tools_transform_service.py 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305
  1. import json
  2. import logging
  3. from typing import Optional, Union, cast
  4. from yarl import URL
  5. from configs import dify_config
  6. from core.tools.__base.tool import Tool
  7. from core.tools.__base.tool_runtime import ToolRuntime
  8. from core.tools.builtin_tool.provider import BuiltinToolProviderController
  9. from core.tools.custom_tool.provider import ApiToolProviderController
  10. from core.tools.entities.api_entities import ToolApiEntity, ToolProviderApiEntity
  11. from core.tools.entities.common_entities import I18nObject
  12. from core.tools.entities.tool_bundle import ApiToolBundle
  13. from core.tools.entities.tool_entities import (
  14. ApiProviderAuthType,
  15. ToolParameter,
  16. ToolProviderType,
  17. )
  18. from core.tools.plugin_tool.provider import PluginToolProviderController
  19. from core.tools.utils.configuration import ProviderConfigEncrypter
  20. from core.tools.workflow_as_tool.provider import WorkflowToolProviderController
  21. from core.tools.workflow_as_tool.tool import WorkflowTool
  22. from models.tools import ApiToolProvider, BuiltinToolProvider, WorkflowToolProvider
  23. logger = logging.getLogger(__name__)
  24. class ToolTransformService:
  25. @classmethod
  26. def get_plugin_icon_url(cls, tenant_id: str, filename: str) -> str:
  27. url_prefix = (
  28. URL(dify_config.CONSOLE_API_URL or "/") / "console" / "api" / "workspaces" / "current" / "plugin" / "icon"
  29. )
  30. return str(url_prefix % {"tenant_id": tenant_id, "filename": filename})
  31. @classmethod
  32. def get_tool_provider_icon_url(cls, provider_type: str, provider_name: str, icon: str | dict) -> Union[str, dict]:
  33. """
  34. get tool provider icon url
  35. """
  36. url_prefix = (
  37. URL(dify_config.CONSOLE_API_URL or "/") / "console" / "api" / "workspaces" / "current" / "tool-provider"
  38. )
  39. if provider_type == ToolProviderType.BUILT_IN.value:
  40. return str(url_prefix / "builtin" / provider_name / "icon")
  41. elif provider_type in {ToolProviderType.API.value, ToolProviderType.WORKFLOW.value}:
  42. try:
  43. if isinstance(icon, str):
  44. return cast(dict, json.loads(icon))
  45. return icon
  46. except Exception:
  47. return {"background": "#252525", "content": "\ud83d\ude01"}
  48. return ""
  49. @staticmethod
  50. def repack_provider(tenant_id: str, provider: Union[dict, ToolProviderApiEntity]):
  51. """
  52. repack provider
  53. :param provider: the provider dict
  54. """
  55. if isinstance(provider, dict) and "icon" in provider:
  56. provider["icon"] = ToolTransformService.get_tool_provider_icon_url(
  57. provider_type=provider["type"], provider_name=provider["name"], icon=provider["icon"]
  58. )
  59. elif isinstance(provider, ToolProviderApiEntity):
  60. if provider.plugin_id:
  61. if isinstance(provider.icon, str):
  62. provider.icon = ToolTransformService.get_plugin_icon_url(
  63. tenant_id=tenant_id, filename=provider.icon
  64. )
  65. else:
  66. provider.icon = ToolTransformService.get_tool_provider_icon_url(
  67. provider_type=provider.type.value, provider_name=provider.name, icon=provider.icon
  68. )
  69. @classmethod
  70. def builtin_provider_to_user_provider(
  71. cls,
  72. provider_controller: BuiltinToolProviderController | PluginToolProviderController,
  73. db_provider: Optional[BuiltinToolProvider],
  74. decrypt_credentials: bool = True,
  75. ) -> ToolProviderApiEntity:
  76. """
  77. convert provider controller to user provider
  78. """
  79. result = ToolProviderApiEntity(
  80. id=provider_controller.entity.identity.name,
  81. author=provider_controller.entity.identity.author,
  82. name=provider_controller.entity.identity.name,
