forked from phoenix/litellm-mirror
Compare commits
13 commits
main
...
litellm_de
Author | SHA1 | Date | |
---|---|---|---|
|
48e926d673 | ||
|
78d630f7ff | ||
|
cebfcfc2d7 | ||
|
fbf54900b1 | ||
|
3ebc685f9a | ||
|
5d09f5778f | ||
|
9b96ae6d78 | ||
|
643e5b755c | ||
|
829199d538 | ||
|
43e0b52f6f | ||
|
5338f8b3e3 | ||
|
1277f553ee | ||
|
7ae5d51964 |
11 changed files with 274 additions and 81 deletions
|
@ -1373,6 +1373,7 @@ jobs:
|
||||||
name: Install Dependencies
|
name: Install Dependencies
|
||||||
command: |
|
command: |
|
||||||
npm install -D @playwright/test
|
npm install -D @playwright/test
|
||||||
|
npm install @google-cloud/vertexai
|
||||||
pip install "pytest==7.3.1"
|
pip install "pytest==7.3.1"
|
||||||
pip install "pytest-retry==1.6.3"
|
pip install "pytest-retry==1.6.3"
|
||||||
pip install "pytest-asyncio==0.21.1"
|
pip install "pytest-asyncio==0.21.1"
|
||||||
|
@ -1434,7 +1435,7 @@ jobs:
|
||||||
- run:
|
- run:
|
||||||
name: Run Playwright Tests
|
name: Run Playwright Tests
|
||||||
command: |
|
command: |
|
||||||
npx playwright test --reporter=html --output=test-results
|
npx playwright test e2e_ui_tests/ --reporter=html --output=test-results
|
||||||
no_output_timeout: 120m
|
no_output_timeout: 120m
|
||||||
- store_test_results:
|
- store_test_results:
|
||||||
path: test-results
|
path: test-results
|
||||||
|
|
|
@ -820,6 +820,7 @@ litellm_settings:
|
||||||
key_generation_settings:
|
key_generation_settings:
|
||||||
team_key_generation:
|
team_key_generation:
|
||||||
allowed_team_member_roles: ["admin"]
|
allowed_team_member_roles: ["admin"]
|
||||||
|
required_params: ["tags"] # require team admins to set tags for cost-tracking when generating a team key
|
||||||
personal_key_generation: # maps to 'Default Team' on UI
|
personal_key_generation: # maps to 'Default Team' on UI
|
||||||
allowed_user_roles: ["proxy_admin"]
|
allowed_user_roles: ["proxy_admin"]
|
||||||
```
|
```
|
||||||
|
@ -829,10 +830,12 @@ litellm_settings:
|
||||||
```python
|
```python
|
||||||
class TeamUIKeyGenerationConfig(TypedDict):
|
class TeamUIKeyGenerationConfig(TypedDict):
|
||||||
allowed_team_member_roles: List[str]
|
allowed_team_member_roles: List[str]
|
||||||
|
required_params: List[str] # require params on `/key/generate` to be set if a team key (team_id in request) is being generated
|
||||||
|
|
||||||
|
|
||||||
class PersonalUIKeyGenerationConfig(TypedDict):
|
class PersonalUIKeyGenerationConfig(TypedDict):
|
||||||
allowed_user_roles: List[LitellmUserRoles]
|
allowed_user_roles: List[LitellmUserRoles]
|
||||||
|
required_params: List[str] # require params on `/key/generate` to be set if a personal key (no team_id in request) is being generated
|
||||||
|
|
||||||
|
|
||||||
class StandardKeyGenerationConfig(TypedDict, total=False):
|
class StandardKeyGenerationConfig(TypedDict, total=False):
|
||||||
|
|
|
@ -11,28 +11,4 @@ model_list:
|
||||||
model: vertex_ai/claude-3-5-sonnet-v2
|
model: vertex_ai/claude-3-5-sonnet-v2
|
||||||
vertex_ai_project: "adroit-crow-413218"
|
vertex_ai_project: "adroit-crow-413218"
|
||||||
vertex_ai_location: "us-east5"
|
vertex_ai_location: "us-east5"
|
||||||
- model_name: fake-openai-endpoint
|
|
||||||
litellm_params:
|
|
||||||
model: openai/fake
|
|
||||||
api_key: fake-key
|
|
||||||
api_base: https://exampleopenaiendpoint-production.up.railway.app/
|
|
||||||
|
|
||||||
router_settings:
|
|
||||||
model_group_alias:
|
|
||||||
"gpt-4-turbo": # Aliased model name
