| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799 | 
							- import datetime
 
- import json
 
- import logging
 
- from collections.abc import Iterator
 
- from json import JSONDecodeError
 
- from typing import Optional
 
- from pydantic import BaseModel
 
- from core.entities.model_entities import ModelStatus, ModelWithProviderEntity, SimpleModelProviderEntity
 
- from core.entities.provider_entities import CustomConfiguration, SystemConfiguration, SystemConfigurationStatus
 
- from core.helper import encrypter
 
- from core.helper.model_provider_cache import ProviderCredentialsCache, ProviderCredentialsCacheType
 
- from core.model_runtime.entities.model_entities import FetchFrom, ModelType
 
- from core.model_runtime.entities.provider_entities import (
 
-     ConfigurateMethod,
 
-     CredentialFormSchema,
 
-     FormType,
 
-     ProviderEntity,
 
- )
 
- from core.model_runtime.model_providers import model_provider_factory
 
- from core.model_runtime.model_providers.__base.ai_model import AIModel
 
- from core.model_runtime.model_providers.__base.model_provider import ModelProvider
 
- from extensions.ext_database import db
 
- from models.provider import Provider, ProviderModel, ProviderType, TenantPreferredModelProvider
 
- logger = logging.getLogger(__name__)
 
- original_provider_configurate_methods = {}
 
- class ProviderConfiguration(BaseModel):
 
-     """
 
-     Model class for provider configuration.
 
-     """
 
-     tenant_id: str
 
-     provider: ProviderEntity
 
-     preferred_provider_type: ProviderType
 
-     using_provider_type: ProviderType
 
-     system_configuration: SystemConfiguration
 
-     custom_configuration: CustomConfiguration
 
-     def __init__(self, **data):
 
-         super().__init__(**data)
 
-         if self.provider.provider not in original_provider_configurate_methods:
 
-             original_provider_configurate_methods[self.provider.provider] = []
 
-             for configurate_method in self.provider.configurate_methods:
 
-                 original_provider_configurate_methods[self.provider.provider].append(configurate_method)
 
-         if original_provider_configurate_methods[self.provider.provider] == [ConfigurateMethod.CUSTOMIZABLE_MODEL]:
 
-             if (any([len(quota_configuration.restrict_models) > 0
 
-                      for quota_configuration in self.system_configuration.quota_configurations])
 
-                     and ConfigurateMethod.PREDEFINED_MODEL not in self.provider.configurate_methods):
 
-                 self.provider.configurate_methods.append(ConfigurateMethod.PREDEFINED_MODEL)
 
-     def get_current_credentials(self, model_type: ModelType, model: str) -> Optional[dict]:
 
-         """
 
-         Get current credentials.
 
-         :param model_type: model type
 
-         :param model: model name
 
-         :return:
 
-         """
 
-         if self.using_provider_type == ProviderType.SYSTEM:
 
-             restrict_models = []
 
-             for quota_configuration in self.system_configuration.quota_configurations:
 
-                 if self.system_configuration.current_quota_type != quota_configuration.quota_type:
 
-                     continue
 
-                 restrict_models = quota_configuration.restrict_models
 
-             copy_credentials = self.system_configuration.credentials.copy()
 
-             if restrict_models:
 
-                 for restrict_model in restrict_models:
 
-                     if (restrict_model.model_type == model_type
 
-                             and restrict_model.model == model
 
-                             and restrict_model.base_model_name):
 
-                         copy_credentials['base_model_name'] = restrict_model.base_model_name
 
-             return copy_credentials
 
-         else:
 
-             if self.custom_configuration.models:
 
-                 for model_configuration in self.custom_configuration.models:
 
-                     if model_configuration.model_type == model_type and model_configuration.model == model:
 
-                         return model_configuration.credentials
 
-             if self.custom_configuration.provider:
 
-                 return self.custom_configuration.provider.credentials
 
-             else:
 
-                 return None
 
-     def get_system_configuration_status(self) -> SystemConfigurationStatus:
 
-         """
 
-         Get system configuration status.
 
