
Co-authored-by: zxhlyh <jasonapring2015@outlook.com> Co-authored-by: autofix-ci[bot] <114827586+autofix-ci[bot]@users.noreply.github.com>
1786 lines
75 KiB
Python
1786 lines
75 KiB
Python
import json
|
|
import logging
|
|
from collections import defaultdict
|
|
from collections.abc import Iterator, Sequence
|
|
from json import JSONDecodeError
|
|
from typing import Optional
|
|
|
|
from pydantic import BaseModel, ConfigDict, Field
|
|
from sqlalchemy import func, select
|
|
from sqlalchemy.orm import Session
|
|
|
|
from constants import HIDDEN_VALUE
|
|
from core.entities.model_entities import ModelStatus, ModelWithProviderEntity, SimpleModelProviderEntity
|
|
from core.entities.provider_entities import (
|
|
CustomConfiguration,
|
|
ModelSettings,
|
|
SystemConfiguration,
|
|
SystemConfigurationStatus,
|
|
)
|
|
from core.helper import encrypter
|
|
from core.helper.model_provider_cache import ProviderCredentialsCache, ProviderCredentialsCacheType
|
|
from core.model_runtime.entities.model_entities import AIModelEntity, FetchFrom, ModelType
|
|
from core.model_runtime.entities.provider_entities import (
|
|
ConfigurateMethod,
|
|
CredentialFormSchema,
|
|
FormType,
|
|
ProviderEntity,
|
|
)
|
|
from core.model_runtime.model_providers.__base.ai_model import AIModel
|
|
from core.model_runtime.model_providers.model_provider_factory import ModelProviderFactory
|
|
from core.plugin.entities.plugin import ModelProviderID
|
|
from extensions.ext_database import db
|
|
from libs.datetime_utils import naive_utc_now
|
|
from models.provider import (
|
|
LoadBalancingModelConfig,
|
|
Provider,
|
|
ProviderCredential,
|
|
ProviderModel,
|
|
ProviderModelCredential,
|
|
ProviderModelSetting,
|
|
ProviderType,
|
|
TenantPreferredModelProvider,
|
|
)
|
|
|
|
logger = logging.getLogger(__name__)
|
|
|
|
original_provider_configurate_methods: dict[str, list[ConfigurateMethod]] = {}
|
|
|
|
|
|
class ProviderConfiguration(BaseModel):
|
|
"""
|
|
Provider configuration entity for managing model provider settings.
|
|
|
|
This class handles:
|
|
- Provider credentials CRUD and switch
|
|
- Custom Model credentials CRUD and switch
|
|
- System vs custom provider switching
|
|
- Load balancing configurations
|
|
- Model enablement/disablement
|
|
|
|
TODO: lots of logic in a BaseModel entity should be separated, the exceptions should be classified
|
|
"""
|
|
|
|
tenant_id: str
|
|
provider: ProviderEntity
|
|
preferred_provider_type: ProviderType
|
|
using_provider_type: ProviderType
|
|
system_configuration: SystemConfiguration
|
|
custom_configuration: CustomConfiguration
|
|
model_settings: list[ModelSettings]
|
|
|
|
# pydantic configs
|
|
model_config = ConfigDict(protected_namespaces=())
|
|
|
|
def __init__(self, **data):
|
|
super().__init__(**data)
|
|
|
|
if self.provider.provider not in original_provider_configurate_methods:
|
|
original_provider_configurate_methods[self.provider.provider] = []
|
|
for configurate_method in self.provider.configurate_methods:
|
|
original_provider_configurate_methods[self.provider.provider].append(configurate_method)
|
|
|
|
if original_provider_configurate_methods[self.provider.provider] == [ConfigurateMethod.CUSTOMIZABLE_MODEL]:
|
|
if (
|
|
any(
|
|
len(quota_configuration.restrict_models) > 0
|
|
for quota_configuration in self.system_configuration.quota_configurations
|
|
)
|
|
and ConfigurateMethod.PREDEFINED_MODEL not in self.provider.configurate_methods
|
|
):
|
|
self.provider.configurate_methods.append(ConfigurateMethod.PREDEFINED_MODEL)
|
|
|
|
def get_current_credentials(self, model_type: ModelType, model: str) -> Optional[dict]:
|
|
"""
|
|
Get current credentials.
|
|
|
|
:param model_type: model type
|
|
:param model: model name
|
|
:return:
|
|
"""
|
|
if self.model_settings:
|
|
# check if model is disabled by admin
|
|
for model_setting in self.model_settings:
|
|
if model_setting.model_type == model_type and model_setting.model == model:
|
|
if not model_setting.enabled:
|
|
raise ValueError(f"Model {model} is disabled.")
|
|
|
|
if self.using_provider_type == ProviderType.SYSTEM:
|
|
restrict_models = []
|
|
for quota_configuration in self.system_configuration.quota_configurations:
|
|
if self.system_configuration.current_quota_type != quota_configuration.quota_type:
|
|
continue
|
|
|
|
restrict_models = quota_configuration.restrict_models
|
|
|
|
copy_credentials = (
|
|
self.system_configuration.credentials.copy() if self.system_configuration.credentials else {}
|
|
)
|
|
if restrict_models:
|
|
for restrict_model in restrict_models:
|
|
if (
|
|
restrict_model.model_type == model_type
|
|
and restrict_model.model == model
|
|
and restrict_model.base_model_name
|
|
):
|
|
copy_credentials["base_model_name"] = restrict_model.base_model_name
|
|
|
|
return copy_credentials
|
|
else:
|
|
credentials = None
|
|
if self.custom_configuration.models:
|
|
for model_configuration in self.custom_configuration.models:
|
|
if model_configuration.model_type == model_type and model_configuration.model == model:
|
|
credentials = model_configuration.credentials
|
|
break
|
|
|
|
if not credentials and self.custom_configuration.provider:
|
|
credentials = self.custom_configuration.provider.credentials
|
|
|
|
return credentials
|
|
|
|
def get_system_configuration_status(self) -> Optional[SystemConfigurationStatus]:
|
|
"""
|
|
Get system configuration status.
|
|
:return:
|
|
"""
|
|
if self.system_configuration.enabled is False:
|
|
return SystemConfigurationStatus.UNSUPPORTED
|
|
|
|
current_quota_type = self.system_configuration.current_quota_type
|
|
current_quota_configuration = next(
|
|
(q for q in self.system_configuration.quota_configurations if q.quota_type == current_quota_type), None
|
|
)
|
|
if current_quota_configuration is None:
|
|
return None
|
|
|
|
if not current_quota_configuration:
|
|
return SystemConfigurationStatus.UNSUPPORTED
|
|
|
|
return (
|
|
SystemConfigurationStatus.ACTIVE
|
|
if current_quota_configuration.is_valid
|
|
else SystemConfigurationStatus.QUOTA_EXCEEDED
|
|
)
|
|
|
|
def is_custom_configuration_available(self) -> bool:
|
|
"""
|
|
Check custom configuration available.
|
|
:return:
|
|
"""
|
|
has_provider_credentials = (
|
|
self.custom_configuration.provider is not None
|
|
and len(self.custom_configuration.provider.available_credentials) > 0
|
|
)
|
|
|
|
has_model_configurations = len(self.custom_configuration.models) > 0
|
|
return has_provider_credentials or has_model_configurations
|
|
|
|
def _get_provider_record(self, session: Session) -> Provider | None:
|
|
"""
|
|
Get custom provider record.
|
|
"""
|
|
# get provider
|
|
model_provider_id = ModelProviderID(self.provider.provider)
|
|
provider_names = [self.provider.provider]
|
|
if model_provider_id.is_langgenius():
|
|
provider_names.append(model_provider_id.provider_name)
|
|
|
|
stmt = select(Provider).where(
|
|
Provider.tenant_id == self.tenant_id,
|
|
Provider.provider_type == ProviderType.CUSTOM.value,
|
|
Provider.provider_name.in_(provider_names),
|
|
)
|
|
|
|
return session.execute(stmt).scalar_one_or_none()
|
|
|
|
def _get_specific_provider_credential(self, credential_id: str) -> dict | None:
|
|
"""
|
|
Get a specific provider credential by ID.
|
|
:param credential_id: Credential ID
|
|
:return:
|
|
"""
|
|
# Extract secret variables from provider credential schema
|
|
credential_secret_variables = self.extract_secret_variables(
|
|
self.provider.provider_credential_schema.credential_form_schemas
|
|
if self.provider.provider_credential_schema
|
|
else []
|
|
)
|
|
|
|
with Session(db.engine) as session:
|
|
# Prefer the actual provider record name if exists (to handle aliased provider names)
|
|
provider_record = self._get_provider_record(session)
|
|
provider_name = provider_record.provider_name if provider_record else self.provider.provider
|
|
|
|
stmt = select(ProviderCredential).where(
|
|
ProviderCredential.id == credential_id,
|
|
ProviderCredential.tenant_id == self.tenant_id,
|
|
ProviderCredential.provider_name == provider_name,
|
|
)
|
|
|
|
credential = session.execute(stmt).scalar_one_or_none()
|
|
|
|
if not credential or not credential.encrypted_config:
|
|
raise ValueError(f"Credential with id {credential_id} not found.")