|
|
||||||
model: "gpt-4" # Actual model name in 'model_list'
|
|
||||||
hidden: true
|
|
||||||
|
|
||||||
litellm_settings:
|
|
||||||
default_team_settings:
|
|
||||||
- team_id: team-1
|
|
||||||
success_callback: ["langfuse"]
|
|
||||||
failure_callback: ["langfuse"]
|
|
||||||
langfuse_public_key: os.environ/LANGFUSE_PROJECT1_PUBLIC # Project 1
|
|
||||||
langfuse_secret: os.environ/LANGFUSE_PROJECT1_SECRET # Project 1
|
|
||||||
- team_id: team-2
|
|
||||||
success_callback: ["langfuse"]
|
|
||||||
failure_callback: ["langfuse"]
|
|
||||||
langfuse_public_key: os.environ/LANGFUSE_PROJECT2_PUBLIC # Project 2
|
|
||||||
langfuse_secret: os.environ/LANGFUSE_PROJECT2_SECRET # Project 2
|
|
||||||
langfuse_host: https://us.cloud.langfuse.com
|
|
||||||
|
|
|
@ -39,16 +39,20 @@ from litellm.proxy.utils import (
|
||||||
handle_exception_on_proxy,
|
handle_exception_on_proxy,
|
||||||
)
|
)
|
||||||
from litellm.secret_managers.main import get_secret
|
from litellm.secret_managers.main import get_secret
|
||||||
|
from litellm.types.utils import PersonalUIKeyGenerationConfig, TeamUIKeyGenerationConfig
|
||||||
|
|
||||||
|
|
||||||
def _is_team_key(data: GenerateKeyRequest):
|
def _is_team_key(data: GenerateKeyRequest):
|
||||||
return data.team_id is not None
|
return data.team_id is not None
|
||||||
|
|
||||||
|
|
||||||
def _team_key_generation_check(user_api_key_dict: UserAPIKeyAuth):
|
def _team_key_generation_team_member_check(
|
||||||
|
user_api_key_dict: UserAPIKeyAuth,
|
||||||
|
team_key_generation: Optional[TeamUIKeyGenerationConfig],
|
||||||
|
):
|
||||||
if (
|
if (
|
||||||
litellm.key_generation_settings is None
|
team_key_generation is None
|
||||||
or litellm.key_generation_settings.get("team_key_generation") is None
|
or "allowed_team_member_roles" not in team_key_generation
|
||||||
):
|
):
|
||||||
return True
|
return True
|
||||||
|
|
||||||
|
@ -59,12 +63,7 @@ def _team_key_generation_check(user_api_key_dict: UserAPIKeyAuth):
|
||||||
)
|
)
|
||||||
|
|
||||||
team_member_role = user_api_key_dict.team_member.role
|
team_member_role = user_api_key_dict.team_member.role
|
||||||
if (
|
if team_member_role not in team_key_generation["allowed_team_member_roles"]:
|
||||||
team_member_role
|
|
||||||
not in litellm.key_generation_settings["team_key_generation"][ # type: ignore
|
|
||||||
"allowed_team_member_roles"
|
|
||||||
]
|
|
||||||
):
|
|
||||||
raise HTTPException(
|
raise HTTPException(
|
||||||
status_code=400,
|
status_code=400,
|
||||||
detail=f"Team member role {team_member_role} not in allowed_team_member_roles={litellm.key_generation_settings['team_key_generation']['allowed_team_member_roles']}", # type: ignore
|
detail=f"Team member role {team_member_role} not in allowed_team_member_roles={litellm.key_generation_settings['team_key_generation']['allowed_team_member_roles']}", # type: ignore
|
||||||
|
@ -72,7 +71,67 @@ def _team_key_generation_check(user_api_key_dict: UserAPIKeyAuth):
|
||||||
return True
|
return True
|
||||||
|
|
||||||
|
|
||||||
def _personal_key_generation_check(user_api_key_dict: UserAPIKeyAuth):
|
def _key_generation_required_param_check(
|
||||||
|
data: GenerateKeyRequest, required_params: Optional[List[str]]
|
||||||
|
):
|
||||||
|
if required_params is None:
|
||||||
|
return True
|
||||||
|
|
||||||
|
data_dict = data.model_dump(exclude_unset=True)
|
||||||
|
for param in required_params:
|
||||||
|
if param not in data_dict:
|
||||||
|
