dify/api/core/tools/tool_manager.py

724 lines
28 KiB
Python
Raw Normal View History

2024-02-01 18:11:57 +08:00
import json
import logging
import mimetypes
from collections.abc import Generator
from os import listdir, path
from threading import Lock
2024-09-20 02:25:14 +08:00
from typing import TYPE_CHECKING, Any, Union, cast
2024-09-23 18:06:16 +08:00
from core.plugin.manager.tool import PluginToolManager
2024-09-20 23:48:48 +08:00
from core.tools.__base.tool_runtime import ToolRuntime
2024-09-23 18:06:16 +08:00
from core.tools.plugin_tool.provider import PluginToolProviderController
from core.tools.plugin_tool.tool import PluginTool
2024-09-20 23:48:48 +08:00
2024-09-20 02:25:14 +08:00
if TYPE_CHECKING:
from core.workflow.nodes.tool.entities import ToolEntity
from configs import dify_config
from core.agent.entities import AgentToolEntity
2024-05-27 22:01:11 +08:00
from core.app.entities.app_invoke_entities import InvokeFrom
from core.helper.module_import_helper import load_single_subclass_from_source
from core.helper.position_helper import is_filtered
from core.model_runtime.utils.encoders import jsonable_encoder
2024-09-20 02:25:14 +08:00
from core.tools.__base.tool import Tool
from core.tools.builtin_tool.provider import BuiltinToolProviderController
from core.tools.builtin_tool.providers._positions import BuiltinToolProviderSort
from core.tools.builtin_tool.tool import BuiltinTool
from core.tools.custom_tool.provider import ApiToolProviderController
from core.tools.custom_tool.tool import ApiTool
2024-09-23 18:06:16 +08:00
from core.tools.entities.api_entities import ToolProviderApiEntity, ToolProviderTypeApiLiteral
from core.tools.entities.common_entities import I18nObject
2024-08-29 13:09:13 +08:00
from core.tools.entities.tool_entities import ApiProviderAuthType, ToolInvokeFrom, ToolParameter, ToolProviderType
from core.tools.errors import ToolProviderNotFoundError
2024-05-27 22:01:11 +08:00
from core.tools.tool_label_manager import ToolLabelManager
2024-08-30 21:25:58 +08:00
from core.tools.utils.configuration import ProviderConfigEncrypter, ToolParameterConfigurationManager
from core.tools.utils.tool_parameter_converter import ToolParameterConverter
2024-09-20 02:25:14 +08:00
from core.tools.workflow_as_tool.tool import WorkflowTool
from extensions.ext_database import db
2024-05-27 22:01:11 +08:00
from models.tools import ApiToolProvider, BuiltinToolProvider, WorkflowToolProvider
from services.tools.tools_transform_service import ToolTransformService
logger = logging.getLogger(__name__)
class ToolManager:
_builtin_provider_lock = Lock()
2024-09-23 18:06:16 +08:00
_hardcoded_providers = {}
_builtin_providers_loaded = False
_builtin_tools_labels = {}
@classmethod
2024-09-23 18:06:16 +08:00
def get_builtin_provider(
cls, provider: str, tenant_id: str
) -> BuiltinToolProviderController | PluginToolProviderController:
"""
get the builtin provider
:param provider: the name of the provider
2024-09-23 18:06:16 +08:00
:param tenant_id: the id of the tenant
:return: the provider
"""
2024-09-29 14:44:22 +08:00
# split provider to
2024-09-23 18:06:16 +08:00
if len(cls._hardcoded_providers) == 0:
# init the builtin providers
2024-09-23 18:06:16 +08:00
cls.load_hardcoded_providers_cache()