|
|
|
|
try:
|
|
credentials = json.loads(credential.encrypted_config)
|
|
except JSONDecodeError:
|
|
credentials = {}
|
|
|
|
# Decrypt secret variables
|
|
for key in credential_secret_variables:
|
|
if key in credentials and credentials[key] is not None:
|
|
try:
|
|
credentials[key] = encrypter.decrypt_token(tenant_id=self.tenant_id, token=credentials[key])
|
|
except Exception:
|
|
pass
|
|
|
|
return self.obfuscated_credentials(
|
|
credentials=credentials,
|
|
credential_form_schemas=self.provider.provider_credential_schema.credential_form_schemas
|
|
if self.provider.provider_credential_schema
|
|
else [],
|
|
)
|
|
|
|
def _check_provider_credential_name_exists(
|
|
self, credential_name: str, session: Session, exclude_id: str | None = None
|
|
) -> bool:
|
|
"""
|
|
not allowed same name when create or update a credential
|
|
"""
|
|
stmt = select(ProviderCredential.id).where(
|
|
ProviderCredential.tenant_id == self.tenant_id,
|
|
ProviderCredential.provider_name == self.provider.provider,
|
|
ProviderCredential.credential_name == credential_name,
|
|
)
|
|
if exclude_id:
|
|
stmt = stmt.where(ProviderCredential.id != exclude_id)
|
|
return session.execute(stmt).scalar_one_or_none() is not None
|
|
|
|
def get_provider_credential(self, credential_id: str | None = None) -> dict | None:
|
|
"""
|
|
Get provider credentials.
|
|
|
|
:param credential_id: if provided, return the specified credential
|
|
:return:
|
|
"""
|
|
|
|
if credential_id:
|
|
return self._get_specific_provider_credential(credential_id)
|
|
|
|
# Default behavior: return current active provider credentials
|
|
credentials = self.custom_configuration.provider.credentials if self.custom_configuration.provider else {}
|
|
|
|
return self.obfuscated_credentials(
|
|
credentials=credentials,
|
|
credential_form_schemas=self.provider.provider_credential_schema.credential_form_schemas
|
|
if self.provider.provider_credential_schema
|
|
else [],
|
|
)
|
|
|
|
def validate_provider_credentials(
|
|
self, credentials: dict, credential_id: str = "", session: Session | None = None
|
|
) -> dict:
|
|
"""
|
|
Validate custom credentials.
|
|
:param credentials: provider credentials
|
|
:param credential_id: (Optional)If provided, can use existing credential's hidden api key to validate
|
|
:param session: optional database session
|
|
:return:
|
|
"""
|
|
|
|
def _validate(s: Session) -> dict:
|
|
# Get provider credential secret variables
|
|
provider_credential_secret_variables = self.extract_secret_variables(
|
|
self.provider.provider_credential_schema.credential_form_schemas
|
|
if self.provider.provider_credential_schema
|
|
else []
|
|
)
|
|
|
|
if credential_id:
|
|
try:
|
|
stmt = select(ProviderCredential).where(
|
|
ProviderCredential.tenant_id == self.tenant_id,
|
|
ProviderCredential.provider_name == self.provider.provider,
|
|
ProviderCredential.id == credential_id,
|
|
)
|
|
credential_record = s.execute(stmt).scalar_one_or_none()
|
|
# fix origin data
|
|
if credential_record and credential_record.encrypted_config:
|
|
if not credential_record.encrypted_config.startswith("{"):
|
|
original_credentials = {"openai_api_key": credential_record.encrypted_config}
|
|
else:
|
|
original_credentials = json.loads(credential_record.encrypted_config)
|
|
else:
|
|
original_credentials = {}
|
|
except JSONDecodeError:
|
|
original_credentials = {}
|
|
|
|
# encrypt credentials
|
|
for key, value in credentials.items():
|
|
if key in provider_credential_secret_variables:
|
|
# if send [__HIDDEN__] in secret input, it will be same as original value
|
|
if value == HIDDEN_VALUE and key in original_credentials:
|
|
credentials[key] = encrypter.decrypt_token(
|
|
tenant_id=self.tenant_id, token=original_credentials[key]
|
|
)
|
|
|
|
model_provider_factory = ModelProviderFactory(self.tenant_id)
|
|
validated_credentials = model_provider_factory.provider_credentials_validate(
|
|
provider=self.provider.provider, credentials=credentials
|
|
)
|
|
|
|
for key, value in validated_credentials.items():
|
|
if key in provider_credential_secret_variables:
|
|
validated_credentials[key] = encrypter.encrypt_token(self.tenant_id, value)
|
|
|
|
return validated_credentials
|
|
|
|
if session:
|
|
return _validate(session)
|
|
else:
|
|
with Session(db.engine) as new_session:
|
|
return _validate(new_session)
|
|
|
|
def create_provider_credential(self, credentials: dict, credential_name: str) -> None:
|
|
"""
|
|
Add custom provider credentials.
|
|
:param credentials: provider credentials
|
|
:param credential_name: credential name
|
|
:return:
|
|
"""
|
|
with Session(db.engine) as session:
|
|
if self._check_provider_credential_name_exists(credential_name=credential_name, session=session):
|
|
raise ValueError(f"Credential with name '{credential_name}' already exists.")
|
|
|
|
credentials = self.validate_provider_credentials(credentials=credentials, session=session)
|
|
provider_record = self._get_provider_record(session)
|
|
try:
|
|
new_record = ProviderCredential(
|
|
tenant_id=self.tenant_id,
|
|
provider_name=self.provider.provider,
|
|
encrypted_config=json.dumps(credentials),
|
|
credential_name=credential_name,
|
|
)
|
|
session.add(new_record)
|
|
session.flush()
|
|
|
|
if not provider_record:
|
|
# If provider record does not exist, create it
|
|
provider_record = Provider(
|
|
tenant_id=self.tenant_id,
|
|
provider_name=self.provider.provider,
|
|
provider_type=ProviderType.CUSTOM.value,
|
|
is_valid=True,
|
|
credential_id=new_record.id,
|
|
)
|
|
session.add(provider_record)
|
|
|
|
provider_model_credentials_cache = ProviderCredentialsCache(
|
|
tenant_id=self.tenant_id,
|
|
identity_id=provider_record.id,
|
|
cache_type=ProviderCredentialsCacheType.PROVIDER,
|
|
)
|
|
provider_model_credentials_cache.delete()
|
|
|
|
self.switch_preferred_provider_type(provider_type=ProviderType.CUSTOM, session=session)
|
|
|
|
session.commit()
|
|
except Exception:
|
|
session.rollback()
|
|
raise
|
|
|
|
def update_provider_credential(
|
|
self,
|
|
credentials: dict,
|
|
credential_id: str,
|
|
credential_name: str,
|
|
) -> None:
|
|
"""
|
|
update a saved provider credential (by credential_id).
|
|
|
|
:param credentials: provider credentials
|
|
:param credential_id: credential id
|
|
:param credential_name: credential name
|
|
:return:
|
|
"""
|
|
with Session(db.engine) as session:
|
|
if self._check_provider_credential_name_exists(
|
|
credential_name=credential_name, session=session, exclude_id=credential_id
|
|
):
|
|
raise ValueError(f"Credential with name '{credential_name}' already exists.")
|
|
|
|
credentials = self.validate_provider_credentials(
|
|
credentials=credentials, credential_id=credential_id, session=session
|
|
)
|
|
provider_record = self._get_provider_record(session)
|
|
stmt = select(ProviderCredential).where(
|
|
ProviderCredential.id == credential_id,
|
|
ProviderCredential.tenant_id == self.tenant_id,
|
|
ProviderCredential.provider_name == self.provider.provider,
|
|
)
|
|
|
|
# Get the credential record to update
|
|
credential_record = session.execute(stmt).scalar_one_or_none()
|
|
if not credential_record:
|
|
raise ValueError("Credential record not found.")
|
|
try:
|
|
# Update credential
|
|
credential_record.encrypted_config = json.dumps(credentials)
|
|
credential_record.credential_name = credential_name
|
|
credential_record.updated_at = naive_utc_now()
|
|
|
|
session.commit()
|
|
|
|
if provider_record and provider_record.credential_id == credential_id:
|
|
provider_model_credentials_cache = ProviderCredentialsCache(
|
|
tenant_id=self.tenant_id,
|
|
identity_id=provider_record.id,
|
|
cache_type=ProviderCredentialsCacheType.PROVIDER,
|
|
)
|
|
provider_model_credentials_cache.delete()
|
|
|
|
self._update_load_balancing_configs_with_credential(
|
|
credential_id=credential_id,
|
|
credential_record=credential_record,
|
|
credential_source="provider",
|
|
session=session,
|
|
)
|
|
except Exception:
|
|
session.rollback()
|
|
raise
|
|
|
|
def _update_load_balancing_configs_with_credential(
|
|
self,
|
|
credential_id: str,
|
|
credential_record: ProviderCredential | ProviderModelCredential,
|
|
credential_source: str,
|
|
session: Session,
|
|
) -> None:
|
|
"""
|
|
Update load balancing configurations that reference the given credential_id.