-         :return:
 
-         """
 
-         if self.system_configuration.enabled is False:
 
-             return SystemConfigurationStatus.UNSUPPORTED
 
-         current_quota_type = self.system_configuration.current_quota_type
 
-         current_quota_configuration = next(
 
-             (q for q in self.system_configuration.quota_configurations if q.quota_type == current_quota_type),
 
-             None
 
-         )
 
-         return SystemConfigurationStatus.ACTIVE if current_quota_configuration.is_valid else \
 
-             SystemConfigurationStatus.QUOTA_EXCEEDED
 
-     def is_custom_configuration_available(self) -> bool:
 
-         """
 
-         Check custom configuration available.
 
-         :return:
 
-         """
 
-         return (self.custom_configuration.provider is not None
 
-                 or len(self.custom_configuration.models) > 0)
 
-     def get_custom_credentials(self, obfuscated: bool = False) -> Optional[dict]:
 
-         """
 
-         Get custom credentials.
 
-         :param obfuscated: obfuscated secret data in credentials
 
-         :return:
 
-         """
 
-         if self.custom_configuration.provider is None:
 
-             return None
 
-         credentials = self.custom_configuration.provider.credentials
 
-         if not obfuscated:
 
-             return credentials
 
-         # Obfuscate credentials
 
-         return self._obfuscated_credentials(
 
-             credentials=credentials,
 
-             credential_form_schemas=self.provider.provider_credential_schema.credential_form_schemas
 
-             if self.provider.provider_credential_schema else []
 
-         )
 
-     def custom_credentials_validate(self, credentials: dict) -> tuple[Provider, dict]:
 
-         """
 
-         Validate custom credentials.
 
-         :param credentials: provider credentials
 
-         :return:
 
-         """
 
-         # get provider
 
-         provider_record = db.session.query(Provider) \
 
-             .filter(
 
-             Provider.tenant_id == self.tenant_id,
 
-             Provider.provider_name == self.provider.provider,
 
-             Provider.provider_type == ProviderType.CUSTOM.value
 
-         ).first()
 
-         # Get provider credential secret variables
 
-         provider_credential_secret_variables = self._extract_secret_variables(
 
-             self.provider.provider_credential_schema.credential_form_schemas
 
-             if self.provider.provider_credential_schema else []
 
-         )
 
-         if provider_record:
 
-             try:
 
-                 # fix origin data
 
-                 if provider_record.encrypted_config:
 
-                     if not provider_record.encrypted_config.startswith("{"):
 
-                         original_credentials = {
 
-                             "openai_api_key": provider_record.encrypted_config
 
-                         }
 
-                     else:
 
-                         original_credentials = json.loads(provider_record.encrypted_config)
 
-                 else:
 
-                     original_credentials = {}
 
-             except JSONDecodeError:
 
-                 original_credentials = {}
 
-             # encrypt credentials
 
-             for key, value in credentials.items():
 
-                 if key in provider_credential_secret_variables:
 
-                     # if send [__HIDDEN__] in secret input, it will be same as original value
 
-                     if value == '[__HIDDEN__]' and key in original_credentials:
 
-                         credentials[key] = encrypter.decrypt_token(self.tenant_id, original_credentials[key])
 
-         credentials = model_provider_factory.provider_credentials_validate(
 
-             self.provider.provider,
 
-             credentials
 
-         )
 
-         for key, value in credentials.items():
 
-             if key in provider_credential_secret_variables:
 
-                 credentials[key] = encrypter.encrypt_token(self.tenant_id, value)
 
-         return provider_record, credentials
 
-     def add_or_update_custom_credentials(self, credentials: dict) -> None:
 
-         """
 
-         Add or update custom provider credentials.
 
-         :param credentials:
 
-         :return:
 
-         """
 
-         # validate custom provider config
 
-         provider_record, credentials = self.custom_credentials_validate(credentials)
 
-         # save provider
 
-         # Note: Do not switch the preferred provider, which allows users to use quotas first
 
-         if provider_record:
 
-             provider_record.encrypted_config = json.dumps(credentials)
 
-             provider_record.is_valid = True
 
-             provider_record.updated_at = datetime.datetime.now(datetime.timezone.utc).replace(tzinfo=None)
 
-             db.session.commit()
 
-         else:
 
-             provider_record = Provider(
 
-                 tenant_id=self.tenant_id,
 
-                 provider_name=self.provider.provider,
 
-                 provider_type=ProviderType.CUSTOM.value,
 
-                 encrypted_config=json.dumps(credentials),
 
-                 is_valid=True
 
-             )
 
-             db.session.add(provider_record)
 
-             db.session.commit()
 
-         provider_model_credentials_cache = ProviderCredentialsCache(
 
-             tenant_id=self.tenant_id,
 
-             identity_id=provider_record.id,
 
-             cache_type=ProviderCredentialsCacheType.PROVIDER
 
-         )
 
-         provider_model_credentials_cache.delete()
 
-         self.switch_preferred_provider_type(ProviderType.CUSTOM)
 
-     def delete_custom_credentials(self) -> None:
 
-         """
 
-         Delete custom provider credentials.
 
