spark_provider.py 7.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243
  1. import json
  2. import logging
  3. from json import JSONDecodeError
  4. from typing import Type
  5. from langchain.schema import HumanMessage
  6. from core.helper import encrypter
  7. from core.model_providers.models.base import BaseProviderModel
  8. from core.model_providers.models.entity.model_params import ModelKwargsRules, KwargRule, ModelType, ModelMode
  9. from core.model_providers.models.llm.spark_model import SparkModel
  10. from core.model_providers.providers.base import BaseModelProvider, CredentialsValidateFailedError
  11. from core.third_party.langchain.llms.spark import ChatSpark
  12. from core.third_party.spark.spark_llm import SparkError
  13. from models.provider import ProviderType, ProviderQuotaType
  14. class SparkProvider(BaseModelProvider):
  15. @property
  16. def provider_name(self):
  17. """
  18. Returns the name of a provider.
  19. """
  20. return 'spark'
  21. def _get_fixed_model_list(self, model_type: ModelType) -> list[dict]:
  22. if model_type == ModelType.TEXT_GENERATION:
  23. return [
  24. {
  25. 'id': 'spark-v3',
  26. 'name': 'Spark V3.0',
  27. 'mode': ModelMode.CHAT.value,
  28. },
  29. {
  30. 'id': 'spark-v2',
  31. 'name': 'Spark V2.0',
  32. 'mode': ModelMode.CHAT.value,
  33. },
  34. {
  35. 'id': 'spark',
  36. 'name': 'Spark V1.5',
  37. 'mode': ModelMode.CHAT.value,
  38. }
  39. ]
  40. else:
  41. return []
  42. def _get_text_generation_model_mode(self, model_name) -> str:
  43. return ModelMode.CHAT.value
  44. def get_model_class(self, model_type: ModelType) -> Type[BaseProviderModel]:
  45. """
  46. Returns the model class.
  47. :param model_type:
  48. :return:
  49. """
  50. if model_type == ModelType.TEXT_GENERATION:
  51. model_class = SparkModel
  52. else:
  53. raise NotImplementedError
  54. return model_class
  55. def get_model_parameter_rules(self, model_name: str, model_type: ModelType) -> ModelKwargsRules:
  56. """
  57. get model parameter rules.
  58. :param model_name:
  59. :param model_type:
  60. :return:
  61. """
  62. return ModelKwargsRules(
  63. temperature=KwargRule[float](min=0, max=1, default=0.5, precision=2),
  64. top_p=KwargRule[float](enabled=False),
  65. presence_penalty=KwargRule[float](enabled=False),
  66. frequency_penalty=KwargRule[float](enabled=False),
  67. max_tokens=KwargRule[int](min=10, max=4096, default=2048, precision=0),
  68. )
  69. @classmethod
  70. def is_provider_credentials_valid_or_raise(cls, credentials: dict):
  71. """
  72. Validates the given credentials.
  73. """
  74. if 'app_id' not in credentials:
  75. raise CredentialsValidateFailedError('Spark app_id must be provided.')
  76. if 'api_key' not in credentials:
  77. raise CredentialsValidateFailedError('Spark api_key must be provided.')
  78. if 'api_secret' not in credentials:
  79. raise CredentialsValidateFailedError('Spark api_secret must be provided.')
  80. credential_kwargs = {
  81. 'app_id': credentials['app_id'],
  82. 'api_key': credentials['api_key'],
  83. 'api_secret': credentials['api_secret'],
  84. }
  85. try:
  86. chat_llm = ChatSpark(
  87. model_name='spark-v3',
  88. max_tokens=10,
  89. temperature=0.01,
  90. **credential_kwargs
  91. )
  92. messages = [
  93. HumanMessage(
  94. content="ping"
  95. )
  96. ]
  97. chat_llm(messages)
  98. except SparkError as ex:
  99. # try spark v2.1 if v3.1 failed
  100. try:
  101. chat_llm = ChatSpark(
  102. model_name='spark-v2',
  103. max_tokens=10,
  104. temperature=0.01,
  105. **credential_kwargs
  106. )
  107. messages = [
  108. HumanMessage(
  109. content="ping"
  110. )
  111. ]
  112. chat_llm(messages)
  113. except SparkError as ex:
  114. # try spark v1.5 if v2.1 failed
  115. try:
  116. chat_llm = ChatSpark(
  117. model_name='spark',
  118. max_tokens=10,
  119. temperature=0.01,
  120. **credential_kwargs
  121. )
  122. messages = [
  123. HumanMessage(
  124. content="ping"
  125. )
  126. ]
  127. chat_llm(messages)
  128. except SparkError as ex:
  129. raise CredentialsValidateFailedError(str(ex))
  130. except Exception as ex:
  131. logging.exception('Spark config validation failed')
  132. raise ex
  133. except Exception as ex:
  134. logging.exception('Spark config validation failed')
  135. raise ex
  136. @classmethod
  137. def encrypt_provider_credentials(cls, tenant_id: str, credentials: dict) -> dict:
  138. credentials['api_key'] = encrypter.encrypt_token(tenant_id, credentials['api_key'])
  139. credentials['api_secret'] = encrypter.encrypt_token(tenant_id, credentials['api_secret'])
  140. return credentials
  141. def get_provider_credentials(self, obfuscated: bool = False) -> dict:
  142. if self.provider.provider_type == ProviderType.CUSTOM.value \
  143. or (self.provider.provider_type == ProviderType.SYSTEM.value
  144. and self.provider.quota_type == ProviderQuotaType.FREE.value):
  145. try:
  146. credentials = json.loads(self.provider.encrypted_config)
  147. except JSONDecodeError:
  148. credentials = {
  149. 'app_id': None,
  150. 'api_key': None,
  151. 'api_secret': None,
  152. }
  153. if credentials['api_key']:
  154. credentials['api_key'] = encrypter.decrypt_token(
  155. self.provider.tenant_id,
  156. credentials['api_key']
  157. )
  158. if obfuscated:
  159. credentials['api_key'] = encrypter.obfuscated_token(credentials['api_key'])
  160. if credentials['api_secret']:
  161. credentials['api_secret'] = encrypter.decrypt_token(
  162. self.provider.tenant_id,
  163. credentials['api_secret']
  164. )
  165. if obfuscated:
  166. credentials['api_secret'] = encrypter.obfuscated_token(credentials['api_secret'])
  167. return credentials
  168. else:
  169. return {
  170. 'app_id': None,
  171. 'api_key': None,
  172. 'api_secret': None,
  173. }
  174. def should_deduct_quota(self):
  175. return True
  176. @classmethod
  177. def is_model_credentials_valid_or_raise(cls, model_name: str, model_type: ModelType, credentials: dict):
  178. """
  179. check model credentials valid.
  180. :param model_name:
  181. :param model_type:
  182. :param credentials:
  183. """
  184. return
  185. @classmethod
  186. def encrypt_model_credentials(cls, tenant_id: str, model_name: str, model_type: ModelType,
  187. credentials: dict) -> dict:
  188. """
  189. encrypt model credentials for save.
  190. :param tenant_id:
  191. :param model_name:
  192. :param model_type:
  193. :param credentials:
  194. :return:
  195. """
  196. return {}
  197. def get_model_credentials(self, model_name: str, model_type: ModelType, obfuscated: bool = False) -> dict:
  198. """
  199. get credentials for llm use.
  200. :param model_name:
  201. :param model_type:
  202. :param obfuscated:
  203. :return:
  204. """
  205. return self.get_provider_credentials(obfuscated)