raise HTTPException(
|
||||||
|
status_code=400,
|
||||||
|
detail=f"Required param {param} not in data",
|
||||||
|
)
|
||||||
|
return True
|
||||||
|
|
||||||
|
|
||||||
|
def _team_key_generation_check(
|
||||||
|
user_api_key_dict: UserAPIKeyAuth, data: GenerateKeyRequest
|
||||||
|
):
|
||||||
|
if (
|
||||||
|
litellm.key_generation_settings is None
|
||||||
|
or litellm.key_generation_settings.get("team_key_generation") is None
|
||||||
|
):
|
||||||
|
return True
|
||||||
|
|
||||||
|
_team_key_generation = litellm.key_generation_settings["team_key_generation"] # type: ignore
|
||||||
|
|
||||||
|
_team_key_generation_team_member_check(
|
||||||
|
user_api_key_dict,
|
||||||
|
team_key_generation=_team_key_generation,
|
||||||
|
)
|
||||||
|
_key_generation_required_param_check(
|
||||||
|
data,
|
||||||
|
_team_key_generation.get("required_params"),
|
||||||
|
)
|
||||||
|
|
||||||
|
return True
|
||||||
|
|
||||||
|
|
||||||
|
def _personal_key_membership_check(
|
||||||
|
user_api_key_dict: UserAPIKeyAuth,
|
||||||
|
personal_key_generation: Optional[PersonalUIKeyGenerationConfig],
|
||||||
|
):
|
||||||
|
if (
|
||||||
|
personal_key_generation is None
|
||||||
|
or "allowed_user_roles" not in personal_key_generation
|
||||||
|
):
|
||||||
|
return True
|
||||||
|
|
||||||
|
if user_api_key_dict.user_role not in personal_key_generation["allowed_user_roles"]:
|
||||||
|
raise HTTPException(
|
||||||
|
status_code=400,
|
||||||
|
detail=f"Personal key creation has been restricted by admin. Allowed roles={litellm.key_generation_settings['personal_key_generation']['allowed_user_roles']}. Your role={user_api_key_dict.user_role}", # type: ignore
|
||||||
|
)
|
||||||
|
|
||||||
|
return True
|
||||||
|
|
||||||
|
|
||||||
|
def _personal_key_generation_check(
|
||||||
|
user_api_key_dict: UserAPIKeyAuth, data: GenerateKeyRequest
|
||||||
|
):
|
||||||
|
|
||||||
if (
|
if (
|
||||||
litellm.key_generation_settings is None
|
litellm.key_generation_settings is None
|
||||||
|
@ -80,16 +139,18 @@ def _personal_key_generation_check(user_api_key_dict: UserAPIKeyAuth):
|
||||||
):
|
):
|
||||||
return True
|
return True
|
||||||
|
|
||||||
if (
|
_personal_key_generation = litellm.key_generation_settings["personal_key_generation"] # type: ignore
|
||||||
user_api_key_dict.user_role
|
|
||||||
not in litellm.key_generation_settings["personal_key_generation"][ # type: ignore
|
_personal_key_membership_check(
|
||||||
"allowed_user_roles"
|
user_api_key_dict,
|
||||||
]
|
personal_key_generation=_personal_key_generation,
|
||||||
):
|
)
|
||||||
raise HTTPException(
|
|
||||||
status_code=400,
|
_key_generation_required_param_check(
|
||||||
detail=f"Personal key creation has been restricted by admin. Allowed roles={litellm.key_generation_settings['personal_key_generation']['allowed_user_roles']}. Your role={user_api_key_dict.user_role}", # type: ignore
|
data,
|
||||||
)
|
_personal_key_generation.get("required_params"),
|
||||||
|
)
|
||||||
|
|
||||||
return True
|
return True
|
||||||
|
|
||||||
|
|
||||||
|
@ -99,16 +160,23 @@ def key_generation_check(
|
||||||
"""
|
"""
|
||||||
Check if admin has restricted key creation to certain roles for teams or individuals
|
Check if admin has restricted key creation to certain roles for teams or individuals
|
||||||
"""
|
"""
|
||||||
if litellm.key_generation_settings is None:
|
if (
|
||||||
|
litellm.key_generation_settings is None
|
||||||
|
