tools.py 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416
  1. import os
  2. from pathlib import Path
  3. from typing import Optional
  4. from open_webui.apps.webui.models.tools import ToolForm, ToolModel, ToolResponse, Tools
  5. from open_webui.apps.webui.utils import load_tools_module_by_id, replace_imports
  6. from open_webui.config import CACHE_DIR, DATA_DIR
  7. from open_webui.constants import ERROR_MESSAGES
  8. from fastapi import APIRouter, Depends, HTTPException, Request, status
  9. from open_webui.utils.tools import get_tools_specs
  10. from open_webui.utils.utils import get_admin_user, get_verified_user
  11. from open_webui.utils.access_control import has_access, has_permission
  12. router = APIRouter()
  13. ############################
  14. # GetTools
  15. ############################
  16. @router.get("/", response_model=list[ToolResponse])
  17. async def get_tools(user=Depends(get_verified_user)):
  18. if user.role == "admin":
  19. tools = Tools.get_tools()
  20. else:
  21. tools = Tools.get_tools_by_user_id(user.id, "read")
  22. return tools
  23. ############################
  24. # GetToolList
  25. ############################
  26. @router.get("/list", response_model=list[ToolResponse])
  27. async def get_tool_list(user=Depends(get_verified_user)):
  28. if user.role == "admin":
  29. tools = Tools.get_tools()
  30. else:
  31. tools = Tools.get_tools_by_user_id(user.id, "write")
  32. return tools
  33. ############################
  34. # ExportTools
  35. ############################
  36. @router.get("/export", response_model=list[ToolModel])
  37. async def export_tools(user=Depends(get_admin_user)):
  38. tools = Tools.get_tools()
  39. return tools
  40. ############################
  41. # CreateNewTools
  42. ############################
  43. @router.post("/create", response_model=Optional[ToolResponse])
  44. async def create_new_tools(
  45. request: Request,
  46. form_data: ToolForm,
  47. user=Depends(get_verified_user),
  48. ):
  49. if user.role != "admin" and not has_permission(
  50. user.id, "workspace.knowledge", request.app.state.config.USER_PERMISSIONS
  51. ):
  52. raise HTTPException(
  53. status_code=status.HTTP_401_UNAUTHORIZED,
  54. detail=ERROR_MESSAGES.UNAUTHORIZED,
  55. )
  56. if not form_data.id.isidentifier():
  57. raise HTTPException(
  58. status_code=status.HTTP_400_BAD_REQUEST,
  59. detail="Only alphanumeric characters and underscores are allowed in the id",
  60. )
  61. form_data.id = form_data.id.lower()
  62. tools = Tools.get_tool_by_id(form_data.id)
  63. if tools is None:
  64. try:
  65. form_data.content = replace_imports(form_data.content)
  66. tools_module, frontmatter = load_tools_module_by_id(
  67. form_data.id, content=form_data.content
  68. )
  69. form_data.meta.manifest = frontmatter
  70. TOOLS = request.app.state.TOOLS
  71. TOOLS[form_data.id] = tools_module
  72. specs = get_tools_specs(TOOLS[form_data.id])
  73. tools = Tools.insert_new_tool(user.id, form_data, specs)
  74. tool_cache_dir = Path(CACHE_DIR) / "tools" / form_data.id
  75. tool_cache_dir.mkdir(parents=True, exist_ok=True)
  76. if tools:
  77. return tools
  78. else:
  79. raise HTTPException(
  80. status_code=status.HTTP_400_BAD_REQUEST,
  81. detail=ERROR_MESSAGES.DEFAULT("Error creating tools"),
  82. )
  83. except Exception as e:
  84. print(e)
  85. raise HTTPException(
  86. status_code=status.HTTP_400_BAD_REQUEST,
  87. detail=ERROR_MESSAGES.DEFAULT(str(e)),
  88. )
  89. else:
  90. raise HTTPException(
  91. status_code=status.HTTP_400_BAD_REQUEST,
  92. detail=ERROR_MESSAGES.ID_TAKEN,
  93. )
  94. ############################
  95. # GetToolsById
  96. ############################
  97. @router.get("/id/{id}", response_model=Optional[ToolModel])
  98. async def get_tools_by_id(id: str, user=Depends(get_verified_user)):
  99. tools = Tools.get_tool_by_id(id)
  100. if tools:
  101. if (
  102. user.role == "admin"
  103. or tools.user_id == user.id
  104. or has_access(user.id, "read", tools.access_control)
  105. ):
  106. return tools
  107. else:
  108. raise HTTPException(
  109. status_code=status.HTTP_401_UNAUTHORIZED,
  110. detail=ERROR_MESSAGES.NOT_FOUND,
  111. )
  112. ############################
  113. # UpdateToolsById
  114. ############################
  115. @router.post("/id/{id}/update", response_model=Optional[ToolModel])
  116. async def update_tools_by_id(
  117. request: Request,
  118. id: str,
  119. form_data: ToolForm,
  120. user=Depends(get_verified_user),
  121. ):
  122. tools = Tools.get_tool_by_id(id)
  123. if not tools:
  124. raise HTTPException(
  125. status_code=status.HTTP_401_UNAUTHORIZED,
  126. detail=ERROR_MESSAGES.NOT_FOUND,
  127. )
  128. if tools.user_id != user.id and user.role != "admin":
  129. raise HTTPException(
  130. status_code=status.HTTP_401_UNAUTHORIZED,
  131. detail=ERROR_MESSAGES.UNAUTHORIZED,
  132. )
  133. try:
  134. form_data.content = replace_imports(form_data.content)
  135. tools_module, frontmatter = load_tools_module_by_id(
  136. id, content=form_data.content
  137. )
  138. form_data.meta.manifest = frontmatter
  139. TOOLS = request.app.state.TOOLS
  140. TOOLS[id] = tools_module
  141. specs = get_tools_specs(TOOLS[id])
  142. updated = {
  143. **form_data.model_dump(exclude={"id"}),
  144. "specs": specs,
  145. }
  146. print(updated)
  147. tools = Tools.update_tool_by_id(id, updated)
  148. if tools:
  149. return tools
  150. else:
  151. raise HTTPException(
  152. status_code=status.HTTP_400_BAD_REQUEST,
  153. detail=ERROR_MESSAGES.DEFAULT("Error updating tools"),
  154. )
  155. except Exception as e:
  156. raise HTTPException(
  157. status_code=status.HTTP_400_BAD_REQUEST,
  158. detail=ERROR_MESSAGES.DEFAULT(str(e)),
  159. )
  160. ############################
  161. # DeleteToolsById
  162. ############################
  163. @router.delete("/id/{id}/delete", response_model=bool)
  164. async def delete_tools_by_id(
  165. request: Request, id: str, user=Depends(get_verified_user)
  166. ):
  167. tools = Tools.get_tool_by_id(id)
  168. if not tools:
  169. raise HTTPException(
  170. status_code=status.HTTP_401_UNAUTHORIZED,
  171. detail=ERROR_MESSAGES.NOT_FOUND,
  172. )
  173. if tools.user_id != user.id and user.role != "admin":
  174. raise HTTPException(
  175. status_code=status.HTTP_401_UNAUTHORIZED,
  176. detail=ERROR_MESSAGES.UNAUTHORIZED,
  177. )
  178. result = Tools.delete_tool_by_id(id)
  179. if result:
  180. TOOLS = request.app.state.TOOLS
  181. if id in TOOLS:
  182. del TOOLS[id]
  183. return result
  184. ############################
  185. # GetToolValves
  186. ############################
  187. @router.get("/id/{id}/valves", response_model=Optional[dict])
  188. async def get_tools_valves_by_id(id: str, user=Depends(get_verified_user)):
  189. tools = Tools.get_tool_by_id(id)
  190. if tools:
  191. try:
  192. valves = Tools.get_tool_valves_by_id(id)
  193. return valves
  194. except Exception as e:
  195. raise HTTPException(
  196. status_code=status.HTTP_400_BAD_REQUEST,
  197. detail=ERROR_MESSAGES.DEFAULT(str(e)),
  198. )
  199. else:
  200. raise HTTPException(
  201. status_code=status.HTTP_401_UNAUTHORIZED,
  202. detail=ERROR_MESSAGES.NOT_FOUND,
  203. )
  204. ############################
  205. # GetToolValvesSpec
  206. ############################
  207. @router.get("/id/{id}/valves/spec", response_model=Optional[dict])
  208. async def get_tools_valves_spec_by_id(
  209. request: Request, id: str, user=Depends(get_verified_user)
  210. ):
  211. tools = Tools.get_tool_by_id(id)
  212. if tools:
  213. if id in request.app.state.TOOLS:
  214. tools_module = request.app.state.TOOLS[id]
  215. else:
  216. tools_module, _ = load_tools_module_by_id(id)
  217. request.app.state.TOOLS[id] = tools_module
  218. if hasattr(tools_module, "Valves"):
  219. Valves = tools_module.Valves
  220. return Valves.schema()
  221. return None
  222. else:
  223. raise HTTPException(
  224. status_code=status.HTTP_401_UNAUTHORIZED,
  225. detail=ERROR_MESSAGES.NOT_FOUND,
  226. )
  227. ############################
  228. # UpdateToolValves
  229. ############################
  230. @router.post("/id/{id}/valves/update", response_model=Optional[dict])
  231. async def update_tools_valves_by_id(
  232. request: Request, id: str, form_data: dict, user=Depends(get_verified_user)
  233. ):
  234. tools = Tools.get_tool_by_id(id)
  235. if tools:
  236. if id in request.app.state.TOOLS:
  237. tools_module = request.app.state.TOOLS[id]
  238. else:
  239. tools_module, _ = load_tools_module_by_id(id)
  240. request.app.state.TOOLS[id] = tools_module
  241. if hasattr(tools_module, "Valves"):
  242. Valves = tools_module.Valves
  243. try:
  244. form_data = {k: v for k, v in form_data.items() if v is not None}
  245. valves = Valves(**form_data)
  246. Tools.update_tool_valves_by_id(id, valves.model_dump())
  247. return valves.model_dump()
  248. except Exception as e:
  249. print(e)
  250. raise HTTPException(
  251. status_code=status.HTTP_400_BAD_REQUEST,
  252. detail=ERROR_MESSAGES.DEFAULT(str(e)),
  253. )
  254. else:
  255. raise HTTPException(
  256. status_code=status.HTTP_401_UNAUTHORIZED,
  257. detail=ERROR_MESSAGES.NOT_FOUND,
  258. )
  259. else:
  260. raise HTTPException(
  261. status_code=status.HTTP_401_UNAUTHORIZED,
  262. detail=ERROR_MESSAGES.NOT_FOUND,
  263. )
  264. ############################
  265. # ToolUserValves
  266. ############################
  267. @router.get("/id/{id}/valves/user", response_model=Optional[dict])
  268. async def get_tools_user_valves_by_id(id: str, user=Depends(get_verified_user)):
  269. tools = Tools.get_tool_by_id(id)
  270. if tools:
  271. try:
  272. user_valves = Tools.get_user_valves_by_id_and_user_id(id, user.id)
  273. return user_valves
  274. except Exception as e:
  275. raise HTTPException(
  276. status_code=status.HTTP_400_BAD_REQUEST,
  277. detail=ERROR_MESSAGES.DEFAULT(str(e)),
  278. )
  279. else:
  280. raise HTTPException(
  281. status_code=status.HTTP_401_UNAUTHORIZED,
  282. detail=ERROR_MESSAGES.NOT_FOUND,
  283. )
  284. @router.get("/id/{id}/valves/user/spec", response_model=Optional[dict])
  285. async def get_tools_user_valves_spec_by_id(
  286. request: Request, id: str, user=Depends(get_verified_user)
  287. ):
  288. tools = Tools.get_tool_by_id(id)
  289. if tools:
  290. if id in request.app.state.TOOLS:
  291. tools_module = request.app.state.TOOLS[id]
  292. else:
  293. tools_module, _ = load_tools_module_by_id(id)
  294. request.app.state.TOOLS[id] = tools_module
  295. if hasattr(tools_module, "UserValves"):
  296. UserValves = tools_module.UserValves
  297. return UserValves.schema()
  298. return None
  299. else:
  300. raise HTTPException(
  301. status_code=status.HTTP_401_UNAUTHORIZED,
  302. detail=ERROR_MESSAGES.NOT_FOUND,
  303. )
  304. @router.post("/id/{id}/valves/user/update", response_model=Optional[dict])
  305. async def update_tools_user_valves_by_id(
  306. request: Request, id: str, form_data: dict, user=Depends(get_verified_user)
  307. ):
  308. tools = Tools.get_tool_by_id(id)
  309. if tools:
  310. if id in request.app.state.TOOLS:
  311. tools_module = request.app.state.TOOLS[id]
  312. else:
  313. tools_module, _ = load_tools_module_by_id(id)
  314. request.app.state.TOOLS[id] = tools_module
  315. if hasattr(tools_module, "UserValves"):
  316. UserValves = tools_module.UserValves
  317. try:
  318. form_data = {k: v for k, v in form_data.items() if v is not None}
  319. user_valves = UserValves(**form_data)
  320. Tools.update_user_valves_by_id_and_user_id(
  321. id, user.id, user_valves.model_dump()
  322. )
  323. return user_valves.model_dump()
  324. except Exception as e:
  325. print(e)
  326. raise HTTPException(
  327. status_code=status.HTTP_400_BAD_REQUEST,
  328. detail=ERROR_MESSAGES.DEFAULT(str(e)),
  329. )
  330. else:
  331. raise HTTPException(
  332. status_code=status.HTTP_401_UNAUTHORIZED,
  333. detail=ERROR_MESSAGES.NOT_FOUND,
  334. )
  335. else:
  336. raise HTTPException(
  337. status_code=status.HTTP_401_UNAUTHORIZED,
  338. detail=ERROR_MESSAGES.NOT_FOUND,
  339. )