|
|
|
|
:param credential_id: credential id
|
|
:param credential_record: the encrypted_config and credential_name
|
|
:param credential_source: the credential comes from the provider_credential(`provider`)
|
|
or the provider_model_credential(`custom_model`)
|
|
:param session: the database session
|
|
:return:
|
|
"""
|
|
# Find all load balancing configs that use this credential_id
|
|
stmt = select(LoadBalancingModelConfig).where(
|
|
LoadBalancingModelConfig.tenant_id == self.tenant_id,
|
|
LoadBalancingModelConfig.provider_name == self.provider.provider,
|
|
LoadBalancingModelConfig.credential_id == credential_id,
|
|
LoadBalancingModelConfig.credential_source_type == credential_source,
|
|
)
|
|
load_balancing_configs = session.execute(stmt).scalars().all()
|
|
|
|
if not load_balancing_configs:
|
|
return
|
|
|
|
# Update each load balancing config with the new credentials
|
|
for lb_config in load_balancing_configs:
|
|
# Update the encrypted_config with the new credentials
|
|
lb_config.encrypted_config = credential_record.encrypted_config
|
|
lb_config.name = credential_record.credential_name
|
|
lb_config.updated_at = naive_utc_now()
|
|
|
|
# Clear cache for this load balancing config
|
|
lb_credentials_cache = ProviderCredentialsCache(
|
|
tenant_id=self.tenant_id,
|
|
identity_id=lb_config.id,
|
|
cache_type=ProviderCredentialsCacheType.LOAD_BALANCING_MODEL,
|
|
)
|
|
lb_credentials_cache.delete()
|
|
|
|
session.commit()
|
|
|
|
def delete_provider_credential(self, credential_id: str) -> None:
|
|
"""
|
|
Delete a saved provider credential (by credential_id).
|
|
|
|
:param credential_id: credential id
|
|
:return:
|
|
"""
|
|
with Session(db.engine) as session:
|
|
stmt = select(ProviderCredential).where(
|
|
ProviderCredential.id == credential_id,
|
|
ProviderCredential.tenant_id == self.tenant_id,
|
|
ProviderCredential.provider_name == self.provider.provider,
|
|
)
|
|
|
|
# Get the credential record to update
|
|
credential_record = session.execute(stmt).scalar_one_or_none()
|
|
if not credential_record:
|
|
raise ValueError("Credential record not found.")
|
|
|
|
# Check if this credential is used in load balancing configs
|
|
lb_stmt = select(LoadBalancingModelConfig).where(
|
|
LoadBalancingModelConfig.tenant_id == self.tenant_id,
|
|
LoadBalancingModelConfig.provider_name == self.provider.provider,
|
|
LoadBalancingModelConfig.credential_id == credential_id,
|
|
LoadBalancingModelConfig.credential_source_type == "provider",
|
|
)
|
|
lb_configs_using_credential = session.execute(lb_stmt).scalars().all()
|
|
try:
|
|
for lb_config in lb_configs_using_credential:
|
|
lb_credentials_cache = ProviderCredentialsCache(
|
|
tenant_id=self.tenant_id,
|
|
identity_id=lb_config.id,
|
|
cache_type=ProviderCredentialsCacheType.LOAD_BALANCING_MODEL,
|
|
)
|
|
lb_credentials_cache.delete()
|
|
|
|
lb_config.credential_id = None
|
|
lb_config.encrypted_config = None
|
|
lb_config.enabled = False
|
|
lb_config.name = "__delete__"
|
|
lb_config.updated_at = naive_utc_now()
|
|
session.add(lb_config)
|
|
|
|
# Check if this is the currently active credential
|
|
provider_record = self._get_provider_record(session)
|
|
|
|
# Check available credentials count BEFORE deleting
|
|
# if this is the last credential, we need to delete the provider record
|
|
count_stmt = select(func.count(ProviderCredential.id)).where(
|
|
ProviderCredential.tenant_id == self.tenant_id,
|
|
ProviderCredential.provider_name == self.provider.provider,
|
|
)
|
|
available_credentials_count = session.execute(count_stmt).scalar() or 0
|
|
session.delete(credential_record)
|
|
|
|
if provider_record and available_credentials_count <= 1:
|
|
# If all credentials are deleted, delete the provider record
|
|
session.delete(provider_record)
|
|
|
|
provider_model_credentials_cache = ProviderCredentialsCache(
|
|
tenant_id=self.tenant_id,
|
|
identity_id=provider_record.id,
|
|
cache_type=ProviderCredentialsCacheType.PROVIDER,
|
|
)
|
|
provider_model_credentials_cache.delete()
|
|
self.switch_preferred_provider_type(provider_type=ProviderType.SYSTEM, session=session)
|
|
elif provider_record and provider_record.credential_id == credential_id:
|
|
provider_record.credential_id = None
|
|
provider_record.updated_at = naive_utc_now()
|
|
|
|
provider_model_credentials_cache = ProviderCredentialsCache(
|
|
tenant_id=self.tenant_id,
|
|
identity_id=provider_record.id,
|
|
cache_type=ProviderCredentialsCacheType.PROVIDER,
|
|
)
|
|
provider_model_credentials_cache.delete()
|
|
self.switch_preferred_provider_type(provider_type=ProviderType.SYSTEM, session=session)
|
|
|
|
session.commit()
|
|
except Exception:
|
|
session.rollback()
|
|
raise
|
|
|
|
def switch_active_provider_credential(self, credential_id: str) -> None:
|
|
"""
|
|
Switch active provider credential (copy the selected one into current active snapshot).
|
|
|
|
:param credential_id: credential id
|
|
:return:
|
|
"""
|
|
with Session(db.engine) as session:
|
|
stmt = select(ProviderCredential).where(
|
|
ProviderCredential.id == credential_id,
|
|
ProviderCredential.tenant_id == self.tenant_id,
|
|
ProviderCredential.provider_name == self.provider.provider,
|
|
)
|
|
credential_record = session.execute(stmt).scalar_one_or_none()
|
|
if not credential_record:
|
|
raise ValueError("Credential record not found.")
|
|
|
|
provider_record = self._get_provider_record(session)
|
|
if not provider_record:
|
|
raise ValueError("Provider record not found.")
|
|
|
|
try:
|
|
provider_record.credential_id = credential_record.id
|
|
provider_record.updated_at = naive_utc_now()
|
|
session.commit()
|
|
|
|
provider_model_credentials_cache = ProviderCredentialsCache(
|
|
tenant_id=self.tenant_id,
|
|
identity_id=provider_record.id,
|
|
cache_type=ProviderCredentialsCacheType.PROVIDER,
|
|
)
|
|
provider_model_credentials_cache.delete()
|
|
self.switch_preferred_provider_type(ProviderType.CUSTOM, session=session)
|
|
except Exception:
|
|
session.rollback()
|
|
raise
|
|
|
|
def _get_custom_model_record(
|
|
self,
|
|
model_type: ModelType,
|
|
model: str,
|
|
session: Session,
|
|
) -> ProviderModel | None:
|
|
"""
|
|
Get custom model credentials.
|
|
"""
|
|
# get provider model
|
|
model_provider_id = ModelProviderID(self.provider.provider)
|
|
provider_names = [self.provider.provider]
|
|
if model_provider_id.is_langgenius():
|
|
provider_names.append(model_provider_id.provider_name)
|
|
|
|
stmt = select(ProviderModel).where(
|
|
ProviderModel.tenant_id == self.tenant_id,
|
|
ProviderModel.provider_name.in_(provider_names),
|
|
ProviderModel.model_name == model,
|
|
ProviderModel.model_type == model_type.to_origin_model_type(),
|
|
)
|
|
|
|
return session.execute(stmt).scalar_one_or_none()
|
|
|
|
def _get_specific_custom_model_credential(
|
|
self, model_type: ModelType, model: str, credential_id: str
|
|
) -> dict | None:
|
|
"""
|
|
Get a specific provider credential by ID.