or user_api_key_dict.user_role == LitellmUserRoles.PROXY_ADMIN.value
|
||||||
|
):
|
||||||
return True
|
return True
|
||||||
|
|
||||||
## check if key is for team or individual
|
## check if key is for team or individual
|
||||||
is_team_key = _is_team_key(data=data)
|
is_team_key = _is_team_key(data=data)
|
||||||
|
|
||||||
if is_team_key:
|
if is_team_key:
|
||||||
return _team_key_generation_check(user_api_key_dict)
|
return _team_key_generation_check(
|
||||||
|
user_api_key_dict=user_api_key_dict, data=data
|
||||||
|
)
|
||||||
else:
|
else:
|
||||||
return _personal_key_generation_check(user_api_key_dict=user_api_key_dict)
|
return _personal_key_generation_check(
|
||||||
|
user_api_key_dict=user_api_key_dict, data=data
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
router = APIRouter()
|
router = APIRouter()
|
||||||
|
|
|
@ -1604,11 +1604,17 @@ class StandardCallbackDynamicParams(TypedDict, total=False):
|
||||||
langsmith_base_url: Optional[str]
|
langsmith_base_url: Optional[str]
|
||||||
|
|
||||||
|
|
||||||
class TeamUIKeyGenerationConfig(TypedDict):
|
class KeyGenerationConfig(TypedDict, total=False):
|
||||||
|
required_params: List[
|
||||||
|
str
|
||||||
|
] # specify params that must be present in the key generation request
|
||||||
|
|
||||||
|
|
||||||
|
class TeamUIKeyGenerationConfig(KeyGenerationConfig):
|
||||||
allowed_team_member_roles: List[str]
|
allowed_team_member_roles: List[str]
|
||||||
|
|
||||||
|
|
||||||
class PersonalUIKeyGenerationConfig(TypedDict):
|
class PersonalUIKeyGenerationConfig(KeyGenerationConfig):
|
||||||
allowed_user_roles: List[str]
|
allowed_user_roles: List[str]
|
||||||
|
|
||||||
|
|
||||||
|
|
|
@ -13,6 +13,8 @@ import { defineConfig, devices } from '@playwright/test';
|
||||||
*/
|
*/
|
||||||
export default defineConfig({
|
export default defineConfig({
|
||||||
testDir: './e2e_ui_tests',
|
testDir: './e2e_ui_tests',
|
||||||
|
testIgnore: ['**/tests/pass_through_tests/**', '../pass_through_tests/**/*'],
|
||||||
|
testMatch: '**/*.spec.ts', // Only run files ending in .spec.ts
|
||||||
/* Run tests in files in parallel */
|
/* Run tests in files in parallel */
|
||||||
fullyParallel: true,
|
fullyParallel: true,
|
||||||
/* Fail the build on CI if you accidentally left test.only in the source code. */
|
/* Fail the build on CI if you accidentally left test.only in the source code. */
|
||||||
|
|
|
@ -551,7 +551,7 @@ def test_is_team_key():
|
||||||
assert not _is_team_key(GenerateKeyRequest(user_id="test_user_id"))
|
assert not _is_team_key(GenerateKeyRequest(user_id="test_user_id"))
|
||||||
|
|
||||||
|
|
||||||
def test_team_key_generation_check():
|
def test_team_key_generation_team_member_check():
|
||||||
from litellm.proxy.management_endpoints.key_management_endpoints import (
|
from litellm.proxy.management_endpoints.key_management_endpoints import (
|
||||||
_team_key_generation_check,
|
_team_key_generation_check,
|
||||||
)
|
)
|
||||||
|
@ -562,22 +562,86 @@ def test_team_key_generation_check():
|
||||||
}
|
}
|
||||||
|
|
||||||
assert _team_key_generation_check(
|
assert _team_key_generation_check(
|
||||||
UserAPIKeyAuth(
|
user_api_key_dict=UserAPIKeyAuth(
|
||||||
user_role=LitellmUserRoles.INTERNAL_USER,
|
user_role=LitellmUserRoles.INTERNAL_USER,
|
||||||
api_key="sk-1234",
|
api_key="sk-1234",
|
||||||
team_member=Member(role="admin", user_id="test_user_id"),
|
team_member=Member(role="admin", user_id="test_user_id"),
|
||||||
)
|
),
|
||||||
