dhisana 0.0.1.dev85__py3-none-any.whl → 0.0.1.dev236__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- dhisana/schemas/common.py +33 -0
- dhisana/schemas/sales.py +224 -23
- dhisana/utils/add_mapping.py +72 -63
- dhisana/utils/apollo_tools.py +739 -109
- dhisana/utils/built_with_api_tools.py +4 -2
- dhisana/utils/cache_output_tools.py +23 -23
- dhisana/utils/check_email_validity_tools.py +456 -458
- dhisana/utils/check_for_intent_signal.py +1 -2
- dhisana/utils/check_linkedin_url_validity.py +34 -8
- dhisana/utils/clay_tools.py +3 -2
- dhisana/utils/clean_properties.py +3 -1
- dhisana/utils/compose_salesnav_query.py +0 -1
- dhisana/utils/compose_search_query.py +7 -3
- dhisana/utils/composite_tools.py +0 -1
- dhisana/utils/dataframe_tools.py +2 -2
- dhisana/utils/email_body_utils.py +72 -0
- dhisana/utils/email_provider.py +375 -0
- dhisana/utils/enrich_lead_information.py +585 -85
- dhisana/utils/fetch_openai_config.py +129 -0
- dhisana/utils/field_validators.py +1 -1
- dhisana/utils/g2_tools.py +0 -1
- dhisana/utils/generate_content.py +0 -1
- dhisana/utils/generate_email.py +69 -16
- dhisana/utils/generate_email_response.py +298 -41
- dhisana/utils/generate_flow.py +0 -1
- dhisana/utils/generate_linkedin_connect_message.py +19 -6
- dhisana/utils/generate_linkedin_response_message.py +156 -65
- dhisana/utils/generate_structured_output_internal.py +351 -131
- dhisana/utils/google_custom_search.py +150 -44
- dhisana/utils/google_oauth_tools.py +721 -0
- dhisana/utils/google_workspace_tools.py +391 -25
- dhisana/utils/hubspot_clearbit.py +3 -1
- dhisana/utils/hubspot_crm_tools.py +771 -167
- dhisana/utils/instantly_tools.py +3 -1
- dhisana/utils/lusha_tools.py +10 -7
- dhisana/utils/mailgun_tools.py +150 -0
- dhisana/utils/microsoft365_tools.py +447 -0
- dhisana/utils/openai_assistant_and_file_utils.py +121 -177
- dhisana/utils/openai_helpers.py +19 -16
- dhisana/utils/parse_linkedin_messages_txt.py +2 -3
- dhisana/utils/profile.py +37 -0
- dhisana/utils/proxy_curl_tools.py +507 -206
- dhisana/utils/proxycurl_search_leads.py +426 -0
- dhisana/utils/research_lead.py +121 -68
- dhisana/utils/sales_navigator_crawler.py +1 -6
- dhisana/utils/salesforce_crm_tools.py +323 -50
- dhisana/utils/search_router.py +131 -0
- dhisana/utils/search_router_jobs.py +51 -0
- dhisana/utils/sendgrid_tools.py +126 -91
- dhisana/utils/serarch_router_local_business.py +75 -0
- dhisana/utils/serpapi_additional_tools.py +290 -0
- dhisana/utils/serpapi_google_jobs.py +117 -0
- dhisana/utils/serpapi_google_search.py +188 -0
- dhisana/utils/serpapi_local_business_search.py +129 -0
- dhisana/utils/serpapi_search_tools.py +363 -432
- dhisana/utils/serperdev_google_jobs.py +125 -0
- dhisana/utils/serperdev_local_business.py +154 -0
- dhisana/utils/serperdev_search.py +233 -0
- dhisana/utils/smtp_email_tools.py +576 -0
- dhisana/utils/test_connect.py +1765 -92
- dhisana/utils/trasform_json.py +95 -16
- dhisana/utils/web_download_parse_tools.py +0 -1
- dhisana/utils/zoominfo_tools.py +2 -3
- dhisana/workflow/test.py +1 -1
- {dhisana-0.0.1.dev85.dist-info → dhisana-0.0.1.dev236.dist-info}/METADATA +5 -2
- dhisana-0.0.1.dev236.dist-info/RECORD +100 -0
- {dhisana-0.0.1.dev85.dist-info → dhisana-0.0.1.dev236.dist-info}/WHEEL +1 -1
- dhisana-0.0.1.dev85.dist-info/RECORD +0 -81
- {dhisana-0.0.1.dev85.dist-info → dhisana-0.0.1.dev236.dist-info}/entry_points.txt +0 -0
- {dhisana-0.0.1.dev85.dist-info → dhisana-0.0.1.dev236.dist-info}/top_level.txt +0 -0
dhisana/utils/test_connect.py
CHANGED
|
@@ -1,16 +1,32 @@
|
|
|
1
|
-
import os
|
|
2
1
|
import json
|
|
3
2
|
import logging
|
|
4
3
|
import asyncio
|
|
5
|
-
|
|
4
|
+
import os
|
|
5
|
+
from datetime import datetime, timedelta, timezone
|
|
6
|
+
from typing import Awaitable, Callable, Dict, List, Any, Optional
|
|
7
|
+
import requests
|
|
8
|
+
|
|
9
|
+
try:
|
|
10
|
+
from openai import AsyncOpenAI
|
|
11
|
+
except Exception: # pragma: no cover - optional dependency
|
|
12
|
+
AsyncOpenAI = None # type: ignore
|
|
6
13
|
|
|
7
14
|
import aiohttp
|
|
8
15
|
from google.oauth2 import service_account
|
|
9
16
|
from googleapiclient.discovery import build
|
|
17
|
+
import imaplib
|
|
18
|
+
import aiosmtplib
|
|
19
|
+
from simple_salesforce import Salesforce
|
|
20
|
+
from urllib.parse import urljoin, urlparse
|
|
21
|
+
|
|
22
|
+
from dhisana.utils.clay_tools import push_to_clay_table
|
|
10
23
|
|
|
11
24
|
logging.basicConfig(level=logging.INFO)
|
|
12
25
|
logger = logging.getLogger(__name__)
|
|
13
26
|
|
|
27
|
+
# If FindyMail uses a base URL in your environment, define it here:
|
|
28
|
+
FINDYMAIL_BASE_URL = "https://app.findymail.com/api"
|
|
29
|
+
|
|
14
30
|
###############################################################################
|
|
15
31
|
# HELPER FUNCTIONS
|
|
16
32
|
###############################################################################
|
|
@@ -55,11 +71,11 @@ async def test_zerobounce(api_key: str) -> Dict[str, Any]:
|
|
|
55
71
|
logger.error(f"ZeroBounce test failed: {e}")
|
|
56
72
|
return {"success": False, "status_code": 0, "error_message": str(e)}
|
|
57
73
|
|
|
74
|
+
|
|
58
75
|
async def test_openai(api_key: str, model_name: str, reasoning_effort: str) -> Dict[str, Any]:
|
|
59
76
|
"""
|
|
60
77
|
Tests OpenAI API key by making a simple chat completion request.
