ops_service.py 7.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200
  1. from typing import Optional
  2. from core.ops.ops_trace_manager import OpsTraceManager, provider_config_map
  3. from extensions.ext_database import db
  4. from models.model import App, TraceAppConfig
  5. class OpsService:
  6. @classmethod
  7. def get_tracing_app_config(cls, app_id: str, tracing_provider: str):
  8. """
  9. Get tracing app config
  10. :param app_id: app id
  11. :param tracing_provider: tracing provider
  12. :return:
  13. """
  14. trace_config_data: Optional[TraceAppConfig] = (
  15. db.session.query(TraceAppConfig)
  16. .filter(TraceAppConfig.app_id == app_id, TraceAppConfig.tracing_provider == tracing_provider)
  17. .first()
  18. )
  19. if not trace_config_data:
  20. return None
  21. # decrypt_token and obfuscated_token
  22. tenant = db.session.query(App).filter(App.id == app_id).first()
  23. if not tenant:
  24. return None
  25. tenant_id = tenant.tenant_id
  26. decrypt_tracing_config = OpsTraceManager.decrypt_tracing_config(
  27. tenant_id, tracing_provider, trace_config_data.tracing_config
  28. )
  29. new_decrypt_tracing_config = OpsTraceManager.obfuscated_decrypt_token(tracing_provider, decrypt_tracing_config)
  30. if tracing_provider == "langfuse" and (
  31. "project_key" not in decrypt_tracing_config or not decrypt_tracing_config.get("project_key")
  32. ):
  33. try:
  34. project_key = OpsTraceManager.get_trace_config_project_key(decrypt_tracing_config, tracing_provider)
  35. new_decrypt_tracing_config.update(
  36. {
  37. "project_url": "{host}/project/{key}".format(
  38. host=decrypt_tracing_config.get("host"), key=project_key
  39. )
  40. }
  41. )
  42. except Exception:
  43. new_decrypt_tracing_config.update(
  44. {"project_url": "{host}/".format(host=decrypt_tracing_config.get("host"))}
  45. )
  46. if tracing_provider == "langsmith" and (
  47. "project_url" not in decrypt_tracing_config or not decrypt_tracing_config.get("project_url")
  48. ):
  49. try:
  50. project_url = OpsTraceManager.get_trace_config_project_url(decrypt_tracing_config, tracing_provider)
  51. new_decrypt_tracing_config.update({"project_url": project_url})
  52. except Exception:
  53. new_decrypt_tracing_config.update({"project_url": "https://smith.langchain.com/"})
  54. if tracing_provider == "opik" and (
  55. "project_url" not in decrypt_tracing_config or not decrypt_tracing_config.get("project_url")
  56. ):
  57. try:
  58. project_url = OpsTraceManager.get_trace_config_project_url(decrypt_tracing_config, tracing_provider)
  59. new_decrypt_tracing_config.update({"project_url": project_url})
  60. except Exception:
  61. new_decrypt_tracing_config.update({"project_url": "https://www.comet.com/opik/"})
  62. trace_config_data.tracing_config = new_decrypt_tracing_config
  63. return trace_config_data.to_dict()
  64. @classmethod
  65. def create_tracing_app_config(cls, app_id: str, tracing_provider: str, tracing_config: dict):
  66. """
  67. Create tracing app config
  68. :param app_id: app id
  69. :param tracing_provider: tracing provider
  70. :param tracing_config: tracing config
  71. :return:
  72. """
  73. if tracing_provider not in provider_config_map and tracing_provider:
  74. return {"error": f"Invalid tracing provider: {tracing_provider}"}
  75. config_class, other_keys = (
  76. provider_config_map[tracing_provider]["config_class"],
  77. provider_config_map[tracing_provider]["other_keys"],
  78. )
  79. # FIXME: ignore type error
  80. default_config_instance = config_class(**tracing_config) # type: ignore
  81. for key in other_keys: # type: ignore
  82. if key in tracing_config and tracing_config[key] == "":
