,
  805. provider_id=provider_id,
  806. )
  807. return jsonable_encoder(tools)
  808. class ToolMCPCallbackApi(Resource):
  809. def get(self):
  810. parser = reqparse.RequestParser()
  811. parser.add_argument("code", type=str, required=True, nullable=False, location="args")
  812. parser.add_argument("state", type=str, required=True, nullable=False, location="args")
  813. args = parser.parse_args()
  814. state_key = args["state"]
  815. authorization_code = args["code"]
  816. handle_callback(state_key, authorization_code)
  817. return redirect(f"{dify_config.CONSOLE_WEB_URL}/oauth-callback")
  818. # tool provider
  819. api.add_resource(ToolProviderListApi, "/workspaces/current/tool-providers")
  820. # tool oauth
  821. api.add_resource(ToolPluginOAuthApi, "/oauth/plugin/<path:provider>/tool/authorization-url")
  822. api.add_resource(ToolOAuthCallback, "/oauth/plugin/<path:provider>/tool/callback")
  823. api.add_resource(ToolOAuthCustomClient, "/workspaces/current/tool-provider/builtin/<path:provider>/oauth/custom-client")
  824. # builtin tool provider
  825. api.add_resource(ToolBuiltinProviderListToolsApi, "/workspaces/current/tool-provider/builtin/<path:provider>/tools")
  826. api.add_resource(ToolBuiltinProviderInfoApi, "/workspaces/current/tool-provider/builtin/<path:provider>/info")
  827. api.add_resource(ToolBuiltinProviderAddApi, "/workspaces/current/tool-provider/builtin/<path:provider>/add")
  828. api.add_resource(ToolBuiltinProviderDeleteApi, "/workspaces/current/tool-provider/builtin/<path:provider>/delete")
  829. api.add_resource(ToolBuiltinProviderUpdateApi, "/workspaces/current/tool-provider/builtin/<path:provider>/update")
  830. api.add_resource(
  831. ToolBuiltinProviderSetDefaultApi, "/workspaces/current/tool-provider/builtin/<path:provider>/default-credential"
  832. )
  833. api.add_resource(
  834. ToolBuiltinProviderGetCredentialInfoApi, "/workspaces/current/tool-provider/builtin/<path:provider>/credential/info"
  835. )
  836. api.add_resource(
  837. ToolBuiltinProviderGetCredentialsApi, "/workspaces/current/tool-provider/builtin/<path:provider>/credentials"
  838. )
  839. api.add_resource(
  840. ToolBuiltinProviderCredentialsSchemaApi,
  841. "/workspaces/current/tool-provider/builtin/<path:provider>/credential/schema/<path:credential_type>",
  842. )
  843. api.add_resource(
  844. ToolBuiltinProviderGetOauthClientSchemaApi,
  845. "/workspaces/current/tool-provider/builtin/<path:provider>/oauth/client-schema",
  846. )
  847. api.add_resource(ToolBuiltinProviderIconApi, "/workspaces/current/tool-provider/builtin/<path:provider>/icon")
  848. # api tool provider
  849. api.add_resource(ToolApiProviderAddApi, "/workspaces/current/tool-provider/api/add")
  850. api.add_resource(ToolApiProviderGetRemoteSchemaApi, "/workspaces/current/tool-provider/api/remote")
  851. api.add_resource(ToolApiProviderListToolsApi, "/workspaces/current/tool-provider/api/tools")
  852. api.add_resource(ToolApiProviderUpdateApi, "/workspaces/current/tool-provider/api/update")
  853. api.add_resource(ToolApiProviderDeleteApi, "/workspaces/current/tool-provider/api/delete")
  854. api.add_resource(ToolApiProviderGetApi, "/workspaces/current/tool-provider/api/get")
  855. api.add_resource(ToolApiProviderSchemaApi, "/workspaces/current/tool-provider/api/schema")
  856. api.add_resource(ToolApiProviderPreviousTestApi, "/workspaces/current/tool-provider/api/test/pre")
  857. # workflow tool provider
  858. api.add_resource(ToolWorkflowProviderCreateApi, "/workspaces/current/tool-provider/workflow/create")
  859. api.add_resource(ToolWorkflowProviderUpdateApi, "/workspaces/current/tool-provider/workflow/update")
  860. api.add_resource(ToolWorkflowProviderDeleteApi, "/workspaces/current/tool-provider/workflow/delete")
  861. api.add_resource(ToolWorkflowProviderGetApi, "/workspaces/current/tool-provider/workflow/get")
  862. api.add_resource(ToolWorkflowProviderListToolApi, "/workspaces/current/tool-provider/workflow/tools")
  863. # mcp tool provider
  864. api.add_resource(ToolMCPDetailApi, "/workspaces/current/tool-provider/mcp/tools/<path:provider_id>")
  865. api.add_resource(ToolProviderMCPApi, "/workspaces/current/tool-provider/mcp")
  866. api.add_resource(ToolMCPUpdateApi, "/workspaces/current/tool-provider/mcp/update/<path:provider_id>")
  867. api.add_resource(ToolMCPAuthApi, "/workspaces/current/tool-provider/mcp/auth")
  868. api.add_resource(ToolMCPCallbackApi, "/mcp/oauth/callback")
  869. api.add_resource(ToolBuiltinListApi, "/workspaces/current/tools/builtin")
  870. api.add_resource(ToolApiListApi, "/workspaces/current/tools/api")
  871. api.add_resource(ToolMCPListAllApi, "/workspaces/current/tools/mcp")
  872. api.add_resource(ToolWorkflowListApi, "/workspaces/current/tools/workflow")
  873. api.add_resource(ToolLabelsApi, "/workspaces/current/tool-labels")