openllm_provider.py 4.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138
  1. import json
  2. from typing import Type
  3. from core.helper import encrypter
  4. from core.model_providers.models.entity.model_params import KwargRule, ModelKwargsRules, ModelType
  5. from core.model_providers.models.llm.openllm_model import OpenLLMModel
  6. from core.model_providers.providers.base import BaseModelProvider, CredentialsValidateFailedError
  7. from core.model_providers.models.base import BaseProviderModel
  8. from core.third_party.langchain.llms.openllm import OpenLLM
  9. from models.provider import ProviderType
  10. class OpenLLMProvider(BaseModelProvider):
  11. @property
  12. def provider_name(self):
  13. """
  14. Returns the name of a provider.
  15. """
  16. return 'openllm'
  17. def _get_fixed_model_list(self, model_type: ModelType) -> list[dict]:
  18. return []
  19. def get_model_class(self, model_type: ModelType) -> Type[BaseProviderModel]:
  20. """
  21. Returns the model class.
  22. :param model_type:
  23. :return:
  24. """
  25. if model_type == ModelType.TEXT_GENERATION:
  26. model_class = OpenLLMModel
  27. else:
  28. raise NotImplementedError
  29. return model_class
  30. def get_model_parameter_rules(self, model_name: str, model_type: ModelType) -> ModelKwargsRules:
  31. """
  32. get model parameter rules.
  33. :param model_name:
  34. :param model_type:
  35. :return:
  36. """
  37. return ModelKwargsRules(
  38. temperature=KwargRule[float](min=0.01, max=2, default=1, precision=2),
  39. top_p=KwargRule[float](min=0, max=1, default=0.7, precision=2),
  40. presence_penalty=KwargRule[float](min=-2, max=2, default=0, precision=2),
  41. frequency_penalty=KwargRule[float](min=-2, max=2, default=0, precision=2),
  42. max_tokens=KwargRule[int](alias='max_new_tokens', min=10, max=4000, default=128, precision=0),
  43. )
  44. @classmethod
  45. def is_model_credentials_valid_or_raise(cls, model_name: str, model_type: ModelType, credentials: dict):
  46. """
  47. check model credentials valid.
  48. :param model_name:
  49. :param model_type:
  50. :param credentials:
  51. """
  52. if 'server_url' not in credentials:
  53. raise CredentialsValidateFailedError('OpenLLM Server URL must be provided.')
  54. try:
  55. credential_kwargs = {
  56. 'server_url': credentials['server_url']
  57. }
  58. llm = OpenLLM(
  59. llm_kwargs={
  60. 'max_new_tokens': 10
  61. },
  62. **credential_kwargs
  63. )
  64. llm("ping")
  65. except Exception as ex:
  66. raise CredentialsValidateFailedError(str(ex))
  67. @classmethod
  68. def encrypt_model_credentials(cls, tenant_id: str, model_name: str, model_type: ModelType,
  69. credentials: dict) -> dict:
  70. """
  71. encrypt model credentials for save.
  72. :param tenant_id:
  73. :param model_name:
  74. :param model_type:
  75. :param credentials:
  76. :return:
  77. """
  78. credentials['server_url'] = encrypter.encrypt_token(tenant_id, credentials['server_url'])
  79. return credentials
  80. def get_model_credentials(self, model_name: str, model_type: ModelType, obfuscated: bool = False) -> dict:
  81. """
  82. get credentials for llm use.
  83. :param model_name:
  84. :param model_type:
  85. :param obfuscated:
  86. :return:
  87. """
  88. if self.provider.provider_type != ProviderType.CUSTOM.value:
  89. raise NotImplementedError
  90. provider_model = self._get_provider_model(model_name, model_type)
  91. if not provider_model.encrypted_config:
  92. return {
  93. 'server_url': None
  94. }
  95. credentials = json.loads(provider_model.encrypted_config)
  96. if credentials['server_url']:
  97. credentials['server_url'] = encrypter.decrypt_token(
  98. self.provider.tenant_id,
  99. credentials['server_url']
  100. )
  101. if obfuscated:
  102. credentials['server_url'] = encrypter.obfuscated_token(credentials['server_url'])
  103. return credentials
  104. @classmethod
  105. def is_provider_credentials_valid_or_raise(cls, credentials: dict):
  106. return
  107. @classmethod
  108. def encrypt_provider_credentials(cls, tenant_id: str, credentials: dict) -> dict:
  109. return {}
  110. def get_provider_credentials(self, obfuscated: bool = False) -> dict:
  111. return {}