| | |
| | |
| | |
| |
|
| | import os |
| | from abc import ABC, abstractmethod |
| | from dataclasses import dataclass |
| | from enum import Enum |
| | from typing import Any, Dict, Iterable, List, Optional, Tuple, Union |
| |
|
| |
|
| | class SecretType(Enum): |
| | TOKEN = "token" |
| | ENV_VAR = "env_var" |
| |
|
| | def __str__(self): |
| | return self.value |
| |
|
| | @staticmethod |
| | def from_str(string: str) -> "SecretType": |
| | """ |
| | Convert a string to a SecretType. |
| | |
| | :param string: The string to convert. |
| | """ |
| | mapping = {e.value: e for e in SecretType} |
| | _type = mapping.get(string) |
| | if _type is None: |
| | raise ValueError(f"Unknown secret type '{string}'") |
| | return _type |
| |
|
| |
|
| | class Secret(ABC): |
| | """ |
| | Encapsulates a secret used for authentication. |
| | |
| | Usage example: |
| | ```python |
| | from haystack.components.generators import OpenAIGenerator |
| | from haystack.utils import Secret |
| | |
| | generator = OpenAIGenerator(api_key=Secret.from_token("<here_goes_your_token>")) |
| | ``` |
| | """ |
| |
|
| | @staticmethod |
| | def from_token(token: str) -> "Secret": |
| | """ |
| | Create a token-based secret. Cannot be serialized. |
| | |
| | :param token: |
| | The token to use for authentication. |
| | """ |
| | return TokenSecret(_token=token) |
| |
|
| | @staticmethod |
| | def from_env_var(env_vars: Union[str, List[str]], *, strict: bool = True) -> "Secret": |
| | """ |
| | Create an environment variable-based secret. Accepts one or more environment variables. |
| | |
| | Upon resolution, it returns a string token from the first environment variable that is set. |
| | |
| | :param env_vars: |
| | A single environment variable or an ordered list of |
| | candidate environment variables. |
| | :param strict: |
| | Whether to raise an exception if none of the environment |
| | variables are set. |
| | """ |
| | if isinstance(env_vars, str): |
| | env_vars = [env_vars] |
| | return EnvVarSecret(_env_vars=tuple(env_vars), _strict=strict) |
| |
|
| | def to_dict(self) -> Dict[str, Any]: |
| | """ |
| | Convert the secret to a JSON-serializable dictionary. |
| | |
| | Some secrets may not be serializable. |
| | |
| | :returns: |
| | The serialized policy. |
| | """ |
| | out = {"type": self.type.value} |
| | inner = self._to_dict() |
| | assert all(k not in inner for k in out.keys()) |
| | out.update(inner) |
| | return out |
| |
|
| | @staticmethod |
| | def from_dict(dict: Dict[str, Any]) -> "Secret": |
| | """ |
| | Create a secret from a JSON-serializable dictionary. |
| | |
| | :param dict: |
| | The dictionary with the serialized data. |
| | :returns: |
| | The deserialized secret. |
| | """ |
| | secret_map = {SecretType.TOKEN: TokenSecret, SecretType.ENV_VAR: EnvVarSecret} |
| | secret_type = SecretType.from_str(dict["type"]) |
| | return secret_map[secret_type]._from_dict(dict) |
| |
|
| | @abstractmethod |
| | def resolve_value(self) -> Optional[Any]: |
| | """ |
| | Resolve the secret to an atomic value. The semantics of the value is secret-dependent. |
| | |
| | :returns: |
| | The value of the secret, if any. |
| | """ |
| | pass |
| |
|
| | @property |
| | @abstractmethod |
| | def type(self) -> SecretType: |
| | """ |
| | The type of the secret. |
| | """ |
| | pass |
| |
|
| | @abstractmethod |
| | def _to_dict(self) -> Dict[str, Any]: |
| | pass |
| |
|
| | @staticmethod |
| | @abstractmethod |
| | def _from_dict(_: Dict[str, Any]) -> "Secret": |
| | pass |
| |
|
| |
|
| | @dataclass(frozen=True) |
| | class TokenSecret(Secret): |
| | """ |
| | A secret that uses a string token/API key. |
| | |
| | Cannot be serialized. |
| | """ |
| |
|
| | _token: str |
| | _type: SecretType = SecretType.TOKEN |
| |
|
| | def __post_init__(self): |
| | super().__init__() |
| | assert self._type == SecretType.TOKEN |
| |
|
| | if len(self._token) == 0: |
| | raise ValueError("Authentication token cannot be empty.") |
| |
|
| | def _to_dict(self) -> Dict[str, Any]: |
| | raise ValueError( |
| | "Cannot serialize token-based secret. Use an alternative secret type like environment variables." |
| | ) |
| |
|
| | @staticmethod |
| | def _from_dict(_: Dict[str, Any]) -> "Secret": |
| | raise ValueError( |
| | "Cannot deserialize token-based secret. Use an alternative secret type like environment variables." |
| | ) |
| |
|
| | def resolve_value(self) -> Optional[Any]: |
| | """Return the token.""" |
| | return self._token |
| |
|
| | @property |
| | def type(self) -> SecretType: |
| | """The type of the secret.""" |
| | return self._type |
| |
|
| |
|
| | @dataclass(frozen=True) |
| | class EnvVarSecret(Secret): |
| | """ |
| | A secret that accepts one or more environment variables. |
| | |
| | Upon resolution, it returns a string token from the first environment variable that is set. Can be serialized. |
| | """ |
| |
|
| | _env_vars: Tuple[str, ...] |
| | _strict: bool = True |
| | _type: SecretType = SecretType.ENV_VAR |
| |
|
| | def __post_init__(self): |
| | super().__init__() |
| | assert self._type == SecretType.ENV_VAR |
| |
|
| | if len(self._env_vars) == 0: |
| | raise ValueError("One or more environment variables must be provided for the secret.") |
| |
|
| | def _to_dict(self) -> Dict[str, Any]: |
| | return {"env_vars": list(self._env_vars), "strict": self._strict} |
| |
|
| | @staticmethod |
| | def _from_dict(dictionary: Dict[str, Any]) -> "Secret": |
| | return EnvVarSecret(tuple(dictionary["env_vars"]), _strict=dictionary["strict"]) |
| |
|
| | def resolve_value(self) -> Optional[Any]: |
| | """Resolve the secret to an atomic value. The semantics of the value is secret-dependent.""" |
| | out = None |
| | for env_var in self._env_vars: |
| | value = os.getenv(env_var) |
| | if value is not None: |
| | out = value |
| | break |
| | if out is None and self._strict: |
| | raise ValueError(f"None of the following authentication environment variables are set: {self._env_vars}") |
| | return out |
| |
|
| | @property |
| | def type(self) -> SecretType: |
| | """The type of the secret.""" |
| | return self._type |
| |
|
| |
|
| | def deserialize_secrets_inplace(data: Dict[str, Any], keys: Iterable[str], *, recursive: bool = False): |
| | """ |
| | Deserialize secrets in a dictionary inplace. |
| | |
| | :param data: |
| | The dictionary with the serialized data. |
| | :param keys: |
| | The keys of the secrets to deserialize. |
| | :param recursive: |
| | Whether to recursively deserialize nested dictionaries. |
| | """ |
| | for k, v in data.items(): |
| | if isinstance(v, dict) and recursive: |
| | deserialize_secrets_inplace(v, keys) |
| | elif k in keys and v is not None: |
| | data[k] = Secret.from_dict(v) |
| |
|