tools_transform_service.py 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285
  1. import json
  2. import logging
  3. from typing import Optional, Union
  4. from configs import dify_config
  5. from core.tools.__base.tool import Tool
  6. from core.tools.__base.tool_runtime import ToolRuntime
  7. from core.tools.builtin_tool.provider import BuiltinToolProviderController
  8. from core.tools.custom_tool.provider import ApiToolProviderController
  9. from core.tools.entities.api_entities import ToolApiEntity, ToolProviderApiEntity
  10. from core.tools.entities.common_entities import I18nObject
  11. from core.tools.entities.tool_bundle import ApiToolBundle
  12. from core.tools.entities.tool_entities import (
  13. ApiProviderAuthType,
  14. ToolParameter,
  15. ToolProviderType,
  16. )
  17. from core.tools.plugin_tool.provider import PluginToolProviderController
  18. from core.tools.utils.configuration import ProviderConfigEncrypter
  19. from core.tools.workflow_as_tool.provider import WorkflowToolProviderController
  20. from core.tools.workflow_as_tool.tool import WorkflowTool
  21. from models.tools import ApiToolProvider, BuiltinToolProvider, WorkflowToolProvider
  22. logger = logging.getLogger(__name__)
  23. class ToolTransformService:
  24. @classmethod
  25. def get_tool_provider_icon_url(cls, provider_type: str, provider_name: str, icon: str | dict) -> Union[str, dict]:
  26. """
  27. get tool provider icon url
  28. """
  29. url_prefix = dify_config.CONSOLE_API_URL + "/console/api/workspaces/current/tool-provider/"
  30. if provider_type == ToolProviderType.BUILT_IN.value:
  31. return url_prefix + "builtin/" + provider_name + "/icon"
  32. elif provider_type in {ToolProviderType.API.value, ToolProviderType.WORKFLOW.value}:
  33. try:
  34. if isinstance(icon, str):
  35. return json.loads(icon)
  36. return icon
  37. except:
  38. return {"background": "#252525", "content": "\ud83d\ude01"}
  39. return ""
  40. @staticmethod
  41. def repack_provider(provider: Union[dict, ToolProviderApiEntity]):
  42. """
  43. repack provider
  44. :param provider: the provider dict
  45. """
  46. if isinstance(provider, dict) and "icon" in provider:
  47. provider["icon"] = ToolTransformService.get_tool_provider_icon_url(
  48. provider_type=provider["type"], provider_name=provider["name"], icon=provider["icon"]
  49. )
  50. elif isinstance(provider, ToolProviderApiEntity):
  51. provider.icon = ToolTransformService.get_tool_provider_icon_url(
  52. provider_type=provider.type.value, provider_name=provider.name, icon=provider.icon
  53. )
  54. @classmethod
  55. def builtin_provider_to_user_provider(
  56. cls,
  57. provider_controller: BuiltinToolProviderController | PluginToolProviderController,
  58. db_provider: Optional[BuiltinToolProvider],
  59. decrypt_credentials: bool = True,
  60. ) -> ToolProviderApiEntity:
  61. """
  62. convert provider controller to user provider
  63. """
  64. result = ToolProviderApiEntity(
  65. id=provider_controller.entity.identity.name,
  66. author=provider_controller.entity.identity.author,
  67. name=provider_controller.entity.identity.name,
  68. description=provider_controller.entity.identity.description,
  69. icon=provider_controller.entity.identity.icon,
  70. label=provider_controller.entity.identity.label,
  71. type=ToolProviderType.BUILT_IN,
  72. masked_credentials={},
  73. is_team_authorization=False,
  74. plugin_id=None,
  75. tools=[],
  76. labels=provider_controller.tool_labels,
  77. )
  78. if isinstance(provider_controller, PluginToolProviderController):
  79. result.plugin_id = provider_controller.plugin_id
  80. # get credentials schema
  81. schema = {x.to_basic_provider_config().name: x for x in provider_controller.get_credentials_schema()}
  82. for name, value in schema.items():
  83. if result.masked_credentials:
  84. result.masked_credentials[name] = ""
  85. # check if the provider need credentials
  86. if not provider_controller.need_credentials:
  87. result.is_team_authorization = True
  88. result.allow_delete = False
  89. elif db_provider:
  90. result.is_team_authorization = True
  91. if decrypt_credentials:
  92. credentials = db_provider.credentials
  93. # init tool configuration
  94. tool_configuration = ProviderConfigEncrypter(
  95. tenant_id=db_provider.tenant_id,
  96. config=[x.to_basic_provider_config() for x in provider_controller.get_credentials_schema()],
  97. provider_type=provider_controller.provider_type.value,
  98. provider_identity=provider_controller.entity.identity.name,
  99. )
  100. # decrypt the credentials and mask the credentials
  101. decrypted_credentials = tool_configuration.decrypt(data=credentials)
  102. masked_credentials = tool_configuration.mask_tool_credentials(data=decrypted_credentials)
  103. result.masked_credentials = masked_credentials
  104. result.original_credentials = decrypted_credentials
  105. return result
  106. @staticmethod
  107. def api_provider_to_controller(
  108. db_provider: ApiToolProvider,
  109. ) -> ApiToolProviderController:
  110. """
  111. convert provider controller to user provider
  112. """
  113. # package tool provider controller
  114. controller = ApiToolProviderController.from_db(