|
data=GenerateKeyRequest(),
|
||||||
)
|
)
|
||||||
|
|
||||||
with pytest.raises(HTTPException):
|
with pytest.raises(HTTPException):
|
||||||
_team_key_generation_check(
|
_team_key_generation_check(
|
||||||
UserAPIKeyAuth(
|
user_api_key_dict=UserAPIKeyAuth(
|
||||||
user_role=LitellmUserRoles.INTERNAL_USER,
|
user_role=LitellmUserRoles.INTERNAL_USER,
|
||||||
api_key="sk-1234",
|
api_key="sk-1234",
|
||||||
user_id="test_user_id",
|
user_id="test_user_id",
|
||||||
team_member=Member(role="user", user_id="test_user_id"),
|
team_member=Member(role="user", user_id="test_user_id"),
|
||||||
|
),
|
||||||
|
data=GenerateKeyRequest(),
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
@pytest.mark.parametrize(
|
||||||
|
"team_key_generation_settings, input_data, expected_result",
|
||||||
|
[
|
||||||
|
({"required_params": ["tags"]}, GenerateKeyRequest(tags=["test_tags"]), True),
|
||||||
|
({}, GenerateKeyRequest(), True),
|
||||||
|
(
|
||||||
|
{"required_params": ["models"]},
|
||||||
|
GenerateKeyRequest(tags=["test_tags"]),
|
||||||
|
False,
|
||||||
|
),
|
||||||
|
],
|
||||||
|
)
|
||||||
|
@pytest.mark.parametrize("key_type", ["team_key", "personal_key"])
|
||||||
|
def test_key_generation_required_params_check(
|
||||||
|
team_key_generation_settings, input_data, expected_result, key_type
|
||||||
|
):
|
||||||
|
from litellm.proxy.management_endpoints.key_management_endpoints import (
|
||||||
|
_team_key_generation_check,
|
||||||
|
_personal_key_generation_check,
|
||||||
|
)
|
||||||
|
from litellm.types.utils import (
|
||||||
|
TeamUIKeyGenerationConfig,
|
||||||
|
StandardKeyGenerationConfig,
|
||||||
|
PersonalUIKeyGenerationConfig,
|
||||||
|
)
|
||||||
|
from fastapi import HTTPException
|
||||||
|
|
||||||
|
user_api_key_dict = UserAPIKeyAuth(
|
||||||
|
user_role=LitellmUserRoles.INTERNAL_USER,
|
||||||
|
api_key="sk-1234",
|
||||||
|
user_id="test_user_id",
|
||||||
|
team_id="test_team_id",
|
||||||
|
team_member=Member(role="admin", user_id="test_user_id"),
|
||||||
|
)
|
||||||
|
|
||||||
|
if key_type == "team_key":
|
||||||
|
litellm.key_generation_settings = StandardKeyGenerationConfig(
|
||||||
|
team_key_generation=TeamUIKeyGenerationConfig(
|
||||||
|
**team_key_generation_settings
|
||||||
)
|
)
|
||||||
)
|
)
|
||||||
|
elif key_type == "personal_key":
|
||||||
|
litellm.key_generation_settings = StandardKeyGenerationConfig(
|
||||||
|
personal_key_generation=PersonalUIKeyGenerationConfig(
|
||||||
|
**team_key_generation_settings
|
||||||
|
)
|
||||||
|
)
|
||||||
|
|
||||||
|
if expected_result:
|
||||||
|
if key_type == "team_key":
|
||||||
|
assert _team_key_generation_check(user_api_key_dict, input_data)
|
||||||
|
elif key_type == "personal_key":
|
||||||
|
assert _personal_key_generation_check(user_api_key_dict, input_data)
|
||||||
|
else:
|
||||||
|
if key_type == "team_key":
|
||||||
|
with pytest.raises(HTTPException):
|
||||||
|
_team_key_generation_check(user_api_key_dict, input_data)
|
||||||
|
elif key_type == "personal_key":
|
||||||
|
with pytest.raises(HTTPException):
|
||||||
|
_personal_key_generation_check(user_api_key_dict, input_data)
|
||||||
|
|
||||||
|
|
||||||
def test_personal_key_generation_check():
|
def test_personal_key_generation_check():
|
||||||
|
@ -591,16 +655,18 @@ def test_personal_key_generation_check():
|
||||||
}
|
}
|
||||||
|
|
||||||
assert _personal_key_generation_check(
|
assert _personal_key_generation_check(
|
||||||
