| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290 | import osfrom copy import deepcopyfrom typing import Any, Unionfrom pydantic import BaseModelfrom yaml import FullLoader, loadfrom core.helper import encrypterfrom core.helper.tool_parameter_cache import ToolParameterCache, ToolParameterCacheTypefrom core.helper.tool_provider_cache import ToolProviderCredentialsCache, ToolProviderCredentialsCacheTypefrom core.tools.entities.tool_entities import (    ModelToolConfiguration,    ModelToolProviderConfiguration,    ToolParameter,    ToolProviderCredentials,)from core.tools.provider.tool_provider import ToolProviderControllerfrom core.tools.tool.tool import Toolclass ToolConfigurationManager(BaseModel):    tenant_id: str    provider_controller: ToolProviderController    def _deep_copy(self, credentials: dict[str, str]) -> dict[str, str]:        """        deep copy credentials        """        return deepcopy(credentials)        def encrypt_tool_credentials(self, credentials: dict[str, str]) -> dict[str, str]:        """        encrypt tool credentials with tenant id        return a deep copy of credentials with encrypted values        """        credentials = self._deep_copy(credentials)        # get fields need to be decrypted        fields = self.provider_controller.get_credentials_schema()        for field_name, field in fields.items():            if field.type == ToolProviderCredentials.CredentialsType.SECRET_INPUT:                if field_name in credentials:                    encrypted = encrypter.encrypt_token(self.tenant_id, credentials[field_name])                    credentials[field_name] = encrypted                return credentials        def mask_tool_credentials(self, credentials: dict[str, Any]) -> dict[str, Any]:        """        mask tool credentials        return a deep copy of credentials with masked values        """        credentials = self._deep_copy(credentials)        # get fields need to be decrypted        fields = self.provider_controller.get_credentials_schema()        for field_name, field in fields.items():            if field.type == ToolProviderCredentials.CredentialsType.SECRET_INPUT:                if field_name in credentials:                    if len(credentials[field_name]) > 6:                        credentials[field_name] = \                            credentials[field_name][:2] + \                            '*' * (len(credentials[field_name]) - 4) +\                            credentials[field_name][-2:]                    else:                        credentials[field_name] = '*' * len(credentials[field_name])        return credentials    def decrypt_tool_credentials(self, credentials: dict[str, str]) -> dict[str, str]:        """        decrypt tool credentials with tenant id        return a deep copy of credentials with decrypted values        """        cache = ToolProviderCredentialsCache(            tenant_id=self.tenant_id,             identity_id=f'{self.provider_controller.app_type.value}.{self.provider_controller.identity.name}',            cache_type=ToolProviderCredentialsCacheType.PROVIDER        )        cached_credentials = cache.get()        if cached_credentials:            return cached_credentials        credentials = self._deep_copy(credentials)        # get fields need to be decrypted        fields = self.provider_controller.get_credentials_schema()        for field_name, field in fields.items():            if field.type == ToolProviderCredentials.CredentialsType.SECRET_INPUT:                if field_name in credentials:                    try:                        credentials[field_name] = encrypter.decrypt_token(self.tenant_id, credentials[field_name])                    except:                        pass        cache.set(credentials)        return credentials        def delete_tool_credentials_cache(self):        cache = ToolProviderCredentialsCache(            tenant_id=self.tenant_id,             identity_id=f'{self.provider_controller.app_type.value}.{self.provider_controller.identity.name}',            cache_type=ToolProviderCredentialsCacheType.PROVIDER        )        cache.delete()class ToolParameterConfigurationManager(BaseModel):    """    Tool parameter configuration manager    """    tenant_id: str    tool_runtime: Tool    provider_name: str    provider_type: str    def _deep_copy(self, parameters: dict[str, Any]) -> dict[str, Any]:        """        deep copy parameters        """        return {key: value for key, value in parameters.items()}        def _merge_parameters(self) -> list[ToolParameter]:        """        merge parameters        """        # get tool parameters        tool_parameters = self.tool_runtime.parameters or []        # get tool runtime parameters        runtime_parameters = self.tool_runtime.get_runtime_parameters() or []        # override parameters        current_parameters = tool_parameters.copy()        for runtime_parameter in runtime_parameters:            found = False            for index, parameter in enumerate(current_parameters):                if parameter.name == runtime_parameter.name and parameter.form == runtime_parameter.form:                    current_parameters[index] = runtime_parameter                    found = True                    break            if not found and runtime_parameter.form == ToolParameter.ToolParameterForm.FORM:                