  115. db_provider=db_provider,
  116. auth_type=ApiProviderAuthType.API_KEY
  117. if db_provider.credentials["auth_type"] == "api_key"
  118. else ApiProviderAuthType.NONE,
  119. )
  120. return controller
  121. @staticmethod
  122. def workflow_provider_to_controller(db_provider: WorkflowToolProvider) -> WorkflowToolProviderController:
  123. """
  124. convert provider controller to provider
  125. """
  126. return WorkflowToolProviderController.from_db(db_provider)
  127. @staticmethod
  128. def workflow_provider_to_user_provider(
  129. provider_controller: WorkflowToolProviderController, labels: list[str] | None = None
  130. ):
  131. """
  132. convert provider controller to user provider
  133. """
  134. return ToolProviderApiEntity(
  135. id=provider_controller.provider_id,
  136. author=provider_controller.entity.identity.author,
  137. name=provider_controller.entity.identity.name,
  138. description=provider_controller.entity.identity.description,
  139. icon=provider_controller.entity.identity.icon,
  140. label=provider_controller.entity.identity.label,
  141. type=ToolProviderType.WORKFLOW,
  142. masked_credentials={},
  143. is_team_authorization=True,
  144. plugin_id=None,
  145. tools=[],
  146. labels=labels or [],
  147. )
  148. @classmethod
  149. def api_provider_to_user_provider(
  150. cls,
  151. provider_controller: ApiToolProviderController,
  152. db_provider: ApiToolProvider,
  153. decrypt_credentials: bool = True,
  154. labels: list[str] | None = None,
  155. ) -> ToolProviderApiEntity:
  156. """
  157. convert provider controller to user provider
  158. """
  159. username = "Anonymous"
  160. try:
  161. user = db_provider.user
  162. if not user:
  163. raise ValueError("user not found")
  164. username = user.name
  165. except Exception as e:
  166. logger.error(f"failed to get user name for api provider {db_provider.id}: {str(e)}")
  167. # add provider into providers
  168. credentials = db_provider.credentials
  169. result = ToolProviderApiEntity(
  170. id=db_provider.id,
  171. author=username,
  172. name=db_provider.name,
  173. description=I18nObject(
  174. en_US=db_provider.description,
  175. zh_Hans=db_provider.description,
  176. ),
  177. icon=db_provider.icon,
  178. label=I18nObject(
  179. en_US=db_provider.name,
  180. zh_Hans=db_provider.name,
  181. ),
  182. type=ToolProviderType.API,
  183. plugin_id=None,
  184. masked_credentials={},
  185. is_team_authorization=True,
  186. tools=[],
  187. labels=labels or [],
  188. )
  189. if decrypt_credentials:
  190. # init tool configuration
  191. tool_configuration = ProviderConfigEncrypter(
  192. tenant_id=db_provider.tenant_id,
  193. config=[x.to_basic_provider_config() for x in provider_controller.get_credentials_schema()],
  194. provider_type=provider_controller.provider_type.value,
  195. provider_identity=provider_controller.entity.identity.name,
  196. )
  197. # decrypt the credentials and mask the credentials
  198. decrypted_credentials = tool_configuration.decrypt(data=credentials)
  199. masked_credentials = tool_configuration.mask_tool_credentials(data=decrypted_credentials)
  200. result.masked_credentials = masked_credentials
  201. return result
  202. @staticmethod
  203. def convert_tool_entity_to_api_entity(
  204. tool: Union[ApiToolBundle, WorkflowTool, Tool],
  205. tenant_id: str,
  206. credentials: dict | None = None,
  207. labels: list[str] | None = None,
  208. ) -> ToolApiEntity:
  209. """
  210. convert tool to user tool
  211. """
  212. if isinstance(tool, Tool):
  213. # fork tool runtime
  214. tool = tool.fork_tool_runtime(
  215. runtime=ToolRuntime(
  216. credentials=credentials or {},
  217. tenant_id=tenant_id,
  218. )
  219. )
  220. # get tool parameters
  221. parameters = tool.entity.parameters or []
  222. # get tool runtime parameters
  223. runtime_parameters = tool.get_runtime_parameters() or []
  224. # override parameters
  225. current_parameters = parameters.copy()
  226. for runtime_parameter in runtime_parameters:
  227. found = False
  228. for index, parameter in enumerate(current_parameters):
  229. if parameter.name == runtime_parameter.name and parameter.form == runtime_parameter.form:
  230. current_parameters[index] = runtime_parameter
  231. found = True
  232. break
  233. if not found and runtime_parameter.form == ToolParameter.ToolParameterForm.FORM:
  234. current_parameters.append(runtime_parameter)
  235. return ToolApiEntity(
  236. author=tool.entity.identity.author,
  237. name=tool.entity.identity.name,
  238. label=tool.entity.identity.label,
  239. description=tool.entity.description.human if tool.entity.description else I18nObject(en_US=""),
  240. output_schema=tool.entity.output_schema,
  241. parameters=current_parameters,
  242. labels=labels or [],
  243. )
  244. if isinstance(tool, ApiToolBundle):
  245. return ToolApiEntity(
  246. author=tool.author,
  247. name=tool.operation_id,
  248. label=I18nObject(en_US=tool.operation_id, zh_Hans=tool.operation_id),
  249. description=I18nObject(en_US=tool.summary or "", zh_Hans=tool.summary or ""),
  250. parameters=tool.parameters,
  251. labels=labels or [],
  252. )