| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798 | import datetimeimport jsonimport loggingfrom collections.abc import Iteratorfrom json import JSONDecodeErrorfrom typing import Optionalfrom pydantic import BaseModelfrom core.entities.model_entities import ModelStatus, ModelWithProviderEntity, SimpleModelProviderEntityfrom core.entities.provider_entities import CustomConfiguration, SystemConfiguration, SystemConfigurationStatusfrom core.helper import encrypterfrom core.helper.model_provider_cache import ProviderCredentialsCache, ProviderCredentialsCacheTypefrom core.model_runtime.entities.model_entities import FetchFrom, ModelTypefrom core.model_runtime.entities.provider_entities import (    ConfigurateMethod,    CredentialFormSchema,    FormType,    ProviderEntity,)from core.model_runtime.model_providers import model_provider_factoryfrom core.model_runtime.model_providers.__base.ai_model import AIModelfrom core.model_runtime.model_providers.__base.model_provider import ModelProviderfrom extensions.ext_database import dbfrom models.provider import Provider, ProviderModel, ProviderType, TenantPreferredModelProviderlogger = logging.getLogger(__name__)original_provider_configurate_methods = {}class ProviderConfiguration(BaseModel):    """    Model class for provider configuration.    """    tenant_id: str    provider: ProviderEntity    preferred_provider_type: ProviderType    using_provider_type: ProviderType    system_configuration: SystemConfiguration    custom_configuration: CustomConfiguration    def __init__(self, **data):        super().__init__(**data)        if self.provider.provider not in original_provider_configurate_methods:            original_provider_configurate_methods[self.provider.provider] = []            for configurate_method in self.provider.configurate_methods:                original_provider_configurate_methods[self.provider.provider].append(configurate_method)        if original_provider_configurate_methods[self.provider.provider] == [ConfigurateMethod.CUSTOMIZABLE_MODEL]:            if (any([len(quota_configuration.restrict_models) > 0                     for quota_configuration in self.system_configuration.quota_configurations])                    and ConfigurateMethod.PREDEFINED_MODEL not in self.provider.configurate_methods):                self.provider.configurate_methods.append(ConfigurateMethod.PREDEFINED_MODEL)    def get_current_credentials(self, model_type: ModelType, model: str) -> Optional[dict]:        """        Get current credentials.        :param model_type: model type        :param model: model name        :return:        """        if self.using_provider_type == ProviderType.SYSTEM:            restrict_models = []            for quota_configuration in self.system_configuration.quota_configurations:                if self.system_configuration.current_quota_type != quota_configuration.quota_type:                    continue                restrict_models = quota_configuration.restrict_models            copy_credentials = self.system_configuration.credentials.copy()            if restrict_models:                for restrict_model in restrict_models:                    if (restrict_model.model_type == model_type                            and restrict_model.model == model                            and restrict_model.base_model_name):                        copy_credentials['base_model_name'] = restrict_model.base_model_name            return copy_credentials        else:            if self.custom_configuration.models:                for model_configuration in self.custom_configuration.models:                    if model_configuration.model_type == model_type and model_configuration.model == model:                        return model_configuration.credentials            if self.custom_configuration.provider:                return self.custom_configuration.provider.credentials            else:                return None    def get_system_configuration_status(self) -> SystemConfigurationStatus:        """        Get system configuration status.        :return:        """        if self.system_configuration.enabled is False:            return SystemConfigurationStatus.UNSUPPORTED        current_quota_type = self.system_configuration.current_quota_type        current_quota_configuration = next(            (q for q in self.system_configuration.quota_configurations if q.quota_type == current_quota_type),            None        )        return SystemConfigurationStatus.ACTIVE if current_quota_configuration.is_valid else \            SystemConfigurationStatus.QUOTA_EXCEEDED    def is_custom_configuration_available(self) -> bool:        """        Check custom configuration available.        :return:        """        return (self.custom_configuration.provider is not None                or len(self.custom_configuration.models) > 0)    def get_custom_credentials(self, obfuscated: bool = False) -> Optional[dict]:        """        Get custom credentials.        :param obfuscated: obfuscated secret data in credentials        :return:        """        if self.custom_configuration.provider is None:            return None        credentials = self.custom_configuration.provider.credentials        if not obfuscated:            return credentials        # Obfuscate credentials        return self._obfuscated_credentials(            credentials=credentials,            credential_form_schemas=self.provider.provider_credential_schema.credential_form_schemas            if self.provider.provider_credential_schema else []        )    def custom_credentials_validate(self, credentials: dict) -> tuple[Provider, dict]:        """        Validate custom credentials.        :param credentials: provider credentials        :return:        """        # get provider        provider_record = db.session.query(Provider) \            .filter(            Provider.tenant_id == self.tenant_id,            Provider.provider_name == self.provider.provider,            Provider.provider_type == ProviderType.CUSTOM.value        ).first()        # Get provider credential secret variables        provider_credential_secret_variables = self._extract_secret_variables(            self.provider.provider_credential_schema.credential_form_schemas            if self.provider.provider_credential_schema else []        )        if provider_record:            try:                # fix origin data                if provider_record.encrypted_config:                    if not provider_record.encrypted_config.startswith("{"):                        original_credentials = {                            "openai_api_key": provider_record.encrypted_config                        }                    else:                        original_credentials = json.loads(provider_record.encrypted_config)                else:                    original_credentials = {}            except JSONDecodeError:                original_credentials = {}            # encrypt credentials            for key, value in credentials.items():                if key in provider_credential_secret_variables:                    # if send [__HIDDEN__] in secret input, it will be same as original value                    if value == '[__HIDDEN__]' and key in original_credentials:                        credentials[key] = encrypter.decrypt_token(self.tenant_id, original_credentials[key])        credentials = model_provider_factory.provider_credentials_validate(            self.provider.provider,            credentials        )        for key, value in credentials.items():            if key in provider_credential_secret_variables:                credentials[key] = encrypter.encrypt_token(self.tenant_id, value)        return provider_record, credentials    def add_or_update_custom_credentials(self, credentials: dict) -> None:        """        Add or update custom provider credentials.        :param credentials:        :return:        """        # validate custom provider config        provider_record, credentials = self.custom_credentials_validate(credentials)        # save provider        # Note: Do not switch the preferred provider, which allows users to use quotas first        if provider_record:            provider_record.encrypted_config = json.dumps(credentials)            provider_record.is_valid = True            provider_record.updated_at = datetime.datetime.now(datetime.timezone.utc).replace(tzinfo=None)            db.session.commit()        else:            provider_record = Provider(                tenant_id=self.tenant_id,                provider_name=self.provider.provider,                provider_type=ProviderType.CUSTOM.value,                encrypted_config=json.dumps(credentials),                is_valid=True            )            db.session.add(provider_record)            db.session.commit()        provider_model_credentials_cache = ProviderCredentialsCache(            tenant_id=self.tenant_id,            identity_id=provider_record.id,            cache_type=ProviderCredentialsCacheType.PROVIDER        )        provider_model_credentials_cache.delete()        self.switch_preferred_provider_type(ProviderType.CUSTOM)    def delete_custom_credentials(self) -> None:        """        Delete custom provider credentials.        :return:        """        # get provider        provider_record = db.session.query(Provider) \            .filter(            Provider.tenant_id == self.tenant_id,            Provider.provider_name == self.provider.provider,            Provider.provider_type == ProviderType.CUSTOM.value        ).first()        # delete provider        if provider_record:            self.switch_preferred_provider_type(ProviderType.SYSTEM)            db.session.delete(provider_record)            db.session.commit()            provider_model_credentials_cache = ProviderCredentialsCache(                tenant_id=self.tenant_id,                identity_id=provider_record.id,                cache_type=ProviderCredentialsCacheType.PROVIDER            )            provider_model_credentials_cache.delete()    def get_custom_model_credentials(self, model_type: ModelType, model: str, obfuscated: bool = False) \            -> Optional[dict]:        """        Get custom model credentials.        :param model_type: model type        :param model: model name        :param obfuscated: obfuscated secret data in credentials        :return:        """        if not self.custom_configuration.models:            return None        for model_configuration in self.custom_configuration.models:            if model_configuration.model_type == model_type and model_configuration.model == model:                credentials = model_configuration.credentials                if not obfuscated:                    return credentials                # Obfuscate credentials                return self._obfuscated_credentials(                    credentials=credentials,                    credential_form_schemas=self.provider.model_credential_schema.credential_form_schemas                    if self.provider.model_credential_schema else []                )        return None    def custom_model_credentials_validate(self, model_type: ModelType, model: str, credentials: dict) \            -> tuple[ProviderModel, dict]:        """        Validate custom model credentials.        :param model_type: model type        :param model: model name        :param credentials: model credentials        :return:        """        # get provider model        provider_model_record = db.session.query(ProviderModel) \            .filter(            ProviderModel.tenant_id == self.tenant_id,            ProviderModel.provider_name == self.provider.provider,            ProviderModel.model_name == model,            ProviderModel.model_type == model_type.to_origin_model_type()        ).first()        # Get provider credential secret variables        provider_credential_secret_variables = self._extract_secret_variables(            self.provider.model_credential_schema.credential_form_schemas            if self.provider.model_credential_schema else []        )        if provider_model_record:            try:                original_credentials = json.loads(                    provider_model_record.encrypted_config) if provider_model_record.encrypted_config else {}            except JSONDecodeError:                original_credentials = {}            # decrypt credentials            