-         :return:
 
-         """
 
-         # get provider
 
-         provider_record = db.session.query(Provider) \
 
-             .filter(
 
-             Provider.tenant_id == self.tenant_id,
 
-             Provider.provider_name == self.provider.provider,
 
-             Provider.provider_type == ProviderType.CUSTOM.value
 
-         ).first()
 
-         # delete provider
 
-         if provider_record:
 
-             self.switch_preferred_provider_type(ProviderType.SYSTEM)
 
-             db.session.delete(provider_record)
 
-             db.session.commit()
 
-             provider_model_credentials_cache = ProviderCredentialsCache(
 
-                 tenant_id=self.tenant_id,
 
-                 identity_id=provider_record.id,
 
-                 cache_type=ProviderCredentialsCacheType.PROVIDER
 
-             )
 
-             provider_model_credentials_cache.delete()
 
-     def get_custom_model_credentials(self, model_type: ModelType, model: str, obfuscated: bool = False) \
 
-             -> Optional[dict]:
 
-         """
 
-         Get custom model credentials.
 
-         :param model_type: model type
 
-         :param model: model name
 
-         :param obfuscated: obfuscated secret data in credentials
 
-         :return:
 
-         """
 
-         if not self.custom_configuration.models:
 
-             return None
 
-         for model_configuration in self.custom_configuration.models:
 
-             if model_configuration.model_type == model_type and model_configuration.model == model:
 
-                 credentials = model_configuration.credentials
 
-                 if not obfuscated:
 
-                     return credentials
 
-                 # Obfuscate credentials
 
-                 return self._obfuscated_credentials(
 
-                     credentials=credentials,
 
-                     credential_form_schemas=self.provider.model_credential_schema.credential_form_schemas
 
-                     if self.provider.model_credential_schema else []
 
-                 )
 
-         return None
 
-     def custom_model_credentials_validate(self, model_type: ModelType, model: str, credentials: dict) \
 
-             -> tuple[ProviderModel, dict]:
 
-         """
 
-         Validate custom model credentials.
 
-         :param model_type: model type
 
-         :param model: model name
 
-         :param credentials: model credentials
 
-         :return:
 
-         """
 
-         # get provider model
 
-         provider_model_record = db.session.query(ProviderModel) \
 
-             .filter(
 
-             ProviderModel.tenant_id == self.tenant_id,
 
-             ProviderModel.provider_name == self.provider.provider,
 
-             ProviderModel.model_name == model,
 
-             ProviderModel.model_type == model_type.to_origin_model_type()
 
-         ).first()
 
-         # Get provider credential secret variables
 
-         provider_credential_secret_variables = self._extract_secret_variables(
 
-             self.provider.model_credential_schema.credential_form_schemas
 
-             if self.provider.model_credential_schema else []
 
-         )
 
-         if provider_model_record:
 
-             try:
 
-                 original_credentials = json.loads(
 
-                     provider_model_record.encrypted_config) if provider_model_record.encrypted_config else {}
 
-             except JSONDecodeError:
 
-                 original_credentials = {}
 
-             # decrypt credentials
 
-             for key, value in credentials.items():
 
-                 if key in provider_credential_secret_variables:
 
-                     # if send [__HIDDEN__] in secret input, it will be same as original value
 
-                     if value == '[__HIDDEN__]' and key in original_credentials:
 
-                         credentials[key] = encrypter.decrypt_token(self.tenant_id, original_credentials[key])
 
-         credentials = model_provider_factory.model_credentials_validate(
 
-             provider=self.provider.provider,
 
-             model_type=model_type,
 
-             model=model,
 
-             credentials=credentials
 
-         )
 
-         for key, value in credentials.items():
 
-             if key in provider_credential_secret_variables:
 
-                 credentials[key] = encrypter.encrypt_token(self.tenant_id, value)
 
-         return provider_model_record, credentials
 
-     def add_or_update_custom_model_credentials(self, model_type: ModelType, model: str, credentials: dict) -> None:
 
-         """
 
-         Add or update custom model credentials.
 