UserAPIKeyAuth(
|
user_api_key_dict=UserAPIKeyAuth(
|
||||||
user_role=LitellmUserRoles.PROXY_ADMIN, api_key="sk-1234", user_id="admin"
|
user_role=LitellmUserRoles.PROXY_ADMIN, api_key="sk-1234", user_id="admin"
|
||||||
)
|
),
|
||||||
|
data=GenerateKeyRequest(),
|
||||||
)
|
)
|
||||||
|
|
||||||
with pytest.raises(HTTPException):
|
with pytest.raises(HTTPException):
|
||||||
_personal_key_generation_check(
|
_personal_key_generation_check(
|
||||||
UserAPIKeyAuth(
|
user_api_key_dict=UserAPIKeyAuth(
|
||||||
user_role=LitellmUserRoles.INTERNAL_USER,
|
user_role=LitellmUserRoles.INTERNAL_USER,
|
||||||
api_key="sk-1234",
|
api_key="sk-1234",
|
||||||
user_id="admin",
|
user_id="admin",
|
||||||
)
|
),
|
||||||
|
data=GenerateKeyRequest(),
|
||||||
)
|
)
|
||||||
|
|
|
@ -40,6 +40,31 @@ interface CreateKeyProps {
|
||||||
setData: React.Dispatch<React.SetStateAction<any[] | null>>;
|
setData: React.Dispatch<React.SetStateAction<any[] | null>>;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
const getPredefinedTags = (data: any[] | null) => {
|
||||||
|
let allTags = [];
|
||||||
|
|
||||||
|
console.log("data:", JSON.stringify(data));
|
||||||
|
|
||||||
|
if (data) {
|
||||||
|
for (let key of data) {
|
||||||
|
if (key["metadata"] && key["metadata"]["tags"]) {
|
||||||
|
allTags.push(...key["metadata"]["tags"]);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Deduplicate using Set
|
||||||
|
const uniqueTags = Array.from(new Set(allTags)).map(tag => ({
|
||||||
|
value: tag,
|
||||||
|
label: tag,
|
||||||
|
}));
|
||||||
|
|
||||||
|
|
||||||
|
console.log("uniqueTags:", uniqueTags);
|
||||||
|
return uniqueTags;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
const CreateKey: React.FC<CreateKeyProps> = ({
|
const CreateKey: React.FC<CreateKeyProps> = ({
|
||||||
userID,
|
userID,
|
||||||
team,
|
team,
|
||||||
|
@ -55,6 +80,8 @@ const CreateKey: React.FC<CreateKeyProps> = ({
|
||||||
const [userModels, setUserModels] = useState([]);
|
const [userModels, setUserModels] = useState([]);
|
||||||
const [modelsToPick, setModelsToPick] = useState([]);
|
const [modelsToPick, setModelsToPick] = useState([]);
|
||||||
const [keyOwner, setKeyOwner] = useState("you");
|
const [keyOwner, setKeyOwner] = useState("you");
|
||||||
|
const [predefinedTags, setPredefinedTags] = useState(getPredefinedTags(data));
|
||||||
|
|
||||||
|
|
||||||
const handleOk = () => {
|
const handleOk = () => {
|
||||||
setIsModalVisible(false);
|
setIsModalVisible(false);
|
||||||
|
@ -355,6 +382,15 @@ const CreateKey: React.FC<CreateKeyProps> = ({
|
||||||
placeholder="Enter metadata as JSON"
|
placeholder="Enter metadata as JSON"
|
||||||
/>
|
/>
|
||||||
</Form.Item>
|
</Form.Item>
|
||||||
|
<Form.Item label="Tags" name="tags" className="mt-8" help={`Tags for tracking spend and/or doing tag-based routing.`}>
|
||||||
|
<Select
|
||||||
|
mode="tags"
|
||||||
|
style={{ width: '100%' }}
|
||||||
|
placeholder="Enter tags"
|
||||||
|
tokenSeparators={[',']}
|
||||||
|
options={predefinedTags}
|
||||||
|
/>
|
||||||
|
</Form.Item>
|
||||||
</AccordionBody>
|
</AccordionBody>
|
||||||
</Accordion>
|
</Accordion>
|
||||||
</>
|
</>
|
||||||
|
|
|
@ -32,7 +32,7 @@ const menuItems: MenuItem[] = [
|
||||||
{ key: "3", page: "llm-playground", label: "Test Key" }, // all roles
|
{ key: "3", page: "llm-playground", label: "Test Key" }, // all roles
|
||||||
{ key: "2", page: "models", label: "Models", roles: all_admin_roles },
|