|
|
61
|
-
- If the model name starts with '
|
|
62
|
-
- Otherwise, uses the model name as is.
|
|
78
|
+
- If the model name starts with 'o', includes 'reasoning_effort' in the request.
|
|
63
79
|
"""
|
|
64
80
|
url = "https://api.openai.com/v1/chat/completions"
|
|
65
81
|
headers = {"Authorization": f"Bearer {api_key}"}
|
|
@@ -71,18 +87,22 @@ async def test_openai(api_key: str, model_name: str, reasoning_effort: str) -> D
|
|
|
71
87
|
"max_completion_tokens": 5
|
|
72
88
|
}
|
|
73
89
|
|
|
74
|
-
# Only apply the reasoning parameter if it's an
|
|
75
|
-
if model_name.startswith("
|
|
90
|
+
# Only apply the reasoning parameter if it's an 'o' series model
|
|
91
|
+
if model_name.startswith("o"):
|
|
76
92
|
data["reasoning_effort"] = reasoning_effort
|
|
77
93
|
|
|
78
94
|
try:
|
|
79
95
|
async with aiohttp.ClientSession(timeout=aiohttp.ClientTimeout(total=10)) as session:
|
|
80
96
|
async with session.post(url, headers=headers, json=data) as response:
|
|
81
97
|
status = response.status
|
|
82
|
-
resp_data = await response
|
|
98
|
+
resp_data = await safe_json(response)
|
|
83
99
|
|
|
84
100
|
if status != 200:
|
|
85
|
-
err_message =
|
|
101
|
+
err_message = (
|
|
102
|
+
resp_data.get("error", {}).get("message")
|
|
103
|
+
if resp_data and isinstance(resp_data, dict)
|
|
104
|
+
else f"Non-200 from OpenAI: {status}"
|
|
105
|
+
)
|
|
86
106
|
return {
|
|
87
107
|
"success": False,
|
|
88
108
|
"status_code": status,
|
|
@@ -90,7 +110,7 @@ async def test_openai(api_key: str, model_name: str, reasoning_effort: str) -> D
|
|
|
90
110
|
}
|
|
91
111
|
|
|
92
112
|
# Check if "error" is present in the response
|
|
93
|
-
if "error" in resp_data:
|
|
113
|
+
if resp_data and "error" in resp_data:
|
|
94
114
|
return {
|
|
95
115
|
"success": False,
|
|
96
116
|
"status_code": status,
|
|
@@ -138,6 +158,40 @@ async def test_google_workspace(api_key: str, subject: str) -> Dict[str, Any]:
|
|
|
138
158
|
logger.error(f"Google Workspace test failed: {e}")
|
|
139
159
|
return {"success": False, "status_code": 0, "error_message": str(e)}
|
|
140
160
|
|
|
161
|
+
|
|
162
|
+
async def test_google_drive(api_key: str, subject: str) -> Dict[str, Any]:
|
|
163
|
+
"""Tests Google Drive API access using domain-wide delegation.
|
|
164
|
+
|
|
165
|
+
Lists files in the impersonated user's Drive to verify the credentials.
