spark_provider.py 6.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194
  1. import json
  2. import logging
  3. from json import JSONDecodeError
  4. from typing import Type
  5. from langchain.schema import HumanMessage
  6. from core.helper import encrypter
  7. from core.model_providers.models.base import BaseProviderModel
  8. from core.model_providers.models.entity.model_params import ModelKwargsRules, KwargRule, ModelType
  9. from core.model_providers.models.llm.spark_model import SparkModel
  10. from core.model_providers.providers.base import BaseModelProvider, CredentialsValidateFailedError
  11. from core.third_party.langchain.llms.spark import ChatSpark
  12. from core.third_party.spark.spark_llm import SparkError
  13. from models.provider import ProviderType, ProviderQuotaType
  14. class SparkProvider(BaseModelProvider):
  15. @property
  16. def provider_name(self):
  17. """
  18. Returns the name of a provider.
  19. """
  20. return 'spark'
  21. def _get_fixed_model_list(self, model_type: ModelType) -> list[dict]:
  22. if model_type == ModelType.TEXT_GENERATION:
  23. return [
  24. {
  25. 'id': 'spark',
  26. 'name': 'Spark V1.5',
  27. },
  28. {
  29. 'id': 'spark-v2',
  30. 'name': 'Spark V2.0',
  31. }
  32. ]
  33. else:
  34. return []
  35. def get_model_class(self, model_type: ModelType) -> Type[BaseProviderModel]:
  36. """
  37. Returns the model class.
  38. :param model_type:
  39. :return:
  40. """
  41. if model_type == ModelType.TEXT_GENERATION:
  42. model_class = SparkModel
  43. else:
  44. raise NotImplementedError
  45. return model_class
  46. def get_model_parameter_rules(self, model_name: str, model_type: ModelType) -> ModelKwargsRules:
  47. """
  48. get model parameter rules.
  49. :param model_name:
  50. :param model_type:
  51. :return:
  52. """
  53. return ModelKwargsRules(
  54. temperature=KwargRule[float](min=0, max=1, default=0.5),
  55. top_p=KwargRule[float](enabled=False),
  56. presence_penalty=KwargRule[float](enabled=False),
  57. frequency_penalty=KwargRule[float](enabled=False),
  58. max_tokens=KwargRule[int](min=10, max=4096, default=2048),
  59. )
  60. @classmethod
  61. def is_provider_credentials_valid_or_raise(cls, credentials: dict):
  62. """
  63. Validates the given credentials.
  64. """
  65. if 'app_id' not in credentials:
  66. raise CredentialsValidateFailedError('Spark app_id must be provided.')
  67. if 'api_key' not in credentials:
  68. raise CredentialsValidateFailedError('Spark api_key must be provided.')
  69. if 'api_secret' not in credentials:
  70. raise CredentialsValidateFailedError('Spark api_secret must be provided.')
  71. try:
  72. credential_kwargs = {
  73. 'app_id': credentials['app_id'],
  74. 'api_key': credentials['api_key'],
  75. 'api_secret': credentials['api_secret'],
  76. }
  77. chat_llm = ChatSpark(
  78. max_tokens=10,
  79. temperature=0.01,
  80. **credential_kwargs
  81. )
  82. messages = [
  83. HumanMessage(
  84. content="ping"
  85. )
  86. ]
  87. chat_llm(messages)
  88. except SparkError as ex:
  89. raise CredentialsValidateFailedError(str(ex))
  90. except Exception as ex:
  91. logging.exception('Spark config validation failed')
  92. raise ex
  93. @classmethod
  94. def encrypt_provider_credentials(cls, tenant_id: str, credentials: dict) -> dict:
  95. credentials['api_key'] = encrypter.encrypt_token(tenant_id, credentials['api_key'])
  96. credentials['api_secret'] = encrypter.encrypt_token(tenant_id, credentials['api_secret'])
  97. return credentials
  98. def get_provider_credentials(self, obfuscated: bool = False) -> dict:
  99. if self.provider.provider_type == ProviderType.CUSTOM.value \
  100. or (self.provider.provider_type == ProviderType.SYSTEM.value
  101. and self.provider.quota_type == ProviderQuotaType.FREE.value):
  102. try:
  103. credentials = json.loads(self.provider.encrypted_config)
  104. except JSONDecodeError:
  105. credentials = {
  106. 'app_id': None,
  107. 'api_key': None,
  108. 'api_secret': None,
  109. }
  110. if credentials['api_key']:
  111. credentials['api_key'] = encrypter.decrypt_token(
  112. self.provider.tenant_id,
  113. credentials['api_key']
  114. )
  115. if obfuscated:
  116. credentials['api_key'] = encrypter.obfuscated_token(credentials['api_key'])
  117. if credentials['api_secret']:
  118. credentials['api_secret'] = encrypter.decrypt_token(
  119. self.provider.tenant_id,
  120. credentials['api_secret']
  121. )
  122. if obfuscated:
  123. credentials['api_secret'] = encrypter.obfuscated_token(credentials['api_secret'])
  124. return credentials
  125. else:
  126. return {
  127. 'app_id': None,
  128. 'api_key': None,
  129. 'api_secret': None,
  130. }
  131. def should_deduct_quota(self):
  132. return True
  133. @classmethod
  134. def is_model_credentials_valid_or_raise(cls, model_name: str, model_type: ModelType, credentials: dict):
  135. """
  136. check model credentials valid.
  137. :param model_name:
  138. :param model_type:
  139. :param credentials:
  140. """
  141. return
  142. @classmethod
  143. def encrypt_model_credentials(cls, tenant_id: str, model_name: str, model_type: ModelType,
  144. credentials: dict) -> dict:
  145. """
  146. encrypt model credentials for save.
  147. :param tenant_id:
  148. :param model_name:
  149. :param model_type:
  150. :param credentials:
  151. :return:
  152. """
  153. return {}
  154. def get_model_credentials(self, model_name: str, model_type: ModelType, obfuscated: bool = False) -> dict:
  155. """
  156. get credentials for llm use.
  157. :param model_name:
  158. :param model_type:
  159. :param obfuscated:
  160. :return:
  161. """
  162. return self.get_provider_credentials(obfuscated)