-         :param model_type: model type
 
-         :param model: model name
 
-         :param credentials: model credentials
 
-         :return:
 
-         """
 
-         # validate custom model config
 
-         provider_model_record, credentials = self.custom_model_credentials_validate(model_type, model, credentials)
 
-         # save provider model
 
-         # Note: Do not switch the preferred provider, which allows users to use quotas first
 
-         if provider_model_record:
 
-             provider_model_record.encrypted_config = json.dumps(credentials)
 
-             provider_model_record.is_valid = True
 
-             provider_model_record.updated_at = datetime.datetime.now(datetime.timezone.utc).replace(tzinfo=None)
 
-             db.session.commit()
 
-         else:
 
-             provider_model_record = ProviderModel(
 
-                 tenant_id=self.tenant_id,
 
-                 provider_name=self.provider.provider,
 
-                 model_name=model,
 
-                 model_type=model_type.to_origin_model_type(),
 
-                 encrypted_config=json.dumps(credentials),
 
-                 is_valid=True
 
-             )
 
-             db.session.add(provider_model_record)
 
-             db.session.commit()
 
-         provider_model_credentials_cache = ProviderCredentialsCache(
 
-             tenant_id=self.tenant_id,
 
-             identity_id=provider_model_record.id,
 
-             cache_type=ProviderCredentialsCacheType.MODEL
 
-         )
 
-         provider_model_credentials_cache.delete()
 
-     def delete_custom_model_credentials(self, model_type: ModelType, model: str) -> None:
 
-         """
 
-         Delete custom model credentials.
 
-         :param model_type: model type
 
-         :param model: model name
 
-         :return:
 
-         """
 
-         # get provider model
 
-         provider_model_record = db.session.query(ProviderModel) \
 
-             .filter(
 
-             ProviderModel.tenant_id == self.tenant_id,
 
-             ProviderModel.provider_name == self.provider.provider,
 
-             ProviderModel.model_name == model,
 
-             ProviderModel.model_type == model_type.to_origin_model_type()
 
-         ).first()
 
-         # delete provider model
 
-         if provider_model_record:
 
-             db.session.delete(provider_model_record)
 
-             db.session.commit()
 
-             provider_model_credentials_cache = ProviderCredentialsCache(
 
-                 tenant_id=self.tenant_id,
 
-                 identity_id=provider_model_record.id,
 
-                 cache_type=ProviderCredentialsCacheType.MODEL
 
-             )
 
-             provider_model_credentials_cache.delete()
 
-     def get_provider_instance(self) -> ModelProvider:
 
-         """
 
-         Get provider instance.
 
-         :return:
 
-         """
 
-         return model_provider_factory.get_provider_instance(self.provider.provider)
 
-     def get_model_type_instance(self, model_type: ModelType) -> AIModel:
 
-         """
 
-         Get current model type instance.
 
-         :param model_type: model type
 
-         :return:
 
-         """
 
-         # Get provider instance
 
-         provider_instance = self.get_provider_instance()
 
-         # Get model instance of LLM
 
-         return provider_instance.get_model_instance(model_type)
 
-     def switch_preferred_provider_type(self, provider_type: ProviderType) -> None:
 
-         """
 
-         Switch preferred provider type.
 
-         :param provider_type:
 
-         :return:
 
-         """
 
-         if provider_type == self.preferred_provider_type:
 
-             return
 
-         if provider_type == ProviderType.SYSTEM and not self.system_configuration.enabled:
 
-             return
 
-         # get preferred provider
 
-         preferred_model_provider = db.session.query(TenantPreferredModelProvider) \
 
-             .filter(
 
-             TenantPreferredModelProvider.tenant_id == self.tenant_id,
 
-             TenantPreferredModelProvider.provider_name == self.provider.provider
 
-         ).first()
 
-         if preferred_model_provider:
 
-             preferred_model_provider.preferred_provider_type = provider_type.value
 
-         else:
 
-             preferred_model_provider = TenantPreferredModelProvider(
 
-                 tenant_id=self.tenant_id,
 
-                 provider_name=self.provider.provider,
 
-                 preferred_provider_type=provider_type.value
 
-             )
 
-             db.session.add(preferred_model_provider)
 
-         db.session.commit()
 
-     def _extract_secret_variables(self, credential_form_schemas: list[CredentialFormSchema]) -> list[str]:
 
-         """
 
-         Extract secret input form variables.
 