|
|
:param credential_id: Credential ID
|
|
:return:
|
|
"""
|
|
model_credential_secret_variables = self.extract_secret_variables(
|
|
self.provider.model_credential_schema.credential_form_schemas
|
|
if self.provider.model_credential_schema
|
|
else []
|
|
)
|
|
|
|
with Session(db.engine) as session:
|
|
stmt = select(ProviderModelCredential).where(
|
|
ProviderModelCredential.id == credential_id,
|
|
ProviderModelCredential.tenant_id == self.tenant_id,
|
|
ProviderModelCredential.provider_name == self.provider.provider,
|
|
ProviderModelCredential.model_name == model,
|
|
ProviderModelCredential.model_type == model_type.to_origin_model_type(),
|
|
)
|
|
|
|
credential_record = session.execute(stmt).scalar_one_or_none()
|
|
|
|
if not credential_record or not credential_record.encrypted_config:
|
|
raise ValueError(f"Credential with id {credential_id} not found.")
|
|
|
|
try:
|
|
credentials = json.loads(credential_record.encrypted_config)
|
|
except JSONDecodeError:
|
|
credentials = {}
|
|
|
|
# Decrypt secret variables
|
|
for key in model_credential_secret_variables:
|
|
if key in credentials and credentials[key] is not None:
|
|
try:
|
|
credentials[key] = encrypter.decrypt_token(tenant_id=self.tenant_id, token=credentials[key])
|
|
except Exception:
|
|
pass
|
|
|
|
current_credential_id = credential_record.id
|
|
current_credential_name = credential_record.credential_name
|
|
credentials = self.obfuscated_credentials(
|
|
credentials=credentials,
|
|
credential_form_schemas=self.provider.model_credential_schema.credential_form_schemas
|
|
if self.provider.model_credential_schema
|
|
else [],
|
|
)
|
|
|
|
return {
|
|
"current_credential_id": current_credential_id,
|
|
"current_credential_name": current_credential_name,
|
|
"credentials": credentials,
|
|
}
|
|
|
|
def _check_custom_model_credential_name_exists(
|
|
self, model_type: ModelType, model: str, credential_name: str, session: Session, exclude_id: str | None = None
|
|
) -> bool:
|
|
"""
|
|
not allowed same name when create or update a credential
|
|
"""
|
|
stmt = select(ProviderModelCredential).where(
|
|
ProviderModelCredential.tenant_id == self.tenant_id,
|
|
ProviderModelCredential.provider_name == self.provider.provider,
|
|
ProviderModelCredential.model_name == model,
|
|
ProviderModelCredential.model_type == model_type.to_origin_model_type(),
|
|
ProviderModelCredential.credential_name == credential_name,
|
|
)
|
|
if exclude_id:
|
|
stmt = stmt.where(ProviderModelCredential.id != exclude_id)
|
|
return session.execute(stmt).scalar_one_or_none() is not None
|
|
|
|
def get_custom_model_credential(
|
|
self, model_type: ModelType, model: str, credential_id: str | None
|
|
) -> Optional[dict]:
|
|
"""
|
|
Get custom model credentials.
|
|
|
|
:param model_type: model type
|
|
:param model: model name
|
|
:return:
|
|
"""
|
|
# If credential_id is provided, return the specific credential
|
|
if credential_id:
|
|
return self._get_specific_custom_model_credential(
|
|
model_type=model_type, model=model, credential_id=credential_id
|
|
)
|
|
|
|
for model_configuration in self.custom_configuration.models:
|
|
if (
|
|
model_configuration.model_type == model_type
|
|
and model_configuration.model == model
|
|
and model_configuration.credentials
|
|
):
|
|
current_credential_id = model_configuration.current_credential_id
|
|
current_credential_name = model_configuration.current_credential_name
|
|
credentials = self.obfuscated_credentials(
|
|
credentials=model_configuration.credentials,
|
|
credential_form_schemas=self.provider.model_credential_schema.credential_form_schemas
|
|
if self.provider.model_credential_schema
|
|
else [],
|
|
)
|
|
return {
|
|
"current_credential_id": current_credential_id,
|
|
"current_credential_name": current_credential_name,
|
|
"credentials": credentials,
|
|
}
|
|
return None
|
|
|
|
def validate_custom_model_credentials(
|
|
self,
|
|
model_type: ModelType,
|
|
model: str,
|
|
credentials: dict,
|
|
credential_id: str = "",
|
|
session: Session | None = None,
|
|
) -> dict:
|
|
"""
|
|
Validate custom model credentials.
|
|
|
|
:param model_type: model type
|
|
:param model: model name
|
|
:param credentials: model credentials dict
|
|
:param credential_id: (Optional)If provided, can use existing credential's hidden api key to validate
|
|
:return:
|
|
"""
|
|
|
|
def _validate(s: Session) -> dict:
|
|
# Get provider credential secret variables
|
|
provider_credential_secret_variables = self.extract_secret_variables(
|
|
self.provider.model_credential_schema.credential_form_schemas
|
|
if self.provider.model_credential_schema
|
|
else []
|
|
)
|
|
|
|
if credential_id:
|
|
try:
|
|
stmt = select(ProviderModelCredential).where(
|
|
ProviderModelCredential.id == credential_id,
|
|
ProviderModelCredential.tenant_id == self.tenant_id,
|
|
ProviderModelCredential.provider_name == self.provider.provider,
|
|
ProviderModelCredential.model_name == model,
|
|
ProviderModelCredential.model_type == model_type.to_origin_model_type(),
|
|
)
|
|
credential_record = s.execute(stmt).scalar_one_or_none()
|
|
original_credentials = (
|
|
json.loads(credential_record.encrypted_config)
|
|
if credential_record and credential_record.encrypted_config
|
|
else {}
|
|
)
|
|
except JSONDecodeError:
|
|
original_credentials = {}
|
|
|
|
# decrypt credentials
|
|
for key, value in credentials.items():
|
|
if key in provider_credential_secret_variables:
|
|
# if send [__HIDDEN__] in secret input, it will be same as original value
|
|
if value == HIDDEN_VALUE and key in original_credentials:
|
|
credentials[key] = encrypter.decrypt_token(
|
|
tenant_id=self.tenant_id, token=original_credentials[key]
|
|
)
|
|
|
|
model_provider_factory = ModelProviderFactory(self.tenant_id)
|
|
validated_credentials = model_provider_factory.model_credentials_validate(
|
|
provider=self.provider.provider, model_type=model_type, model=model, credentials=credentials
|
|
)
|
|
|
|
for key, value in validated_credentials.items():
|
|
if key in provider_credential_secret_variables:
|
|
validated_credentials[key] = encrypter.encrypt_token(self.tenant_id, value)
|
|
|
|
return validated_credentials
|
|
|
|
if session:
|
|
return _validate(session)
|
|
else:
|
|
with Session(db.engine) as new_session:
|
|
return _validate(new_session)
|
|
|
|
def create_custom_model_credential(
|
|
self, model_type: ModelType, model: str, credentials: dict, credential_name: str
|
|
) -> None:
|
|
"""
|
|
Create a custom model credential.
|
|
|
|
:param model_type: model type
|
|
:param model: model name
|
|
:param credentials: model credentials dict
|
|
:return:
|
|
"""
|
|
with Session(db.engine) as session:
|
|
if self._check_custom_model_credential_name_exists(
|
|
model=model, model_type=model_type, credential_name=credential_name, session=session
|
|
):
|
|
raise ValueError(f"Model credential with name '{credential_name}' already exists for {model}.")
|
|
# validate custom model config
|
|
credentials = self.validate_custom_model_credentials(
|
|
model_type=model_type, model=model, credentials=credentials, session=session
|
|
)
|
|
provider_model_record = self._get_custom_model_record(model_type=model_type, model=model, session=session)
|
|
|
|
try:
|
|
credential = ProviderModelCredential(
|
|
tenant_id=self.tenant_id,
|
|
provider_name=self.provider.provider,
|
|
model_name=model,
|
|
model_type=model_type.to_origin_model_type(),
|
|
encrypted_config=json.dumps(credentials),
|
|
credential_name=credential_name,
|
|
)
|
|
session.add(credential)
|
|
session.flush()
|
|
|
|
# save provider model
|
|
if not provider_model_record:
|
|
provider_model_record = ProviderModel(
|
|
tenant_id=self.tenant_id,
|
|
provider_name=self.provider.provider,
|
|
model_name=model,
|
|
model_type=model_type.to_origin_model_type(),
|
|
credential_id=credential.id,
|
|
is_valid=True,
|
|
)
|
|
session.add(provider_model_record)
|
|
|
|
session.commit()
|
|
|
|
provider_model_credentials_cache = ProviderCredentialsCache(
|
|
tenant_id=self.tenant_id,
|
|
identity_id=provider_model_record.id,
|
|
cache_type=ProviderCredentialsCacheType.MODEL,
|
|
)
|
|
provider_model_credentials_cache.delete()
|
|
except Exception:
|
|
session.rollback()
|
|
raise
|
|
|
|
def update_custom_model_credential(
|
|
self, model_type: ModelType, model: str, credentials: dict, credential_name: str, credential_id: str
|
|
) -> None:
|
|
"""
|
|
Update a custom model credential.
