builtin_tools_manage_service.py 9.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248
  1. import json
  2. import logging
  3. from configs import dify_config
  4. from core.helper.position_helper import is_filtered
  5. from core.model_runtime.utils.encoders import jsonable_encoder
  6. from core.tools.entities.api_entities import UserTool, UserToolProvider
  7. from core.tools.errors import ToolNotFoundError, ToolProviderCredentialValidationError, ToolProviderNotFoundError
  8. from core.tools.provider.builtin._positions import BuiltinToolProviderSort
  9. from core.tools.provider.tool_provider import ToolProviderController
  10. from core.tools.tool_label_manager import ToolLabelManager
  11. from core.tools.tool_manager import ToolManager
  12. from core.tools.utils.configuration import ToolConfigurationManager
  13. from extensions.ext_database import db
  14. from models.tools import BuiltinToolProvider
  15. from services.tools.tools_transform_service import ToolTransformService
  16. logger = logging.getLogger(__name__)
  17. class BuiltinToolManageService:
  18. @staticmethod
  19. def list_builtin_tool_provider_tools(user_id: str, tenant_id: str, provider: str) -> list[UserTool]:
  20. """
  21. list builtin tool provider tools
  22. """
  23. provider_controller: ToolProviderController = ToolManager.get_builtin_provider(provider)
  24. tools = provider_controller.get_tools()
  25. tool_provider_configurations = ToolConfigurationManager(
  26. tenant_id=tenant_id, provider_controller=provider_controller
  27. )
  28. # check if user has added the provider
  29. builtin_provider: BuiltinToolProvider = (
  30. db.session.query(BuiltinToolProvider)
  31. .filter(
  32. BuiltinToolProvider.tenant_id == tenant_id,
  33. BuiltinToolProvider.provider == provider,
  34. )
  35. .first()
  36. )
  37. credentials = {}
  38. if builtin_provider is not None:
  39. # get credentials
  40. credentials = builtin_provider.credentials
  41. credentials = tool_provider_configurations.decrypt_tool_credentials(credentials)
  42. result = []
  43. for tool in tools:
  44. result.append(
  45. ToolTransformService.tool_to_user_tool(
  46. tool=tool,
  47. credentials=credentials,
  48. tenant_id=tenant_id,
  49. labels=ToolLabelManager.get_tool_labels(provider_controller),
  50. )
  51. )
  52. return result
  53. @staticmethod
  54. def list_builtin_provider_credentials_schema(provider_name):
  55. """
  56. list builtin provider credentials schema
  57. :return: the list of tool providers
  58. """
  59. provider = ToolManager.get_builtin_provider(provider_name)
  60. return jsonable_encoder([v for _, v in (provider.credentials_schema or {}).items()])
  61. @staticmethod
  62. def update_builtin_tool_provider(user_id: str, tenant_id: str, provider_name: str, credentials: dict):
  63. """
  64. update builtin tool provider
  65. """
  66. # get if the provider exists
  67. provider: BuiltinToolProvider = (
  68. db.session.query(BuiltinToolProvider)
  69. .filter(
  70. BuiltinToolProvider.tenant_id == tenant_id,
  71. BuiltinToolProvider.provider == provider_name,
  72. )
  73. .first()
  74. )
  75. try:
  76. # get provider
  77. provider_controller = ToolManager.get_builtin_provider(provider_name)
  78. if not provider_controller.need_credentials:
  79. raise ValueError(f"provider {provider_name} does not need credentials")
  80. tool_configuration = ToolConfigurationManager(tenant_id=tenant_id, provider_controller=provider_controller)
  81. # get original credentials if exists
  82. if provider is not None:
  83. original_credentials = tool_configuration.decrypt_tool_credentials(provider.credentials)
  84. masked_credentials = tool_configuration.mask_tool_credentials(original_credentials)
  85. # check if the credential has changed, save the original credential
  86. for name, value in credentials.items():
  87. if name in masked_credentials and value == masked_credentials[name]:
  88. credentials[name] = original_credentials[name]
  89. # validate credentials
  90. provider_controller.validate_credentials(credentials)
  91. # encrypt credentials
  92. credentials = tool_configuration.encrypt_tool_credentials(credentials)
  93. except (ToolProviderNotFoundError, ToolNotFoundError, ToolProviderCredentialValidationError) as e:
  94. raise ValueError(str(e))
  95. if provider is None:
  96. # create provider
  97. provider = BuiltinToolProvider(