  83. description=provider_controller.entity.identity.description,
  84. icon=provider_controller.entity.identity.icon,
  85. label=provider_controller.entity.identity.label,
  86. type=ToolProviderType.BUILT_IN,
  87. masked_credentials={},
  88. is_team_authorization=False,
  89. plugin_id=None,
  90. tools=[],
  91. labels=provider_controller.tool_labels,
  92. )
  93. if isinstance(provider_controller, PluginToolProviderController):
  94. result.plugin_id = provider_controller.plugin_id
  95. result.plugin_unique_identifier = provider_controller.plugin_unique_identifier
  96. # get credentials schema
  97. schema = {x.to_basic_provider_config().name: x for x in provider_controller.get_credentials_schema()}
  98. for name, value in schema.items():
  99. if result.masked_credentials:
  100. result.masked_credentials[name] = ""
  101. # check if the provider need credentials
  102. if not provider_controller.need_credentials:
  103. result.is_team_authorization = True
  104. result.allow_delete = False
  105. elif db_provider:
  106. result.is_team_authorization = True
  107. if decrypt_credentials:
  108. credentials = db_provider.credentials
  109. # init tool configuration
  110. tool_configuration = ProviderConfigEncrypter(
  111. tenant_id=db_provider.tenant_id,
  112. config=[x.to_basic_provider_config() for x in provider_controller.get_credentials_schema()],
  113. provider_type=provider_controller.provider_type.value,
  114. provider_identity=provider_controller.entity.identity.name,
  115. )
  116. # decrypt the credentials and mask the credentials
  117. decrypted_credentials = tool_configuration.decrypt(data=credentials)
  118. masked_credentials = tool_configuration.mask_tool_credentials(data=decrypted_credentials)
  119. result.masked_credentials = masked_credentials
  120. result.original_credentials = decrypted_credentials
  121. return result
  122. @staticmethod
  123. def api_provider_to_controller(
  124. db_provider: ApiToolProvider,
  125. ) -> ApiToolProviderController:
  126. """
  127. convert provider controller to user provider
  128. """
  129. # package tool provider controller
  130. controller = ApiToolProviderController.from_db(
  131. db_provider=db_provider,
  132. auth_type=ApiProviderAuthType.API_KEY
  133. if db_provider.credentials["auth_type"] == "api_key"
  134. else ApiProviderAuthType.NONE,
  135. )
  136. return controller
  137. @staticmethod
  138. def workflow_provider_to_controller(db_provider: WorkflowToolProvider) -> WorkflowToolProviderController:
  139. """
  140. convert provider controller to provider
  141. """
  142. return WorkflowToolProviderController.from_db(db_provider)
  143. @staticmethod
  144. def workflow_provider_to_user_provider(
  145. provider_controller: WorkflowToolProviderController, labels: list[str] | None = None
  146. ):
  147. """
  148. convert provider controller to user provider
  149. """
  150. return ToolProviderApiEntity(
  151. id=provider_controller.provider_id,
  152. author=provider_controller.entity.identity.author,
  153. name=provider_controller.entity.identity.name,
  154. description=provider_controller.entity.identity.description,
  155. icon=provider_controller.entity.identity.icon,
  156. label=provider_controller.entity.identity.label,
  157. type=ToolProviderType.WORKFLOW,
  158. masked_credentials={},
  159. is_team_authorization=True,
  160. plugin_id=None,
  161. plugin_unique_identifier=None,
  162. tools=[],
  163. labels=labels or [],
  164. )
  165. @classmethod
  166. def api_provider_to_user_provider(
  167. cls,
  168. provider_controller: ApiToolProviderController,
  169. db_provider: ApiToolProvider,
  170. decrypt_credentials: bool = True,
  171. labels: list[str] | None = None,
  172. ) -> ToolProviderApiEntity:
