forked from phoenix-oss/llama-stack-mirror
Create a new agent: ``` curl --request POST \ --url http://localhost:8321/v1/agents \ --header 'Accept: application/json' \ --header 'Content-Type: application/json' \ --data '{ "agent_config": { "sampling_params": { "strategy": { "type": "greedy" }, "max_tokens": 0, "repetition_penalty": 1 }, "input_shields": [ "string" ], "output_shields": [ "string" ], "toolgroups": [ "string" ], "client_tools": [ { "name": "string", "description": "string", "parameters": [ { "name": "string", "parameter_type": "string", "description": "string", "required": true, "default": null } ], "metadata": { "property1": null, "property2": null } } ], "tool_choice": "auto", "tool_prompt_format": "json", "tool_config": { "tool_choice": "auto", "tool_prompt_format": "json", "system_message_behavior": "append" }, "max_infer_iters": 10, "model": "string", "instructions": "string", "enable_session_persistence": false, "response_format": { "type": "json_schema", "json_schema": { "property1": null, "property2": null } } } }' ``` Get agent: ``` curl http://127.0.0.1:8321/v1/agents/9abad4ab-2c77-45f9-9d16-46b79d2bea1f {"agent_id":"9abad4ab-2c77-45f9-9d16-46b79d2bea1f","agent_config":{"sampling_params":{"strategy":{"type":"greedy"},"max_tokens":0,"repetition_penalty":1.0},"input_shields":["string"],"output_shields":["string"],"toolgroups":["string"],"client_tools":[{"name":"string","description":"string","parameters":[{"name":"string","parameter_type":"string","description":"string","required":true,"default":null}],"metadata":{"property1":null,"property2":null}}],"tool_choice":"auto","tool_prompt_format":"json","tool_config":{"tool_choice":"auto","tool_prompt_format":"json","system_message_behavior":"append"},"max_infer_iters":10,"model":"string","instructions":"string","enable_session_persistence":false,"response_format":{"type":"json_schema","json_schema":{"property1":null,"property2":null}}},"created_at":"2025-03-12T16:18:28.369144Z"}% ``` List agents: ``` curl http://127.0.0.1:8321/v1/agents|jq % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 100 1680 100 1680 0 0 498k 0 --:--:-- --:--:-- --:--:-- 546k { "data": [ { "agent_id": "9abad4ab-2c77-45f9-9d16-46b79d2bea1f", "agent_config": { "sampling_params": { "strategy": { "type": "greedy" }, "max_tokens": 0, "repetition_penalty": 1.0 }, "input_shields": [ "string" ], "output_shields": [ "string" ], "toolgroups": [ "string" ], "client_tools": [ { "name": "string", "description": "string", "parameters": [ { "name": "string", "parameter_type": "string", "description": "string", "required": true, "default": null } ], "metadata": { "property1": null, "property2": null } } ], "tool_choice": "auto", "tool_prompt_format": "json", "tool_config": { "tool_choice": "auto", "tool_prompt_format": "json", "system_message_behavior": "append" }, "max_infer_iters": 10, "model": "string", "instructions": "string", "enable_session_persistence": false, "response_format": { "type": "json_schema", "json_schema": { "property1": null, "property2": null } } }, "created_at": "2025-03-12T16:18:28.369144Z" }, { "agent_id": "a6643aaa-96dd-46db-a405-333dc504b168", "agent_config": { "sampling_params": { "strategy": { "type": "greedy" }, "max_tokens": 0, "repetition_penalty": 1.0 }, "input_shields": [ "string" ], "output_shields": [ "string" ], "toolgroups": [ "string" ], "client_tools": [ { "name": "string", "description": "string", "parameters": [ { "name": "string", "parameter_type": "string", "description": "string", "required": true, "default": null } ], "metadata": { "property1": null, "property2": null } } ], "tool_choice": "auto", "tool_prompt_format": "json", "tool_config": { "tool_choice": "auto", "tool_prompt_format": "json", "system_message_behavior": "append" }, "max_infer_iters": 10, "model": "string", "instructions": "string", "enable_session_persistence": false, "response_format": { "type": "json_schema", "json_schema": { "property1": null, "property2": null } } }, "created_at": "2025-03-12T16:17:12.811273Z" } ] } ``` Create sessions: ``` curl --request POST \ --url http://localhost:8321/v1/agents/{agent_id}/session \ --header 'Accept: application/json' \ --header 'Content-Type: application/json' \ --data '{ "session_name": "string" }' ``` List sessions: ``` curl http://127.0.0.1:8321/v1/agents/9abad4ab-2c77-45f9-9d16-46b79d2bea1f/sessions|jq % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 100 263 100 263 0 0 90099 0 --:--:-- --:--:-- --:--:-- 128k [ { "session_id": "2b15c4fc-e348-46c1-ae32-f6d424441ac1", "session_name": "string", "turns": [], "started_at": "2025-03-12T17:19:17.784328" }, { "session_id": "9432472d-d483-4b73-b682-7b1d35d64111", "session_name": "string", "turns": [], "started_at": "2025-03-12T17:19:19.885834" } ] ``` Signed-off-by: Sébastien Han <seb@redhat.com>