|
|
166
|
+
"""
|
|
167
|
+
try:
|
|
168
|
+
creds_info = json.loads(api_key)
|
|
169
|
+
creds = service_account.Credentials.from_service_account_info(
|
|
170
|
+
creds_info,
|
|
171
|
+
scopes=["https://www.googleapis.com/auth/drive.metadata.readonly"],
|
|
172
|
+
)
|
|
173
|
+
|
|
174
|
+
delegated_creds = creds.with_subject(subject)
|
|
175
|
+
|
|
176
|
+
service = build("drive", "v3", credentials=delegated_creds)
|
|
177
|
+
|
|
178
|
+
def _list_files():
|
|
179
|
+
return service.files().list(pageSize=1).execute()
|
|
180
|
+
|
|
181
|
+
response = await asyncio.to_thread(_list_files)
|
|
182
|
+
|
|
183
|
+
if "files" in response:
|
|
184
|
+
return {"success": True, "status_code": 200, "error_message": None}
|
|
185
|
+
return {
|
|
186
|
+
"success": False,
|
|
187
|
+
"status_code": 200,
|
|
188
|
+
"error_message": "API responded but no 'files' key found",
|
|
189
|
+
}
|
|
190
|
+
except Exception as e:
|
|
191
|
+
logger.error(f"Google Drive test failed: {e}")
|
|
192
|
+
return {"success": False, "status_code": 0, "error_message": str(e)}
|
|
193
|
+
|
|
194
|
+
|
|
141
195
|
async def test_serpapi(api_key: str) -> Dict[str, Any]:
|
|
142
196
|
url = f"https://serpapi.com/search?engine=google&q=hello+world&api_key={api_key}"
|
|
143
197
|
try:
|
|
@@ -147,13 +201,11 @@ async def test_serpapi(api_key: str) -> Dict[str, Any]:
|
|
|
147
201
|
data = await safe_json(response)
|
|
148
202
|
|
|
149
203
|
if status != 200:
|
|
150
|
-
err_message =
|
|
151
|
-
if data and isinstance(data, dict):
|
|
152
|
-
err_message = data.get("error")
|
|
204
|
+
err_message = data.get("error") if data else f"Non-200 from SERPAPI: {status}"
|
|
153
205
|
return {
|
|
154
206
|
"success": False,
|
|
155
207
|
"status_code": status,
|
|
156
|
-
"error_message": err_message
|
|
208
|
+
"error_message": err_message
|
|
157
209
|
}
|
|
158
210
|
# Some SERP API errors might still be 200 but contain an 'error' field
|
|
159
211
|
if data and "error" in data:
|
|
@@ -167,8 +219,60 @@ async def test_serpapi(api_key: str) -> Dict[str, Any]:
|
|
|
167
219
|
logger.error(f"SERP API test failed: {e}")
|
|
168
220
|
return {"success": False, "status_code": 0, "error_message": str(e)}
|
|
169
221
|
|
|
222
|
+
|
|
223
|
+
###############################################################################
|
|
224
|
+
# UPDATED test_serperdev TO MATCH THE search_google_serper USAGE
|
|
225
|
+
###############################################################################
|
|
226
|
+
async def test_serperdev(api_key: str) -> Dict[str, Any]:
|
|
227
|
+
"""
|
|
228
|
+
Tests Serper.dev by sending a POST request to https://google.serper.dev/search
|
|
229
|
+
using similar headers/payload as `search_google_serper`.
|
|
230
|
+
"""
|
|
231
|
+
url = "https://google.serper.dev/search"
|
|
232
|
+
headers = {
|
|
233
|
+
"X-API-KEY": api_key,
|
|
234
|
+
"Content-Type": "application/json"
|
|
235
|
+
}
|
|
236
|
+
payload = {
|
|
237
|
+
"q": "Hello world from SerperDev",
|
|
238
|
+
"gl": "us",
|
|
239
|
+
"hl": "en",
|
|
240
|
+
"autocorrect": True,
|
|
241
|
+
"page": 1,
|
|
242
|
+
"type": "search"
|
|
243
|
+
}
|
|
244
|
+
|
|
245
|
+
try:
|
|
246
|
+
async with aiohttp.ClientSession(timeout=aiohttp.ClientTimeout(total=10)) as session:
|
|
247
|
+
async with session.post(url, headers=headers, json=payload) as response:
|
|
248
|
+
status = response.status
|
|
249
|
+
data = await safe_json(response)
|
|
250
|
+
|
|
251
|
+
if status != 200:
|
|
252
|
+
return {
|
|
253
|
+
"success": False,
|
|
254
|
+
"status_code": status,
|
|
255
|
+
"error_message": f"Non-200 from Serper.dev: {status}"
|
|
256
|
+
}
|
|
257
|
+
# Check if "organic" in the JSON to confirm we got typical search results
|
|
258
|
+
if data and "organic" in data and isinstance(data["organic"], list):
|
|
259
|
+
return {
|
|
260
|
+
"success": True,
|
|
261
|
+
"status_code": status,
|
|
262
|
+
"error_message": None
|
|
263
|
+
}
|
|
264
|
+
return {
|
|
265
|
+
"success": False,
|
|
266
|
+
"status_code": status,
|
|
267
|
+
"error_message": "No 'organic' field found in Serper.dev response"
|
|
268
|
+
}
|
|
269
|
+
except Exception as e:
|
|
270
|
+
logger.error(f"SerperDev test failed: {e}")
|
|
271
|
+
return {"success": False, "status_code": 0, "error_message": str(e)}
|
|
272
|
+
|
|
273
|
+
|
|
170
274
|
async def test_proxycurl(api_key: str) -> Dict[str, Any]:
|
|
171
|
-
url = "https://
|
|
275
|
+
url = "https://enrichlayer.com/api/v2/profile"
|
|
172
276
|
headers = {"Authorization": f"Bearer {api_key}"}
|
|
173
277
|
params = {"linkedin_profile_url": "https://www.linkedin.com/in/satyanadella"}
|
|
174
278
|
try:
|
|
@@ -184,13 +288,76 @@ async def test_proxycurl(api_key: str) -> Dict[str, Any]:
|
|
|
184
288
|
return {
|
|
185
289
|
"success": False,
|
|
186
290
|
"status_code": status,
|
|
187
|
-
"error_message": err_message or f"Non-200 from
|
|
291
|
+
"error_message": err_message or f"Non-200 from Enrich Layer: {status}"
|
|
188
292
|
}
|
|
189
293
|
return {"success": True, "status_code": status, "error_message": None}
|
|
190
294
|
except Exception as e:
|
|
191
|
-
logger.error(f"
|
|
295
|
+
logger.error(f"Enrich Layer test failed: {e}")
|
|
192
296
|
return {"success": False, "status_code": 0, "error_message": str(e)}
|
|
193
297
|
|
|
298
|
+
|
|
299
|
+
async def test_exa(api_key: str) -> Dict[str, Any]:
|
|
300
|
+
"""Verify Exa connectivity by issuing a minimal search request."""
