builtin_tools_manage_service.py 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291
  1. import json
  2. import logging
  3. from pathlib import Path
  4. from configs import dify_config
  5. from core.helper.position_helper import is_filtered
  6. from core.model_runtime.utils.encoders import jsonable_encoder
  7. from core.tools.builtin_tool.providers._positions import BuiltinToolProviderSort
  8. from core.tools.entities.api_entities import ToolApiEntity, ToolProviderApiEntity
  9. from core.tools.entities.tool_entities import ToolProviderID
  10. from core.tools.errors import ToolNotFoundError, ToolProviderCredentialValidationError, ToolProviderNotFoundError
  11. from core.tools.tool_label_manager import ToolLabelManager
  12. from core.tools.tool_manager import ToolManager
  13. from core.tools.utils.configuration import ProviderConfigEncrypter
  14. from extensions.ext_database import db
  15. from models.tools import BuiltinToolProvider
  16. from services.tools.tools_transform_service import ToolTransformService
  17. logger = logging.getLogger(__name__)
  18. class BuiltinToolManageService:
  19. @staticmethod
  20. def list_builtin_tool_provider_tools(user_id: str, tenant_id: str, provider: str) -> list[ToolApiEntity]:
  21. """
  22. list builtin tool provider tools
  23. :param user_id: the id of the user
  24. :param tenant_id: the id of the tenant
  25. :param provider: the name of the provider
  26. :return: the list of tools
  27. """
  28. provider_controller = ToolManager.get_builtin_provider(provider, tenant_id)
  29. tools = provider_controller.get_tools()
  30. tool_provider_configurations = ProviderConfigEncrypter(
  31. tenant_id=tenant_id,
  32. config=[x.to_basic_provider_config() for x in provider_controller.get_credentials_schema()],
  33. provider_type=provider_controller.provider_type.value,
  34. provider_identity=provider_controller.entity.identity.name,
  35. )
  36. # check if user has added the provider
  37. builtin_provider = BuiltinToolManageService._fetch_builtin_provider(provider, tenant_id)
  38. credentials = {}
  39. if builtin_provider is not None:
  40. # get credentials
  41. credentials = builtin_provider.credentials
  42. credentials = tool_provider_configurations.decrypt(credentials)
  43. result = []
  44. for tool in tools:
  45. result.append(
  46. ToolTransformService.convert_tool_entity_to_api_entity(
  47. tool=tool,
  48. credentials=credentials,
  49. tenant_id=tenant_id,
  50. labels=ToolLabelManager.get_tool_labels(provider_controller),
  51. )
  52. )
  53. return result
  54. @staticmethod
  55. def list_builtin_provider_credentials_schema(provider_name: str, tenant_id: str):
  56. """
  57. list builtin provider credentials schema
  58. :param provider_name: the name of the provider
  59. :param tenant_id: the id of the tenant
  60. :return: the list of tool providers
  61. """
  62. provider = ToolManager.get_builtin_provider(provider_name, tenant_id)
  63. return jsonable_encoder(provider.get_credentials_schema())
  64. @staticmethod
  65. def update_builtin_tool_provider(user_id: str, tenant_id: str, provider_name: str, credentials: dict):
  66. """
  67. update builtin tool provider
  68. """
  69. # get if the provider exists
  70. provider = BuiltinToolManageService._fetch_builtin_provider(provider_name, tenant_id)
  71. try:
  72. # get provider
  73. provider_controller = ToolManager.get_builtin_provider(provider_name, tenant_id)
  74. if not provider_controller.need_credentials:
  75. raise ValueError(f"provider {provider_name} does not need credentials")
  76. tool_configuration = ProviderConfigEncrypter(
  77. tenant_id=tenant_id,
  78. config=[x.to_basic_provider_config() for x in provider_controller.get_credentials_schema()],
  79. provider_type=provider_controller.provider_type.value,
  80. provider_identity=provider_controller.entity.identity.name,
  81. )
  82. # get original credentials if exists
  83. if provider is not None:
  84. original_credentials = tool_configuration.decrypt(provider.credentials)
  85. masked_credentials = tool_configuration.mask_tool_credentials(original_credentials)
  86. # check if the credential has changed, save the original credential
  87. for name, value in credentials.items():
  88. if name in masked_credentials and value == masked_credentials[name]:
  89. credentials[name] = original_credentials[name]
  90. # validate credentials
  91. provider_controller.validate_credentials(user_id, credentials)
  92. # encrypt credentials
  93. credentials = tool_configuration.encrypt(credentials)
  94. except (ToolProviderNotFoundError, ToolNotFoundError, ToolProviderCredentialValidationError) as e:
  95. raise ValueError(str(e))
  96. if provider is None:
  97. # create provider
  98. provider = BuiltinToolProvider(
  99. tenant_id=tenant_id,
  100. user_id=user_id,
  101. provider=provider_name,
  102. encrypted_credentials=json.dumps(credentials),
  103. )
  104. db.session.add(provider)
  105. db.session.commit()
  106. else:
  107. provider.encrypted_credentials = json.dumps(credentials)
  108. db.session.add(provider)
  109. db.session.commit()
  110. # delete cache
  111. tool_configuration.delete_tool_credentials_cache()
  112. return {"result": "success"}
  113. @staticmethod
  114. def get_builtin_tool_provider_credentials(user_id: str, tenant_id: str, provider: str):
  115. """
  116. get builtin tool provider credentials