{ key: "2", page: "models", label: "Models", roles: all_admin_roles },
|
||||||
{ key: "4", page: "usage", label: "Usage"}, // all roles
|
{ key: "4", page: "usage", label: "Usage"}, // all roles
|
||||||
{ key: "6", page: "teams", label: "Teams", roles: all_admin_roles },
|
{ key: "6", page: "teams", label: "Teams" },
|
||||||
{ key: "5", page: "users", label: "Internal Users", roles: all_admin_roles },
|
{ key: "5", page: "users", label: "Internal Users", roles: all_admin_roles },
|
||||||
{ key: "8", page: "settings", label: "Logging & Alerts", roles: all_admin_roles },
|
{ key: "8", page: "settings", label: "Logging & Alerts", roles: all_admin_roles },
|
||||||
{ key: "9", page: "caching", label: "Caching", roles: all_admin_roles },
|
{ key: "9", page: "caching", label: "Caching", roles: all_admin_roles },
|
||||||
|
|
|
@ -671,7 +671,8 @@ export const teamInfoCall = async (
|
||||||
};
|
};
|
||||||
|
|
||||||
export const teamListCall = async (
|
export const teamListCall = async (
|
||||||
accessToken: String,
|
accessToken: String,
|
||||||
|
userID: String | null = null
|
||||||
) => {
|
) => {
|
||||||
/**
|
/**
|
||||||
* Get all available teams on proxy
|
* Get all available teams on proxy
|
||||||
|
@ -679,6 +680,9 @@ export const teamListCall = async (
|
||||||
try {
|
try {
|
||||||
let url = proxyBaseUrl ? `${proxyBaseUrl}/team/list` : `/team/list`;
|
let url = proxyBaseUrl ? `${proxyBaseUrl}/team/list` : `/team/list`;
|
||||||
console.log("in teamInfoCall");
|
console.log("in teamInfoCall");
|
||||||
|
if (userID) {
|
||||||
|
url += `?user_id=${userID}`;
|
||||||
|
}
|
||||||
const response = await fetch(url, {
|
const response = await fetch(url, {
|
||||||
method: "GET",
|
method: "GET",
|
||||||
headers: {
|
headers: {
|
||||||
|
|
|
@ -80,7 +80,13 @@ const Team: React.FC<TeamProps> = ({
|
||||||
if (teams === null && accessToken) {
|
if (teams === null && accessToken) {
|
||||||
// Call your function here
|
// Call your function here
|
||||||
const fetchData = async () => {
|
const fetchData = async () => {
|
||||||
const givenTeams = await teamListCall(accessToken)
|
let givenTeams;
|
||||||
|
if (userRole != "Admin" && userRole != "Admin Viewer") {
|
||||||
|
givenTeams = await teamListCall(accessToken, userID)
|
||||||
|
} else {
|
||||||
|
givenTeams = await teamListCall(accessToken)
|
||||||
|
}
|
||||||
|
|
||||||
console.log(`givenTeams: ${givenTeams}`)
|
console.log(`givenTeams: ${givenTeams}`)
|
||||||
|
|
||||||
setTeams(givenTeams)
|
setTeams(givenTeams)
|
||||||
|
@ -98,6 +104,7 @@ const Team: React.FC<TeamProps> = ({
|
||||||
const [selectedTeam, setSelectedTeam] = useState<null | any>(
|
const [selectedTeam, setSelectedTeam] = useState<null | any>(
|
||||||
teams ? teams[0] : null
|
teams ? teams[0] : null
|
||||||
);
|
);
|
||||||
|
|
||||||
const [isTeamModalVisible, setIsTeamModalVisible] = useState(false);
|
const [isTeamModalVisible, setIsTeamModalVisible] = useState(false);
|
||||||
const [isAddMemberModalVisible, setIsAddMemberModalVisible] = useState(false);
|
const [isAddMemberModalVisible, setIsAddMemberModalVisible] = useState(false);
|
||||||
const [userModels, setUserModels] = useState([]);
|
const [userModels, setUserModels] = useState([]);
|
||||||
|
@ -327,7 +334,13 @@ const Team: React.FC<TeamProps> = ({
|
||||||
}
|
}
|
||||||
|
|
||||||
let _team_id_to_info: Record<string, any> = {};
|
let _team_id_to_info: Record<string, any> = {};
|
||||||
const teamList = await teamListCall(accessToken)
