builtin_tool_provider.py 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306
  1. from abc import abstractmethod
  2. from os import listdir, path
  3. from typing import Any
  4. from yaml import FullLoader, load
  5. from core.tools.entities.tool_entities import ToolParameter, ToolProviderCredentials, ToolProviderType
  6. from core.tools.entities.user_entities import UserToolProviderCredentials
  7. from core.tools.errors import (
  8. ToolNotFoundError,
  9. ToolParameterValidationError,
  10. ToolProviderCredentialValidationError,
  11. ToolProviderNotFoundError,
  12. )
  13. from core.tools.provider.tool_provider import ToolProviderController
  14. from core.tools.tool.builtin_tool import BuiltinTool
  15. from core.tools.tool.tool import Tool
  16. from core.utils.module_import_helper import load_single_subclass_from_source
  17. class BuiltinToolProviderController(ToolProviderController):
  18. def __init__(self, **data: Any) -> None:
  19. if self.app_type == ToolProviderType.API_BASED or self.app_type == ToolProviderType.APP_BASED:
  20. super().__init__(**data)
  21. return
  22. # load provider yaml
  23. provider = self.__class__.__module__.split('.')[-1]
  24. yaml_path = path.join(path.dirname(path.realpath(__file__)), 'builtin', provider, f'{provider}.yaml')
  25. try:
  26. with open(yaml_path, 'rb') as f:
  27. provider_yaml = load(f.read(), FullLoader)
  28. except:
  29. raise ToolProviderNotFoundError(f'can not load provider yaml for {provider}')
  30. if 'credentials_for_provider' in provider_yaml and provider_yaml['credentials_for_provider'] is not None:
  31. # set credentials name
  32. for credential_name in provider_yaml['credentials_for_provider']:
  33. provider_yaml['credentials_for_provider'][credential_name]['name'] = credential_name
  34. super().__init__(**{
  35. 'identity': provider_yaml['identity'],
  36. 'credentials_schema': provider_yaml['credentials_for_provider'] if 'credentials_for_provider' in provider_yaml else None,
  37. })
  38. def _get_builtin_tools(self) -> list[Tool]:
  39. """
  40. returns a list of tools that the provider can provide
  41. :return: list of tools
  42. """
  43. if self.tools:
  44. return self.tools
  45. provider = self.identity.name
  46. tool_path = path.join(path.dirname(path.realpath(__file__)), "builtin", provider, "tools")
  47. # get all the yaml files in the tool path
  48. tool_files = list(filter(lambda x: x.endswith(".yaml") and not x.startswith("__"), listdir(tool_path)))
  49. tools = []
  50. for tool_file in tool_files:
  51. with open(path.join(tool_path, tool_file), encoding='utf-8') as f:
  52. # get tool name
  53. tool_name = tool_file.split(".")[0]
  54. tool = load(f.read(), FullLoader)
  55. # get tool class, import the module
  56. assistant_tool_class = load_single_subclass_from_source(
  57. module_name=f'core.tools.provider.builtin.{provider}.tools.{tool_name}',
  58. script_path=path.join(path.dirname(path.realpath(__file__)),
  59. 'builtin', provider, 'tools', f'{tool_name}.py'),
  60. parent_type=BuiltinTool)
  61. tool["identity"]["provider"] = provider
  62. tools.append(assistant_tool_class(**tool))
  63. self.tools = tools
  64. return tools
  65. def get_credentials_schema(self) -> dict[str, ToolProviderCredentials]:
  66. """
  67. returns the credentials schema of the provider
  68. :return: the credentials schema
  69. """
  70. if not self.credentials_schema:
  71. return {}
  72. return self.credentials_schema.copy()
  73. def user_get_credentials_schema(self) -> UserToolProviderCredentials:
  74. """
  75. returns the credentials schema of the provider, this method is used for user
  76. :return: the credentials schema
  77. """
  78. credentials = self.credentials_schema.copy()
  79. return UserToolProviderCredentials(credentials=credentials)
  80. def get_tools(self) -> list[Tool]:
  81. """
  82. returns a list of tools that the provider can provide
  83. :return: list of tools
  84. """
  85. return self._get_builtin_tools()
  86. def get_tool(self, tool_name: str) -> Tool:
  87. """
  88. returns the tool that the provider can provide
  89. """
  90. return next(filter(lambda x: x.identity.name == tool_name, self.get_tools()), None)
  91. def get_parameters(self, tool_name: str) -> list[ToolParameter]:
  92. """
  93. returns the parameters of the tool
  94. :param tool_name: the name of the tool, defined in `get_tools`
  95. :return: list of parameters
  96. """