-         :param credential_form_schemas:
 
-         :return:
 
-         """
 
-         secret_input_form_variables = []
 
-         for credential_form_schema in credential_form_schemas:
 
-             if credential_form_schema.type == FormType.SECRET_INPUT:
 
-                 secret_input_form_variables.append(credential_form_schema.variable)
 
-         return secret_input_form_variables
 
-     def _obfuscated_credentials(self, credentials: dict, credential_form_schemas: list[CredentialFormSchema]) -> dict:
 
-         """
 
-         Obfuscated credentials.
 
-         :param credentials: credentials
 
-         :param credential_form_schemas: credential form schemas
 
-         :return:
 
-         """
 
-         # Get provider credential secret variables
 
-         credential_secret_variables = self._extract_secret_variables(
 
-             credential_form_schemas
 
-         )
 
-         # Obfuscate provider credentials
 
-         copy_credentials = credentials.copy()
 
-         for key, value in copy_credentials.items():
 
-             if key in credential_secret_variables:
 
-                 copy_credentials[key] = encrypter.obfuscated_token(value)
 
-         return copy_credentials
 
-     def get_provider_model(self, model_type: ModelType,
 
-                            model: str,
 
-                            only_active: bool = False) -> Optional[ModelWithProviderEntity]:
 
-         """
 
-         Get provider model.
 
-         :param model_type: model type
 
-         :param model: model name
 
-         :param only_active: return active model only
 
-         :return:
 
-         """
 
-         provider_models = self.get_provider_models(model_type, only_active)
 
-         for provider_model in provider_models:
 
-             if provider_model.model == model:
 
-                 return provider_model
 
-         return None
 
-     def get_provider_models(self, model_type: Optional[ModelType] = None,
 
-                             only_active: bool = False) -> list[ModelWithProviderEntity]:
 
-         """
 
-         Get provider models.
 
-         :param model_type: model type
 
-         :param only_active: only active models
 
-         :return:
 
-         """
 
-         provider_instance = self.get_provider_instance()
 
-         model_types = []
 
-         if model_type:
 
-             model_types.append(model_type)
 
-         else:
 
-             model_types = provider_instance.get_provider_schema().supported_model_types
 
-         if self.using_provider_type == ProviderType.SYSTEM:
 
-             provider_models = self._get_system_provider_models(
 
-                 model_types=model_types,
 
-                 provider_instance=provider_instance
 
-             )
 
-         else:
 
-             provider_models = self._get_custom_provider_models(
 
-                 model_types=model_types,
 
-                 provider_instance=provider_instance
 
-             )
 
-         if only_active:
 
-             provider_models = [m for m in provider_models if m.status == ModelStatus.ACTIVE]
 
-         # resort provider_models
 
-         return sorted(provider_models, key=lambda x: x.model_type.value)
 
-     def _get_system_provider_models(self,
 
-                                     model_types: list[ModelType],
 
-                                     provider_instance: ModelProvider) -> list[ModelWithProviderEntity]:
 
-         """
 
-         Get system provider models.
 
-         :param model_types: model types
 
-         :param provider_instance: provider instance
 
-         :return:
 
-         """
 
-         provider_models = []
 
-         for model_type in model_types:
 
-             provider_models.extend(
 
-                 [
 
-                     ModelWithProviderEntity(
 
-                         model=m.model,
 
-                         label=m.label,
 
-                         model_type=m.model_type,
 
-                         features=m.features,
 
-                         fetch_from=m.fetch_from,
 
-                         model_properties=m.model_properties,
 
-                         deprecated=m.deprecated,
 
-                         provider=SimpleModelProviderEntity(self.provider),
 
-                         status=ModelStatus.ACTIVE
 
-                     )
 
-                     for m in provider_instance.models(model_type)
 
-                 ]
 
-             )
 