212 lines
7.9 KiB
Python
212 lines
7.9 KiB
Python
# Copyright (c) Meta Platforms, Inc. and affiliates.
|
|
# All rights reserved.
|
|
#
|
|
# This source code is licensed under the terms described in the LICENSE file in
|
|
# the root directory of this source tree.
|
|
|
|
import json
|
|
import logging
|
|
import uuid
|
|
from datetime import datetime, timezone
|
|
|
|
from llama_stack.apis.agents import AgentConfig, Session, ToolExecutionStep, Turn
|
|
from llama_stack.distribution.access_control import check_access
|
|
from llama_stack.distribution.datatypes import AccessAttributes
|
|
from llama_stack.distribution.request_headers import get_auth_attributes
|
|
from llama_stack.providers.utils.kvstore import KVStore
|
|
|
|
log = logging.getLogger(__name__)
|
|
|
|
|
|
class AgentSessionInfo(Session):
|
|
# TODO: is this used anywhere?
|
|
vector_db_id: str | None = None
|
|
started_at: datetime
|
|
access_attributes: AccessAttributes | None = None
|
|
|
|
|
|
class AgentInfo(AgentConfig):
|
|
created_at: datetime
|
|
|
|
|
|
class AgentPersistence:
|
|
def __init__(self, agent_id: str, kvstore: KVStore):
|
|
self.agent_id = agent_id
|
|
self.kvstore = kvstore
|
|
|
|
async def create_session(self, name: str) -> str:
|
|
session_id = str(uuid.uuid4())
|
|
|
|
# Get current user's auth attributes for new sessions
|
|
auth_attributes = get_auth_attributes()
|
|
access_attributes = AccessAttributes(**auth_attributes) if auth_attributes else None
|
|
|
|
session_info = AgentSessionInfo(
|
|
session_id=session_id,
|
|
session_name=name,
|
|
started_at=datetime.now(timezone.utc),
|
|
access_attributes=access_attributes,
|
|
turns=[],
|
|
)
|
|
|
|
await self.kvstore.set(
|
|
key=f"session:{self.agent_id}:{session_id}",
|
|
value=session_info.model_dump_json(),
|
|
)
|
|
return session_id
|
|
|
|
async def get_session_info(self, session_id: str) -> AgentSessionInfo | None:
|
|
value = await self.kvstore.get(
|
|
key=f"session:{self.agent_id}:{session_id}",
|
|
)
|
|
if not value:
|
|
return None
|
|
|
|
session_info = AgentSessionInfo(**json.loads(value))
|
|
|
|
# Check access to session
|
|
if not self._check_session_access(session_info):
|
|
return None
|
|
|
|
return session_info
|
|
|
|
def _check_session_access(self, session_info: AgentSessionInfo) -> bool:
|
|
"""Check if current user has access to the session."""
|
|
# Handle backward compatibility for old sessions without access control
|
|
if not hasattr(session_info, "access_attributes"):
|
|
return True
|
|
|
|
return check_access(session_info.session_id, session_info.access_attributes, get_auth_attributes())
|
|
|
|
async def get_session_if_accessible(self, session_id: str) -> AgentSessionInfo | None:
|
|
"""Get session info if the user has access to it. For internal use by sub-session methods."""