|
let teamList;
|
||||||
|
if (userRole != "Admin" && userRole != "Admin Viewer") {
|
||||||
|
teamList = await teamListCall(accessToken, userID)
|
||||||
|
} else {
|
||||||
|
teamList = await teamListCall(accessToken)
|
||||||
|
}
|
||||||
|
|
||||||
for (let i = 0; i < teamList.length; i++) {
|
for (let i = 0; i < teamList.length; i++) {
|
||||||
let team = teamList[i];
|
let team = teamList[i];
|
||||||
let _team_id = team.team_id;
|
let _team_id = team.team_id;
|
||||||
|
@ -376,6 +389,16 @@ const Team: React.FC<TeamProps> = ({
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
|
const is_team_admin = (team: any) => {
|
||||||
|
for (let i = 0; i < team.members_with_roles.length; i++) {
|
||||||
|
let member = team.members_with_roles[i];
|
||||||
|
if (member.user_id == userID && member.role == "admin") {
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
const handleMemberCreate = async (formValues: Record<string, any>) => {
|
const handleMemberCreate = async (formValues: Record<string, any>) => {
|
||||||
try {
|
try {
|
||||||
if (accessToken != null && teams != null) {
|
if (accessToken != null && teams != null) {
|
||||||
|
@ -557,16 +580,20 @@ const Team: React.FC<TeamProps> = ({
|
||||||
</Text>
|
</Text>
|
||||||
</TableCell>
|
</TableCell>
|
||||||
<TableCell>
|
<TableCell>
|
||||||
<Icon
|
{userRole == "Admin" ? (
|
||||||
icon={PencilAltIcon}
|
<>
|
||||||
size="sm"
|
<Icon
|
||||||
onClick={() => handleEditClick(team)}
|
icon={PencilAltIcon}
|
||||||
/>
|
size="sm"
|
||||||
<Icon
|
onClick={() => handleEditClick(team)}
|
||||||
onClick={() => handleDelete(team.team_id)}
|
/>
|
||||||
icon={TrashIcon}
|
<Icon
|
||||||
size="sm"
|
onClick={() => handleDelete(team.team_id)}
|
||||||
/>
|
icon={TrashIcon}
|
||||||
|
size="sm"
|
||||||
|
/>
|
||||||
|
</>
|
||||||
|
) : null}
|
||||||
</TableCell>
|
</TableCell>
|
||||||
</TableRow>
|
</TableRow>
|
||||||
))
|
))
|
||||||
|
@ -623,8 +650,9 @@ const Team: React.FC<TeamProps> = ({
|
||||||
)}
|
)}
|
||||||
</Card>
|
</Card>
|
||||||
</Col>
|
</Col>
|
||||||
<Col numColSpan={1}>
|
{userRole == "Admin"? (
|
||||||
<Button
|
<Col numColSpan={1}>
|
||||||
|
<Button
|
||||||
className="mx-auto"
|
className="mx-auto"
|
||||||
onClick={() => setIsTeamModalVisible(true)}
|
onClick={() => setIsTeamModalVisible(true)}
|
||||||
>
|
>
|
||||||
|
@ -707,7 +735,8 @@ const Team: React.FC<TeamProps> = ({
|
||||||
</div>
|
</div>
|
||||||
</Form>
|
</Form>
|
||||||
</Modal>
|
</Modal>
|
||||||
</Col>
|
</Col>
|
||||||
|
) : null}
|
||||||
<Col numColSpan={1}>
|
<Col numColSpan={1}>
|
||||||
<Title level={4}>Team Members</Title>
|
<Title level={4}>Team Members</Title>
|
||||||
<Paragraph>
|
<Paragraph>
|
||||||
|
@ -774,12 +803,14 @@ const Team: React.FC<TeamProps> = ({
|
||||||
)}
|
)}
|
||||||
</Col>
|
</Col>
|
||||||
<Col numColSpan={1}>
|
<Col numColSpan={1}>
|
||||||
<Button
|
{userRole == "Admin" || (selectedTeam && is_team_admin(selectedTeam)) ? (
|
||||||
className="mx-auto mb-5"
|
<Button
|
||||||
onClick={() => setIsAddMemberModalVisible(true)}
|
className="mx-auto mb-5"
|
||||||
>
|
onClick={() => setIsAddMemberModalVisible(true)}
|
||||||
+ Add member
|
>
|
||||||
</Button>
|
+ Add member
|
||||||
|
</Button>
|
||||||
|
) : null}
|
||||||
<Modal
|
<Modal
|
||||||
title="Add member"
|
title="Add member"
|
||||||
visible={isAddMemberModalVisible}
|
visible={isAddMemberModalVisible}
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue