| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145 | import jsonfrom flask import requestfrom flask_login import current_userfrom flask_restful import Resourcefrom controllers.console import apifrom controllers.console.app import _get_appfrom controllers.console.setup import setup_requiredfrom controllers.console.wraps import account_initialization_requiredfrom core.entities.application_entities import AgentToolEntityfrom core.tools.tool_manager import ToolManagerfrom core.tools.utils.configuration import ToolParameterConfigurationManagerfrom events.app_event import app_model_config_was_updatedfrom extensions.ext_database import dbfrom libs.login import login_requiredfrom models.model import AppModelConfigfrom services.app_model_config_service import AppModelConfigServiceclass ModelConfigResource(Resource):    @setup_required    @login_required    @account_initialization_required    def post(self, app_id):        """Modify app model config"""        app_id = str(app_id)        app = _get_app(app_id)        # validate config        model_configuration = AppModelConfigService.validate_configuration(            tenant_id=current_user.current_tenant_id,            account=current_user,            config=request.json,            app_mode=app.mode        )        new_app_model_config = AppModelConfig(            app_id=app.id,        )        new_app_model_config = new_app_model_config.from_model_config_dict(model_configuration)        # get original app model config        original_app_model_config: AppModelConfig = db.session.query(AppModelConfig).filter(            AppModelConfig.id == app.app_model_config_id        ).first()        agent_mode = original_app_model_config.agent_mode_dict        # decrypt agent tool parameters if it's secret-input        parameter_map = {}        masked_parameter_map = {}        tool_map = {}        for tool in agent_mode.get('tools') or []:            if not isinstance(tool, dict) or len(tool.keys()) <= 3:                continue                        agent_tool_entity = AgentToolEntity(**tool)            # get tool            try:                tool_runtime = ToolManager.get_agent_tool_runtime(                    tenant_id=current_user.current_tenant_id,                    agent_tool=agent_tool_entity,                    agent_callback=None                )                manager = ToolParameterConfigurationManager(                    tenant_id=current_user.current_tenant_id,                    tool_runtime=tool_runtime,                    provider_name=agent_tool_entity.provider_id,                    provider_type=agent_tool_entity.provider_type,                )            except Exception as e:                continue            # get decrypted parameters            if agent_tool_entity.tool_parameters:                parameters = manager.decrypt_tool_parameters(agent_tool_entity.tool_parameters or {})                masked_parameter = manager.mask_tool_parameters(parameters or {})            else:                parameters = {}                masked_parameter = {}            key = f'{agent_tool_entity.provider_id}.{agent_tool_entity.provider_type}.{agent_tool_entity.tool_name}'            masked_parameter_map[key] = masked_parameter            parameter_map[key] = parameters            tool_map[key] = tool_runtime        # encrypt agent tool parameters if it's secret-input        agent_mode = new_app_model_config.agent_mode_dict        for tool in agent_mode.get('tools') or []:            agent_tool_entity = AgentToolEntity(**tool)                        # get tool            key = f'{agent_tool_entity.provider_id}.{agent_tool_entity.provider_type}.{agent_tool_entity.tool_name}'            if key in tool_map:                tool_runtime = tool_map[key]            else:                try:                    tool_runtime = ToolManager.get_agent_tool_runtime(                        tenant_id=current_user.current_tenant_id,                        agent_tool=agent_tool_entity,                        agent_callback=None                    )                except Exception as e:                    continue                        manager = ToolParameterConfigurationManager(                tenant_id=current_user.current_tenant_id,                tool_runtime=tool_runtime,                provider_name=agent_tool_entity.provider_id,                provider_type=agent_tool_entity.provider_type,            )            manager.delete_tool_parameters_cache()            # override parameters if it equals to masked parameters            if agent_tool_entity.tool_parameters:                if key not in masked_parameter_map:                    continue                if agent_tool_entity.tool_parameters == masked_parameter_map[key]:                    agent_tool_entity.tool_parameters = parameter_map[key]            # encrypt parameters            if agent_tool_entity.tool_parameters:                tool['tool_parameters'] = manager.encrypt_tool_parameters(agent_tool_entity.tool_parameters or {})        # update app model config        new_app_model_config.agent_mode = json.dumps(agent_mode)        db.session.add(new_app_model_config)        db.session.flush()        app.app_model_config_id = new_app_model_config.id        db.session.commit()        app_model_config_was_updated.send(            app,            app_model_config=new_app_model_config        )        return {'result': 'success'}api.add_resource(ModelConfigResource, '/apps/<uuid:app_id>/model-config')
 |