|
|
301
|
+
|
|
302
|
+
url = "https://api.exa.ai/search"
|
|
303
|
+
headers = {
|
|
304
|
+
"x-api-key": api_key,
|
|
305
|
+
"Content-Type": "application/json",
|
|
306
|
+
"Accept": "application/json",
|
|
307
|
+
}
|
|
308
|
+
payload = {
|
|
309
|
+
"query": "Dhisana connectivity check",
|
|
310
|
+
"numResults": 1,
|
|
311
|
+
}
|
|
312
|
+
|
|
313
|
+
try:
|
|
314
|
+
timeout = aiohttp.ClientTimeout(total=10)
|
|
315
|
+
async with aiohttp.ClientSession(timeout=timeout) as session:
|
|
316
|
+
async with session.post(url, headers=headers, json=payload) as response:
|
|
317
|
+
status = response.status
|
|
318
|
+
data = await safe_json(response)
|
|
319
|
+
|
|
320
|
+
if status != 200:
|
|
321
|
+
err_message = None
|
|
322
|
+
if isinstance(data, dict):
|
|
323
|
+
err_message = (
|
|
324
|
+
data.get("message")
|
|
325
|
+
or data.get("error")
|
|
326
|
+
or data.get("detail")
|
|
327
|
+
)
|
|
328
|
+
if isinstance(err_message, dict):
|
|
329
|
+
err_message = err_message.get("message") or str(err_message)
|
|
330
|
+
return {
|
|
331
|
+
"success": False,
|
|
332
|
+
"status_code": status,
|
|
333
|
+
"error_message": err_message or f"Non-200 from Exa: {status}",
|
|
334
|
+
}
|
|
335
|
+
|
|
336
|
+
if isinstance(data, dict):
|
|
337
|
+
if "error" in data:
|
|
338
|
+
error_value = data["error"]
|
|
339
|
+
if isinstance(error_value, dict):
|
|
340
|
+
error_value = error_value.get("message") or str(error_value)
|
|
341
|
+
return {
|
|
342
|
+
"success": False,
|
|
343
|
+
"status_code": status,
|
|
344
|
+
"error_message": str(error_value),
|
|
345
|
+
}
|
|
346
|
+
|
|
347
|
+
results = data.get("results")
|
|
348
|
+
if isinstance(results, list):
|
|
349
|
+
return {"success": True, "status_code": status, "error_message": None}
|
|
350
|
+
|
|
351
|
+
return {
|
|
352
|
+
"success": False,
|
|
353
|
+
"status_code": status,
|
|
354
|
+
"error_message": "Unexpected response from Exa API.",
|
|
355
|
+
}
|
|
356
|
+
except Exception as exc:
|
|
357
|
+
logger.error(f"Exa test failed: {exc}")
|
|
358
|
+
return {"success": False, "status_code": 0, "error_message": str(exc)}
|
|
359
|
+
|
|
360
|
+
|
|
194
361
|
async def test_apollo(api_key: str) -> Dict[str, Any]:
|
|
195
362
|
organization_domain = 'microsoft.com'
|
|
196
363
|
url = f'https://api.apollo.io/api/v1/organizations/enrich?domain={organization_domain}'
|
|
@@ -202,24 +369,23 @@ async def test_apollo(api_key: str) -> Dict[str, Any]:
|
|
|
202
369
|
async with session.get(url, headers=headers) as response:
|
|
203
370
|
status = response.status
|
|
204
371
|
if status == 200:
|
|
205
|
-
|
|
372
|
+
await response.json()
|
|
206
373
|
logger.info("Successfully retrieved organization info from Apollo.")
|
|
207
374
|
return {"success": True, "status_code": status}
|
|
208
375
|
|
|
209
376
|
elif status == 429:
|
|
210
377
|
msg = "Rate limit exceeded"
|
|
211
378
|
logger.warning(msg)
|
|
212
|
-
|
|
213
|
-
|
|
214
|
-
|
|
215
|
-
|
|
216
|
-
|
|
217
|
-
)
|
|
379
|
+
return {
|
|
380
|
+
"success": False,
|
|
381
|
+
"status_code": status,
|
|
382
|
+
"error_message": msg
|
|
383
|
+
}
|
|
218
384
|
else:
|
|
219
385
|
err_message = None
|
|
220
386
|
if response.content_type == "application/json":
|
|
221
|
-
data = await response
|
|
222
|
-
err_message = data.get("message")
|
|
387
|
+
data = await safe_json(response)
|
|
388
|
+
err_message = data.get("message") if data else None
|
|
223
389
|
return {
|
|
224
390
|
"success": False,
|
|
225
391
|
"status_code": status,
|
|
@@ -229,6 +395,7 @@ async def test_apollo(api_key: str) -> Dict[str, Any]:
|
|
|
229
395
|
logger.error(f"Apollo test failed: {e}")
|
|
230
396
|
return {"success": False, "status_code": 0, "error_message": str(e)}
|
|
231
397
|
|
|
398
|
+
|
|
232
399
|
async def test_hubspot(api_key: str) -> Dict[str, Any]:
|
|
233
400
|
url = "https://api.hubapi.com/account-info/v3/details"
|
|
234
401
|
try:
|
|
@@ -259,86 +426,1592 @@ async def test_hubspot(api_key: str) -> Dict[str, Any]:
|
|
|
259
426
|
logger.error(f"HubSpot test failed: {e}")
|
|
260
427
|
return {"success": False, "status_code": 0, "error_message": str(e)}
|
|
261
428
|
|
|
262
|
-
###############################################################################
|
|
263
|
-
# MAIN CONNECTIVITY FUNCTION
|
|
264
|
-
###############################################################################
|
|
265
429
|
|
|
266
|
-
async def
|
|
430
|
+
async def test_mailgun(api_key: str, domain: str) -> Dict[str, Any]:
|
|
267
431
|
"""
|
|
268
|
-
|
|
269
|
-
|
|
270
|
-
|
|
271
|
-
|
|
272
|
-
|
|
273
|
-
"""
|
|
274
|
-
|
|
275
|
-
|
|
276
|
-
|
|
277
|
-
|
|
278
|
-
|
|
279
|
-
|
|
280
|
-
|
|
281
|
-
|
|
282
|
-
|
|
283
|
-
|
|
432
|
+
Basic Mailgun connectivity check against the domain-specific stats endpoint.