2024-09-23 18:06:16 +08:00
if provider not in cls._hardcoded_providers:
# get plugin provider
plugin_provider = cls.get_plugin_provider(provider, tenant_id)
if plugin_provider:
return plugin_provider
2024-09-23 18:06:16 +08:00
return cls._hardcoded_providers[provider]
@classmethod
2024-09-23 18:06:16 +08:00
def get_plugin_provider(cls, provider: str, tenant_id: str) -> PluginToolProviderController:
"""
get the plugin provider
"""
manager = PluginToolManager()
2024-09-29 14:44:22 +08:00
provider_entity = manager.fetch_tool_provider(tenant_id, provider)
2024-09-23 18:06:16 +08:00
if not provider_entity:
raise ToolProviderNotFoundError(f"plugin provider {provider} not found")
return PluginToolProviderController(
entity=provider_entity.declaration,
tenant_id=tenant_id,
)
@classmethod
def get_builtin_tool(cls, provider: str, tool_name: str, tenant_id: str) -> BuiltinTool | PluginTool | None:
"""
get the builtin tool
:param provider: the name of the provider
:param tool_name: the name of the tool
2024-09-23 18:06:16 +08:00
:param tenant_id: the id of the tenant
:return: the provider, the tool
"""
2024-09-23 18:06:16 +08:00
provider_controller = cls.get_builtin_provider(provider, tenant_id)
tool = provider_controller.get_tool(tool_name)
return tool
@classmethod
def get_tool_runtime(
cls,
2024-09-14 02:47:01 +08:00
provider_type: ToolProviderType,
provider_id: str,
tool_name: str,
tenant_id: str,
invoke_from: InvokeFrom = InvokeFrom.DEBUGGER,
tool_invoke_from: ToolInvokeFrom = ToolInvokeFrom.AGENT,
2024-09-14 02:47:01 +08:00
) -> Union[BuiltinTool, ApiTool, WorkflowTool]:
"""
get the tool runtime
:param provider_type: the type of the provider
:param provider_name: the name of the provider
:param tool_name: the name of the tool
:return: the tool
"""
2024-07-09 15:37:56 +08:00
if provider_type == ToolProviderType.BUILT_IN:
# check if the builtin tool need credentials
2024-09-23 18:06:16 +08:00
provider_controller = cls.get_builtin_provider(provider_id, tenant_id)
builtin_tool = provider_controller.get_tool(tool_name)
if not builtin_tool:
raise ToolProviderNotFoundError(f"builtin tool {tool_name} not found")
if not provider_controller.need_credentials:
2024-09-14 02:47:01 +08:00
return cast(
BuiltinTool,
builtin_tool.fork_tool_runtime(
2024-09-20 23:48:48 +08:00
runtime=ToolRuntime(
tenant_id=tenant_id,
credentials={},
invoke_from=invoke_from,
tool_invoke_from=tool_invoke_from,
)
2024-09-14 02:47:01 +08:00
),
)
# get credentials
2024-09-14 02:47:01 +08:00
builtin_provider: BuiltinToolProvider | None = (
db.session.query(BuiltinToolProvider)
.filter(
BuiltinToolProvider.tenant_id == tenant_id,
BuiltinToolProvider.provider == provider_id,
)
.first()
)
if builtin_provider is None:
raise ToolProviderNotFoundError(f"builtin provider {provider_id} not found")
# decrypt the credentials
credentials = builtin_provider.credentials
2024-08-30 21:25:58 +08:00
tool_configuration = ProviderConfigEncrypter(
2024-09-14 02:47:01 +08:00
tenant_id=tenant_id,
config=provider_controller.get_credentials_schema(),
provider_type=provider_controller.provider_type.value,
provider_identity=provider_controller.entity.identity.name,
2024-08-30 18:11:38 +08:00
)
2024-08-30 21:25:58 +08:00
decrypted_credentials = tool_configuration.decrypt(credentials)