|
|
|
|
:param model_type: model type
|
|
:param model: model name
|
|
:param credentials: model credentials dict
|
|
:param credential_name: credential name
|
|
:param credential_id: credential id
|
|
:return:
|
|
"""
|
|
with Session(db.engine) as session:
|
|
if self._check_custom_model_credential_name_exists(
|
|
model=model,
|
|
model_type=model_type,
|
|
credential_name=credential_name,
|
|
session=session,
|
|
exclude_id=credential_id,
|
|
):
|
|
raise ValueError(f"Model credential with name '{credential_name}' already exists for {model}.")
|
|
# validate custom model config
|
|
credentials = self.validate_custom_model_credentials(
|
|
model_type=model_type,
|
|
model=model,
|
|
credentials=credentials,
|
|
credential_id=credential_id,
|
|
session=session,
|
|
)
|
|
provider_model_record = self._get_custom_model_record(model_type=model_type, model=model, session=session)
|
|
|
|
stmt = select(ProviderModelCredential).where(
|
|
ProviderModelCredential.id == credential_id,
|
|
ProviderModelCredential.tenant_id == self.tenant_id,
|
|
ProviderModelCredential.provider_name == self.provider.provider,
|
|
ProviderModelCredential.model_name == model,
|
|
ProviderModelCredential.model_type == model_type.to_origin_model_type(),
|
|
)
|
|
credential_record = session.execute(stmt).scalar_one_or_none()
|
|
if not credential_record:
|
|
raise ValueError("Credential record not found.")
|
|
|
|
try:
|
|
# Update credential
|
|
credential_record.encrypted_config = json.dumps(credentials)
|
|
credential_record.credential_name = credential_name
|
|
credential_record.updated_at = naive_utc_now()
|
|
session.commit()
|
|
|
|
if provider_model_record and provider_model_record.credential_id == credential_id:
|
|
provider_model_credentials_cache = ProviderCredentialsCache(
|
|
tenant_id=self.tenant_id,
|
|
identity_id=provider_model_record.id,
|
|
cache_type=ProviderCredentialsCacheType.MODEL,
|
|
)
|
|
provider_model_credentials_cache.delete()
|
|
|
|
self._update_load_balancing_configs_with_credential(
|
|
credential_id=credential_id,
|
|
credential_record=credential_record,
|
|
credential_source="custom_model",
|
|
session=session,
|
|
)
|
|
except Exception:
|
|
session.rollback()
|
|
raise
|
|
|
|
def delete_custom_model_credential(self, model_type: ModelType, model: str, credential_id: str) -> None:
|
|
"""
|
|
Delete a saved provider credential (by credential_id).
|
|
|
|
:param credential_id: credential id
|
|
:return:
|
|
"""
|
|
with Session(db.engine) as session:
|
|
stmt = select(ProviderModelCredential).where(
|
|
ProviderModelCredential.id == credential_id,
|
|
ProviderModelCredential.tenant_id == self.tenant_id,
|
|
ProviderModelCredential.provider_name == self.provider.provider,
|
|
ProviderModelCredential.model_name == model,
|
|
ProviderModelCredential.model_type == model_type.to_origin_model_type(),
|
|
)
|
|
credential_record = session.execute(stmt).scalar_one_or_none()
|
|
if not credential_record:
|
|
raise ValueError("Credential record not found.")
|
|
|
|
lb_stmt = select(LoadBalancingModelConfig).where(
|
|
LoadBalancingModelConfig.tenant_id == self.tenant_id,
|
|
LoadBalancingModelConfig.provider_name == self.provider.provider,
|
|
LoadBalancingModelConfig.credential_id == credential_id,
|
|
LoadBalancingModelConfig.credential_source_type == "custom_model",
|
|
)
|
|
lb_configs_using_credential = session.execute(lb_stmt).scalars().all()
|
|
|
|
try:
|
|
for lb_config in lb_configs_using_credential:
|
|
lb_credentials_cache = ProviderCredentialsCache(
|
|
tenant_id=self.tenant_id,
|
|
identity_id=lb_config.id,
|
|
cache_type=ProviderCredentialsCacheType.LOAD_BALANCING_MODEL,
|
|
)
|
|
lb_credentials_cache.delete()
|
|
lb_config.credential_id = None
|
|
lb_config.encrypted_config = None
|
|
lb_config.enabled = False
|
|
lb_config.name = "__delete__"
|
|
lb_config.updated_at = naive_utc_now()
|
|
session.add(lb_config)
|
|
|
|
# Check if this is the currently active credential
|
|
provider_model_record = self._get_custom_model_record(model_type, model, session=session)
|
|
|
|
# Check available credentials count BEFORE deleting
|
|
# if this is the last credential, we need to delete the custom model record
|
|
count_stmt = select(func.count(ProviderModelCredential.id)).where(
|
|
ProviderModelCredential.tenant_id == self.tenant_id,
|
|
ProviderModelCredential.provider_name == self.provider.provider,
|
|
ProviderModelCredential.model_name == model,
|
|
ProviderModelCredential.model_type == model_type.to_origin_model_type(),
|
|
)
|
|
available_credentials_count = session.execute(count_stmt).scalar() or 0
|
|
session.delete(credential_record)
|
|
|
|
if provider_model_record and available_credentials_count <= 1:
|
|
# If all credentials are deleted, delete the custom model record
|
|
session.delete(provider_model_record)
|
|
elif provider_model_record and provider_model_record.credential_id == credential_id:
|
|
provider_model_record.credential_id = None
|
|
provider_model_record.updated_at = naive_utc_now()
|
|
provider_model_credentials_cache = ProviderCredentialsCache(
|
|
tenant_id=self.tenant_id,
|
|
identity_id=provider_model_record.id,
|
|
cache_type=ProviderCredentialsCacheType.PROVIDER,
|
|
)
|
|
provider_model_credentials_cache.delete()
|
|
|
|
session.commit()
|
|
|
|
except Exception:
|
|
session.rollback()
|
|
raise
|
|
|
|
def add_model_credential_to_model(self, model_type: ModelType, model: str, credential_id: str) -> None:
|
|
"""
|
|
if model list exist this custom model, switch the custom model credential.
|
|
if model list not exist this custom model, use the credential to add a new custom model record.
|
|
|
|
:param model_type: model type
|
|
:param model: model name
|
|
:param credential_id: credential id
|
|
:return:
|
|
"""
|
|
with Session(db.engine) as session:
|
|
stmt = select(ProviderModelCredential).where(
|
|
ProviderModelCredential.id == credential_id,
|
|
ProviderModelCredential.tenant_id == self.tenant_id,
|
|
ProviderModelCredential.provider_name == self.provider.provider,
|
|
ProviderModelCredential.model_name == model,
|
|
ProviderModelCredential.model_type == model_type.to_origin_model_type(),
|
|
)
|
|
credential_record = session.execute(stmt).scalar_one_or_none()
|
|
if not credential_record:
|
|
raise ValueError("Credential record not found.")
|
|
|
|
# validate custom model config
|
|
provider_model_record = self._get_custom_model_record(model_type=model_type, model=model, session=session)
|
|
|
|
if not provider_model_record:
|
|
# create provider model record
|
|
provider_model_record = ProviderModel(
|
|
tenant_id=self.tenant_id,
|
|
provider_name=self.provider.provider,
|
|
model_name=model,
|
|
model_type=model_type.to_origin_model_type(),
|
|
credential_id=credential_id,
|
|
)
|
|
else:
|
|
if provider_model_record.credential_id == credential_record.id:
|
|
raise ValueError("Can't add same credential")
|
|
provider_model_record.credential_id = credential_record.id
|
|
provider_model_record.updated_at = naive_utc_now()
|
|
session.add(provider_model_record)
|
|
session.commit()
|
|
|
|
def switch_custom_model_credential(self, model_type: ModelType, model: str, credential_id: str) -> None:
|
|
"""
|
|
switch the custom model credential.
|
|
|
|
:param model_type: model type
|
|
:param model: model name
|
|
:param credential_id: credential id
|
|
:return:
|
|
"""
|
|
with Session(db.engine) as session:
|
|
stmt = select(ProviderModelCredential).where(
|
|
ProviderModelCredential.id == credential_id,
|
|
ProviderModelCredential.tenant_id == self.tenant_id,
|
|
ProviderModelCredential.provider_name == self.provider.provider,
|
|
ProviderModelCredential.model_name == model,
|
|
ProviderModelCredential.model_type == model_type.to_origin_model_type(),
|
|
)
|
|
credential_record = session.execute(stmt).scalar_one_or_none()
|
|
if not credential_record:
|
|
raise ValueError("Credential record not found.")
|
|
|
|
provider_model_record = self._get_custom_model_record(model_type=model_type, model=model, session=session)
|
|
if not provider_model_record:
|
|
raise ValueError("The custom model record not found.")
|
|
|
|
provider_model_record.credential_id = credential_record.id
|
|
provider_model_record.updated_at = naive_utc_now()
|
|
session.add(provider_model_record)
|
|
session.commit()
|
|
|
|
def delete_custom_model(self, model_type: ModelType, model: str) -> None:
|
|
"""
|
|
Delete custom model.
|
|
:param model_type: model type
|
|
:param model: model name
|
|
:return:
|
|
"""
|
|
with Session(db.engine) as session:
|
|
# get provider model
|
|
provider_model_record = self._get_custom_model_record(model_type=model_type, model=model, session=session)
|
|
|
|
# delete provider model
|
|
if provider_model_record:
|
|
session.delete(provider_model_record)
|
|
session.commit()
|
|
|
|
provider_model_credentials_cache = ProviderCredentialsCache(
|
|
tenant_id=self.tenant_id,
|
|
identity_id=provider_model_record.id,
|
|
cache_type=ProviderCredentialsCacheType.MODEL,
|
|
)
|
|
|
|
provider_model_credentials_cache.delete()
|
|
|
|
def _get_provider_model_setting(
|
|
self, model_type: ModelType, model: str, session: Session
|
|
) -> ProviderModelSetting | None:
|
|
"""
|
|
Get provider model setting.
|
|
"""
|
|
model_provider_id = ModelProviderID(self.provider.provider)
|
|
provider_names = [self.provider.provider]
|
|
if model_provider_id.is_langgenius():
|
|
provider_names.append(model_provider_id.provider_name)
|
|
|
|
stmt = select(ProviderModelSetting).where(
|
|
ProviderModelSetting.tenant_id == self.tenant_id,
|
|
ProviderModelSetting.provider_name.in_(provider_names),
|
|
ProviderModelSetting.model_type == model_type.to_origin_model_type(),
|
|
ProviderModelSetting.model_name == model,
|
|
)
|
|
return session.execute(stmt).scalars().first()
|
|
|
|
def enable_model(self, model_type: ModelType, model: str) -> ProviderModelSetting:
|
|
"""
|
|
Enable model.
|
|
:param model_type: model type
|
|
:param model: model name
|
|
:return:
|
|
"""
|
|
with Session(db.engine) as session:
|
|
model_setting = self._get_provider_model_setting(model_type=model_type, model=model, session=session)
|
|
|
|
if model_setting:
|
|
model_setting.enabled = True
|
|
model_setting.updated_at = naive_utc_now()
|
|
|
|
else:
|
|
model_setting = ProviderModelSetting(
|
|
tenant_id=self.tenant_id,
|
|
provider_name=self.provider.provider,
|
|
model_type=model_type.to_origin_model_type(),
|
|
model_name=model,
|
|
enabled=True,
|
|
)
|
|
session.add(model_setting)
|
|
session.commit()
|
|
|
|
return model_setting
|
|
|
|
def disable_model(self, model_type: ModelType, model: str) -> ProviderModelSetting:
|
|
"""
|
|
Disable model.
|
|
:param model_type: model type
|
|
:param model: model name
|
|
:return:
|
|
"""
|
|
with Session(db.engine) as session:
|
|
model_setting = self._get_provider_model_setting(model_type=model_type, model=model, session=session)
|
|
|
|
if model_setting:
|
|
model_setting.enabled = False
|
|
model_setting.updated_at = naive_utc_now()
|
|
else:
|
|
model_setting = ProviderModelSetting(
|
|
tenant_id=self.tenant_id,
|
|
provider_name=self.provider.provider,
|
|
model_type=model_type.to_origin_model_type(),
|
|
model_name=model,
|
|
enabled=False,
|
|
)
|
|
session.add(model_setting)
|
|
session.commit()
|
|
|
|
return model_setting
|
|
|
|
def get_provider_model_setting(self, model_type: ModelType, model: str) -> Optional[ProviderModelSetting]:
|
|
"""
|
|
Get provider model setting.
|
|
:param model_type: model type
|
|
:param model: model name
|
|
:return:
|
|
"""
|
|
with Session(db.engine) as session:
|
|
return self._get_provider_model_setting(model_type=model_type, model=model, session=session)
|
|
|
|
def enable_model_load_balancing(self, model_type: ModelType, model: str) -> ProviderModelSetting:
|
|
"""
|
|
Enable model load balancing.
|
|
:param model_type: model type
|
|
:param model: model name
|
|
:return:
|
|
"""
|
|
model_provider_id = ModelProviderID(self.provider.provider)
|
|
provider_names = [self.provider.provider]
|
|
if model_provider_id.is_langgenius():
|
|
provider_names.append(model_provider_id.provider_name)
|
|
|
|
with Session(db.engine) as session:
|
|
stmt = select(func.count(LoadBalancingModelConfig.id)).where(
|
|
LoadBalancingModelConfig.tenant_id == self.tenant_id,
|
|
LoadBalancingModelConfig.provider_name.in_(provider_names),
|
|
LoadBalancingModelConfig.model_type == model_type.to_origin_model_type(),
|
|
LoadBalancingModelConfig.model_name == model,
|
|
)
|
|
load_balancing_config_count = session.execute(stmt).scalar() or 0
|
|
if load_balancing_config_count <= 1:
|
|
raise ValueError("Model load balancing configuration must be more than 1.")
|
|
|
|
model_setting = self._get_provider_model_setting(model_type=model_type, model=model, session=session)
|
|
|
|
if model_setting:
|
|
model_setting.load_balancing_enabled = True
|
|
model_setting.updated_at = naive_utc_now()
|
|
else:
|
|
model_setting = ProviderModelSetting(
|
|
tenant_id=self.tenant_id,
|
|
provider_name=self.provider.provider,
|
|
model_type=model_type.to_origin_model_type(),
|
|
model_name=model,
|
|
load_balancing_enabled=True,
|
|
)
|
|
session.add(model_setting)
|
|
session.commit()
|
|
|
|
return model_setting
|
|
|
|
def disable_model_load_balancing(self, model_type: ModelType, model: str) -> ProviderModelSetting:
|
|
"""
|
|
Disable model load balancing.
|
|
:param model_type: model type
|
|
:param model: model name
|
|
:return:
|
|
"""
|
|
|
|
with Session(db.engine) as session:
|
|
model_setting = self._get_provider_model_setting(model_type=model_type, model=model, session=session)
|
|
|
|
if model_setting:
|
|
model_setting.load_balancing_enabled = False
|
|
model_setting.updated_at = naive_utc_now()
|
|
else:
|
|
model_setting = ProviderModelSetting(
|
|
tenant_id=self.tenant_id,
|
|
provider_name=self.provider.provider,
|
|
model_type=model_type.to_origin_model_type(),
|
|
model_name=model,
|
|
load_balancing_enabled=False,
|
|
)
|
|
session.add(model_setting)
|
|
session.commit()
|
|
|
|
return model_setting
|
|
|
|
def get_model_type_instance(self, model_type: ModelType) -> AIModel:
|
|
"""
|
|
Get current model type instance.
|
|
|
|
:param model_type: model type
|
|
:return:
|
|
"""
|
|
model_provider_factory = ModelProviderFactory(self.tenant_id)
|
|
|
|
# Get model instance of LLM
|
|
return model_provider_factory.get_model_type_instance(provider=self.provider.provider, model_type=model_type)
|
|
|
|
def get_model_schema(self, model_type: ModelType, model: str, credentials: dict | None) -> AIModelEntity | None:
|
|
"""
|
|
Get model schema
|
|
"""
|
|
model_provider_factory = ModelProviderFactory(self.tenant_id)
|
|
return model_provider_factory.get_model_schema(
|
|
provider=self.provider.provider, model_type=model_type, model=model, credentials=credentials
|
|
)
|
|
|
|
def switch_preferred_provider_type(self, provider_type: ProviderType, session: Session | None = None) -> None:
|
|
"""
|
|
Switch preferred provider type.
|
|
:param provider_type:
|
|
:return:
|
|
"""
|
|
if provider_type == self.preferred_provider_type:
|
|
return
|
|
|
|
if provider_type == ProviderType.SYSTEM and not self.system_configuration.enabled:
|
|
return
|
|
|
|
def _switch(s: Session) -> None:
|
|
# get preferred provider
|
|
model_provider_id = ModelProviderID(self.provider.provider)
|
|
provider_names = [self.provider.provider]
|
|
if model_provider_id.is_langgenius():
|
|
provider_names.append(model_provider_id.provider_name)
|
|
|
|
stmt = select(TenantPreferredModelProvider).where(
|
|
TenantPreferredModelProvider.tenant_id == self.tenant_id,
|
|
TenantPreferredModelProvider.provider_name.in_(provider_names),
|
|
)
|
|
preferred_model_provider = s.execute(stmt).scalars().first()
|
|
|
|
if preferred_model_provider:
|
|
preferred_model_provider.preferred_provider_type = provider_type.value
|
|
else:
|
|
preferred_model_provider = TenantPreferredModelProvider(
|
|
tenant_id=self.tenant_id,
|
|
provider_name=self.provider.provider,
|
|
preferred_provider_type=provider_type.value,
|
|
)
|
|
s.add(preferred_model_provider)
|
|
s.commit()
|
|
|
|
if session:
|
|
return _switch(session)
|
|
else:
|
|
with Session(db.engine) as session:
|
|
return _switch(session)
|
|
|
|
def extract_secret_variables(self, credential_form_schemas: list[CredentialFormSchema]) -> list[str]:
|
|
"""
|
|
Extract secret input form variables.