  97. tool = next(filter(lambda x: x.identity.name == tool_name, self.get_tools()), None)
  98. if tool is None:
  99. raise ToolNotFoundError(f'tool {tool_name} not found')
  100. return tool.parameters
  101. @property
  102. def need_credentials(self) -> bool:
  103. """
  104. returns whether the provider needs credentials
  105. :return: whether the provider needs credentials
  106. """
  107. return self.credentials_schema is not None and \
  108. len(self.credentials_schema) != 0
  109. @property
  110. def app_type(self) -> ToolProviderType:
  111. """
  112. returns the type of the provider
  113. :return: type of the provider
  114. """
  115. return ToolProviderType.BUILT_IN
  116. def validate_parameters(self, tool_id: int, tool_name: str, tool_parameters: dict[str, Any]) -> None:
  117. """
  118. validate the parameters of the tool and set the default value if needed
  119. :param tool_name: the name of the tool, defined in `get_tools`
  120. :param tool_parameters: the parameters of the tool
  121. """
  122. tool_parameters_schema = self.get_parameters(tool_name)
  123. tool_parameters_need_to_validate: dict[str, ToolParameter] = {}
  124. for parameter in tool_parameters_schema:
  125. tool_parameters_need_to_validate[parameter.name] = parameter
  126. for parameter in tool_parameters:
  127. if parameter not in tool_parameters_need_to_validate:
  128. raise ToolParameterValidationError(f'parameter {parameter} not found in tool {tool_name}')
  129. # check type
  130. parameter_schema = tool_parameters_need_to_validate[parameter]
  131. if parameter_schema.type == ToolParameter.ToolParameterType.STRING:
  132. if not isinstance(tool_parameters[parameter], str):
  133. raise ToolParameterValidationError(f'parameter {parameter} should be string')
  134. elif parameter_schema.type == ToolParameter.ToolParameterType.NUMBER:
  135. if not isinstance(tool_parameters[parameter], int | float):
  136. raise ToolParameterValidationError(f'parameter {parameter} should be number')
  137. if parameter_schema.min is not None and tool_parameters[parameter] < parameter_schema.min:
  138. raise ToolParameterValidationError(f'parameter {parameter} should be greater than {parameter_schema.min}')
  139. if parameter_schema.max is not None and tool_parameters[parameter] > parameter_schema.max:
  140. raise ToolParameterValidationError(f'parameter {parameter} should be less than {parameter_schema.max}')
  141. elif parameter_schema.type == ToolParameter.ToolParameterType.BOOLEAN:
  142. if not isinstance(tool_parameters[parameter], bool):
  143. raise ToolParameterValidationError(f'parameter {parameter} should be boolean')
  144. elif parameter_schema.type == ToolParameter.ToolParameterType.SELECT:
  145. if not isinstance(tool_parameters[parameter], str):
  146. raise ToolParameterValidationError(f'parameter {parameter} should be string')
  147. options = parameter_schema.options
  148. if not isinstance(options, list):
  149. raise ToolParameterValidationError(f'parameter {parameter} options should be list')
  150. if tool_parameters[parameter] not in [x.value for x in options]:
  151. raise ToolParameterValidationError(f'parameter {parameter} should be one of {options}')
  152. tool_parameters_need_to_validate.pop(parameter)
  153. for parameter in tool_parameters_need_to_validate:
  154. parameter_schema = tool_parameters_need_to_validate[parameter]
  155. if parameter_schema.required:
  156. raise ToolParameterValidationError(f'parameter {parameter} is required')
  157. # the parameter is not set currently, set the default value if needed
  158. if parameter_schema.default is not None:
  159. default_value = parameter_schema.default
  160. # parse default value into the correct type
  161. if parameter_schema.type == ToolParameter.ToolParameterType.STRING or \
  162. parameter_schema.type == ToolParameter.ToolParameterType.SELECT:
  163. default_value = str(default_value)
  164. elif parameter_schema.type == ToolParameter.ToolParameterType.NUMBER:
  165. default_value = float(default_value)
  166. elif parameter_schema.type == ToolParameter.ToolParameterType.BOOLEAN:
  167. default_value = bool(default_value)
  168. tool_parameters[parameter] = default_value
  169. def validate_credentials_format(self, credentials: dict[str, Any]) -> None:
  170. """
  171. validate the format of the credentials of the provider and set the default value if needed
  172. :param credentials: the credentials of the tool
