configuration.py 8.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253
  1. from collections.abc import Mapping
  2. from copy import deepcopy
  3. from typing import Any
  4. from pydantic import BaseModel
  5. from core.entities.provider_entities import BasicProviderConfig
  6. from core.helper import encrypter
  7. from core.helper.tool_parameter_cache import ToolParameterCache, ToolParameterCacheType
  8. from core.helper.tool_provider_cache import ToolProviderCredentialsCache, ToolProviderCredentialsCacheType
  9. from core.tools.__base.tool import Tool
  10. from core.tools.entities.tool_entities import (
  11. ToolParameter,
  12. ToolProviderType,
  13. )
  14. class ProviderConfigEncrypter(BaseModel):
  15. tenant_id: str
  16. config: Mapping[str, BasicProviderConfig]
  17. provider_type: str
  18. provider_identity: str
  19. def _deep_copy(self, data: dict[str, str]) -> dict[str, str]:
  20. """
  21. deep copy data
  22. """
  23. return deepcopy(data)
  24. def encrypt(self, data: dict[str, str]) -> dict[str, str]:
  25. """
  26. encrypt tool credentials with tenant id
  27. return a deep copy of credentials with encrypted values
  28. """
  29. data = self._deep_copy(data)
  30. # get fields need to be decrypted
  31. fields = self.config
  32. for field_name, field in fields.items():
  33. if field.type == BasicProviderConfig.Type.SECRET_INPUT:
  34. if field_name in data:
  35. encrypted = encrypter.encrypt_token(self.tenant_id, data[field_name])
  36. data[field_name] = encrypted
  37. return data
  38. def mask_tool_credentials(self, data: dict[str, Any]) -> dict[str, Any]:
  39. """
  40. mask tool credentials
  41. return a deep copy of credentials with masked values
  42. """
  43. data = self._deep_copy(data)
  44. # get fields need to be decrypted
  45. fields = self.config
  46. for field_name, field in fields.items():
  47. if field.type == BasicProviderConfig.Type.SECRET_INPUT:
  48. if field_name in data:
  49. if len(data[field_name]) > 6:
  50. data[field_name] = (
  51. data[field_name][:2] + "*" * (len(data[field_name]) - 4) + data[field_name][-2:]
  52. )
  53. else:
  54. data[field_name] = "*" * len(data[field_name])
  55. return data
  56. def decrypt(self, data: dict[str, str]) -> dict[str, str]:
  57. """
  58. decrypt tool credentials with tenant id
  59. return a deep copy of credentials with decrypted values
  60. """
  61. cache = ToolProviderCredentialsCache(
  62. tenant_id=self.tenant_id,
  63. identity_id=f"{self.provider_type}.{self.provider_identity}",
  64. cache_type=ToolProviderCredentialsCacheType.PROVIDER,
  65. )
  66. cached_credentials = cache.get()
  67. if cached_credentials:
  68. return cached_credentials
  69. data = self._deep_copy(data)
  70. # get fields need to be decrypted
  71. fields = self.config
  72. for field_name, field in fields.items():
  73. if field.type == BasicProviderConfig.Type.SECRET_INPUT:
  74. if field_name in data:
  75. try:
  76. data[field_name] = encrypter.decrypt_token(self.tenant_id, data[field_name])
  77. except:
  78. pass
  79. cache.set(data)
  80. return data
  81. def delete_tool_credentials_cache(self):
  82. cache = ToolProviderCredentialsCache(
  83. tenant_id=self.tenant_id,
  84. identity_id=f"{self.provider_type}.{self.provider_identity}",
  85. cache_type=ToolProviderCredentialsCacheType.PROVIDER,
  86. )
  87. cache.delete()
  88. class ToolParameterConfigurationManager:
  89. """
  90. Tool parameter configuration manager
  91. """
  92. tenant_id: str
  93. tool_runtime: Tool
  94. provider_name: str
  95. provider_type: ToolProviderType
  96. identity_id: str
  97. def __init__(
  98. self, tenant_id: str, tool_runtime: Tool, provider_name: str, provider_type: ToolProviderType, identity_id: str
  99. ) -> None:
  100. self.tenant_id = tenant_id
  101. self.tool_runtime = tool_runtime
  102. self.provider_name = provider_name
  103. self.provider_type = provider_type
  104. self.identity_id = identity_id
  105. def _deep_copy(self, parameters: dict[str, Any]) -> dict[str, Any]:
  106. """
  107. deep copy parameters
  108. """
  109. return deepcopy(parameters)
