ops_service.py 7.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191
  1. from typing import Optional
  2. from core.ops.ops_trace_manager import OpsTraceManager, provider_config_map
  3. from extensions.ext_database import db
  4. from models.model import App, TraceAppConfig
  5. class OpsService:
  6. @classmethod
  7. def get_tracing_app_config(cls, app_id: str, tracing_provider: str):
  8. """
  9. Get tracing app config
  10. :param app_id: app id
  11. :param tracing_provider: tracing provider
  12. :return:
  13. """
  14. trace_config_data: Optional[TraceAppConfig] = (
  15. db.session.query(TraceAppConfig)
  16. .filter(TraceAppConfig.app_id == app_id, TraceAppConfig.tracing_provider == tracing_provider)
  17. .first()
  18. )
  19. if not trace_config_data:
  20. return None
  21. # decrypt_token and obfuscated_token
  22. tenant = db.session.query(App).filter(App.id == app_id).first()
  23. if not tenant:
  24. return None
  25. tenant_id = tenant.tenant_id
  26. decrypt_tracing_config = OpsTraceManager.decrypt_tracing_config(
  27. tenant_id, tracing_provider, trace_config_data.tracing_config
  28. )
  29. new_decrypt_tracing_config = OpsTraceManager.obfuscated_decrypt_token(tracing_provider, decrypt_tracing_config)
  30. if tracing_provider == "langfuse" and (
  31. "project_key" not in decrypt_tracing_config or not decrypt_tracing_config.get("project_key")
  32. ):
  33. try:
  34. project_key = OpsTraceManager.get_trace_config_project_key(decrypt_tracing_config, tracing_provider)
  35. new_decrypt_tracing_config.update(
  36. {
  37. "project_url": "{host}/project/{key}".format(
  38. host=decrypt_tracing_config.get("host"), key=project_key
  39. )
  40. }
  41. )
  42. except Exception:
  43. new_decrypt_tracing_config.update(
  44. {"project_url": "{host}/".format(host=decrypt_tracing_config.get("host"))}
  45. )
  46. if tracing_provider == "langsmith" and (
  47. "project_url" not in decrypt_tracing_config or not decrypt_tracing_config.get("project_url")
  48. ):
  49. try:
  50. project_url = OpsTraceManager.get_trace_config_project_url(decrypt_tracing_config, tracing_provider)
  51. new_decrypt_tracing_config.update({"project_url": project_url})
  52. except Exception:
  53. new_decrypt_tracing_config.update({"project_url": "https://smith.langchain.com/"})
  54. trace_config_data.tracing_config = new_decrypt_tracing_config
  55. return trace_config_data.to_dict()
  56. @classmethod
  57. def create_tracing_app_config(cls, app_id: str, tracing_provider: str, tracing_config: dict):
  58. """
  59. Create tracing app config
  60. :param app_id: app id
  61. :param tracing_provider: tracing provider
  62. :param tracing_config: tracing config
  63. :return:
  64. """
  65. if tracing_provider not in provider_config_map and tracing_provider:
  66. return {"error": f"Invalid tracing provider: {tracing_provider}"}
  67. config_class, other_keys = (
  68. provider_config_map[tracing_provider]["config_class"],
  69. provider_config_map[tracing_provider]["other_keys"],
  70. )
  71. # FIXME: ignore type error
  72. default_config_instance = config_class(**tracing_config) # type: ignore
  73. for key in other_keys: # type: ignore
  74. if key in tracing_config and tracing_config[key] == "":
  75. tracing_config[key] = getattr(default_config_instance, key, None)
  76. # api check
  77. if not OpsTraceManager.check_trace_config_is_effective(tracing_config, tracing_provider):
  78. return {"error": "Invalid Credentials"}
  79. # get project url
  80. if tracing_provider == "langfuse":
  81. project_key = OpsTraceManager.get_trace_config_project_key(tracing_config, tracing_provider)
  82. project_url = "{host}/project/{key}".format(host=tracing_config.get("host"), key=project_key)
  83. elif tracing_provider == "langsmith":
  84. project_url = OpsTraceManager.get_trace_config_project_url(tracing_config, tracing_provider)
  85. else:
  86. project_url = None
  87. # check if trace config already exists
  88. trace_config_data: Optional[TraceAppConfig] = (
  89. db.session.query(TraceAppConfig)
  90. .filter(TraceAppConfig.app_id == app_id, TraceAppConfig.tracing_provider == tracing_provider)
  91. .first()
  92. )
  93. if trace_config_data:
  94. return None
  95. # get tenant id
  96. tenant = db.session.query(App).filter(App.id == app_id).first()
  97. if not tenant:
  98. return None
  99. tenant_id = tenant.tenant_id
  100. tracing_config = OpsTraceManager.encrypt_tracing_config(tenant_id, tracing_provider, tracing_config)
  101. if project_url:
  102. tracing_config["project_url"] = project_url
  103. trace_config_data = TraceAppConfig(
  104. app_id=app_id,
  105. tracing_provider=tracing_provider,
  106. tracing_config=tracing_config,
  107. )
  108. db.session.add(trace_config_data)
  109. db.session.commit()
  110. return {"result": "success"}
  111. @classmethod
  112. def update_tracing_app_config(cls, app_id: str, tracing_provider: str, tracing_config: dict):
  113. """
  114. Update tracing app config
  115. :param app_id: app id
  116. :param tracing_provider: tracing provider
  117. :param tracing_config: tracing config
  118. :return:
  119. """
  120. if tracing_provider not in provider_config_map:
  121. raise ValueError(f"Invalid tracing provider: {tracing_provider}")
  122. # check if trace config already exists
  123. current_trace_config = (
  124. db.session.query(TraceAppConfig)
  125. .filter(TraceAppConfig.app_id == app_id, TraceAppConfig.tracing_provider == tracing_provider)
  126. .first()
  127. )
  128. if not current_trace_config:
  129. return None
  130. # get tenant id
  131. tenant = db.session.query(App).filter(App.id == app_id).first()
  132. if not tenant:
  133. return None
  134. tenant_id = tenant.tenant_id
  135. tracing_config = OpsTraceManager.encrypt_tracing_config(
  136. tenant_id, tracing_provider, tracing_config, current_trace_config.tracing_config
  137. )
  138. # api check
  139. # decrypt_token
  140. decrypt_tracing_config = OpsTraceManager.decrypt_tracing_config(tenant_id, tracing_provider, tracing_config)
  141. if not OpsTraceManager.check_trace_config_is_effective(decrypt_tracing_config, tracing_provider):
  142. raise ValueError("Invalid Credentials")
  143. current_trace_config.tracing_config = tracing_config
  144. db.session.commit()
  145. return current_trace_config.to_dict()
  146. @classmethod
  147. def delete_tracing_app_config(cls, app_id: str, tracing_provider: str):
  148. """
  149. Delete tracing app config
  150. :param app_id: app id
  151. :param tracing_provider: tracing provider
  152. :return:
  153. """
  154. trace_config = (
  155. db.session.query(TraceAppConfig)
  156. .filter(TraceAppConfig.app_id == app_id, TraceAppConfig.tracing_provider == tracing_provider)
  157. .first()
  158. )
  159. if not trace_config:
  160. return None
  161. db.session.delete(trace_config)
  162. db.session.commit()
  163. return True