|
|
433
|
+
|
|
434
|
+
Uses BasicAuth("api", api_key) as required by Mailgun. Does not send mail.
|
|
435
|
+
"""
|
|
436
|
+
url = f"https://api.mailgun.net/v3/{domain}/stats/total"
|
|
437
|
+
params = {"event": "accepted", "duration": "1d", "limit": 1}
|
|
438
|
+
try:
|
|
439
|
+
timeout = aiohttp.ClientTimeout(total=10)
|
|
440
|
+
auth = aiohttp.BasicAuth("api", api_key)
|
|
441
|
+
async with aiohttp.ClientSession(timeout=timeout, auth=auth) as session:
|
|
442
|
+
async with session.get(url, params=params) as response:
|
|
443
|
+
status = response.status
|
|
444
|
+
data = await safe_json(response)
|
|
445
|
+
if status != 200:
|
|
446
|
+
msg = None
|
|
447
|
+
if data and isinstance(data, dict):
|
|
448
|
+
msg = data.get("message") or data.get("error")
|
|
449
|
+
return {"success": False, "status_code": status, "error_message": msg or f"Mailgun non-200: {status}"}
|
|
450
|
+
return {"success": True, "status_code": status, "error_message": None}
|
|
451
|
+
except Exception as e:
|
|
452
|
+
logger.error(f"Mailgun test failed: {e}")
|
|
453
|
+
return {"success": False, "status_code": 0, "error_message": str(e)}
|
|
454
|
+
|
|
455
|
+
|
|
456
|
+
async def test_sendgrid(api_key: str) -> Dict[str, Any]:
|
|
457
|
+
"""
|
|
458
|
+
Basic SendGrid connectivity check via the user account endpoint.
|
|
459
|
+
|
|
460
|
+
SendGrid returns 200 with account details when the API key is valid
|
|
461
|
+
and has sufficient scopes.
|
|
462
|
+
"""
|
|
463
|
+
url = "https://api.sendgrid.com/v3/user/account"
|
|
464
|
+
headers = {"Authorization": f"Bearer {api_key}"}
|
|
465
|
+
try:
|
|
466
|
+
async with aiohttp.ClientSession(timeout=aiohttp.ClientTimeout(total=10)) as session:
|
|
467
|
+
async with session.get(url, headers=headers) as response:
|
|
468
|
+
status = response.status
|
|
469
|
+
data = await safe_json(response)
|
|
470
|
+
if status != 200:
|
|
471
|
+
msg = None
|
|
472
|
+
if data and isinstance(data, dict):
|
|
473
|
+
# Typical SendGrid error shape: {"errors":[{"message": ...}]}
|
|
474
|
+
errs = data.get("errors")
|
|
475
|
+
if isinstance(errs, list) and errs:
|
|
476
|
+
first = errs[0]
|
|
477
|
+
if isinstance(first, dict):
|
|
478
|
+
msg = first.get("message")
|
|
479
|
+
return {"success": False, "status_code": status, "error_message": msg or f"SendGrid non-200: {status}"}
|
|
480
|
+
return {"success": True, "status_code": status, "error_message": None}
|
|
481
|
+
except Exception as e:
|
|
482
|
+
logger.error(f"SendGrid test failed: {e}")
|
|
483
|
+
return {"success": False, "status_code": 0, "error_message": str(e)}
|
|
484
|
+
|
|
485
|
+
|
|
486
|
+
async def test_samgov(api_key: str) -> Dict[str, Any]:
|
|
487
|
+
"""Test SAM.gov connectivity by fetching a single opportunity."""
|
|
488
|
+
|
|
489
|
+
url = "https://api.sam.gov/opportunities/v2/search"
|
|
490
|
+
now = datetime.now(timezone.utc)
|
|
491
|
+
posted_to = now.strftime("%Y-%m-%dT%H:%M:%SZ")
|
|
492
|
+
posted_from = (now - timedelta(days=7)).strftime("%Y-%m-%dT%H:%M:%SZ")
|
|
493
|
+
|
|
494
|
+
params = {
|
|
495
|
+
"limit": 1,
|
|
496
|
+
"offset": 0,
|
|
497
|
+
"keyword": "software",
|
|
498
|
+
"status": "active",
|
|
499
|
+
"includeCount": "true",
|
|
500
|
+
"postedFrom": posted_from,
|
|
501
|
+
"postedTo": posted_to,
|
|
502
|
+
"api_key": api_key,
|
|
284
503
|
}
|
|
285
504
|
|
|
286
|
-
|
|
287
|
-
|
|
288
|
-
tool_name = tool.get("name")
|
|
289
|
-
config_entries = tool.get("configuration", [])
|
|
290
|
-
if not tool_name:
|
|
291
|
-
logger.warning("Tool entry missing 'name' field.")
|
|
292
|
-
results["unknown_tool"] = {
|
|
293
|
-
"success": False,
|
|
294
|
-
"status_code": 0,
|
|
295
|
-
"error_message": "Tool entry missing 'name'."