  83. tracing_config[key] = getattr(default_config_instance, key, None)
  84. # api check
  85. if not OpsTraceManager.check_trace_config_is_effective(tracing_config, tracing_provider):
  86. return {"error": "Invalid Credentials"}
  87. # get project url
  88. if tracing_provider == "langfuse":
  89. project_key = OpsTraceManager.get_trace_config_project_key(tracing_config, tracing_provider)
  90. project_url = "{host}/project/{key}".format(host=tracing_config.get("host"), key=project_key)
  91. elif tracing_provider in ("langsmith", "opik"):
  92. project_url = OpsTraceManager.get_trace_config_project_url(tracing_config, tracing_provider)
  93. else:
  94. project_url = None
  95. # check if trace config already exists
  96. trace_config_data: Optional[TraceAppConfig] = (
  97. db.session.query(TraceAppConfig)
  98. .filter(TraceAppConfig.app_id == app_id, TraceAppConfig.tracing_provider == tracing_provider)
  99. .first()
  100. )
  101. if trace_config_data:
  102. return None
  103. # get tenant id
  104. tenant = db.session.query(App).filter(App.id == app_id).first()
  105. if not tenant:
  106. return None
  107. tenant_id = tenant.tenant_id
  108. tracing_config = OpsTraceManager.encrypt_tracing_config(tenant_id, tracing_provider, tracing_config)
  109. if project_url:
  110. tracing_config["project_url"] = project_url
  111. trace_config_data = TraceAppConfig(
  112. app_id=app_id,
  113. tracing_provider=tracing_provider,
  114. tracing_config=tracing_config,
  115. )
  116. db.session.add(trace_config_data)
  117. db.session.commit()
  118. return {"result": "success"}
  119. @classmethod
  120. def update_tracing_app_config(cls, app_id: str, tracing_provider: str, tracing_config: dict):
  121. """
  122. Update tracing app config
  123. :param app_id: app id
  124. :param tracing_provider: tracing provider
  125. :param tracing_config: tracing config
  126. :return:
  127. """
  128. if tracing_provider not in provider_config_map:
  129. raise ValueError(f"Invalid tracing provider: {tracing_provider}")
  130. # check if trace config already exists
  131. current_trace_config = (
  132. db.session.query(TraceAppConfig)
  133. .filter(TraceAppConfig.app_id == app_id, TraceAppConfig.tracing_provider == tracing_provider)
  134. .first()
  135. )
  136. if not current_trace_config:
  137. return None
  138. # get tenant id
  139. tenant = db.session.query(App).filter(App.id == app_id).first()
  140. if not tenant:
  141. return None
  142. tenant_id = tenant.tenant_id
  143. tracing_config = OpsTraceManager.encrypt_tracing_config(
  144. tenant_id, tracing_provider, tracing_config, current_trace_config.tracing_config
  145. )
  146. # api check
  147. # decrypt_token
  148. decrypt_tracing_config = OpsTraceManager.decrypt_tracing_config(tenant_id, tracing_provider, tracing_config)
  149. if not OpsTraceManager.check_trace_config_is_effective(decrypt_tracing_config, tracing_provider):
  150. raise ValueError("Invalid Credentials")
  151. current_trace_config.tracing_config = tracing_config
  152. db.session.commit()
  153. return current_trace_config.to_dict()
  154. @classmethod
  155. def delete_tracing_app_config(cls, app_id: str, tracing_provider: str):
  156. """
  157. Delete tracing app config
  158. :param app_id: app id
  159. :param tracing_provider: tracing provider
  160. :return:
  161. """
  162. trace_config = (
  163. db.session.query(TraceAppConfig)
  164. .filter(TraceAppConfig.app_id == app_id, TraceAppConfig.tracing_provider == tracing_provider)
  165. .first()
  166. )
  167. if not trace_config:
  168. return None
  169. db.session.delete(trace_config)
  170. db.session.commit()
  171. return True