ops_service.py 5.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154
  1. from core.ops.ops_trace_manager import OpsTraceManager, provider_config_map
  2. from extensions.ext_database import db
  3. from models.model import App, TraceAppConfig
  4. class OpsService:
  5. @classmethod
  6. def get_tracing_app_config(cls, app_id: str, tracing_provider: str):
  7. """
  8. Get tracing app config
  9. :param app_id: app id
  10. :param tracing_provider: tracing provider
  11. :return:
  12. """
  13. trace_config_data: TraceAppConfig = (
  14. db.session.query(TraceAppConfig)
  15. .filter(TraceAppConfig.app_id == app_id, TraceAppConfig.tracing_provider == tracing_provider)
  16. .first()
  17. )
  18. if not trace_config_data:
  19. return None
  20. # decrypt_token and obfuscated_token
  21. tenant_id = db.session.query(App).filter(App.id == app_id).first().tenant_id
  22. decrypt_tracing_config = OpsTraceManager.decrypt_tracing_config(
  23. tenant_id, tracing_provider, trace_config_data.tracing_config
  24. )
  25. if tracing_provider == "langfuse" and (
  26. "project_key" not in decrypt_tracing_config or not decrypt_tracing_config.get("project_key")
  27. ):
  28. project_key = OpsTraceManager.get_trace_config_project_key(decrypt_tracing_config, tracing_provider)
  29. decrypt_tracing_config["project_key"] = project_key
  30. decrypt_tracing_config = OpsTraceManager.obfuscated_decrypt_token(tracing_provider, decrypt_tracing_config)
  31. trace_config_data.tracing_config = decrypt_tracing_config
  32. return trace_config_data.to_dict()
  33. @classmethod
  34. def create_tracing_app_config(cls, app_id: str, tracing_provider: str, tracing_config: dict):
  35. """
  36. Create tracing app config
  37. :param app_id: app id
  38. :param tracing_provider: tracing provider
  39. :param tracing_config: tracing config
  40. :return:
  41. """
  42. if tracing_provider not in provider_config_map.keys() and tracing_provider:
  43. return {"error": f"Invalid tracing provider: {tracing_provider}"}
  44. config_class, other_keys = (
  45. provider_config_map[tracing_provider]["config_class"],
  46. provider_config_map[tracing_provider]["other_keys"],
  47. )
  48. default_config_instance = config_class(**tracing_config)
  49. for key in other_keys:
  50. if key in tracing_config and tracing_config[key] == "":
  51. tracing_config[key] = getattr(default_config_instance, key, None)
  52. # api check
  53. if not OpsTraceManager.check_trace_config_is_effective(tracing_config, tracing_provider):
  54. return {"error": "Invalid Credentials"}
  55. # get project key
  56. project_key = OpsTraceManager.get_trace_config_project_key(tracing_config, tracing_provider)
  57. # check if trace config already exists
  58. trace_config_data: TraceAppConfig = (
  59. db.session.query(TraceAppConfig)
  60. .filter(TraceAppConfig.app_id == app_id, TraceAppConfig.tracing_provider == tracing_provider)
  61. .first()
  62. )
  63. if trace_config_data:
  64. return None
  65. # get tenant id
  66. tenant_id = db.session.query(App).filter(App.id == app_id).first().tenant_id
  67. tracing_config = OpsTraceManager.encrypt_tracing_config(tenant_id, tracing_provider, tracing_config)
  68. if tracing_provider == "langfuse":
  69. tracing_config["project_key"] = project_key
  70. trace_config_data = TraceAppConfig(
  71. app_id=app_id,
  72. tracing_provider=tracing_provider,
  73. tracing_config=tracing_config,
  74. )
  75. db.session.add(trace_config_data)
  76. db.session.commit()
  77. return {"result": "success"}
  78. @classmethod
  79. def update_tracing_app_config(cls, app_id: str, tracing_provider: str, tracing_config: dict):
  80. """
  81. Update tracing app config
  82. :param app_id: app id
  83. :param tracing_provider: tracing provider
  84. :param tracing_config: tracing config
  85. :return:
  86. """
  87. if tracing_provider not in provider_config_map.keys():
  88. raise ValueError(f"Invalid tracing provider: {tracing_provider}")
  89. # check if trace config already exists
  90. current_trace_config = (
  91. db.session.query(TraceAppConfig)
  92. .filter(TraceAppConfig.app_id == app_id, TraceAppConfig.tracing_provider == tracing_provider)
  93. .first()
  94. )
  95. if not current_trace_config:
  96. return None
  97. # get tenant id
  98. tenant_id = db.session.query(App).filter(App.id == app_id).first().tenant_id
  99. tracing_config = OpsTraceManager.encrypt_tracing_config(
  100. tenant_id, tracing_provider, tracing_config, current_trace_config.tracing_config
  101. )
  102. # api check
  103. # decrypt_token
  104. decrypt_tracing_config = OpsTraceManager.decrypt_tracing_config(tenant_id, tracing_provider, tracing_config)
  105. if not OpsTraceManager.check_trace_config_is_effective(decrypt_tracing_config, tracing_provider):
  106. raise ValueError("Invalid Credentials")
  107. current_trace_config.tracing_config = tracing_config
  108. db.session.commit()
  109. return current_trace_config.to_dict()
  110. @classmethod
  111. def delete_tracing_app_config(cls, app_id: str, tracing_provider: str):
  112. """
  113. Delete tracing app config
  114. :param app_id: app id
  115. :param tracing_provider: tracing provider
  116. :return:
  117. """
  118. trace_config = (
  119. db.session.query(TraceAppConfig)
  120. .filter(TraceAppConfig.app_id == app_id, TraceAppConfig.tracing_provider == tracing_provider)
  121. .first()
  122. )
  123. if not trace_config:
  124. return None
  125. db.session.delete(trace_config)
  126. db.session.commit()
  127. return True