for key, value in credentials.items():                if key in provider_credential_secret_variables:                    # if send [__HIDDEN__] in secret input, it will be same as original value                    if value == '[__HIDDEN__]' and key in original_credentials:                        credentials[key] = encrypter.decrypt_token(self.tenant_id, original_credentials[key])        credentials = model_provider_factory.model_credentials_validate(            provider=self.provider.provider,            model_type=model_type,            model=model,            credentials=credentials        )        for key, value in credentials.items():            if key in provider_credential_secret_variables:                credentials[key] = encrypter.encrypt_token(self.tenant_id, value)        return provider_model_record, credentials    def add_or_update_custom_model_credentials(self, model_type: ModelType, model: str, credentials: dict) -> None:        """        Add or update custom model credentials.        :param model_type: model type        :param model: model name        :param credentials: model credentials        :return:        """        # validate custom model config        provider_model_record, credentials = self.custom_model_credentials_validate(model_type, model, credentials)        # save provider model        # Note: Do not switch the preferred provider, which allows users to use quotas first        if provider_model_record:            provider_model_record.encrypted_config = json.dumps(credentials)            provider_model_record.is_valid = True            provider_model_record.updated_at = datetime.datetime.now(datetime.timezone.utc).replace(tzinfo=None)            db.session.commit()        else:            provider_model_record = ProviderModel(                tenant_id=self.tenant_id,                provider_name=self.provider.provider,                model_name=model,                model_type=model_type.to_origin_model_type(),                encrypted_config=json.dumps(credentials),                is_valid=True            )            db.session.add(provider_model_record)            db.session.commit()        provider_model_credentials_cache = ProviderCredentialsCache(            tenant_id=self.tenant_id,            identity_id=provider_model_record.id,            cache_type=ProviderCredentialsCacheType.MODEL        )        provider_model_credentials_cache.delete()    def delete_custom_model_credentials(self, model_type: ModelType, model: str) -> None:        """        Delete custom model credentials.        :param model_type: model type        :param model: model name        :return:        """        # get provider model        provider_model_record = db.session.query(ProviderModel) \            .filter(            ProviderModel.tenant_id == self.tenant_id,            ProviderModel.provider_name == self.provider.provider,            ProviderModel.model_name == model,            ProviderModel.model_type == model_type.to_origin_model_type()        ).first()        # delete provider model        if provider_model_record:            db.session.delete(provider_model_record)            db.session.commit()            provider_model_credentials_cache = ProviderCredentialsCache(                tenant_id=self.tenant_id,                identity_id=provider_model_record.id,                cache_type=ProviderCredentialsCacheType.MODEL            )            provider_model_credentials_cache.delete()    def get_provider_instance(self) -> ModelProvider:        """        Get provider instance.        :return:        """        return model_provider_factory.get_provider_instance(self.provider.provider)    def get_model_type_instance(self, model_type: ModelType) -> AIModel:        """        Get current model type instance.        :param model_type: model type        :return:        """        # Get provider instance        provider_instance = self.get_provider_instance()        # Get model instance of LLM        return provider_instance.get_model_instance(model_type)    def switch_preferred_provider_type(self, provider_type: ProviderType) -> None:        """        Switch preferred provider type.        :param provider_type:        :return:        """        if provider_type == self.preferred_provider_type:            return        if provider_type == ProviderType.SYSTEM and not self.system_configuration.enabled:            return        # get preferred provider        preferred_model_provider = db.session.query(TenantPreferredModelProvider) \            .filter(            TenantPreferredModelProvider.tenant_id == self.tenant_id,            TenantPreferredModelProvider.provider_name == self.provider.provider        ).first()        if preferred_model_provider:            preferred_model_provider.preferred_provider_type = provider_type.value        else:            preferred_model_provider = TenantPreferredModelProvider(                tenant_id=self.tenant_id,                provider_name=self.provider.provider,                preferred_provider_type=provider_type.value            )            db.session.add(preferred_model_provider)        db.session.commit()    def _extract_secret_variables(self, credential_form_schemas: list[CredentialFormSchema]) -> list[str]:        """        Extract secret input form variables.        :param credential_form_schemas:        :return:        """        secret_input_form_variables = []        for credential_form_schema in credential_form_schemas:            if credential_form_schema.type == FormType.SECRET_INPUT:                secret_input_form_variables.append(credential_form_schema.variable)        return secret_input_form_variables    def _obfuscated_credentials(self, credentials: dict, credential_form_schemas: list[CredentialFormSchema]) -> dict:        """        Obfuscated credentials.        :param credentials: credentials        :param credential_form_schemas: credential form schemas        :return:        """        # Get provider credential secret variables        credential_secret_variables = self._extract_secret_variables(            credential_form_schemas        )        # Obfuscate provider credentials        copy_credentials = credentials.copy()        for key, value in copy_credentials.items():            if key in credential_secret_variables:                copy_credentials[key] = encrypter.obfuscated_token(value)        return copy_credentials    def get_provider_model(self, model_type: ModelType,                           model: str,                           only_active: bool = False) -> Optional[ModelWithProviderEntity]:        """        Get provider model.        :param model_type: model type        :param model: model name        :param only_active: return active model only        :return:        """        provider_models = self.get_provider_models(model_type, only_active)        for provider_model in provider_models:            if provider_model.model == model:                return provider_model        return None    def get_provider_models(self, model_type: Optional[ModelType] = None,                            only_active: bool = False) -> list[ModelWithProviderEntity]:        """        Get provider models.        :param model_type: model type        :param only_active: only active models        :return:        """        provider_instance = self.get_provider_instance()        model_types = []        if model_type:            model_types.append(model_type)        else:            model_types = provider_instance.get_provider_schema().supported_model_types        if self.using_provider_type == ProviderType.SYSTEM:            provider_models = self._get_system_provider_models(                model_types=model_types,                provider_instance=provider_instance            )        else:            provider_models = self._get_custom_provider_models(                model_types=model_types,                provider_instance=provider_instance            )        if only_active:            provider_models = [m for m in provider_models if m.status == ModelStatus.ACTIVE]        # resort provider_models        return sorted(provider_models, key=lambda x: x.model_type.value)    def _get_system_provider_models(self,                                    model_types: list[ModelType],                                    provider_instance: ModelProvider) -> list[ModelWithProviderEntity]:        """        Get system provider models.        :param model_types: model types        :param provider_instance: provider instance        :return:        """        provider_models = []        for model_type in model_types:            provider_models.extend(                [                    ModelWithProviderEntity(                        model=m.model,                        label=m.label,                        model_type=m.model_type,                        features=m.features,                        fetch_from=m.fetch_from,                        model_properties=m.model_properties,                        deprecated=m.deprecated,                        provider=SimpleModelProviderEntity(self.provider),                        status=ModelStatus.ACTIVE                    )                    for m in provider_instance.models(model_type)                ]            )        if self.provider.provider not in original_provider_configurate_methods:            original_provider_configurate_methods[self.provider.provider] = []            for configurate_method in provider_instance.get_provider_schema().configurate_methods:                original_provider_configurate_methods[self.provider.provider].append(configurate_method)        should_use_custom_model = False        if original_provider_configurate_methods[self.provider.provider] == [ConfigurateMethod.CUSTOMIZABLE_MODEL]:            should_use_custom_model = True        for quota_configuration in self.system_configuration.quota_configurations:            if self.system_configuration.current_quota_type != quota_configuration.quota_type:                continue            restrict_models = quota_configuration.restrict_models            if len(restrict_models) == 0:                break            if should_use_custom_model:                if original_provider_configurate_methods[self.provider.provider] == [ConfigurateMethod.CUSTOMIZABLE_MODEL]:                    # only customizable model                    for restrict_model in restrict_models:                        copy_credentials = self.system_configuration.credentials.copy()                        if restrict_model.base_model_name:                            copy_credentials['base_model_name'] = restrict_model.base_model_name                        try:                            custom_model_schema = (                                provider_instance.get_model_instance(restrict_model.model_type)                                .get_customizable_model_schema_from_credentials(                                    restrict_model.model,                                    copy_credentials                                )                            )                        except Exception as ex:                            logger.warning(f'get custom model schema failed, {ex}')                            continue                        if not custom_model_schema:                            continue                        if custom_model_schema.model_type not in model_types:                            continue                        provider_models.append(                            ModelWithProviderEntity(                                model=custom_model_schema.model,                                label=custom_model_schema.label,                                model_type=custom_model_schema.model_type,                                features=custom_model_schema.features,                                fetch_from=FetchFrom.PREDEFINED_MODEL,                                model_properties=custom_model_schema.model_properties,                                deprecated=custom_model_schema.deprecated,                                provider=SimpleModelProviderEntity(self.provider),                                status=ModelStatus.ACTIVE                            )                        )            # if llm name not in restricted llm list, remove it            restrict_model_names = [rm.model for rm in restrict_models]            for m in provider_models:                if m.model_type == ModelType.LLM and m.model not in restrict_model_names:                    m.status = ModelStatus.NO_PERMISSION                elif not quota_configuration.is_valid:                    m.status = ModelStatus.QUOTA_EXCEEDED        return provider_models    def _get_custom_provider_models(self,                                    model_types: list[ModelType],                                    provider_instance: ModelProvider) -> list[ModelWithProviderEntity]:        """        Get custom provider models.        :param model_types: model types        :param provider_instance: provider instance        :return:        """        provider_models = []        credentials = None        if self.custom_configuration.provider:            credentials = self.custom_configuration.provider.credentials        for model_type in model_types:            if model_type not in self.provider.supported_model_types:                continue            models = provider_instance.models(model_type)            for m in models:                provider_models.append(                    ModelWithProviderEntity(                        model=m.model,                        label=m.label,                        model_type=m.model_type,                        features=m.features,                        fetch_from=m.fetch_from,                        model_properties=m.model_properties,                        deprecated=m.deprecated,                        provider=SimpleModelProviderEntity(self.provider),                        status=ModelStatus.ACTIVE if credentials else ModelStatus.NO_CONFIGURE                    )                )        # custom models        for model_configuration in self.custom_configuration.models:            if model_configuration.model_type not in model_types:                continue            try:                custom_model_schema = (                    provider_instance.get_model_instance(model_configuration.model_type)                    .get_customizable_model_schema_from_credentials(                        model_configuration.model,                        model_configuration.credentials                    )                )            except Exception as ex:                logger.warning(f'get custom model schema failed, {ex}')                continue            if not custom_model_schema:                continue            provider_models.append(                ModelWithProviderEntity(                    model=custom_model_schema.model,                    label=custom_model_schema.label,                    model_type=custom_model_schema.model_type,                    features=custom_model_schema.features,                    fetch_from=custom_model_schema.fetch_from,                    model_properties=custom_model_schema.model_properties,                    deprecated=custom_model_schema.deprecated,                    provider=SimpleModelProviderEntity(self.provider),                    status=ModelStatus.ACTIVE                )            )        return provider_modelsclass ProviderConfigurations(BaseModel):    """    Model class for provider configuration dict.    """    tenant_id: str    configurations: dict[str, ProviderConfiguration] = {}    def __init__(self, tenant_id: str):        super().__init__(tenant_id=tenant_id)    def get_models(self,                   provider: Optional[str] = None,                   model_type: Optional[ModelType] = None,                   only_active: bool = False) \            -> list[ModelWithProviderEntity]:        """        Get available models.        If preferred provider type is `system`:          Get the current **system mode** if provider supported,          if all system modes are not available (no quota), it is considered to be the **custom credential mode**.          If there is no model configured in custom mode, it is treated as no_configure.        system > custom > no_configure        If preferred provider type is `custom`:          If custom credentials are configured, it is treated as custom mode.          Otherwise, get the current **system mode** if supported,          If all system modes are not available (no quota), it is treated as no_configure.        custom > system > no_configure        If real mode is `system`, use system credentials to get models,          paid quotas > provider free quotas > system free quotas          include pre-defined models (exclude GPT-4, status marked as `no_permission`).        If real mode is `custom`, use workspace custom credentials to get models,          include pre-defined models, custom models(manual append).        If real mode is `no_configure`, only return pre-defined models from `model runtime`.          (model status marked as `no_configure` if preferred provider type is `custom` otherwise `quota_exceeded`)        model status marked as `active` is available.        :param provider: provider name        :param model_type: model type        :param only_active: only active models        :return:        """        all_models = []        for provider_configuration in self.values():            if provider and provider_configuration.provider.provider != provider:                continue            all_models.extend(provider_configuration.get_provider_models(model_type, only_active))        return all_models    def to_list(self) -> list[ProviderConfiguration]:        """        Convert to list.        :return:        """        return list(self.values())    def __getitem__(self, key):        return self.configurations[key]    def __setitem__(self, key, value):        self.configurations[key] = value    def __iter__(self):        return iter(self.configurations)    def values(self) -> Iterator[ProviderConfiguration]:        return self.configurations.values()    def get(self, key, default=None):        return self.configurations.get(key, default)class ProviderModelBundle(BaseModel):    """    Provider model bundle.    """    configuration: ProviderConfiguration    provider_instance: ModelProvider    model_type_instance: AIModel    class Config:        """Configuration for this pydantic object."""        arbitrary_types_allowed = True
 |