current_parameters.append(runtime_parameter)        return current_parameters        def mask_tool_parameters(self, parameters: dict[str, Any]) -> dict[str, Any]:        """        mask tool parameters        return a deep copy of parameters with masked values        """        parameters = self._deep_copy(parameters)        # override parameters        current_parameters = self._merge_parameters()        for parameter in current_parameters:            if parameter.form == ToolParameter.ToolParameterForm.FORM and parameter.type == ToolParameter.ToolParameterType.SECRET_INPUT:                if parameter.name in parameters:                    if len(parameters[parameter.name]) > 6:                        parameters[parameter.name] = \                            parameters[parameter.name][:2] + \                            '*' * (len(parameters[parameter.name]) - 4) +\                            parameters[parameter.name][-2:]                    else:                        parameters[parameter.name] = '*' * len(parameters[parameter.name])        return parameters        def encrypt_tool_parameters(self, parameters: dict[str, Any]) -> dict[str, Any]:        """        encrypt tool parameters with tenant id        return a deep copy of parameters with encrypted values        """        # override parameters        current_parameters = self._merge_parameters()        for parameter in current_parameters:            if parameter.form == ToolParameter.ToolParameterForm.FORM and parameter.type == ToolParameter.ToolParameterType.SECRET_INPUT:                if parameter.name in parameters:                    encrypted = encrypter.encrypt_token(self.tenant_id, parameters[parameter.name])                    parameters[parameter.name] = encrypted                return parameters        def decrypt_tool_parameters(self, parameters: dict[str, Any]) -> dict[str, Any]:        """        decrypt tool parameters with tenant id        return a deep copy of parameters with decrypted values        """        cache = ToolParameterCache(            tenant_id=self.tenant_id,             provider=f'{self.provider_type}.{self.provider_name}',            tool_name=self.tool_runtime.identity.name,            cache_type=ToolParameterCacheType.PARAMETER        )        cached_parameters = cache.get()        if cached_parameters:            return cached_parameters        # override parameters        current_parameters = self._merge_parameters()        has_secret_input = False        for parameter in current_parameters:            if parameter.form == ToolParameter.ToolParameterForm.FORM and parameter.type == ToolParameter.ToolParameterType.SECRET_INPUT:                if parameter.name in parameters:                    try:                        has_secret_input = True                        parameters[parameter.name] = encrypter.decrypt_token(self.tenant_id, parameters[parameter.name])                    except:                        pass                if has_secret_input:            cache.set(parameters)        return parameters        def delete_tool_parameters_cache(self):        cache = ToolParameterCache(            tenant_id=self.tenant_id,             provider=f'{self.provider_type}.{self.provider_name}',            tool_name=self.tool_runtime.identity.name,            cache_type=ToolParameterCacheType.PARAMETER        )        cache.delete()class ModelToolConfigurationManager:    """    Model as tool configuration    """    _configurations: dict[str, ModelToolProviderConfiguration] = {}    _model_configurations: dict[str, ModelToolConfiguration] = {}    _inited = False    @classmethod    def _init_configuration(cls):        """        init configuration        """                absolute_path = os.path.abspath(os.path.dirname(__file__))        model_tools_path = os.path.join(absolute_path, '..', 'model_tools')        # get all .yaml file        files = [f for f in os.listdir(model_tools_path) if f.endswith('.yaml')]        for file in files:            provider = file.split('.')[0]            with open(os.path.join(model_tools_path, file), encoding='utf-8') as f:                configurations = ModelToolProviderConfiguration(**load(f, Loader=FullLoader))                models = configurations.models or []                for model in models:                    model_key = f'{provider}.{model.model}'                    cls._model_configurations[model_key] = model                cls._configurations[provider] = configurations        cls._inited = True    @classmethod    def get_configuration(cls, provider: str) -> Union[ModelToolProviderConfiguration, None]:        """        get configuration by provider        """        if not cls._inited:            cls._init_configuration()        return cls._configurations.get(provider, None)        @classmethod    def get_all_configuration(cls) -> dict[str, ModelToolProviderConfiguration]:        """        get all configurations        """        if not cls._inited:            cls._init_configuration()        return cls._configurations        @classmethod    def get_model_configuration(cls, provider: str, model: str) -> Union[ModelToolConfiguration, None]:        """        get model configuration        """        key = f'{provider}.{model}'        if not cls._inited:            cls._init_configuration()        return cls._model_configurations.get(key, None)
 |