|
|
296
|
-
}
|
|
297
|
-
continue
|
|
505
|
+
try:
|
|
506
|
+
async with aiohttp.ClientSession(timeout=aiohttp.ClientTimeout(total=10)) as session:
|
|
298
507
|
|
|
299
|
-
|
|
300
|
-
|
|
301
|
-
|
|
302
|
-
|
|
303
|
-
|
|
304
|
-
"error_message": f"No test function for tool '{tool_name}'"
|
|
305
|
-
}
|
|
306
|
-
continue
|
|
508
|
+
async def perform(request_params: Dict[str, Any]):
|
|
509
|
+
async with session.get(url, params=request_params) as response:
|
|
510
|
+
status = response.status
|
|
511
|
+
body_text = await response.text()
|
|
512
|
+
data: Optional[Dict[str, Any]] = None
|
|
307
513
|
|
|
308
|
-
|
|
309
|
-
|
|
310
|
-
|
|
311
|
-
|
|
312
|
-
|
|
313
|
-
|
|
314
|
-
"status_code": 0,
|
|
315
|
-
"error_message": "Missing apiKey"
|
|
316
|
-
}
|
|
317
|
-
continue
|
|
514
|
+
try:
|
|
515
|
+
parsed = json.loads(body_text)
|
|
516
|
+
if isinstance(parsed, dict):
|
|
517
|
+
data = parsed
|
|
518
|
+
except json.JSONDecodeError:
|
|
519
|
+
data = None
|
|
318
520
|
|
|
319
|
-
|
|
521
|
+
return status, data, body_text
|
|
320
522
|
|
|
321
|
-
|
|
322
|
-
if tool_name == "openai":
|
|
323
|
-
model_name = next((c["value"] for c in config_entries if c["name"] == "modelName"), "gpt-4o")
|
|
324
|
-
reasoning_effort = next((c["value"] for c in config_entries if c["name"] == "reasoningEffort"), "medium")
|
|
325
|
-
results[tool_name] = await test_openai(api_key, model_name, reasoning_effort)
|
|
523
|
+
status, data, body_text = await perform(params)
|
|
326
524
|
|
|
327
|
-
|
|
328
|
-
|
|
329
|
-
|
|
330
|
-
|
|
331
|
-
|
|
525
|
+
def extract_error_message(payload: Optional[Dict[str, Any]], fallback_text: str) -> Optional[str]:
|
|
526
|
+
if not payload:
|
|
527
|
+
return fallback_text[:200] if fallback_text else None
|
|
528
|
+
|
|
529
|
+
errors = payload.get("errors") or payload.get("error")
|
|
530
|
+
if isinstance(errors, list):
|
|
531
|
+
parts = [
|
|
532
|
+
err.get("message") if isinstance(err, dict) else str(err)
|
|
533
|
+
for err in errors
|
|
534
|
+
if err
|
|
535
|
+
]
|
|
536
|
+
return "; ".join(parts) if parts else fallback_text[:200]
|
|
537
|
+
if isinstance(errors, dict):
|
|
538
|
+
return errors.get("message") or str(errors)
|
|
539
|
+
if errors:
|
|
540
|
+
return str(errors)
|
|
541
|
+
|
|
542
|
+
for key in ("message", "errorMessage", "detail", "description"):
|
|
543
|
+
if key in payload and payload[key]:
|
|
544
|
+
return str(payload[key])
|
|
545
|
+
|
|
546
|
+
return fallback_text[:200] if fallback_text else None
|
|
547
|
+
|
|
548
|
+
error_message = extract_error_message(data, body_text)
|
|
549
|
+
|
|
550
|
+
if status == 400 and error_message and "Invalid Date Entered" in error_message:
|
|
551
|
+
fallback_params = dict(params)
|
|
552
|
+
fallback_params["postedFrom"] = (now - timedelta(days=7)).strftime("%m/%d/%Y")
|
|
553
|
+
fallback_params["postedTo"] = now.strftime("%m/%d/%Y")
|
|
554
|
+
status, data, body_text = await perform(fallback_params)
|
|
555
|
+
error_message = extract_error_message(data, body_text)
|
|
556
|
+
|
|
557
|
+
if status != 200:
|
|
558
|
+
return {
|
|
332
559
|
"success": False,
|
|
333
|
-
"status_code":
|
|
334
|
-
"error_message":
|
|
560
|
+
"status_code": status,
|
|
561
|
+
"error_message": error_message or f"SAM.gov non-200: {status}",
|
|
335
562
|
}
|
|
336
|
-
else:
|
|
337
|
-
results[tool_name] = await test_google_workspace(api_key, subject_email)
|
|
338
563
|
|
|
339
|
-
|
|
564
|
+
if not data:
|
|
565
|
+
return {
|
|
566
|
+
"success": False,
|
|
567
|
+
"status_code": status,
|
|
568
|
+
"error_message": "SAM.gov returned invalid JSON response.",
|
|
569
|
+
}
|
|
570
|
+
|
|
571
|
+
if data.get("errors"):
|
|
572
|
+
return {
|
|
573
|
+
"success": False,
|
|
574
|
+
"status_code": status,
|
|
575
|
+
"error_message": extract_error_message(data, body_text) or "SAM.gov reported errors.",
|
|
576
|
+
}
|
|
577
|
+
|
|
578
|
+
if data.get("opportunitiesData") or data.get("totalRecords") is not None:
|
|
579
|
+
return {"success": True, "status_code": status, "error_message": None}
|
|
580
|
+
|
|
581
|
+
return {
|
|
582
|
+
"success": False,
|
|
583
|
+
"status_code": status,
|
|
584
|
+
"error_message": "Unexpected SAM.gov response payload.",
|
|
585
|
+
}
|
|
586
|
+
|
|
587
|
+
except Exception as e:
|
|
588
|
+
logger.error(f"SAM.gov test failed: {e}")
|
|
589
|
+
return {"success": False, "status_code": 0, "error_message": str(e)}
|
|
590
|
+
|
|
591
|
+
|
|
592
|
+
async def test_salesforce(
|
|
593
|
+
username: str,
|
|
594
|
+
password: str,
|
|
595
|
+
security_token: str,
|
|
596
|
+
domain: str,
|
|
597
|
+
client_id: Optional[str] = None,
|
|
598
|
+
client_secret: Optional[str] = None,
|
|
599
|
+
) -> Dict[str, Any]:
|
|
600
|
+
"""Test Salesforce connectivity using provided credentials.
|
|
601
|
+
|
|
602
|
+
If client_id and client_secret are supplied, perform an OAuth2 password
|
|
603
|
+
grant to obtain an access token and execute a simple REST API call. This is
|
|
604
|
+
suitable for production environments. Otherwise, fall back to the
|
|
605
|
+
simple_salesforce login used for testing.
|
|
606
|
+
"""
|
|
607
|
+
|
|
608
|
+
try:
|
|
609
|
+
def _connect():
|
|
610
|
+
# OAuth2 password grant flow when client credentials are provided
|
|
611
|
+
if client_id and client_secret:
|
|
612
|
+
token_url = f"https://{domain}.salesforce.com/services/oauth2/token"
|
|
613
|
+
resp = requests.post(
|
|
614
|
+
token_url,
|
|
615
|
+
data={
|
|
616
|
+
"grant_type": "password",
|
|
617
|
+
"client_id": client_id,
|
|
618
|
+
"client_secret": client_secret,
|
|
619
|
+
"username": username,
|
|
620
|
+
"password": f"{password}{security_token}",
|
|
621
|
+
},
|
|
622
|
+
timeout=10,
|
|
623
|
+
)
|
|
624
|
+
resp.raise_for_status()
|
|
625
|
+
data = resp.json()
|
|
626
|
+
access_token = data.get("access_token")
|
|
627
|
+
instance_url = data.get("instance_url")
|
|
628
|
+
if not access_token or not instance_url:
|
|
629
|
+
raise ValueError("Invalid response from Salesforce OAuth2 token endpoint")
|
|
630
|
+
headers = {"Authorization": f"Bearer {access_token}"}
|
|
631
|
+
url = f"{instance_url}/services/data/v59.0/sobjects/Account/"
|
|
632
|
+
res = requests.get(url, headers=headers, timeout=10)
|
|
633
|
+
res.raise_for_status()
|
|
634
|
+
return res.json()
|
|
635
|
+
|
|
636
|
+
# Default simple_salesforce client for testing/sandbox
|
|
637
|
+
sf = Salesforce(
|
|
638
|
+
username=username,
|
|
639
|
+
password=password,
|
|
640
|
+
security_token=security_token,
|
|
641
|
+
domain=domain,
|
|
642
|
+
)
|
|
643
|
+
return sf.query("SELECT Id FROM Account LIMIT 1")
|
|
644
|
+
|
|
645
|
+
data = await asyncio.to_thread(_connect)
|
|
646
|
+
if isinstance(data, dict):
|
|
647
|
+
return {"success": True, "status_code": 200, "error_message": None}
|
|
648
|
+
return {
|
|
649
|
+
"success": False,
|
|
650
|
+
"status_code": 200,
|
|
651
|
+
"error_message": "Did not receive records from Salesforce.",
|
|
652
|
+
}
|
|
653
|
+
except Exception as e:
|
|
654
|
+
status = getattr(e, "status", 0)
|
|
655
|
+
logger.error(f"Salesforce test failed: {e}")
|
|
656
|
+
return {"success": False, "status_code": status, "error_message": str(e)}
|
|
657
|
+
|
|
658
|
+
|
|
659
|
+
async def test_github(api_key: str) -> Dict[str, Any]:
|
|
660
|
+
"""
|
|
661
|
+
Tests GitHub API connectivity using a Personal Access Token (PAT).
|
|
662
|
+
Performs a GET /user call to verify token validity.
|
|
663
|
+
"""
|
|
664
|
+
url = "https://api.github.com/user"
|
|
665
|
+
headers = {
|
|
666
|
+
"Authorization": f"token {api_key}",
|
|
667
|
+
"Accept": "application/vnd.github+json",
|
|
668
|
+
}
|
|
669
|
+
try:
|
|
670
|
+
async with aiohttp.ClientSession(timeout=aiohttp.ClientTimeout(total=10)) as session:
|
|
671
|
+
async with session.get(url, headers=headers) as response:
|
|
672
|
+
status = response.status
|
|
673
|
+
data = await safe_json(response)
|
|
674
|
+
|
|
675
|
+
if status != 200:
|
|
676
|
+
error_message = data.get("message", f"Non-200 from GitHub: {status}") if data else None
|
|
677
|
+
return {
|
|
678
|
+
"success": False,
|
|
679
|
+
"status_code": status,
|
|
680
|
+
"error_message": error_message
|
|
681
|
+
}
|
|
682
|
+
|
|
683
|
+
if data and "login" in data:
|
|
684
|
+
return {
|
|
685
|
+
"success": True,
|
|
686
|
+
"status_code": status,
|
|
687
|
+
"error_message": None
|
|
688
|
+
}
|
|
689
|
+
else:
|
|
690
|
+
return {
|
|
691
|
+
"success": False,
|
|
692
|
+
"status_code": status,
|
|
693
|
+
"error_message": "GitHub API responded but 'login' not found."
|
|
694
|
+
}
|
|
695
|
+
except Exception as e:
|
|
696
|
+
logger.error(f"GitHub connectivity test failed: {e}")
|
|
697
|
+
return {
|
|
698
|
+
"success": False,
|
|
699
|
+
"status_code": 0,
|
|
700
|
+
"error_message": str(e)
|
|
701
|
+
}
|
|
702
|
+
|
|
703
|
+
###############################################################################
|
|
704
|
+
# UPDATED test_findyemail TO REFLECT ACTUAL USAGE
|
|
705
|
+
###############################################################################
|
|
706
|
+
|
|
707
|
+
async def test_findyemail(api_key: str) -> Dict[str, Any]:
|
|
708
|
+
"""
|
|
709
|
+
Tests FindyMail by sending a POST request to /search/name
|
|
710
|
+
with a dummy name+domain, matching the usage in guess_email_with_findymail.