2024-09-14 02:47:01 +08:00
return cast(
BuiltinTool,
builtin_tool.fork_tool_runtime(
2024-09-20 23:48:48 +08:00
runtime=ToolRuntime(
tenant_id=tenant_id,
credentials=decrypted_credentials,
runtime_parameters={},
invoke_from=invoke_from,
tool_invoke_from=tool_invoke_from,
)
2024-09-14 02:47:01 +08:00
),
)
2024-07-09 15:37:56 +08:00
elif provider_type == ToolProviderType.API:
2024-05-27 22:01:11 +08:00
api_provider, credentials = cls.get_api_provider_controller(tenant_id, provider_id)
# decrypt the credentials
2024-08-30 21:25:58 +08:00
tool_configuration = ProviderConfigEncrypter(
2024-09-14 02:47:01 +08:00
tenant_id=tenant_id,
2024-08-30 18:11:38 +08:00
config=api_provider.get_credentials_schema(),
provider_type=api_provider.provider_type.value,
2024-09-20 23:48:48 +08:00
provider_identity=api_provider.entity.identity.name,
2024-08-30 18:11:38 +08:00
)
2024-08-30 21:25:58 +08:00
decrypted_credentials = tool_configuration.decrypt(credentials)
2024-09-14 02:47:01 +08:00
return cast(
ApiTool,
api_provider.get_tool(tool_name).fork_tool_runtime(
2024-09-20 23:48:48 +08:00
runtime=ToolRuntime(
tenant_id=tenant_id,
credentials=decrypted_credentials,
invoke_from=invoke_from,
tool_invoke_from=tool_invoke_from,
)
2024-09-14 02:47:01 +08:00
),
)
2024-07-09 15:37:56 +08:00
elif provider_type == ToolProviderType.WORKFLOW:
workflow_provider = (
db.session.query(WorkflowToolProvider)
.filter(WorkflowToolProvider.tenant_id == tenant_id, WorkflowToolProvider.id == provider_id)
.first()
)
2024-05-27 22:01:11 +08:00
if workflow_provider is None:
raise ToolProviderNotFoundError(f"workflow provider {provider_id} not found")
2024-05-27 22:01:11 +08:00
controller = ToolTransformService.workflow_provider_to_controller(db_provider=workflow_provider)
2024-05-27 22:01:11 +08:00
2024-09-14 02:47:01 +08:00
return cast(
WorkflowTool,
controller.get_tools(tenant_id=workflow_provider.tenant_id)[0].fork_tool_runtime(
2024-09-20 23:48:48 +08:00
runtime=ToolRuntime(
tenant_id=tenant_id,
credentials={},
invoke_from=invoke_from,
tool_invoke_from=tool_invoke_from,
)
2024-09-14 02:47:01 +08:00
),
2024-05-27 22:01:11 +08:00
)
2024-07-09 15:37:56 +08:00
elif provider_type == ToolProviderType.APP:
raise NotImplementedError("app provider not implemented")
else:
2024-09-14 02:47:01 +08:00
raise ToolProviderNotFoundError(f"provider type {provider_type.value} not found")
@classmethod
def _init_runtime_parameter(cls, parameter_rule: ToolParameter, parameters: dict) -> Union[str, int, float, bool]:
"""
init runtime parameter
"""
parameter_value = parameters.get(parameter_rule.name)
if not parameter_value and parameter_value != 0:
# get default value
parameter_value = parameter_rule.default
if not parameter_value and parameter_rule.required:
raise ValueError(f"tool parameter {parameter_rule.name} not found in tool config")
if parameter_rule.type == ToolParameter.ToolParameterType.SELECT:
# check if tool_parameter_config in options
options = [x.value for x in parameter_rule.options]
if parameter_value is not None and parameter_value not in options:
raise ValueError(
f"tool parameter {parameter_rule.name} value {parameter_value} not in options {options}"
)
return ToolParameterConverter.cast_parameter_by_type(parameter_value, parameter_rule.type)