  110. def _merge_parameters(self) -> list[ToolParameter]:
  111. """
  112. merge parameters
  113. """
  114. # get tool parameters
  115. tool_parameters = self.tool_runtime.entity.parameters or []
  116. # get tool runtime parameters
  117. runtime_parameters = self.tool_runtime.get_runtime_parameters() or []
  118. # override parameters
  119. current_parameters = tool_parameters.copy()
  120. for runtime_parameter in runtime_parameters:
  121. found = False
  122. for index, parameter in enumerate(current_parameters):
  123. if parameter.name == runtime_parameter.name and parameter.form == runtime_parameter.form:
  124. current_parameters[index] = runtime_parameter
  125. found = True
  126. break
  127. if not found and runtime_parameter.form == ToolParameter.ToolParameterForm.FORM:
  128. current_parameters.append(runtime_parameter)
  129. return current_parameters
  130. def mask_tool_parameters(self, parameters: dict[str, Any]) -> dict[str, Any]:
  131. """
  132. mask tool parameters
  133. return a deep copy of parameters with masked values
  134. """
  135. parameters = self._deep_copy(parameters)
  136. # override parameters
  137. current_parameters = self._merge_parameters()
  138. for parameter in current_parameters:
  139. if (
  140. parameter.form == ToolParameter.ToolParameterForm.FORM
  141. and parameter.type == ToolParameter.ToolParameterType.SECRET_INPUT
  142. ):
  143. if parameter.name in parameters:
  144. if len(parameters[parameter.name]) > 6:
  145. parameters[parameter.name] = (
  146. parameters[parameter.name][:2]
  147. + "*" * (len(parameters[parameter.name]) - 4)
  148. + parameters[parameter.name][-2:]
  149. )
  150. else:
  151. parameters[parameter.name] = "*" * len(parameters[parameter.name])
  152. return parameters
  153. def encrypt_tool_parameters(self, parameters: dict[str, Any]) -> dict[str, Any]:
  154. """
  155. encrypt tool parameters with tenant id
  156. return a deep copy of parameters with encrypted values
  157. """
  158. # override parameters
  159. current_parameters = self._merge_parameters()
  160. parameters = self._deep_copy(parameters)
  161. for parameter in current_parameters:
  162. if (
  163. parameter.form == ToolParameter.ToolParameterForm.FORM
  164. and parameter.type == ToolParameter.ToolParameterType.SECRET_INPUT
  165. ):
  166. if parameter.name in parameters:
  167. encrypted = encrypter.encrypt_token(self.tenant_id, parameters[parameter.name])
  168. parameters[parameter.name] = encrypted
  169. return parameters
  170. def decrypt_tool_parameters(self, parameters: dict[str, Any]) -> dict[str, Any]:
  171. """
  172. decrypt tool parameters with tenant id
  173. return a deep copy of parameters with decrypted values
  174. """
  175. cache = ToolParameterCache(
  176. tenant_id=self.tenant_id,
  177. provider=f"{self.provider_type.value}.{self.provider_name}",
  178. tool_name=self.tool_runtime.entity.identity.name,
  179. cache_type=ToolParameterCacheType.PARAMETER,
  180. identity_id=self.identity_id,
  181. )
  182. cached_parameters = cache.get()
  183. if cached_parameters:
  184. return cached_parameters
  185. # override parameters
  186. current_parameters = self._merge_parameters()
  187. has_secret_input = False
  188. for parameter in current_parameters:
  189. if (
  190. parameter.form == ToolParameter.ToolParameterForm.FORM
  191. and parameter.type == ToolParameter.ToolParameterType.SECRET_INPUT
  192. ):
  193. if parameter.name in parameters:
  194. try:
  195. has_secret_input = True
  196. parameters[parameter.name] = encrypter.decrypt_token(self.tenant_id, parameters[parameter.name])
  197. except:
  198. pass
  199. if has_secret_input:
  200. cache.set(parameters)
  201. return parameters
  202. def delete_tool_parameters_cache(self):
  203. cache = ToolParameterCache(
  204. tenant_id=self.tenant_id,
  205. provider=f"{self.provider_type.value}.{self.provider_name}",
  206. tool_name=self.tool_runtime.entity.identity.name,
  207. cache_type=ToolParameterCacheType.PARAMETER,
  208. identity_id=self.identity_id,
  209. )
  210. cache.delete()