builtin_tool_provider.py 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305
  1. from abc import abstractmethod
  2. from os import listdir, path
  3. from typing import Any
  4. from yaml import FullLoader, load
  5. from core.tools.entities.tool_entities import ToolParameter, ToolProviderCredentials, ToolProviderType
  6. from core.tools.entities.user_entities import UserToolProviderCredentials
  7. from core.tools.errors import (
  8. ToolNotFoundError,
  9. ToolParameterValidationError,
  10. ToolProviderCredentialValidationError,
  11. ToolProviderNotFoundError,
  12. )
  13. from core.tools.provider.tool_provider import ToolProviderController
  14. from core.tools.tool.builtin_tool import BuiltinTool
  15. from core.tools.tool.tool import Tool
  16. from core.utils.module_import_helper import load_single_subclass_from_source
  17. class BuiltinToolProviderController(ToolProviderController):
  18. def __init__(self, **data: Any) -> None:
  19. if self.app_type == ToolProviderType.API_BASED or self.app_type == ToolProviderType.APP_BASED:
  20. super().__init__(**data)
  21. return
  22. # load provider yaml
  23. provider = self.__class__.__module__.split('.')[-1]
  24. yaml_path = path.join(path.dirname(path.realpath(__file__)), 'builtin', provider, f'{provider}.yaml')
  25. try:
  26. with open(yaml_path, 'rb') as f:
  27. provider_yaml = load(f.read(), FullLoader)
  28. except:
  29. raise ToolProviderNotFoundError(f'can not load provider yaml for {provider}')
  30. if 'credentials_for_provider' in provider_yaml and provider_yaml['credentials_for_provider'] is not None:
  31. # set credentials name
  32. for credential_name in provider_yaml['credentials_for_provider']:
  33. provider_yaml['credentials_for_provider'][credential_name]['name'] = credential_name
  34. super().__init__(**{
  35. 'identity': provider_yaml['identity'],
  36. 'credentials_schema': provider_yaml['credentials_for_provider'] if 'credentials_for_provider' in provider_yaml else None,
  37. })
  38. def _get_builtin_tools(self) -> list[Tool]:
  39. """
  40. returns a list of tools that the provider can provide
  41. :return: list of tools
  42. """
  43. if self.tools:
  44. return self.tools
  45. provider = self.identity.name
  46. tool_path = path.join(path.dirname(path.realpath(__file__)), "builtin", provider, "tools")
  47. # get all the yaml files in the tool path
  48. tool_files = list(filter(lambda x: x.endswith(".yaml") and not x.startswith("__"), listdir(tool_path)))
  49. tools = []
  50. for tool_file in tool_files:
  51. with open(path.join(tool_path, tool_file), encoding='utf-8') as f:
  52. # get tool name
  53. tool_name = tool_file.split(".")[0]
  54. tool = load(f.read(), FullLoader)
  55. # get tool class, import the module
  56. assistant_tool_class = load_single_subclass_from_source(
  57. module_name=f'core.tools.provider.builtin.{provider}.tools.{tool_name}',
  58. script_path=path.join(path.dirname(path.realpath(__file__)),
  59. 'builtin', provider, 'tools', f'{tool_name}.py'),
  60. parent_type=BuiltinTool)
  61. tools.append(assistant_tool_class(**tool))
  62. self.tools = tools
  63. return tools
  64. def get_credentials_schema(self) -> dict[str, ToolProviderCredentials]:
  65. """
  66. returns the credentials schema of the provider
  67. :return: the credentials schema
  68. """
  69. if not self.credentials_schema:
  70. return {}
  71. return self.credentials_schema.copy()
  72. def user_get_credentials_schema(self) -> UserToolProviderCredentials:
  73. """
  74. returns the credentials schema of the provider, this method is used for user
  75. :return: the credentials schema
  76. """
  77. credentials = self.credentials_schema.copy()
  78. return UserToolProviderCredentials(credentials=credentials)
  79. def get_tools(self) -> list[Tool]:
  80. """
  81. returns a list of tools that the provider can provide
  82. :return: list of tools
  83. """
  84. return self._get_builtin_tools()
  85. def get_tool(self, tool_name: str) -> Tool:
  86. """
  87. returns the tool that the provider can provide
  88. """
  89. return next(filter(lambda x: x.identity.name == tool_name, self.get_tools()), None)
  90. def get_parameters(self, tool_name: str) -> list[ToolParameter]:
  91. """
  92. returns the parameters of the tool
  93. :param tool_name: the name of the tool, defined in `get_tools`
  94. :return: list of parameters
  95. """