@classmethod
def get_agent_tool_runtime(
cls,
tenant_id: str,
app_id: str,
agent_tool: AgentToolEntity,
invoke_from: InvokeFrom = InvokeFrom.DEBUGGER,
) -> Tool:
2024-03-08 20:31:13 +08:00
"""
get the agent tool runtime
2024-03-08 20:31:13 +08:00
"""
tool_entity = cls.get_tool_runtime(
provider_type=agent_tool.provider_type,
2024-05-27 22:01:11 +08:00
provider_id=agent_tool.provider_id,
tool_name=agent_tool.tool_name,
2024-03-08 20:31:13 +08:00
tenant_id=tenant_id,
2024-05-27 22:01:11 +08:00
invoke_from=invoke_from,
tool_invoke_from=ToolInvokeFrom.AGENT,
2024-03-08 20:31:13 +08:00
)
runtime_parameters = {}
2024-09-23 18:06:16 +08:00
parameters = tool_entity.get_merged_runtime_parameters()
2024-03-08 20:31:13 +08:00
for parameter in parameters:
2024-05-27 22:01:11 +08:00
# check file types
if parameter.type == ToolParameter.ToolParameterType.FILE:
raise ValueError(f"file type parameter {parameter.name} not supported in agent")
2024-03-08 20:31:13 +08:00
if parameter.form == ToolParameter.ToolParameterForm.FORM:
# save tool parameter to tool entity memory
value = cls._init_runtime_parameter(parameter, agent_tool.tool_parameters)
runtime_parameters[parameter.name] = value
2024-03-08 20:31:13 +08:00
# decrypt runtime parameters
encryption_manager = ToolParameterConfigurationManager(
tenant_id=tenant_id,
tool_runtime=tool_entity,
provider_name=agent_tool.provider_id,
provider_type=agent_tool.provider_type,
identity_id=f"AGENT.{app_id}",
2024-03-08 20:31:13 +08:00
)
runtime_parameters = encryption_manager.decrypt_tool_parameters(runtime_parameters)
2024-08-30 14:23:14 +08:00
if not tool_entity.runtime:
raise Exception("tool missing runtime")
2024-09-14 02:47:01 +08:00
2024-03-08 20:31:13 +08:00
tool_entity.runtime.runtime_parameters.update(runtime_parameters)
return tool_entity
@classmethod
def get_workflow_tool_runtime(
cls,
tenant_id: str,
app_id: str,
node_id: str,
workflow_tool: "ToolEntity",
invoke_from: InvokeFrom = InvokeFrom.DEBUGGER,
) -> Tool:
"""
get the workflow tool runtime
"""
2024-09-29 19:36:44 +08:00
tool_runtime = cls.get_tool_runtime(
provider_type=workflow_tool.provider_type,
2024-05-27 22:01:11 +08:00
provider_id=workflow_tool.provider_id,
tool_name=workflow_tool.tool_name,
tenant_id=tenant_id,
2024-05-27 22:01:11 +08:00
invoke_from=invoke_from,
tool_invoke_from=ToolInvokeFrom.WORKFLOW,
)
runtime_parameters = {}
2024-09-29 19:36:44 +08:00
parameters = tool_runtime.get_merged_runtime_parameters()
for parameter in parameters:
# save tool parameter to tool entity memory
if parameter.form == ToolParameter.ToolParameterForm.FORM:
value = cls._init_runtime_parameter(parameter, workflow_tool.tool_configurations)
runtime_parameters[parameter.name] = value
# decrypt runtime parameters
encryption_manager = ToolParameterConfigurationManager(
tenant_id=tenant_id,
2024-09-29 19:36:44 +08:00
tool_runtime=tool_runtime,
provider_name=workflow_tool.provider_id,
provider_type=workflow_tool.provider_type,
identity_id=f"WORKFLOW.{app_id}.{node_id}",
)
if runtime_parameters:
runtime_parameters = encryption_manager.decrypt_tool_parameters(runtime_parameters)
2024-09-29 19:36:44 +08:00
if not tool_runtime.runtime:
2024-08-30 14:23:14 +08:00
raise Exception("tool missing runtime")
2024-09-14 02:47:01 +08:00
2024-09-29 19:36:44 +08:00
tool_runtime.runtime.runtime_parameters.update(runtime_parameters)
return tool_runtime
@classmethod
2024-09-23 18:06:16 +08:00
def get_builtin_provider_icon(cls, provider: str, tenant_id: str) -> tuple[str, str]:
"""
get the absolute path of the icon of the builtin provider
:param provider: the name of the provider
2024-09-23 18:06:16 +08:00
:param tenant_id: the id of the tenant
:return: the absolute path of the icon, the mime type of the icon
"""
# get provider
2024-09-23 18:06:16 +08:00
provider_controller = cls.get_builtin_provider(provider, tenant_id)
absolute_path = path.join(
path.dirname(path.realpath(__file__)),
2024-09-20 02:25:14 +08:00
"builtin_tool",
"providers",
provider,
"_assets",
2024-09-20 23:48:48 +08:00
provider_controller.entity.identity.icon,
)
# check if the icon exists
if not path.exists(absolute_path):
raise ToolProviderNotFoundError(f"builtin provider {provider} icon not found")
# get the mime type
mime_type, _ = mimetypes.guess_type(absolute_path)
mime_type = mime_type or "application/octet-stream"
return absolute_path, mime_type
@classmethod
2024-09-23 18:06:16 +08:00
def list_hardcoded_providers(cls):
# use cache first
if cls._builtin_providers_loaded:
2024-09-23 18:06:16 +08:00
yield from list(cls._hardcoded_providers.values())
return
with cls._builtin_provider_lock:
if cls._builtin_providers_loaded:
2024-09-23 18:06:16 +08:00
yield from list(cls._hardcoded_providers.values())
return
2024-09-23 18:06:16 +08:00
yield from cls._list_hardcoded_providers()
@classmethod
def list_plugin_providers(cls, tenant_id: str) -> list[PluginToolProviderController]:
"""
list all the plugin providers
"""
manager = PluginToolManager()
provider_entities = manager.fetch_tool_providers(tenant_id)
return [
PluginToolProviderController(
entity=provider.declaration,
tenant_id=tenant_id,
)
for provider in provider_entities
]
@classmethod
def list_builtin_providers(
cls, tenant_id: str
) -> Generator[BuiltinToolProviderController | PluginToolProviderController, None, None]:
"""
list all the builtin providers
"""
yield from cls.list_hardcoded_providers()
# get plugin providers
yield from cls.list_plugin_providers(tenant_id)
@classmethod
2024-09-23 18:06:16 +08:00
def _list_hardcoded_providers(cls) -> Generator[BuiltinToolProviderController, None, None]:
"""
list all the builtin providers
"""
2024-09-20 02:25:14 +08:00
for provider_path in listdir(path.join(path.dirname(path.realpath(__file__)), "builtin_tool", "providers")):
2024-09-14 02:47:01 +08:00
if provider_path.startswith("__"):
continue
2024-09-20 02:25:14 +08:00
if path.isdir(path.join(path.dirname(path.realpath(__file__)), "builtin_tool", "providers", provider_path)):
2024-09-14 02:47:01 +08:00
if provider_path.startswith("__"):
continue
# init provider
try:
provider_class = load_single_subclass_from_source(
2024-09-20 02:25:14 +08:00
module_name=f"core.tools.builtin_tool.providers.{provider_path}.{provider_path}",
script_path=path.join(
2024-09-14 02:47:01 +08:00
path.dirname(path.realpath(__file__)),
2024-09-20 02:25:14 +08:00
"builtin_tool",
"providers",
2024-09-14 02:47:01 +08:00
provider_path,
f"{provider_path}.py",
),
parent_type=BuiltinToolProviderController,
)
