12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697 |
- from typing import Any
- from pydantic import BaseModel
- from core.helper import encrypter
- from core.helper.tool_provider_cache import ToolProviderCredentialsCache, ToolProviderCredentialsCacheType
- from core.tools.entities.tool_entities import ToolProviderCredentials
- from core.tools.provider.tool_provider import ToolProviderController
- class ToolConfiguration(BaseModel):
- tenant_id: str
- provider_controller: ToolProviderController
- def _deep_copy(self, credentials: dict[str, str]) -> dict[str, str]:
- """
- deep copy credentials
- """
- return {key: value for key, value in credentials.items()}
-
- def encrypt_tool_credentials(self, credentials: dict[str, str]) -> dict[str, str]:
- """
- encrypt tool credentials with tenant id
- return a deep copy of credentials with encrypted values
- """
- credentials = self._deep_copy(credentials)
- # get fields need to be decrypted
- fields = self.provider_controller.get_credentials_schema()
- for field_name, field in fields.items():
- if field.type == ToolProviderCredentials.CredentialsType.SECRET_INPUT:
- if field_name in credentials:
- encrypted = encrypter.encrypt_token(self.tenant_id, credentials[field_name])
- credentials[field_name] = encrypted
-
- return credentials
-
- def mask_tool_credentials(self, credentials: dict[str, Any]) -> dict[str, Any]:
- """
- mask tool credentials
- return a deep copy of credentials with masked values
- """
- credentials = self._deep_copy(credentials)
- # get fields need to be decrypted
- fields = self.provider_controller.get_credentials_schema()
- for field_name, field in fields.items():
- if field.type == ToolProviderCredentials.CredentialsType.SECRET_INPUT:
- if field_name in credentials:
- if len(credentials[field_name]) > 6:
- credentials[field_name] = \
- credentials[field_name][:2] + \
- '*' * (len(credentials[field_name]) - 4) +\
- credentials[field_name][-2:]
- else:
- credentials[field_name] = '*' * len(credentials[field_name])
- return credentials
- def decrypt_tool_credentials(self, credentials: dict[str, str]) -> dict[str, str]:
- """
- decrypt tool credentials with tenant id
- return a deep copy of credentials with decrypted values
- """
- cache = ToolProviderCredentialsCache(
- tenant_id=self.tenant_id,
- identity_id=f'{self.provider_controller.app_type.value}.{self.provider_controller.identity.name}',
- cache_type=ToolProviderCredentialsCacheType.PROVIDER
- )
- cached_credentials = cache.get()
- if cached_credentials:
- return cached_credentials
- credentials = self._deep_copy(credentials)
- # get fields need to be decrypted
- fields = self.provider_controller.get_credentials_schema()
- for field_name, field in fields.items():
- if field.type == ToolProviderCredentials.CredentialsType.SECRET_INPUT:
- if field_name in credentials:
- try:
- credentials[field_name] = encrypter.decrypt_token(self.tenant_id, credentials[field_name])
- except:
- pass
- cache.set(credentials)
- return credentials
-
- def delete_tool_credentials_cache(self):
- cache = ToolProviderCredentialsCache(
- tenant_id=self.tenant_id,
- identity_id=f'{self.provider_controller.app_type.value}.{self.provider_controller.identity.name}',
- cache_type=ToolProviderCredentialsCacheType.PROVIDER
- )
- cache.delete()
|