You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

ops_service.py 10.0KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240
  1. from typing import Any, Optional
  2. from core.ops.entities.config_entity import BaseTracingConfig
  3. from core.ops.ops_trace_manager import OpsTraceManager, provider_config_map
  4. from extensions.ext_database import db
  5. from models.model import App, TraceAppConfig
  6. class OpsService:
  7. @classmethod
  8. def get_tracing_app_config(cls, app_id: str, tracing_provider: str):
  9. """
  10. Get tracing app config
  11. :param app_id: app id
  12. :param tracing_provider: tracing provider
  13. :return:
  14. """
  15. trace_config_data: Optional[TraceAppConfig] = (
  16. db.session.query(TraceAppConfig)
  17. .filter(TraceAppConfig.app_id == app_id, TraceAppConfig.tracing_provider == tracing_provider)
  18. .first()
  19. )
  20. if not trace_config_data:
  21. return None
  22. # decrypt_token and obfuscated_token
  23. app = db.session.query(App).filter(App.id == app_id).first()
  24. if not app:
  25. return None
  26. tenant_id = app.tenant_id
  27. decrypt_tracing_config = OpsTraceManager.decrypt_tracing_config(
  28. tenant_id, tracing_provider, trace_config_data.tracing_config
  29. )
  30. new_decrypt_tracing_config = OpsTraceManager.obfuscated_decrypt_token(tracing_provider, decrypt_tracing_config)
  31. if tracing_provider == "arize" and (
  32. "project_url" not in decrypt_tracing_config or not decrypt_tracing_config.get("project_url")
  33. ):
  34. try:
  35. project_url = OpsTraceManager.get_trace_config_project_url(decrypt_tracing_config, tracing_provider)
  36. new_decrypt_tracing_config.update({"project_url": project_url})
  37. except Exception:
  38. new_decrypt_tracing_config.update({"project_url": "https://app.arize.com/"})
  39. if tracing_provider == "phoenix" and (
  40. "project_url" not in decrypt_tracing_config or not decrypt_tracing_config.get("project_url")
  41. ):
  42. try:
  43. project_url = OpsTraceManager.get_trace_config_project_url(decrypt_tracing_config, tracing_provider)
  44. new_decrypt_tracing_config.update({"project_url": project_url})
  45. except Exception:
  46. new_decrypt_tracing_config.update({"project_url": "https://app.phoenix.arize.com/projects/"})
  47. if tracing_provider == "langfuse" and (
  48. "project_key" not in decrypt_tracing_config or not decrypt_tracing_config.get("project_key")
  49. ):
  50. try:
  51. project_key = OpsTraceManager.get_trace_config_project_key(decrypt_tracing_config, tracing_provider)
  52. new_decrypt_tracing_config.update(
  53. {
  54. "project_url": "{host}/project/{key}".format(
  55. host=decrypt_tracing_config.get("host"), key=project_key
  56. )
  57. }
  58. )
  59. except Exception:
  60. new_decrypt_tracing_config.update(
  61. {"project_url": "{host}/".format(host=decrypt_tracing_config.get("host"))}
  62. )
  63. if tracing_provider == "langsmith" and (
  64. "project_url" not in decrypt_tracing_config or not decrypt_tracing_config.get("project_url")
  65. ):
  66. try:
  67. project_url = OpsTraceManager.get_trace_config_project_url(decrypt_tracing_config, tracing_provider)
  68. new_decrypt_tracing_config.update({"project_url": project_url})
  69. except Exception:
  70. new_decrypt_tracing_config.update({"project_url": "https://smith.langchain.com/"})
  71. if tracing_provider == "opik" and (
  72. "project_url" not in decrypt_tracing_config or not decrypt_tracing_config.get("project_url")
  73. ):
  74. try:
  75. project_url = OpsTraceManager.get_trace_config_project_url(decrypt_tracing_config, tracing_provider)
  76. new_decrypt_tracing_config.update({"project_url": project_url})
  77. except Exception:
  78. new_decrypt_tracing_config.update({"project_url": "https://www.comet.com/opik/"})
  79. if tracing_provider == "weave" and (
  80. "project_url" not in decrypt_tracing_config or not decrypt_tracing_config.get("project_url")
  81. ):
  82. try:
  83. project_url = OpsTraceManager.get_trace_config_project_url(decrypt_tracing_config, tracing_provider)
  84. new_decrypt_tracing_config.update({"project_url": project_url})
  85. except Exception:
  86. new_decrypt_tracing_config.update({"project_url": "https://wandb.ai/"})
  87. if tracing_provider == "aliyun" and (
  88. "project_url" not in decrypt_tracing_config or not decrypt_tracing_config.get("project_url")
  89. ):
  90. try:
  91. project_url = OpsTraceManager.get_trace_config_project_url(decrypt_tracing_config, tracing_provider)
  92. new_decrypt_tracing_config.update({"project_url": project_url})
  93. except Exception:
  94. new_decrypt_tracing_config.update({"project_url": "https://arms.console.aliyun.com/"})
  95. trace_config_data.tracing_config = new_decrypt_tracing_config