provider: BuiltinToolProviderController = provider_class()
2024-09-23 18:06:16 +08:00
cls._hardcoded_providers[provider.entity.identity.name] = provider
for tool in provider.get_tools():
2024-09-20 23:48:48 +08:00
cls._builtin_tools_labels[tool.entity.identity.name] = tool.entity.identity.label
yield provider
2024-03-08 15:22:55 +08:00
except Exception as e:
2024-09-20 02:25:14 +08:00
logger.error(f"load builtin provider error: {e}")
continue
# set builtin providers loaded
cls._builtin_providers_loaded = True
@classmethod
2024-09-23 18:06:16 +08:00
def load_hardcoded_providers_cache(cls):
for _ in cls.list_hardcoded_providers():
pass
@classmethod
2024-09-23 18:06:16 +08:00
def clear_hardcoded_providers_cache(cls):
cls._hardcoded_providers = {}
cls._builtin_providers_loaded = False
@classmethod
def get_tool_label(cls, tool_name: str) -> Union[I18nObject, None]:
2024-01-24 20:14:45 +08:00
"""
get the tool label
2024-01-24 20:14:45 +08:00
:param tool_name: the name of the tool
2024-01-24 20:14:45 +08:00
:return: the label of the tool
2024-01-24 20:14:45 +08:00
"""
if len(cls._builtin_tools_labels) == 0:
2024-01-24 20:14:45 +08:00
# init the builtin providers
2024-09-23 18:06:16 +08:00
cls.load_hardcoded_providers_cache()
2024-01-24 20:14:45 +08:00
if tool_name not in cls._builtin_tools_labels:
2024-01-24 20:14:45 +08:00
return None
return cls._builtin_tools_labels[tool_name]
@classmethod
2024-09-24 16:33:19 +08:00
def list_providers_from_api(
2024-09-23 18:06:16 +08:00
cls, user_id: str, tenant_id: str, typ: ToolProviderTypeApiLiteral
) -> list[ToolProviderApiEntity]:
result_providers: dict[str, ToolProviderApiEntity] = {}
2024-05-27 22:01:11 +08:00
filters = []
if not typ:
filters.extend(["builtin", "api", "workflow"])
2024-05-27 22:01:11 +08:00
else:
filters.append(typ)
if "builtin" in filters:
2024-05-27 22:01:11 +08:00
# get builtin providers
2024-09-23 18:06:16 +08:00
builtin_providers = cls.list_builtin_providers(tenant_id)
2024-05-27 22:01:11 +08:00
# get db builtin providers
db_builtin_providers: list[BuiltinToolProvider] = (
db.session.query(BuiltinToolProvider).filter(BuiltinToolProvider.tenant_id == tenant_id).all()
)
2024-05-27 22:01:11 +08:00
find_db_builtin_provider = lambda provider: next(
(x for x in db_builtin_providers if x.provider == provider), None
2024-03-08 15:22:55 +08:00
)
2024-05-27 22:01:11 +08:00
# append builtin providers
for provider in builtin_providers:
# handle include, exclude
if is_filtered(
2024-09-14 02:47:01 +08:00
include_set=dify_config.POSITION_TOOL_INCLUDES_SET, # type: ignore
exclude_set=dify_config.POSITION_TOOL_EXCLUDES_SET, # type: ignore
data=provider,
name_func=lambda x: x.identity.name,
):
continue
2024-05-27 22:01:11 +08:00
user_provider = ToolTransformService.builtin_provider_to_user_provider(
provider_controller=provider,
2024-09-20 23:48:48 +08:00
db_provider=find_db_builtin_provider(provider.entity.identity.name),
decrypt_credentials=False,
2024-05-27 22:01:11 +08:00
)
2024-09-24 16:33:19 +08:00
if isinstance(provider, PluginToolProviderController):
result_providers[f"plugin_provider.{user_provider.name}"] = user_provider
2024-09-24 16:33:19 +08:00
else:
result_providers[f"builtin_provider.{user_provider.name}"] = user_provider
# get db api providers
if "api" in filters:
db_api_providers: list[ApiToolProvider] = (
db.session.query(ApiToolProvider).filter(ApiToolProvider.tenant_id == tenant_id).all()
)
api_provider_controllers = [
{"provider": provider, "controller": ToolTransformService.api_provider_to_controller(provider)}
for provider in db_api_providers
]
2024-05-27 22:01:11 +08:00
# get labels
labels = ToolLabelManager.get_tools_labels([x["controller"] for x in api_provider_controllers])
2024-05-27 22:01:11 +08:00
for api_provider_controller in api_provider_controllers:
user_provider = ToolTransformService.api_provider_to_user_provider(
provider_controller=api_provider_controller["controller"],
db_provider=api_provider_controller["provider"],
2024-05-27 22:01:11 +08:00
decrypt_credentials=False,
labels=labels.get(api_provider_controller["controller"].provider_id, []),
2024-05-27 22:01:11 +08:00
)
result_providers[f"api_provider.{user_provider.name}"] = user_provider
2024-05-27 22:01:11 +08:00
if "workflow" in filters:
2024-05-27 22:01:11 +08:00
# get workflow providers
workflow_providers: list[WorkflowToolProvider] = (
db.session.query(WorkflowToolProvider).filter(WorkflowToolProvider.tenant_id == tenant_id).all()
)
2024-05-27 22:01:11 +08:00
workflow_provider_controllers = []
for provider in workflow_providers:
try:
workflow_provider_controllers.append(
ToolTransformService.workflow_provider_to_controller(db_provider=provider)
)
except Exception as e:
# app has been deleted
pass
2024-05-27 22:01:11 +08:00
labels = ToolLabelManager.get_tools_labels(workflow_provider_controllers)
for provider_controller in workflow_provider_controllers:
user_provider = ToolTransformService.workflow_provider_to_user_provider(
provider_controller=provider_controller,
labels=labels.get(provider_controller.provider_id, []),
)
result_providers[f"workflow_provider.{user_provider.name}"] = user_provider
return BuiltinToolProviderSort.sort(list(result_providers.values()))
@classmethod
def get_api_provider_controller(
cls, tenant_id: str, provider_id: str
) -> tuple[ApiToolProviderController, dict[str, Any]]:
"""
get the api provider
:param provider_name: the name of the provider
:return: the provider controller, the credentials
"""
2024-09-14 02:47:01 +08:00
provider: ApiToolProvider | None = (
db.session.query(ApiToolProvider)
.filter(
ApiToolProvider.id == provider_id,
ApiToolProvider.tenant_id == tenant_id,
)
.first()
)
if provider is None:
raise ToolProviderNotFoundError(f"api provider {provider_id} not found")
2024-05-27 22:01:11 +08:00
controller = ApiToolProviderController.from_db(
provider,
ApiProviderAuthType.API_KEY if provider.credentials["auth_type"] == "api_key" else ApiProviderAuthType.NONE,
)
controller.load_bundled_tools(provider.tools)
return controller, provider.credentials
@classmethod
def user_get_api_provider(cls, provider: str, tenant_id: str) -> dict:
"""
get api provider
"""
2024-09-14 02:47:01 +08:00
provider_obj: ApiToolProvider | None = (
db.session.query(ApiToolProvider)
.filter(
ApiToolProvider.tenant_id == tenant_id,
ApiToolProvider.name == provider,
)
.first()
)
2024-08-30 14:23:14 +08:00
if provider_obj is None:
raise ValueError(f"you have not added provider {provider}")
try:
2024-08-30 14:23:14 +08:00