  117. """
  118. provider_obj = BuiltinToolManageService._fetch_builtin_provider(provider, tenant_id)
  119. if provider_obj is None:
  120. return {}
  121. provider_controller = ToolManager.get_builtin_provider(provider_obj.provider, tenant_id)
  122. tool_configuration = ProviderConfigEncrypter(
  123. tenant_id=tenant_id,
  124. config=[x.to_basic_provider_config() for x in provider_controller.get_credentials_schema()],
  125. provider_type=provider_controller.provider_type.value,
  126. provider_identity=provider_controller.entity.identity.name,
  127. )
  128. credentials = tool_configuration.decrypt(provider_obj.credentials)
  129. credentials = tool_configuration.mask_tool_credentials(credentials)
  130. return credentials
  131. @staticmethod
  132. def delete_builtin_tool_provider(user_id: str, tenant_id: str, provider_name: str):
  133. """
  134. delete tool provider
  135. """
  136. provider_obj = BuiltinToolManageService._fetch_builtin_provider(provider_name, tenant_id)
  137. if provider_obj is None:
  138. raise ValueError(f"you have not added provider {provider_name}")
  139. db.session.delete(provider_obj)
  140. db.session.commit()
  141. # delete cache
  142. provider_controller = ToolManager.get_builtin_provider(provider_name, tenant_id)
  143. tool_configuration = ProviderConfigEncrypter(
  144. tenant_id=tenant_id,
  145. config=[x.to_basic_provider_config() for x in provider_controller.get_credentials_schema()],
  146. provider_type=provider_controller.provider_type.value,
  147. provider_identity=provider_controller.entity.identity.name,
  148. )
  149. tool_configuration.delete_tool_credentials_cache()
  150. return {"result": "success"}
  151. @staticmethod
  152. def get_builtin_tool_provider_icon(provider: str, tenant_id: str):
  153. """
  154. get tool provider icon and it's mimetype
  155. """
  156. icon_path, mime_type = ToolManager.get_builtin_provider_icon(provider, tenant_id)
  157. icon_bytes = Path(icon_path).read_bytes()
  158. return icon_bytes, mime_type
  159. @staticmethod
  160. def list_builtin_tools(user_id: str, tenant_id: str) -> list[ToolProviderApiEntity]:
  161. """
  162. list builtin tools
  163. """
  164. # get all builtin providers
  165. provider_controllers = ToolManager.list_builtin_providers(tenant_id)
  166. # get all user added providers
  167. db_providers: list[BuiltinToolProvider] = (
  168. db.session.query(BuiltinToolProvider).filter(BuiltinToolProvider.tenant_id == tenant_id).all() or []
  169. )
  170. # rewrite db_providers
  171. for db_provider in db_providers:
  172. try:
  173. ToolProviderID(db_provider.provider)
  174. except Exception:
  175. db_provider.provider = f"langgenius/{db_provider.provider}/{db_provider.provider}"
  176. # find provider
  177. find_provider = lambda provider: next(
  178. filter(lambda db_provider: db_provider.provider == provider, db_providers), None
  179. )
  180. result: list[ToolProviderApiEntity] = []
  181. for provider_controller in provider_controllers:
  182. try:
  183. # handle include, exclude
  184. if is_filtered(
  185. include_set=dify_config.POSITION_TOOL_INCLUDES_SET, # type: ignore
  186. exclude_set=dify_config.POSITION_TOOL_EXCLUDES_SET, # type: ignore
  187. data=provider_controller,
  188. name_func=lambda x: x.identity.name,
  189. ):
  190. continue
  191. # convert provider controller to user provider
  192. user_builtin_provider = ToolTransformService.builtin_provider_to_user_provider(
  193. provider_controller=provider_controller,
  194. db_provider=find_provider(provider_controller.entity.identity.name),
  195. decrypt_credentials=True,
  196. )
  197. # add icon
  198. ToolTransformService.repack_provider(user_builtin_provider)
  199. tools = provider_controller.get_tools()
  200. for tool in tools:
  201. user_builtin_provider.tools.append(
  202. ToolTransformService.convert_tool_entity_to_api_entity(
  203. tenant_id=tenant_id,
  204. tool=tool,
  205. credentials=user_builtin_provider.original_credentials,
  206. labels=ToolLabelManager.get_tool_labels(provider_controller),
  207. )
  208. )
  209. result.append(user_builtin_provider)
  210. except Exception as e:
  211. raise e
  212. return BuiltinToolProviderSort.sort(result)
  213. @staticmethod
  214. def _fetch_builtin_provider(provider_name: str, tenant_id: str) -> BuiltinToolProvider | None:
  215. try:
  216. provider_id_entity = ToolProviderID(provider_name)
  217. provider_name = provider_id_entity.provider_name
  218. if provider_id_entity.organization != "langgenius":
  219. return None
  220. provider_obj = (
  221. db.session.query(BuiltinToolProvider)
  222. .filter(
  223. BuiltinToolProvider.tenant_id == tenant_id,
  224. (BuiltinToolProvider.provider == provider_name) | (BuiltinToolProvider.provider == provider_name),
  225. )
  226. .first()
  227. )
  228. if provider_obj is None:
  229. return None
  230. try:
  231. ToolProviderID(provider_obj.provider)
  232. except Exception:
  233. provider_obj.provider = f"langgenius/{provider_obj.provider}/{provider_obj.provider}"
  234. return provider_obj
  235. except Exception:
  236. # it's an old provider without organization
  237. return (
  238. db.session.query(BuiltinToolProvider)
  239. .filter(
  240. BuiltinToolProvider.tenant_id == tenant_id,
  241. (BuiltinToolProvider.provider == provider_name),
  242. )
  243. .first()
  244. )