  173. """
  174. convert provider controller to user provider
  175. """
  176. username = "Anonymous"
  177. if db_provider.user is None:
  178. raise ValueError(f"user is None for api provider {db_provider.id}")
  179. try:
  180. user = db_provider.user
  181. if not user:
  182. raise ValueError("user not found")
  183. username = user.name
  184. except Exception:
  185. logger.exception(f"failed to get user name for api provider {db_provider.id}")
  186. # add provider into providers
  187. credentials = db_provider.credentials
  188. result = ToolProviderApiEntity(
  189. id=db_provider.id,
  190. author=username,
  191. name=db_provider.name,
  192. description=I18nObject(
  193. en_US=db_provider.description,
  194. zh_Hans=db_provider.description,
  195. ),
  196. icon=db_provider.icon,
  197. label=I18nObject(
  198. en_US=db_provider.name,
  199. zh_Hans=db_provider.name,
  200. ),
  201. type=ToolProviderType.API,
  202. plugin_id=None,
  203. plugin_unique_identifier=None,
  204. masked_credentials={},
  205. is_team_authorization=True,
  206. tools=[],
  207. labels=labels or [],
  208. )
  209. if decrypt_credentials:
  210. # init tool configuration
  211. tool_configuration = ProviderConfigEncrypter(
  212. tenant_id=db_provider.tenant_id,
  213. config=[x.to_basic_provider_config() for x in provider_controller.get_credentials_schema()],
  214. provider_type=provider_controller.provider_type.value,
  215. provider_identity=provider_controller.entity.identity.name,
  216. )
  217. # decrypt the credentials and mask the credentials
  218. decrypted_credentials = tool_configuration.decrypt(data=credentials)
  219. masked_credentials = tool_configuration.mask_tool_credentials(data=decrypted_credentials)
  220. result.masked_credentials = masked_credentials
  221. return result
  222. @staticmethod
  223. def convert_tool_entity_to_api_entity(
  224. tool: Union[ApiToolBundle, WorkflowTool, Tool],
  225. tenant_id: str,
  226. credentials: dict | None = None,
  227. labels: list[str] | None = None,
  228. ) -> ToolApiEntity:
  229. """
  230. convert tool to user tool
  231. """
  232. if isinstance(tool, Tool):
  233. # fork tool runtime
  234. tool = tool.fork_tool_runtime(
  235. runtime=ToolRuntime(
  236. credentials=credentials or {},
  237. tenant_id=tenant_id,
  238. )
  239. )
  240. # get tool parameters
  241. parameters = tool.entity.parameters or []
  242. # get tool runtime parameters
  243. runtime_parameters = tool.get_runtime_parameters()
  244. # override parameters
  245. current_parameters = parameters.copy()
  246. for runtime_parameter in runtime_parameters:
  247. found = False
  248. for index, parameter in enumerate(current_parameters):
  249. if parameter.name == runtime_parameter.name and parameter.form == runtime_parameter.form:
  250. current_parameters[index] = runtime_parameter
  251. found = True
  252. break
  253. if not found and runtime_parameter.form == ToolParameter.ToolParameterForm.FORM:
  254. current_parameters.append(runtime_parameter)
  255. return ToolApiEntity(
  256. author=tool.entity.identity.author,
  257. name=tool.entity.identity.name,
  258. label=tool.entity.identity.label,
  259. description=tool.entity.description.human if tool.entity.description else I18nObject(en_US=""),
  260. output_schema=tool.entity.output_schema,
  261. parameters=current_parameters,
  262. labels=labels or [],
  263. )
  264. if isinstance(tool, ApiToolBundle):
  265. return ToolApiEntity(
  266. author=tool.author,
  267. name=tool.operation_id or "",
  268. label=I18nObject(en_US=tool.operation_id, zh_Hans=tool.operation_id),
  269. description=I18nObject(en_US=tool.summary or "", zh_Hans=tool.summary or ""),
  270. parameters=tool.parameters,
  271. labels=labels or [],
  272. )