credentials = json.loads(provider_obj.credentials_str) or {}
except:
credentials = {}
# package tool provider controller
2024-05-27 22:01:11 +08:00
controller = ApiToolProviderController.from_db(
2024-09-14 02:47:01 +08:00
provider_obj,
ApiProviderAuthType.API_KEY if credentials["auth_type"] == "api_key" else ApiProviderAuthType.NONE,
)
# init tool configuration
2024-08-30 21:25:58 +08:00
tool_configuration = ProviderConfigEncrypter(
2024-08-30 18:11:38 +08:00
tenant_id=tenant_id,
config=controller.get_credentials_schema(),
provider_type=controller.provider_type.value,
2024-09-20 23:48:48 +08:00
provider_identity=controller.entity.identity.name,
2024-08-30 18:11:38 +08:00
)
2024-08-30 21:25:58 +08:00
decrypted_credentials = tool_configuration.decrypt(credentials)
masked_credentials = tool_configuration.mask_tool_credentials(decrypted_credentials)
try:
2024-08-30 14:23:14 +08:00
icon = json.loads(provider_obj.icon)
except:
icon = {"background": "#252525", "content": "\ud83d\ude01"}
2024-05-27 22:01:11 +08:00
# add tool labels
labels = ToolLabelManager.get_tool_labels(controller)
return jsonable_encoder(
{
2024-09-14 02:47:01 +08:00
"schema_type": provider_obj.schema_type,
"schema": provider_obj.schema,
"tools": provider_obj.tools,
"icon": icon,
2024-09-14 02:47:01 +08:00
"description": provider_obj.description,
"credentials": masked_credentials,
2024-09-14 02:47:01 +08:00
"privacy_policy": provider_obj.privacy_policy,
"custom_disclaimer": provider_obj.custom_disclaimer,
"labels": labels,
}
)
@classmethod
2024-07-09 15:37:56 +08:00
def get_tool_icon(cls, tenant_id: str, provider_type: ToolProviderType, provider_id: str) -> Union[str, dict]:
"""
get the tool icon
:param tenant_id: the id of the tenant
:param provider_type: the type of the provider
:param provider_id: the id of the provider
:return:
"""
provider_type = provider_type
provider_id = provider_id
2024-07-09 15:37:56 +08:00
if provider_type == ToolProviderType.BUILT_IN:
return (
dify_config.CONSOLE_API_URL
+ "/console/api/workspaces/current/tool-provider/builtin/"
+ provider_id
+ "/icon"
)
2024-07-09 15:37:56 +08:00
elif provider_type == ToolProviderType.API:
try:
2024-09-14 02:47:01 +08:00
api_provider: ApiToolProvider | None = (
db.session.query(ApiToolProvider)
.filter(ApiToolProvider.tenant_id == tenant_id, ApiToolProvider.id == provider_id)
.first()
)
2024-08-30 14:23:14 +08:00
if not api_provider:
raise ValueError("api tool not found")
2024-09-14 02:47:01 +08:00
2024-08-30 14:23:14 +08:00
return json.loads(api_provider.icon)
except:
return {"background": "#252525", "content": "\ud83d\ude01"}
2024-07-09 15:37:56 +08:00
elif provider_type == ToolProviderType.WORKFLOW:
2024-09-14 02:47:01 +08:00
workflow_provider: WorkflowToolProvider | None = (
db.session.query(WorkflowToolProvider)
.filter(WorkflowToolProvider.tenant_id == tenant_id, WorkflowToolProvider.id == provider_id)
.first()
)
2024-08-30 14:23:14 +08:00
if workflow_provider is None:
raise ToolProviderNotFoundError(f"workflow provider {provider_id} not found")
2024-05-27 22:01:11 +08:00
2024-08-30 14:23:14 +08:00
return json.loads(workflow_provider.icon)
else:
raise ValueError(f"provider type {provider_type} not found")
2024-09-23 18:06:16 +08:00
ToolManager.load_hardcoded_providers_cache()