|
|
session_info = await self.get_session_info(session_id)
|
|
if not session_info:
|
|
return None
|
|
|
|
return session_info
|
|
|
|
async def add_vector_db_to_session(self, session_id: str, vector_db_id: str):
|
|
session_info = await self.get_session_if_accessible(session_id)
|
|
if session_info is None:
|
|
raise ValueError(f"Session {session_id} not found or access denied")
|
|
|
|
session_info.vector_db_id = vector_db_id
|
|
await self.kvstore.set(
|
|
key=f"session:{self.agent_id}:{session_id}",
|
|
value=session_info.model_dump_json(),
|
|
)
|
|
|
|
async def add_turn_to_session(self, session_id: str, turn: Turn):
|
|
if not await self.get_session_if_accessible(session_id):
|
|
raise ValueError(f"Session {session_id} not found or access denied")
|
|
|
|
await self.kvstore.set(
|
|
key=f"session:{self.agent_id}:{session_id}:{turn.turn_id}",
|
|
value=turn.model_dump_json(),
|
|
)
|
|
|
|
async def get_session_turns(self, session_id: str) -> list[Turn]:
|
|
if not await self.get_session_if_accessible(session_id):
|
|
raise ValueError(f"Session {session_id} not found or access denied")
|
|
|
|
values = await self.kvstore.values_in_range(
|
|
start_key=f"session:{self.agent_id}:{session_id}:",
|
|
end_key=f"session:{self.agent_id}:{session_id}:\xff\xff\xff\xff",
|
|
)
|
|
turns = []
|
|
for value in values:
|
|
try:
|
|
turn = Turn(**json.loads(value))
|
|
turns.append(turn)
|
|
except Exception as e:
|
|
log.error(f"Error parsing turn: {e}")
|
|
continue
|
|
return turns
|
|
|
|
async def get_session_turn(self, session_id: str, turn_id: str) -> Turn | None:
|
|
if not await self.get_session_if_accessible(session_id):
|
|
raise ValueError(f"Session {session_id} not found or access denied")
|
|
|
|
value = await self.kvstore.get(
|
|
key=f"session:{self.agent_id}:{session_id}:{turn_id}",
|
|
)
|
|
if not value:
|
|
return None
|
|
return Turn(**json.loads(value))
|
|
|
|
async def set_in_progress_tool_call_step(self, session_id: str, turn_id: str, step: ToolExecutionStep):
|
|
if not await self.get_session_if_accessible(session_id):
|
|
raise ValueError(f"Session {session_id} not found or access denied")
|
|
|
|
await self.kvstore.set(
|
|
key=f"in_progress_tool_call_step:{self.agent_id}:{session_id}:{turn_id}",
|
|
value=step.model_dump_json(),
|
|
)
|
|
|
|
async def get_in_progress_tool_call_step(self, session_id: str, turn_id: str) -> ToolExecutionStep | None:
|
|
if not await self.get_session_if_accessible(session_id):
|
|
return None
|
|
|
|
value = await self.kvstore.get(
|
|
key=f"in_progress_tool_call_step:{self.agent_id}:{session_id}:{turn_id}",
|
|
)
|
|
return ToolExecutionStep(**json.loads(value)) if value else None
|
|
|
|
async def set_num_infer_iters_in_turn(self, session_id: str, turn_id: str, num_infer_iters: int):
|
|
if not await self.get_session_if_accessible(session_id):
|
|
raise ValueError(f"Session {session_id} not found or access denied")
|
|
|
|
await self.kvstore.set(
|
|
key=f"num_infer_iters_in_turn:{self.agent_id}:{session_id}:{turn_id}",
|
|
value=str(num_infer_iters),
|
|
)
|
|
|
|
async def get_num_infer_iters_in_turn(self, session_id: str, turn_id: str) -> int | None:
|
|
if not await self.get_session_if_accessible(session_id):
|
|
return None
|
|
|
|
value = await self.kvstore.get(
|
|
key=f"num_infer_iters_in_turn:{self.agent_id}:{session_id}:{turn_id}",
|
|
)
|
|
return int(value) if value else None
|
|
|
|
async def list_sessions(self) -> list[Session]:
|
|
values = await self.kvstore.values_in_range(
|
|
start_key=f"session:{self.agent_id}:",
|
|
end_key=f"session:{self.agent_id}:\xff\xff\xff\xff",
|
|
)
|
|
sessions = []
|
|
for value in values:
|
|
try:
|
|
session_info = Session(**json.loads(value))
|
|
sessions.append(session_info)
|
|
except Exception as e:
|
|
log.error(f"Error parsing session info: {e}")
|
|
continue
|
|
return sessions
|
|
|
|
async def delete_session_turns(self, session_id: str) -> None:
|
|
"""Delete all turns and their associated data for a session.
|
|
|
|
Args:
|
|
session_id: The ID of the session whose turns should be deleted.
|
|
"""
|
|
turns = await self.get_session_turns(session_id)
|
|
for turn in turns:
|
|
await self.kvstore.delete(key=f"session:{self.agent_id}:{session_id}:{turn.turn_id}")
|
|
|
|
async def delete_session(self, session_id: str) -> None:
|
|
"""Delete a session and all its associated turns.
|
|
|
|
Args:
|
|
session_id: The ID of the session to delete.
|
|
|
|
Raises:
|
|
ValueError: If the session does not exist.
|
|
"""
|
|
session_info = await self.get_session_info(session_id)
|
|
if session_info is None:
|
|
raise ValueError(f"Session {session_id} not found")
|
|
|
|
await self.kvstore.delete(key=f"session:{self.agent_id}:{session_id}")
|