-         if self.provider.provider not in original_provider_configurate_methods:
 
-             original_provider_configurate_methods[self.provider.provider] = []
 
-             for configurate_method in provider_instance.get_provider_schema().configurate_methods:
 
-                 original_provider_configurate_methods[self.provider.provider].append(configurate_method)
 
-         should_use_custom_model = False
 
-         if original_provider_configurate_methods[self.provider.provider] == [ConfigurateMethod.CUSTOMIZABLE_MODEL]:
 
-             should_use_custom_model = True
 
-         for quota_configuration in self.system_configuration.quota_configurations:
 
-             if self.system_configuration.current_quota_type != quota_configuration.quota_type:
 
-                 continue
 
-             restrict_models = quota_configuration.restrict_models
 
-             if len(restrict_models) == 0:
 
-                 break
 
-             if should_use_custom_model:
 
-                 if original_provider_configurate_methods[self.provider.provider] == [ConfigurateMethod.CUSTOMIZABLE_MODEL]:
 
-                     # only customizable model
 
-                     for restrict_model in restrict_models:
 
-                         copy_credentials = self.system_configuration.credentials.copy()
 
-                         if restrict_model.base_model_name:
 
-                             copy_credentials['base_model_name'] = restrict_model.base_model_name
 
-                         try:
 
-                             custom_model_schema = (
 
-                                 provider_instance.get_model_instance(restrict_model.model_type)
 
-                                 .get_customizable_model_schema_from_credentials(
 
-                                     restrict_model.model,
 
-                                     copy_credentials
 
-                                 )
 
-                             )
 
-                         except Exception as ex:
 
-                             logger.warning(f'get custom model schema failed, {ex}')
 
-                             continue
 
-                         if not custom_model_schema:
 
-                             continue
 
-                         if custom_model_schema.model_type not in model_types:
 
-                             continue
 
-                         provider_models.append(
 
-                             ModelWithProviderEntity(
 
-                                 model=custom_model_schema.model,
 
-                                 label=custom_model_schema.label,
 
-                                 model_type=custom_model_schema.model_type,
 
-                                 features=custom_model_schema.features,
 
-                                 fetch_from=FetchFrom.PREDEFINED_MODEL,
 
-                                 model_properties=custom_model_schema.model_properties,
 
-                                 deprecated=custom_model_schema.deprecated,
 
-                                 provider=SimpleModelProviderEntity(self.provider),
 
-                                 status=ModelStatus.ACTIVE
 
-                             )
 
-                         )
 
-             # if llm name not in restricted llm list, remove it
 
-             restrict_model_names = [rm.model for rm in restrict_models]
 
-             for m in provider_models:
 
-                 if m.model_type == ModelType.LLM and m.model not in restrict_model_names:
 
-                     m.status = ModelStatus.NO_PERMISSION
 
-                 elif not quota_configuration.is_valid:
 
-                     m.status = ModelStatus.QUOTA_EXCEEDED
 
-         return provider_models
 
-     def _get_custom_provider_models(self,
 
-                                     model_types: list[ModelType],
 
-                                     provider_instance: ModelProvider) -> list[ModelWithProviderEntity]:
 
-         """
 
-         Get custom provider models.
 
-         :param model_types: model types
 
-         :param provider_instance: provider instance
 
-         :return:
 
-         """
 
-         provider_models = []
 
-         credentials = None
 
-         if self.custom_configuration.provider:
 
-             credentials = self.custom_configuration.provider.credentials
 
-         for model_type in model_types:
 
-             if model_type not in self.provider.supported_model_types:
 
-                 continue
 
-             models = provider_instance.models(model_type)
 
-             for m in models:
 
-                 provider_models.append(
 
-                     ModelWithProviderEntity(
 
-                         model=m.model,
 
-                         label=m.label,
 
-                         model_type=m.model_type,
 
-                         features=m.features,
 
-                         fetch_from=m.fetch_from,
 
-                         model_properties=m.model_properties,
 
-                         deprecated=m.deprecated,
 
-                         provider=SimpleModelProviderEntity(self.provider),
 
-                         status=ModelStatus.ACTIVE if credentials else ModelStatus.NO_CONFIGURE
 
-                     )
 
-                 )
 
-         # custom models
 
-         for model_configuration in self.custom_configuration.models:
 
-             if model_configuration.model_type not in model_types:
 
-                 continue
 
-             try:
 
-                 custom_model_schema = (
 
-                     provider_instance.get_model_instance(model_configuration.model_type)
 
-                     .get_customizable_model_schema_from_credentials(
 
-                         model_configuration.model,
 
-                         model_configuration.credentials
 
-                     )
 
-                 )
 
-             except Exception as ex:
 
-                 logger.warning(f'get custom model schema failed, {ex}')
 
-                 continue
 
-             if not custom_model_schema:
 
-                 continue
 
-             provider_models.append(
 
-                 ModelWithProviderEntity(
 
-                     model=custom_model_schema.model,
 
-                     label=custom_model_schema.label,
 
-                     model_type=custom_model_schema.model_type,
 
-                     features=custom_model_schema.features,
 
-                     fetch_from=custom_model_schema.fetch_from,
 
-                     model_properties=custom_model_schema.model_properties,
 
-                     deprecated=custom_model_schema.deprecated,
 
-                     provider=SimpleModelProviderEntity(self.provider),
 
-                     status=ModelStatus.ACTIVE
 
-                 )
 
-             )
 
-         return provider_models
 
- class ProviderConfigurations(BaseModel):
 
-     """
 
-     Model class for provider configuration dict.
 
-     """
 
-     tenant_id: str
 
-     configurations: dict[str, ProviderConfiguration] = {}
 
-     def __init__(self, tenant_id: str):
 
-         super().__init__(tenant_id=tenant_id)
 
-     def get_models(self,
 
-                    provider: Optional[str] = None,
 
-                    model_type: Optional[ModelType] = None,
 
-                    only_active: bool = False) \
 
-             -> list[ModelWithProviderEntity]:
 
-         """
 
-         Get available models.
 
-         If preferred provider type is `system`:
 
-           Get the current **system mode** if provider supported,
 
-           if all system modes are not available (no quota), it is considered to be the **custom credential mode**.
 
-           If there is no model configured in custom mode, it is treated as no_configure.
 
-         system > custom > no_configure
 
-         If preferred provider type is `custom`:
 
-           If custom credentials are configured, it is treated as custom mode.
 
-           Otherwise, get the current **system mode** if supported,
 
-           If all system modes are not available (no quota), it is treated as no_configure.
 
-         custom > system > no_configure
 
-         If real mode is `system`, use system credentials to get models,
 
-           paid quotas > provider free quotas > system free quotas
 
-           include pre-defined models (exclude GPT-4, status marked as `no_permission`).
 
-         If real mode is `custom`, use workspace custom credentials to get models,
 
-           include pre-defined models, custom models(manual append).
 
-         If real mode is `no_configure`, only return pre-defined models from `model runtime`.
 
-           (model status marked as `no_configure` if preferred provider type is `custom` otherwise `quota_exceeded`)
 
-         model status marked as `active` is available.
 
-         :param provider: provider name
 
-         :param model_type: model type
 
-         :param only_active: only active models
 
-         :return:
 
-         """
 
-         all_models = []
 
-         for provider_configuration in self.values():
 
-             if provider and provider_configuration.provider.provider != provider:
 
-                 continue
 
-             all_models.extend(provider_configuration.get_provider_models(model_type, only_active))
 
-         return all_models
 
-     def to_list(self) -> list[ProviderConfiguration]:
 
-         """
 
-         Convert to list.
 
-         :return:
 
-         """
 
-         return list(self.values())
 
-     def __getitem__(self, key):
 
-         return self.configurations[key]
 
-     def __setitem__(self, key, value):
 
-         self.configurations[key] = value
 
-     def __iter__(self):
 
-         return iter(self.configurations)
 
-     def values(self) -> Iterator[ProviderConfiguration]:
 
-         return self.configurations.values()
 
-     def get(self, key, default=None):
 
-         return self.configurations.get(key, default)
 
- class ProviderModelBundle(BaseModel):
 
-     """
 
-     Provider model bundle.
 
-     """
 
-     configuration: ProviderConfiguration
 
-     provider_instance: ModelProvider
 
-     model_type_instance: AIModel
 
-     class Config:
 
-         """Configuration for this pydantic object."""
 
-         arbitrary_types_allowed = True
 
 
  |