|
|
|
|
:param credential_form_schemas:
|
|
:return:
|
|
"""
|
|
secret_input_form_variables = []
|
|
for credential_form_schema in credential_form_schemas:
|
|
if credential_form_schema.type == FormType.SECRET_INPUT:
|
|
secret_input_form_variables.append(credential_form_schema.variable)
|
|
|
|
return secret_input_form_variables
|
|
|
|
def obfuscated_credentials(self, credentials: dict, credential_form_schemas: list[CredentialFormSchema]) -> dict:
|
|
"""
|
|
Obfuscated credentials.
|
|
|
|
:param credentials: credentials
|
|
:param credential_form_schemas: credential form schemas
|
|
:return:
|
|
"""
|
|
# Get provider credential secret variables
|
|
credential_secret_variables = self.extract_secret_variables(credential_form_schemas)
|
|
|
|
# Obfuscate provider credentials
|
|
copy_credentials = credentials.copy()
|
|
for key, value in copy_credentials.items():
|
|
if key in credential_secret_variables:
|
|
copy_credentials[key] = encrypter.obfuscated_token(value)
|
|
|
|
return copy_credentials
|
|
|
|
def get_provider_model(
|
|
self, model_type: ModelType, model: str, only_active: bool = False
|
|
) -> Optional[ModelWithProviderEntity]:
|
|
"""
|
|
Get provider model.
|
|
:param model_type: model type
|
|
:param model: model name
|
|
:param only_active: return active model only
|
|
:return:
|
|
"""
|
|
provider_models = self.get_provider_models(model_type, only_active, model)
|
|
|
|
for provider_model in provider_models:
|
|
if provider_model.model == model:
|
|
return provider_model
|
|
|
|
return None
|
|
|
|
def get_provider_models(
|
|
self, model_type: Optional[ModelType] = None, only_active: bool = False, model: Optional[str] = None
|
|
) -> list[ModelWithProviderEntity]:
|
|
"""
|
|
Get provider models.
|
|
:param model_type: model type
|
|
:param only_active: only active models
|
|
:param model: model name
|
|
:return:
|
|
"""
|
|
model_provider_factory = ModelProviderFactory(self.tenant_id)
|
|
provider_schema = model_provider_factory.get_provider_schema(self.provider.provider)
|
|
|
|
model_types: list[ModelType] = []
|
|
if model_type:
|
|
model_types.append(model_type)
|
|
else:
|
|
model_types = list(provider_schema.supported_model_types)
|
|
|
|
# Group model settings by model type and model
|
|
model_setting_map: defaultdict[ModelType, dict[str, ModelSettings]] = defaultdict(dict)
|
|
for model_setting in self.model_settings:
|
|
model_setting_map[model_setting.model_type][model_setting.model] = model_setting
|
|
|
|
if self.using_provider_type == ProviderType.SYSTEM:
|
|
provider_models = self._get_system_provider_models(
|
|
model_types=model_types, provider_schema=provider_schema, model_setting_map=model_setting_map
|
|
)
|
|
else:
|
|
provider_models = self._get_custom_provider_models(
|
|
model_types=model_types,
|
|
provider_schema=provider_schema,
|
|
model_setting_map=model_setting_map,
|
|
model=model,
|
|
)
|
|
|
|
if only_active:
|
|
provider_models = [m for m in provider_models if m.status == ModelStatus.ACTIVE]
|
|
|
|
# resort provider_models
|
|
# Optimize sorting logic: first sort by provider.position order, then by model_type.value
|
|
# Get the position list for model types (retrieve only once for better performance)
|
|
model_type_positions = {}
|
|
if hasattr(self.provider, "position") and self.provider.position:
|
|
model_type_positions = self.provider.position
|
|
|
|
def get_sort_key(model: ModelWithProviderEntity):
|
|
# Get the position list for the current model type
|
|
positions = model_type_positions.get(model.model_type.value, [])
|
|
|
|
# If the model name is in the position list, use its index for sorting
|
|
# Otherwise use a large value (list length) to place undefined models at the end
|
|
position_index = positions.index(model.model) if model.model in positions else len(positions)
|
|
|
|
# Return composite sort key: (model_type value, model position index)
|
|
return (model.model_type.value, position_index)
|
|
|
|
# Sort using the composite sort key
|
|
return sorted(provider_models, key=get_sort_key)
|
|
|
|
def _get_system_provider_models(
|
|
self,
|
|
model_types: Sequence[ModelType],
|
|
provider_schema: ProviderEntity,
|
|
model_setting_map: dict[ModelType, dict[str, ModelSettings]],
|
|
) -> list[ModelWithProviderEntity]:
|
|
"""
|
|
Get system provider models.
|
|
|
|
:param model_types: model types
|
|
:param provider_schema: provider schema
|
|
:param model_setting_map: model setting map
|
|
:return:
|
|
"""
|
|
provider_models = []
|
|
for model_type in model_types:
|
|
for m in provider_schema.models:
|
|
if m.model_type != model_type:
|
|
continue
|
|
|
|
status = ModelStatus.ACTIVE
|
|
if m.model_type in model_setting_map and m.model in model_setting_map[m.model_type]:
|
|
model_setting = model_setting_map[m.model_type][m.model]
|
|
if model_setting.enabled is False:
|
|
status = ModelStatus.DISABLED
|
|
|
|
provider_models.append(
|
|
ModelWithProviderEntity(
|
|
model=m.model,
|
|
label=m.label,
|
|
model_type=m.model_type,
|
|
features=m.features,
|
|
fetch_from=m.fetch_from,
|
|
model_properties=m.model_properties,
|
|
deprecated=m.deprecated,
|
|
provider=SimpleModelProviderEntity(self.provider),
|
|
status=status,
|
|
)
|
|
)
|
|
|
|
if self.provider.provider not in original_provider_configurate_methods:
|
|
original_provider_configurate_methods[self.provider.provider] = []
|
|
for configurate_method in provider_schema.configurate_methods:
|
|
original_provider_configurate_methods[self.provider.provider].append(configurate_method)
|
|
|
|
should_use_custom_model = False
|
|
if original_provider_configurate_methods[self.provider.provider] == [ConfigurateMethod.CUSTOMIZABLE_MODEL]:
|
|
should_use_custom_model = True
|
|
|
|
for quota_configuration in self.system_configuration.quota_configurations:
|
|
if self.system_configuration.current_quota_type != quota_configuration.quota_type:
|
|
continue
|
|
|
|
restrict_models = quota_configuration.restrict_models
|
|
if len(restrict_models) == 0:
|
|
break
|
|
|
|
if should_use_custom_model:
|
|
if original_provider_configurate_methods[self.provider.provider] == [
|
|
ConfigurateMethod.CUSTOMIZABLE_MODEL
|
|
]:
|
|
# only customizable model
|
|
for restrict_model in restrict_models:
|
|
copy_credentials = (
|
|
self.system_configuration.credentials.copy()
|
|
if self.system_configuration.credentials
|
|
else {}
|
|
)
|
|
if restrict_model.base_model_name:
|
|
copy_credentials["base_model_name"] = restrict_model.base_model_name
|
|
|
|
try:
|
|
custom_model_schema = self.get_model_schema(
|
|
model_type=restrict_model.model_type,
|
|
model=restrict_model.model,
|
|
credentials=copy_credentials,
|
|
)
|
|
except Exception as ex:
|
|
logger.warning("get custom model schema failed, %s", ex)
|
|
continue
|
|
|
|
if not custom_model_schema:
|
|
continue
|
|
|
|
if custom_model_schema.model_type not in model_types:
|
|
continue
|
|
|
|
status = ModelStatus.ACTIVE
|
|
if (
|
|
custom_model_schema.model_type in model_setting_map
|
|
and custom_model_schema.model in model_setting_map[custom_model_schema.model_type]
|
|
):
|
|
model_setting = model_setting_map[custom_model_schema.model_type][custom_model_schema.model]
|
|
if model_setting.enabled is False:
|
|
status = ModelStatus.DISABLED
|
|
|
|
provider_models.append(
|
|
ModelWithProviderEntity(
|
|
model=custom_model_schema.model,
|
|
label=custom_model_schema.label,
|
|
model_type=custom_model_schema.model_type,
|
|
features=custom_model_schema.features,
|
|
fetch_from=FetchFrom.PREDEFINED_MODEL,
|
|
model_properties=custom_model_schema.model_properties,
|
|
deprecated=custom_model_schema.deprecated,
|
|
provider=SimpleModelProviderEntity(self.provider),
|
|
status=status,
|
|
)
|
|
)
|
|
|
|
# if llm name not in restricted llm list, remove it
|
|
restrict_model_names = [rm.model for rm in restrict_models]
|
|
for model in provider_models:
|
|
if model.model_type == ModelType.LLM and model.model not in restrict_model_names:
|
|
model.status = ModelStatus.NO_PERMISSION
|
|
elif not quota_configuration.is_valid:
|
|
model.status = ModelStatus.QUOTA_EXCEEDED
|
|
|
|
return provider_models
|
|
|
|
def _get_custom_provider_models(
|
|
self,
|
|
model_types: Sequence[ModelType],
|
|
provider_schema: ProviderEntity,
|
|
model_setting_map: dict[ModelType, dict[str, ModelSettings]],
|
|
model: Optional[str] = None,
|
|
) -> list[ModelWithProviderEntity]:
|
|
"""
|
|
Get custom provider models.