  96. return trace_config_data.to_dict()
  97. @classmethod
  98. def create_tracing_app_config(cls, app_id: str, tracing_provider: str, tracing_config: dict):
  99. """
  100. Create tracing app config
  101. :param app_id: app id
  102. :param tracing_provider: tracing provider
  103. :param tracing_config: tracing config
  104. :return:
  105. """
  106. try:
  107. provider_config_map[tracing_provider]
  108. except KeyError:
  109. return {"error": f"Invalid tracing provider: {tracing_provider}"}
  110. provider_config: dict[str, Any] = provider_config_map[tracing_provider]
  111. config_class: type[BaseTracingConfig] = provider_config["config_class"]
  112. other_keys: list[str] = provider_config["other_keys"]
  113. default_config_instance: BaseTracingConfig = config_class(**tracing_config)
  114. for key in other_keys:
  115. if key in tracing_config and tracing_config[key] == "":
  116. tracing_config[key] = getattr(default_config_instance, key, None)
  117. # api check
  118. if not OpsTraceManager.check_trace_config_is_effective(tracing_config, tracing_provider):
  119. return {"error": "Invalid Credentials"}
  120. # get project url
  121. if tracing_provider in ("arize", "phoenix"):
  122. project_url = OpsTraceManager.get_trace_config_project_url(tracing_config, tracing_provider)
  123. elif tracing_provider == "langfuse":
  124. project_key = OpsTraceManager.get_trace_config_project_key(tracing_config, tracing_provider)
  125. project_url = "{host}/project/{key}".format(host=tracing_config.get("host"), key=project_key)
  126. elif tracing_provider in ("langsmith", "opik"):
  127. project_url = OpsTraceManager.get_trace_config_project_url(tracing_config, tracing_provider)
  128. else:
  129. project_url = None
  130. # check if trace config already exists
  131. trace_config_data: Optional[TraceAppConfig] = (
  132. db.session.query(TraceAppConfig)
  133. .filter(TraceAppConfig.app_id == app_id, TraceAppConfig.tracing_provider == tracing_provider)
  134. .first()
  135. )
  136. if trace_config_data:
  137. return None
  138. # get tenant id
  139. app = db.session.query(App).filter(App.id == app_id).first()
  140. if not app:
  141. return None
  142. tenant_id = app.tenant_id
  143. tracing_config = OpsTraceManager.encrypt_tracing_config(tenant_id, tracing_provider, tracing_config)
  144. if project_url:
  145. tracing_config["project_url"] = project_url
  146. trace_config_data = TraceAppConfig(
  147. app_id=app_id,
  148. tracing_provider=tracing_provider,
  149. tracing_config=tracing_config,
  150. )
  151. db.session.add(trace_config_data)
  152. db.session.commit()
  153. return {"result": "success"}
  154. @classmethod
  155. def update_tracing_app_config(cls, app_id: str, tracing_provider: str, tracing_config: dict):
  156. """
  157. Update tracing app config
  158. :param app_id: app id
  159. :param tracing_provider: tracing provider
  160. :param tracing_config: tracing config
  161. :return:
  162. """
  163. try:
  164. provider_config_map[tracing_provider]
  165. except KeyError:
  166. raise ValueError(f"Invalid tracing provider: {tracing_provider}")
  167. # check if trace config already exists
  168. current_trace_config = (
  169. db.session.query(TraceAppConfig)
  170. .filter(TraceAppConfig.app_id == app_id, TraceAppConfig.tracing_provider == tracing_provider)
  171. .first()
  172. )
  173. if not current_trace_config:
  174. return None
  175. # get tenant id
  176. app = db.session.query(App).filter(App.id == app_id).first()
  177. if not app:
  178. return None
  179. tenant_id = app.tenant_id
  180. tracing_config = OpsTraceManager.encrypt_tracing_config(
  181. tenant_id, tracing_provider, tracing_config, current_trace_config.tracing_config
  182. )
  183. # api check
  184. # decrypt_token
  185. decrypt_tracing_config = OpsTraceManager.decrypt_tracing_config(tenant_id, tracing_provider, tracing_config)
  186. if not OpsTraceManager.check_trace_config_is_effective(decrypt_tracing_config, tracing_provider):
  187. raise ValueError("Invalid Credentials")
  188. current_trace_config.tracing_config = tracing_config
  189. db.session.commit()
  190. return current_trace_config.to_dict()
  191. @classmethod
  192. def delete_tracing_app_config(cls, app_id: str, tracing_provider: str):
  193. """
  194. Delete tracing app config
  195. :param app_id: app id
  196. :param tracing_provider: tracing provider
  197. :return:
  198. """
  199. trace_config = (
  200. db.session.query(TraceAppConfig)
  201. .filter(TraceAppConfig.app_id == app_id, TraceAppConfig.tracing_provider == tracing_provider)
  202. .first()
  203. )
  204. if not trace_config:
  205. return None
  206. db.session.delete(trace_config)
  207. db.session.commit()
  208. return True