ops_service.py 5.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139
  1. from core.ops.ops_trace_manager import OpsTraceManager, provider_config_map
  2. from extensions.ext_database import db
  3. from models.model import App, TraceAppConfig
  4. class OpsService:
  5. @classmethod
  6. def get_tracing_app_config(cls, app_id: str, tracing_provider: str):
  7. """
  8. Get tracing app config
  9. :param app_id: app id
  10. :param tracing_provider: tracing provider
  11. :return:
  12. """
  13. trace_config_data: TraceAppConfig = db.session.query(TraceAppConfig).filter(
  14. TraceAppConfig.app_id == app_id, TraceAppConfig.tracing_provider == tracing_provider
  15. ).first()
  16. if not trace_config_data:
  17. return None
  18. # decrypt_token and obfuscated_token
  19. tenant_id = db.session.query(App).filter(App.id == app_id).first().tenant_id
  20. decrypt_tracing_config = OpsTraceManager.decrypt_tracing_config(tenant_id, tracing_provider, trace_config_data.tracing_config)
  21. if tracing_provider == 'langfuse' and ('project_key' not in decrypt_tracing_config or not decrypt_tracing_config.get('project_key')):
  22. project_key = OpsTraceManager.get_trace_config_project_key(decrypt_tracing_config, tracing_provider)
  23. decrypt_tracing_config['project_key'] = project_key
  24. decrypt_tracing_config = OpsTraceManager.obfuscated_decrypt_token(tracing_provider, decrypt_tracing_config)
  25. trace_config_data.tracing_config = decrypt_tracing_config
  26. return trace_config_data.to_dict()
  27. @classmethod
  28. def create_tracing_app_config(cls, app_id: str, tracing_provider: str, tracing_config: dict):
  29. """
  30. Create tracing app config
  31. :param app_id: app id
  32. :param tracing_provider: tracing provider
  33. :param tracing_config: tracing config
  34. :return:
  35. """
  36. if tracing_provider not in provider_config_map.keys() and tracing_provider:
  37. return {"error": f"Invalid tracing provider: {tracing_provider}"}
  38. config_class, other_keys = provider_config_map[tracing_provider]['config_class'], \
  39. provider_config_map[tracing_provider]['other_keys']
  40. default_config_instance = config_class(**tracing_config)
  41. for key in other_keys:
  42. if key in tracing_config and tracing_config[key] == "":
  43. tracing_config[key] = getattr(default_config_instance, key, None)
  44. # api check
  45. if not OpsTraceManager.check_trace_config_is_effective(tracing_config, tracing_provider):
  46. return {"error": "Invalid Credentials"}
  47. # get project key
  48. project_key = OpsTraceManager.get_trace_config_project_key(tracing_config, tracing_provider)
  49. # check if trace config already exists
  50. trace_config_data: TraceAppConfig = db.session.query(TraceAppConfig).filter(
  51. TraceAppConfig.app_id == app_id, TraceAppConfig.tracing_provider == tracing_provider
  52. ).first()
  53. if trace_config_data:
  54. return None
  55. # get tenant id
  56. tenant_id = db.session.query(App).filter(App.id == app_id).first().tenant_id
  57. tracing_config = OpsTraceManager.encrypt_tracing_config(tenant_id, tracing_provider, tracing_config)
  58. if tracing_provider == 'langfuse':
  59. tracing_config['project_key'] = project_key
  60. trace_config_data = TraceAppConfig(
  61. app_id=app_id,
  62. tracing_provider=tracing_provider,
  63. tracing_config=tracing_config,
  64. )
  65. db.session.add(trace_config_data)
  66. db.session.commit()
  67. return {"result": "success"}
  68. @classmethod
  69. def update_tracing_app_config(cls, app_id: str, tracing_provider: str, tracing_config: dict):
  70. """
  71. Update tracing app config
  72. :param app_id: app id
  73. :param tracing_provider: tracing provider
  74. :param tracing_config: tracing config
  75. :return:
  76. """
  77. if tracing_provider not in provider_config_map.keys():
  78. raise ValueError(f"Invalid tracing provider: {tracing_provider}")
  79. # check if trace config already exists
  80. current_trace_config = db.session.query(TraceAppConfig).filter(
  81. TraceAppConfig.app_id == app_id, TraceAppConfig.tracing_provider == tracing_provider
  82. ).first()
  83. if not current_trace_config:
  84. return None
  85. # get tenant id
  86. tenant_id = db.session.query(App).filter(App.id == app_id).first().tenant_id
  87. tracing_config = OpsTraceManager.encrypt_tracing_config(
  88. tenant_id, tracing_provider, tracing_config, current_trace_config.tracing_config
  89. )
  90. # api check
  91. # decrypt_token
  92. decrypt_tracing_config = OpsTraceManager.decrypt_tracing_config(tenant_id, tracing_provider, tracing_config)
  93. if not OpsTraceManager.check_trace_config_is_effective(decrypt_tracing_config, tracing_provider):
  94. raise ValueError("Invalid Credentials")
  95. current_trace_config.tracing_config = tracing_config
  96. db.session.commit()
  97. return current_trace_config.to_dict()
  98. @classmethod
  99. def delete_tracing_app_config(cls, app_id: str, tracing_provider: str):
  100. """
  101. Delete tracing app config
  102. :param app_id: app id
  103. :param tracing_provider: tracing provider
  104. :return:
  105. """
  106. trace_config = db.session.query(TraceAppConfig).filter(
  107. TraceAppConfig.app_id == app_id, TraceAppConfig.tracing_provider == tracing_provider
  108. ).first()
  109. if not trace_config:
  110. return None
  111. db.session.delete(trace_config)
  112. db.session.commit()
  113. return True