|
|
|
|
:param model_types: model types
|
|
:param provider_schema: provider schema
|
|
:param model_setting_map: model setting map
|
|
:return:
|
|
"""
|
|
provider_models = []
|
|
|
|
credentials = None
|
|
if self.custom_configuration.provider:
|
|
credentials = self.custom_configuration.provider.credentials
|
|
|
|
for model_type in model_types:
|
|
if model_type not in self.provider.supported_model_types:
|
|
continue
|
|
|
|
for m in provider_schema.models:
|
|
if m.model_type != model_type:
|
|
continue
|
|
|
|
status = ModelStatus.ACTIVE if credentials else ModelStatus.NO_CONFIGURE
|
|
load_balancing_enabled = False
|
|
has_invalid_load_balancing_configs = False
|
|
if m.model_type in model_setting_map and m.model in model_setting_map[m.model_type]:
|
|
model_setting = model_setting_map[m.model_type][m.model]
|
|
if model_setting.enabled is False:
|
|
status = ModelStatus.DISABLED
|
|
|
|
provider_model_lb_configs = [
|
|
config
|
|
for config in model_setting.load_balancing_configs
|
|
if config.credential_source_type != "custom_model"
|
|
]
|
|
|
|
if len(provider_model_lb_configs) > 1:
|
|
load_balancing_enabled = True
|
|
|
|
if any(config.name == "__delete__" for config in provider_model_lb_configs):
|
|
has_invalid_load_balancing_configs = True
|
|
|
|
provider_models.append(
|
|
ModelWithProviderEntity(
|
|
model=m.model,
|
|
label=m.label,
|
|
model_type=m.model_type,
|
|
features=m.features,
|
|
fetch_from=m.fetch_from,
|
|
model_properties=m.model_properties,
|
|
deprecated=m.deprecated,
|
|
provider=SimpleModelProviderEntity(self.provider),
|
|
status=status,
|
|
load_balancing_enabled=load_balancing_enabled,
|
|
has_invalid_load_balancing_configs=has_invalid_load_balancing_configs,
|
|
)
|
|
)
|
|
|
|
# custom models
|
|
for model_configuration in self.custom_configuration.models:
|
|
if model_configuration.model_type not in model_types:
|
|
continue
|
|
if model and model != model_configuration.model:
|
|
continue
|
|
try:
|
|
custom_model_schema = self.get_model_schema(
|
|
model_type=model_configuration.model_type,
|
|
model=model_configuration.model,
|
|
credentials=model_configuration.credentials,
|
|
)
|
|
except Exception as ex:
|
|
logger.warning("get custom model schema failed, %s", ex)
|
|
continue
|
|
|
|
if not custom_model_schema:
|
|
continue
|
|
|
|
status = ModelStatus.ACTIVE
|
|
load_balancing_enabled = False
|
|
has_invalid_load_balancing_configs = False
|
|
if (
|
|
custom_model_schema.model_type in model_setting_map
|
|
and custom_model_schema.model in model_setting_map[custom_model_schema.model_type]
|
|
):
|
|
model_setting = model_setting_map[custom_model_schema.model_type][custom_model_schema.model]
|
|
if model_setting.enabled is False:
|
|
status = ModelStatus.DISABLED
|
|
|
|
custom_model_lb_configs = [
|
|
config
|
|
for config in model_setting.load_balancing_configs
|
|
if config.credential_source_type != "provider"
|
|
]
|
|
|
|
if len(custom_model_lb_configs) > 1:
|
|
load_balancing_enabled = True
|
|
|
|
if any(config.name == "__delete__" for config in custom_model_lb_configs):
|
|
has_invalid_load_balancing_configs = True
|
|
|
|
if len(model_configuration.available_model_credentials) > 0 and not model_configuration.credentials:
|
|
status = ModelStatus.CREDENTIAL_REMOVED
|
|
|
|
provider_models.append(
|
|
ModelWithProviderEntity(
|
|
model=custom_model_schema.model,
|
|
label=custom_model_schema.label,
|
|
model_type=custom_model_schema.model_type,
|
|
features=custom_model_schema.features,
|
|
fetch_from=FetchFrom.CUSTOMIZABLE_MODEL,
|
|
model_properties=custom_model_schema.model_properties,
|
|
deprecated=custom_model_schema.deprecated,
|
|
provider=SimpleModelProviderEntity(self.provider),
|
|
status=status,
|
|
load_balancing_enabled=load_balancing_enabled,
|
|
has_invalid_load_balancing_configs=has_invalid_load_balancing_configs,
|
|
)
|
|
)
|
|
|
|
return provider_models
|
|
|
|
|
|
class ProviderConfigurations(BaseModel):
|
|
"""
|
|
Model class for provider configuration dict.
|
|
"""
|
|
|
|
tenant_id: str
|
|
configurations: dict[str, ProviderConfiguration] = Field(default_factory=dict)
|
|
|
|
def __init__(self, tenant_id: str):
|
|
super().__init__(tenant_id=tenant_id)
|
|
|
|
def get_models(
|
|
self, provider: Optional[str] = None, model_type: Optional[ModelType] = None, only_active: bool = False
|
|
) -> list[ModelWithProviderEntity]:
|
|
"""
|
|
Get available models.
|
|
|
|
If preferred provider type is `system`:
|
|
Get the current **system mode** if provider supported,
|
|
if all system modes are not available (no quota), it is considered to be the **custom credential mode**.
|
|
If there is no model configured in custom mode, it is treated as no_configure.
|
|
system > custom > no_configure
|
|
|
|
If preferred provider type is `custom`:
|
|
If custom credentials are configured, it is treated as custom mode.
|
|
Otherwise, get the current **system mode** if supported,
|
|
If all system modes are not available (no quota), it is treated as no_configure.
|
|
custom > system > no_configure
|
|
|
|
If real mode is `system`, use system credentials to get models,
|
|
paid quotas > provider free quotas > system free quotas
|
|
include pre-defined models (exclude GPT-4, status marked as `no_permission`).
|
|
If real mode is `custom`, use workspace custom credentials to get models,
|
|
include pre-defined models, custom models(manual append).
|
|
If real mode is `no_configure`, only return pre-defined models from `model runtime`.
|
|
(model status marked as `no_configure` if preferred provider type is `custom` otherwise `quota_exceeded`)
|
|
model status marked as `active` is available.
|
|
|
|
:param provider: provider name
|
|
:param model_type: model type
|
|
:param only_active: only active models
|
|
:return:
|
|
"""
|
|
all_models = []
|
|
for provider_configuration in self.values():
|
|
if provider and provider_configuration.provider.provider != provider:
|
|
continue
|
|
|
|
all_models.extend(provider_configuration.get_provider_models(model_type, only_active))
|
|
|
|
return all_models
|
|
|
|
def to_list(self) -> list[ProviderConfiguration]:
|
|
"""
|
|
Convert to list.
|
|
|
|
:return:
|
|
"""
|
|
return list(self.values())
|
|
|
|
def __getitem__(self, key):
|
|
if "/" not in key:
|
|
key = str(ModelProviderID(key))
|
|
|
|
return self.configurations[key]
|
|
|
|
def __setitem__(self, key, value):
|
|
self.configurations[key] = value
|
|
|
|
def __iter__(self):
|
|
return iter(self.configurations)
|
|
|
|
def values(self) -> Iterator[ProviderConfiguration]:
|
|
return iter(self.configurations.values())
|
|
|
|
def get(self, key, default=None) -> ProviderConfiguration | None:
|
|
if "/" not in key:
|
|
key = str(ModelProviderID(key))
|
|
|
|
return self.configurations.get(key, default) # type: ignore
|
|
|
|
|
|
class ProviderModelBundle(BaseModel):
|
|
"""
|
|
Provider model bundle.
|
|
"""
|
|
|
|
configuration: ProviderConfiguration
|
|
model_type_instance: AIModel
|
|
|
|
# pydantic configs
|
|
model_config = ConfigDict(arbitrary_types_allowed=True, protected_namespaces=())
|