  96. tool = next(filter(lambda x: x.identity.name == tool_name, self.get_tools()), None)
  97. if tool is None:
  98. raise ToolNotFoundError(f'tool {tool_name} not found')
  99. return tool.parameters
  100. @property
  101. def need_credentials(self) -> bool:
  102. """
  103. returns whether the provider needs credentials
  104. :return: whether the provider needs credentials
  105. """
  106. return self.credentials_schema is not None and len(self.credentials_schema) != 0
  107. @property
  108. def app_type(self) -> ToolProviderType:
  109. """
  110. returns the type of the provider
  111. :return: type of the provider
  112. """
  113. return ToolProviderType.BUILT_IN
  114. def validate_parameters(self, tool_id: int, tool_name: str, tool_parameters: dict[str, Any]) -> None:
  115. """
  116. validate the parameters of the tool and set the default value if needed
  117. :param tool_name: the name of the tool, defined in `get_tools`
  118. :param tool_parameters: the parameters of the tool
  119. """
  120. tool_parameters_schema = self.get_parameters(tool_name)
  121. tool_parameters_need_to_validate: dict[str, ToolParameter] = {}
  122. for parameter in tool_parameters_schema:
  123. tool_parameters_need_to_validate[parameter.name] = parameter
  124. for parameter in tool_parameters:
  125. if parameter not in tool_parameters_need_to_validate:
  126. raise ToolParameterValidationError(f'parameter {parameter} not found in tool {tool_name}')
  127. # check type
  128. parameter_schema = tool_parameters_need_to_validate[parameter]
  129. if parameter_schema.type == ToolParameter.ToolParameterType.STRING:
  130. if not isinstance(tool_parameters[parameter], str):
  131. raise ToolParameterValidationError(f'parameter {parameter} should be string')
  132. elif parameter_schema.type == ToolParameter.ToolParameterType.NUMBER:
  133. if not isinstance(tool_parameters[parameter], int | float):
  134. raise ToolParameterValidationError(f'parameter {parameter} should be number')
  135. if parameter_schema.min is not None and tool_parameters[parameter] < parameter_schema.min:
  136. raise ToolParameterValidationError(f'parameter {parameter} should be greater than {parameter_schema.min}')
  137. if parameter_schema.max is not None and tool_parameters[parameter] > parameter_schema.max:
  138. raise ToolParameterValidationError(f'parameter {parameter} should be less than {parameter_schema.max}')
  139. elif parameter_schema.type == ToolParameter.ToolParameterType.BOOLEAN:
  140. if not isinstance(tool_parameters[parameter], bool):
  141. raise ToolParameterValidationError(f'parameter {parameter} should be boolean')
  142. elif parameter_schema.type == ToolParameter.ToolParameterType.SELECT:
  143. if not isinstance(tool_parameters[parameter], str):
  144. raise ToolParameterValidationError(f'parameter {parameter} should be string')
  145. options = parameter_schema.options
  146. if not isinstance(options, list):
  147. raise ToolParameterValidationError(f'parameter {parameter} options should be list')
  148. if tool_parameters[parameter] not in [x.value for x in options]:
  149. raise ToolParameterValidationError(f'parameter {parameter} should be one of {options}')
  150. tool_parameters_need_to_validate.pop(parameter)
  151. for parameter in tool_parameters_need_to_validate:
  152. parameter_schema = tool_parameters_need_to_validate[parameter]
  153. if parameter_schema.required:
  154. raise ToolParameterValidationError(f'parameter {parameter} is required')
  155. # the parameter is not set currently, set the default value if needed
  156. if parameter_schema.default is not None:
  157. default_value = parameter_schema.default
  158. # parse default value into the correct type
  159. if parameter_schema.type == ToolParameter.ToolParameterType.STRING or \
  160. parameter_schema.type == ToolParameter.ToolParameterType.SELECT:
  161. default_value = str(default_value)
  162. elif parameter_schema.type == ToolParameter.ToolParameterType.NUMBER:
  163. default_value = float(default_value)
  164. elif parameter_schema.type == ToolParameter.ToolParameterType.BOOLEAN:
  165. default_value = bool(default_value)
  166. tool_parameters[parameter] = default_value
  167. def validate_credentials_format(self, credentials: dict[str, Any]) -> None:
  168. """
  169. validate the format of the credentials of the provider and set the default value if needed
  170. :param credentials: the credentials of the tool
  171. """
  172. credentials_schema = self.credentials_schema
  173. if credentials_schema is None:
  174. return
  175. credentials_need_to_validate: dict[str, ToolProviderCredentials] = {}
  176. for credential_name in credentials_schema:
  177. credentials_need_to_validate[credential_name] = credentials_schema[credential_name]
  178. for credential_name in credentials:
  179. if credential_name not in credentials_need_to_validate:
  180. raise ToolProviderCredentialValidationError(f'credential {credential_name} not found in provider {self.identity.name}')
  181. # check type
  182. credential_schema = credentials_need_to_validate[credential_name]
  183. if credential_schema == ToolProviderCredentials.CredentialsType.SECRET_INPUT or \
  184. credential_schema == ToolProviderCredentials.CredentialsType.TEXT_INPUT:
  185. if not isinstance(credentials[credential_name], str):
  186. raise ToolProviderCredentialValidationError(f'credential {credential_schema.label.en_US} should be string')
  187. elif credential_schema.type == ToolProviderCredentials.CredentialsType.SELECT:
  188. if not isinstance(credentials[credential_name], str):
  189. raise ToolProviderCredentialValidationError(f'credential {credential_schema.label.en_US} should be string')
  190. options = credential_schema.options
  191. if not isinstance(options, list):
  192. raise ToolProviderCredentialValidationError(f'credential {credential_schema.label.en_US} options should be list')
  193. if credentials[credential_name] not in [x.value for x in options]:
  194. raise ToolProviderCredentialValidationError(f'credential {credential_schema.label.en_US} should be one of {options}')
  195. elif credential_schema.type == ToolProviderCredentials.CredentialsType.BOOLEAN:
  196. if isinstance(credentials[credential_name], bool):
  197. pass
  198. elif isinstance(credentials[credential_name], str):
  199. if credentials[credential_name].lower() == 'true':
  200. credentials[credential_name] = True
  201. elif credentials[credential_name].lower() == 'false':
  202. credentials[credential_name] = False
  203. else:
  204. raise ToolProviderCredentialValidationError(f'credential {credential_schema.label.en_US} should be boolean')
  205. elif isinstance(credentials[credential_name], int):
  206. if credentials[credential_name] == 1:
  207. credentials[credential_name] = True
  208. elif credentials[credential_name] == 0:
  209. credentials[credential_name] = False
  210. else:
  211. raise ToolProviderCredentialValidationError(f'credential {credential_schema.label.en_US} should be boolean')
  212. else:
  213. raise ToolProviderCredentialValidationError(f'credential {credential_schema.label.en_US} should be boolean')
  214. if credentials[credential_name] or credentials[credential_name] == False:
  215. credentials_need_to_validate.pop(credential_name)
  216. for credential_name in credentials_need_to_validate:
  217. credential_schema = credentials_need_to_validate[credential_name]
  218. if credential_schema.required:
  219. raise ToolProviderCredentialValidationError(f'credential {credential_schema.label.en_US} is required')
  220. # the credential is not set currently, set the default value if needed
  221. if credential_schema.default is not None:
  222. default_value = credential_schema.default
  223. # parse default value into the correct type
  224. if credential_schema.type == ToolProviderCredentials.CredentialsType.SECRET_INPUT or \
  225. credential_schema.type == ToolProviderCredentials.CredentialsType.TEXT_INPUT or \
  226. credential_schema.type == ToolProviderCredentials.CredentialsType.SELECT:
  227. default_value = str(default_value)
  228. credentials[credential_name] = default_value
  229. def validate_credentials(self, credentials: dict[str, Any]) -> None:
  230. """
  231. validate the credentials of the provider
  232. :param tool_name: the name of the tool, defined in `get_tools`
  233. :param credentials: the credentials of the tool
  234. """
  235. # validate credentials format
  236. self.validate_credentials_format(credentials)
  237. # validate credentials
  238. self._validate_credentials(credentials)
  239. @abstractmethod
  240. def _validate_credentials(self, credentials: dict[str, Any]) -> None:
  241. """
  242. validate the credentials of the provider
  243. :param tool_name: the name of the tool, defined in `get_tools`
  244. :param credentials: the credentials of the tool
  245. """
  246. pass