  98. tenant_id=tenant_id,
  99. user_id=user_id,
  100. provider=provider_name,
  101. encrypted_credentials=json.dumps(credentials),
  102. )
  103. db.session.add(provider)
  104. db.session.commit()
  105. else:
  106. provider.encrypted_credentials = json.dumps(credentials)
  107. db.session.add(provider)
  108. db.session.commit()
  109. # delete cache
  110. tool_configuration.delete_tool_credentials_cache()
  111. return {"result": "success"}
  112. @staticmethod
  113. def get_builtin_tool_provider_credentials(user_id: str, tenant_id: str, provider: str):
  114. """
  115. get builtin tool provider credentials
  116. """
  117. provider: BuiltinToolProvider = (
  118. db.session.query(BuiltinToolProvider)
  119. .filter(
  120. BuiltinToolProvider.tenant_id == tenant_id,
  121. BuiltinToolProvider.provider == provider,
  122. )
  123. .first()
  124. )
  125. if provider is None:
  126. return {}
  127. provider_controller = ToolManager.get_builtin_provider(provider.provider)
  128. tool_configuration = ToolConfigurationManager(tenant_id=tenant_id, provider_controller=provider_controller)
  129. credentials = tool_configuration.decrypt_tool_credentials(provider.credentials)
  130. credentials = tool_configuration.mask_tool_credentials(credentials)
  131. return credentials
  132. @staticmethod
  133. def delete_builtin_tool_provider(user_id: str, tenant_id: str, provider_name: str):
  134. """
  135. delete tool provider
  136. """
  137. provider: BuiltinToolProvider = (
  138. db.session.query(BuiltinToolProvider)
  139. .filter(
  140. BuiltinToolProvider.tenant_id == tenant_id,
  141. BuiltinToolProvider.provider == provider_name,
  142. )
  143. .first()
  144. )
  145. if provider is None:
  146. raise ValueError(f"you have not added provider {provider_name}")
  147. db.session.delete(provider)
  148. db.session.commit()
  149. # delete cache
  150. provider_controller = ToolManager.get_builtin_provider(provider_name)
  151. tool_configuration = ToolConfigurationManager(tenant_id=tenant_id, provider_controller=provider_controller)
  152. tool_configuration.delete_tool_credentials_cache()
  153. return {"result": "success"}
  154. @staticmethod
  155. def get_builtin_tool_provider_icon(provider: str):
  156. """
  157. get tool provider icon and it's mimetype
  158. """
  159. icon_path, mime_type = ToolManager.get_builtin_provider_icon(provider)
  160. with open(icon_path, "rb") as f:
  161. icon_bytes = f.read()
  162. return icon_bytes, mime_type
  163. @staticmethod
  164. def list_builtin_tools(user_id: str, tenant_id: str) -> list[UserToolProvider]:
  165. """
  166. list builtin tools
  167. """
  168. # get all builtin providers
  169. provider_controllers = ToolManager.list_builtin_providers()
  170. # get all user added providers
  171. db_providers: list[BuiltinToolProvider] = (
  172. db.session.query(BuiltinToolProvider).filter(BuiltinToolProvider.tenant_id == tenant_id).all() or []
  173. )
  174. # find provider
  175. find_provider = lambda provider: next(
  176. filter(lambda db_provider: db_provider.provider == provider, db_providers), None
  177. )
  178. result: list[UserToolProvider] = []
  179. for provider_controller in provider_controllers:
  180. try:
  181. # handle include, exclude
  182. if is_filtered(
  183. include_set=dify_config.POSITION_TOOL_INCLUDES_SET,
  184. exclude_set=dify_config.POSITION_TOOL_EXCLUDES_SET,
  185. data=provider_controller,
  186. name_func=lambda x: x.identity.name,
  187. ):
  188. continue
  189. # convert provider controller to user provider
  190. user_builtin_provider = ToolTransformService.builtin_provider_to_user_provider(
  191. provider_controller=provider_controller,
  192. db_provider=find_provider(provider_controller.identity.name),
  193. decrypt_credentials=True,
  194. )
  195. # add icon
  196. ToolTransformService.repack_provider(user_builtin_provider)
  197. tools = provider_controller.get_tools()
  198. for tool in tools:
  199. user_builtin_provider.tools.append(
  200. ToolTransformService.tool_to_user_tool(
  201. tenant_id=tenant_id,
  202. tool=tool,
  203. credentials=user_builtin_provider.original_credentials,
  204. labels=ToolLabelManager.get_tool_labels(provider_controller),
  205. )
  206. )
  207. result.append(user_builtin_provider)
  208. except Exception as e:
  209. raise e
  210. return BuiltinToolProviderSort.sort(result)