wenxin_provider.py 6.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187
  1. import json
  2. from json import JSONDecodeError
  3. from typing import Type
  4. from core.helper import encrypter
  5. from core.model_providers.models.base import BaseProviderModel
  6. from core.model_providers.models.entity.model_params import ModelKwargsRules, KwargRule, ModelType
  7. from core.model_providers.models.llm.wenxin_model import WenxinModel
  8. from core.model_providers.providers.base import BaseModelProvider, CredentialsValidateFailedError
  9. from core.third_party.langchain.llms.wenxin import Wenxin
  10. from models.provider import ProviderType
  11. class WenxinProvider(BaseModelProvider):
  12. @property
  13. def provider_name(self):
  14. """
  15. Returns the name of a provider.
  16. """
  17. return 'wenxin'
  18. def _get_fixed_model_list(self, model_type: ModelType) -> list[dict]:
  19. if model_type == ModelType.TEXT_GENERATION:
  20. return [
  21. {
  22. 'id': 'ernie-bot',
  23. 'name': 'ERNIE-Bot',
  24. },
  25. {
  26. 'id': 'ernie-bot-turbo',
  27. 'name': 'ERNIE-Bot-turbo',
  28. },
  29. {
  30. 'id': 'bloomz-7b',
  31. 'name': 'BLOOMZ-7B',
  32. }
  33. ]
  34. else:
  35. return []
  36. def get_model_class(self, model_type: ModelType) -> Type[BaseProviderModel]:
  37. """
  38. Returns the model class.
  39. :param model_type:
  40. :return:
  41. """
  42. if model_type == ModelType.TEXT_GENERATION:
  43. model_class = WenxinModel
  44. else:
  45. raise NotImplementedError
  46. return model_class
  47. def get_model_parameter_rules(self, model_name: str, model_type: ModelType) -> ModelKwargsRules:
  48. """
  49. get model parameter rules.
  50. :param model_name:
  51. :param model_type:
  52. :return:
  53. """
  54. model_max_tokens = {
  55. 'ernie-bot': 4800,
  56. 'ernie-bot-turbo': 11200,
  57. }
  58. if model_name in ['ernie-bot', 'ernie-bot-turbo']:
  59. return ModelKwargsRules(
  60. temperature=KwargRule[float](min=0.01, max=1, default=0.95, precision=2),
  61. top_p=KwargRule[float](min=0.01, max=1, default=0.8, precision=2),
  62. presence_penalty=KwargRule[float](enabled=False),
  63. frequency_penalty=KwargRule[float](enabled=False),
  64. max_tokens=KwargRule[int](enabled=False, max=model_max_tokens.get(model_name)),
  65. )
  66. else:
  67. return ModelKwargsRules(
  68. temperature=KwargRule[float](enabled=False),
  69. top_p=KwargRule[float](enabled=False),
  70. presence_penalty=KwargRule[float](enabled=False),
  71. frequency_penalty=KwargRule[float](enabled=False),
  72. max_tokens=KwargRule[int](enabled=False),
  73. )
  74. @classmethod
  75. def is_provider_credentials_valid_or_raise(cls, credentials: dict):
  76. """
  77. Validates the given credentials.
  78. """
  79. if 'api_key' not in credentials:
  80. raise CredentialsValidateFailedError('Wenxin api_key must be provided.')
  81. if 'secret_key' not in credentials:
  82. raise CredentialsValidateFailedError('Wenxin secret_key must be provided.')
  83. try:
  84. credential_kwargs = {
  85. 'api_key': credentials['api_key'],
  86. 'secret_key': credentials['secret_key'],
  87. }
  88. llm = Wenxin(
  89. temperature=0.01,
  90. **credential_kwargs
  91. )
  92. llm("ping")
  93. except Exception as ex:
  94. raise CredentialsValidateFailedError(str(ex))
  95. @classmethod
  96. def encrypt_provider_credentials(cls, tenant_id: str, credentials: dict) -> dict:
  97. credentials['api_key'] = encrypter.encrypt_token(tenant_id, credentials['api_key'])
  98. credentials['secret_key'] = encrypter.encrypt_token(tenant_id, credentials['secret_key'])
  99. return credentials
  100. def get_provider_credentials(self, obfuscated: bool = False) -> dict:
  101. if self.provider.provider_type == ProviderType.CUSTOM.value:
  102. try:
  103. credentials = json.loads(self.provider.encrypted_config)
  104. except JSONDecodeError:
  105. credentials = {
  106. 'api_key': None,
  107. 'secret_key': None,
  108. }
  109. if credentials['api_key']:
  110. credentials['api_key'] = encrypter.decrypt_token(
  111. self.provider.tenant_id,
  112. credentials['api_key']
  113. )
  114. if obfuscated:
  115. credentials['api_key'] = encrypter.obfuscated_token(credentials['api_key'])
  116. if credentials['secret_key']:
  117. credentials['secret_key'] = encrypter.decrypt_token(
  118. self.provider.tenant_id,
  119. credentials['secret_key']
  120. )
  121. if obfuscated:
  122. credentials['secret_key'] = encrypter.obfuscated_token(credentials['secret_key'])
  123. return credentials
  124. else:
  125. return {
  126. 'api_key': None,
  127. 'secret_key': None,
  128. }
  129. @classmethod
  130. def is_model_credentials_valid_or_raise(cls, model_name: str, model_type: ModelType, credentials: dict):
  131. """
  132. check model credentials valid.
  133. :param model_name:
  134. :param model_type:
  135. :param credentials:
  136. """
  137. return
  138. @classmethod
  139. def encrypt_model_credentials(cls, tenant_id: str, model_name: str, model_type: ModelType,
  140. credentials: dict) -> dict:
  141. """
  142. encrypt model credentials for save.
  143. :param tenant_id:
  144. :param model_name:
  145. :param model_type:
  146. :param credentials:
  147. :return:
  148. """
  149. return {}
  150. def get_model_credentials(self, model_name: str, model_type: ModelType, obfuscated: bool = False) -> dict:
  151. """
  152. get credentials for llm use.
  153. :param model_name:
  154. :param model_type:
  155. :param obfuscated:
  156. :return:
  157. """
  158. return self.get_provider_credentials(obfuscated)