baichuan_provider.py 5.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172
  1. import json
  2. from json import JSONDecodeError
  3. from typing import Type
  4. from langchain.schema import HumanMessage
  5. from core.helper import encrypter
  6. from core.model_providers.models.base import BaseProviderModel
  7. from core.model_providers.models.entity.model_params import ModelKwargsRules, KwargRule, ModelType, ModelMode
  8. from core.model_providers.models.llm.baichuan_model import BaichuanModel
  9. from core.model_providers.providers.base import BaseModelProvider, CredentialsValidateFailedError
  10. from core.third_party.langchain.llms.baichuan_llm import BaichuanChatLLM
  11. from models.provider import ProviderType
  12. class BaichuanProvider(BaseModelProvider):
  13. @property
  14. def provider_name(self):
  15. """
  16. Returns the name of a provider.
  17. """
  18. return 'baichuan'
  19. def _get_text_generation_model_mode(self, model_name) -> str:
  20. return ModelMode.CHAT.value
  21. def _get_fixed_model_list(self, model_type: ModelType) -> list[dict]:
  22. if model_type == ModelType.TEXT_GENERATION:
  23. return [
  24. {
  25. 'id': 'baichuan2-53b',
  26. 'name': 'Baichuan2-53B',
  27. 'mode': ModelMode.CHAT.value,
  28. }
  29. ]
  30. else:
  31. return []
  32. def get_model_class(self, model_type: ModelType) -> Type[BaseProviderModel]:
  33. """
  34. Returns the model class.
  35. :param model_type:
  36. :return:
  37. """
  38. if model_type == ModelType.TEXT_GENERATION:
  39. model_class = BaichuanModel
  40. else:
  41. raise NotImplementedError
  42. return model_class
  43. def get_model_parameter_rules(self, model_name: str, model_type: ModelType) -> ModelKwargsRules:
  44. """
  45. get model parameter rules.
  46. :param model_name:
  47. :param model_type:
  48. :return:
  49. """
  50. return ModelKwargsRules(
  51. temperature=KwargRule[float](min=0, max=1, default=0.3, precision=2),
  52. top_p=KwargRule[float](min=0, max=0.99, default=0.85, precision=2),
  53. presence_penalty=KwargRule[float](enabled=False),
  54. frequency_penalty=KwargRule[float](enabled=False),
  55. max_tokens=KwargRule[int](enabled=False),
  56. )
  57. @classmethod
  58. def is_provider_credentials_valid_or_raise(cls, credentials: dict):
  59. """
  60. Validates the given credentials.
  61. """
  62. if 'api_key' not in credentials:
  63. raise CredentialsValidateFailedError('Baichuan api_key must be provided.')
  64. if 'secret_key' not in credentials:
  65. raise CredentialsValidateFailedError('Baichuan secret_key must be provided.')
  66. try:
  67. credential_kwargs = {
  68. 'api_key': credentials['api_key'],
  69. 'secret_key': credentials['secret_key'],
  70. }
  71. llm = BaichuanChatLLM(
  72. temperature=0,
  73. **credential_kwargs
  74. )
  75. llm([HumanMessage(content='ping')])
  76. except Exception as ex:
  77. raise CredentialsValidateFailedError(str(ex))
  78. @classmethod
  79. def encrypt_provider_credentials(cls, tenant_id: str, credentials: dict) -> dict:
  80. credentials['api_key'] = encrypter.encrypt_token(tenant_id, credentials['api_key'])
  81. credentials['secret_key'] = encrypter.encrypt_token(tenant_id, credentials['secret_key'])
  82. return credentials
  83. def get_provider_credentials(self, obfuscated: bool = False) -> dict:
  84. if self.provider.provider_type == ProviderType.CUSTOM.value:
  85. try:
  86. credentials = json.loads(self.provider.encrypted_config)
  87. except JSONDecodeError:
  88. credentials = {
  89. 'api_key': None,
  90. 'secret_key': None,
  91. }
  92. if credentials['api_key']:
  93. credentials['api_key'] = encrypter.decrypt_token(
  94. self.provider.tenant_id,
  95. credentials['api_key']
  96. )
  97. if obfuscated:
  98. credentials['api_key'] = encrypter.obfuscated_token(credentials['api_key'])
  99. if credentials['secret_key']:
  100. credentials['secret_key'] = encrypter.decrypt_token(
  101. self.provider.tenant_id,
  102. credentials['secret_key']
  103. )
  104. if obfuscated:
  105. credentials['secret_key'] = encrypter.obfuscated_token(credentials['secret_key'])
  106. return credentials
  107. else:
  108. return {}
  109. def should_deduct_quota(self):
  110. return True
  111. @classmethod
  112. def is_model_credentials_valid_or_raise(cls, model_name: str, model_type: ModelType, credentials: dict):
  113. """
  114. check model credentials valid.
  115. :param model_name:
  116. :param model_type:
  117. :param credentials:
  118. """
  119. return
  120. @classmethod
  121. def encrypt_model_credentials(cls, tenant_id: str, model_name: str, model_type: ModelType,
  122. credentials: dict) -> dict:
  123. """
  124. encrypt model credentials for save.
  125. :param tenant_id:
  126. :param model_name:
  127. :param model_type:
  128. :param credentials:
  129. :return:
  130. """
  131. return {}
  132. def get_model_credentials(self, model_name: str, model_type: ModelType, obfuscated: bool = False) -> dict:
  133. """
  134. get credentials for llm use.
  135. :param model_name:
  136. :param model_type:
  137. :param obfuscated:
  138. :return:
  139. """
  140. return self.get_provider_credentials(obfuscated)