  173. """
  174. credentials_schema = self.credentials_schema
  175. if credentials_schema is None:
  176. return
  177. credentials_need_to_validate: dict[str, ToolProviderCredentials] = {}
  178. for credential_name in credentials_schema:
  179. credentials_need_to_validate[credential_name] = credentials_schema[credential_name]
  180. for credential_name in credentials:
  181. if credential_name not in credentials_need_to_validate:
  182. raise ToolProviderCredentialValidationError(f'credential {credential_name} not found in provider {self.identity.name}')
  183. # check type
  184. credential_schema = credentials_need_to_validate[credential_name]
  185. if credential_schema == ToolProviderCredentials.CredentialsType.SECRET_INPUT or \
  186. credential_schema == ToolProviderCredentials.CredentialsType.TEXT_INPUT:
  187. if not isinstance(credentials[credential_name], str):
  188. raise ToolProviderCredentialValidationError(f'credential {credential_schema.label.en_US} should be string')
  189. elif credential_schema.type == ToolProviderCredentials.CredentialsType.SELECT:
  190. if not isinstance(credentials[credential_name], str):
  191. raise ToolProviderCredentialValidationError(f'credential {credential_schema.label.en_US} should be string')
  192. options = credential_schema.options
  193. if not isinstance(options, list):
  194. raise ToolProviderCredentialValidationError(f'credential {credential_schema.label.en_US} options should be list')
  195. if credentials[credential_name] not in [x.value for x in options]:
  196. raise ToolProviderCredentialValidationError(f'credential {credential_schema.label.en_US} should be one of {options}')
  197. elif credential_schema.type == ToolProviderCredentials.CredentialsType.BOOLEAN:
  198. if isinstance(credentials[credential_name], bool):
  199. pass
  200. elif isinstance(credentials[credential_name], str):
  201. if credentials[credential_name].lower() == 'true':
  202. credentials[credential_name] = True
  203. elif credentials[credential_name].lower() == 'false':
  204. credentials[credential_name] = False
  205. else:
  206. raise ToolProviderCredentialValidationError(f'credential {credential_schema.label.en_US} should be boolean')
  207. elif isinstance(credentials[credential_name], int):
  208. if credentials[credential_name] == 1:
  209. credentials[credential_name] = True
  210. elif credentials[credential_name] == 0:
  211. credentials[credential_name] = False
  212. else:
  213. raise ToolProviderCredentialValidationError(f'credential {credential_schema.label.en_US} should be boolean')
  214. else:
  215. raise ToolProviderCredentialValidationError(f'credential {credential_schema.label.en_US} should be boolean')
  216. if credentials[credential_name] or credentials[credential_name] == False:
  217. credentials_need_to_validate.pop(credential_name)
  218. for credential_name in credentials_need_to_validate:
  219. credential_schema = credentials_need_to_validate[credential_name]
  220. if credential_schema.required:
  221. raise ToolProviderCredentialValidationError(f'credential {credential_schema.label.en_US} is required')
  222. # the credential is not set currently, set the default value if needed
  223. if credential_schema.default is not None:
  224. default_value = credential_schema.default
  225. # parse default value into the correct type
  226. if credential_schema.type == ToolProviderCredentials.CredentialsType.SECRET_INPUT or \
  227. credential_schema.type == ToolProviderCredentials.CredentialsType.TEXT_INPUT or \
  228. credential_schema.type == ToolProviderCredentials.CredentialsType.SELECT:
  229. default_value = str(default_value)
  230. credentials[credential_name] = default_value
  231. def validate_credentials(self, credentials: dict[str, Any]) -> None:
  232. """
  233. validate the credentials of the provider
  234. :param tool_name: the name of the tool, defined in `get_tools`
  235. :param credentials: the credentials of the tool
  236. """
  237. # validate credentials format
  238. self.validate_credentials_format(credentials)
  239. # validate credentials
  240. self._validate_credentials(credentials)
  241. @abstractmethod
  242. def _validate_credentials(self, credentials: dict[str, Any]) -> None:
  243. """
  244. validate the credentials of the provider
  245. :param tool_name: the name of the tool, defined in `get_tools`
  246. :param credentials: the credentials of the tool
  247. """
  248. pass