|
|
711
|
+
"""
|
|
712
|
+
url = f"{FINDYMAIL_BASE_URL}/search/name"
|
|
713
|
+
headers = {
|
|
714
|
+
"Authorization": f"Bearer {api_key}",
|
|
715
|
+
"Content-Type": "application/json"
|
|
716
|
+
}
|
|
717
|
+
payload = {
|
|
718
|
+
"name": "Satya Nadella",
|
|
719
|
+
"domain": "microsoft.com"
|
|
720
|
+
}
|
|
721
|
+
|
|
722
|
+
try:
|
|
723
|
+
async with aiohttp.ClientSession(timeout=aiohttp.ClientTimeout(total=10)) as session:
|
|
724
|
+
async with session.post(url, headers=headers, json=payload) as response:
|
|
725
|
+
status = response.status
|
|
726
|
+
data = await safe_json(response)
|
|
727
|
+
|
|
728
|
+
if status != 200:
|
|
729
|
+
return {
|
|
730
|
+
"success": False,
|
|
731
|
+
"status_code": status,
|
|
732
|
+
"error_message": f"[FindyMail] Non-200: {status}"
|
|
733
|
+
}
|
|
734
|
+
|
|
735
|
+
# On success, we usually get { "contact": { ... } }
|
|
736
|
+
contact = data.get("contact")
|
|
737
|
+
if not contact:
|
|
738
|
+
return {
|
|
739
|
+
"success": False,
|
|
740
|
+
"status_code": status,
|
|
741
|
+
"error_message": "No 'contact' field in response. Possibly invalid API key or insufficient data."
|
|
742
|
+
}
|
|
743
|
+
# If we got here, assume success
|
|
744
|
+
return {"success": True, "status_code": status, "error_message": None}
|
|
745
|
+
except Exception as e:
|
|
746
|
+
logger.error(f"FindyEmail test failed: {e}")
|
|
747
|
+
return {"success": False, "status_code": 0, "error_message": str(e)}
|
|
748
|
+
|
|
749
|
+
###############################################################################
|
|
750
|
+
# UPDATED test_hunter TO REFLECT ACTUAL USAGE
|
|
751
|
+
###############################################################################
|
|
752
|
+
|
|
753
|
+
async def test_hunter(api_key: str) -> Dict[str, Any]:
|
|
754
|
+
"""
|
|
755
|
+
Tests Hunter by calling their /v2/email-finder endpoint with dummy parameters,
|
|
756
|
+
mirroring guess_email_with_hunter usage.
|
|
757
|
+
"""
|
|
758
|
+
# Example dummy usage with domain=example.com, first_name=John, last_name=Doe
|
|
759
|
+
base_url = "https://api.hunter.io/v2/email-finder"
|
|
760
|
+
url = f"{base_url}?domain=microsoft.com&first_name=Satya&last_name=Nadella&api_key={api_key}"
|
|
761
|
+
|
|
762
|
+
try:
|
|
763
|
+
async with aiohttp.ClientSession(timeout=aiohttp.ClientTimeout(total=10)) as session:
|
|
764
|
+
async with session.get(url) as response:
|
|
765
|
+
status = response.status
|
|
766
|
+
data = await safe_json(response)
|
|
767
|
+
if status != 200:
|
|
768
|
+
logger.warning("[Hunter] email-finder non‑200: %s", status)
|
|
769
|
+
return {
|
|
770
|
+
"success": False,
|
|
771
|
+
"status_code": status,
|
|
772
|
+
"error_message": f"Hunter responded with {status}"
|
|
773
|
+
}
|
|
774
|
+
|
|
775
|
+
# On success, check if we got an email in data->"data"->"email"
|
|
776
|
+
email = data.get("data", {}).get("email")
|
|
777
|
+
if not email:
|
|
778
|
+
return {
|
|
779
|
+
"success": False,
|
|
780
|
+
"status_code": status,
|
|
781
|
+
"error_message": "No email found in Hunter response. Possibly invalid API key or no data."
|
|
782
|
+
}
|
|
783
|
+
return {"success": True, "status_code": status, "error_message": None}
|
|
784
|
+
except Exception as ex:
|
|
785
|
+
logger.exception("[Hunter] test exception: %s", ex)
|
|
786
|
+
return {"success": False, "status_code": 0, "error_message": str(ex)}
|
|
787
|
+
|
|
788
|
+
###############################################################################
|
|
789
|
+
# CLAY CONNECTIVITY TEST
|
|
790
|
+
###############################################################################
|
|
791
|
+
|
|
792
|
+
async def test_clay(api_key: str, webhook: str) -> Dict[str, Any]:
|
|
793
|
+
"""Send a simple payload to the Clay webhook to verify credentials."""
|
|
794
|
+
dummy_lead = {
|
|
795
|
+
"first_name": "Test",
|
|
796
|
+
"last_name": "User",
|
|
797
|
+
"email": "test@example.com",
|
|
798
|
+
}
|
|
799
|
+
|
|
800
|
+
try:
|
|
801
|
+
result = await push_to_clay_table(dummy_lead, webhook=webhook, api_key=api_key)
|
|
802
|
+
if isinstance(result, dict) and "error" in result:
|
|
803
|
+
return {
|
|
804
|
+
"success": False,
|
|
805
|
+
"status_code": 0,
|
|
806
|
+
"error_message": result["error"],
|
|
807
|
+
}
|
|
808
|
+
return {"success": True, "status_code": 200, "error_message": None}
|
|
809
|
+
except Exception as exc: # network or other
|
|
810
|
+
logger.error(f"Clay test failed: {exc}")
|
|
811
|
+
return {"success": False, "status_code": 0, "error_message": str(exc)}
|
|
812
|
+
|
|
813
|
+
###############################################################################
|
|
814
|
+
# POSTHOG CONNECTIVITY TEST
|
|
815
|
+
###############################################################################
|
|
816
|
+
|
|
817
|
+
async def test_posthog(
|
|
818
|
+
api_host: str,
|
|
819
|
+
project_id: str,
|
|
820
|
+
personal_api_key: str,
|
|
821
|
+
) -> Dict[str, Any]:
|
|
822
|
+
"""
|
|
823
|
+
Validate PostHog connectivity by issuing a lightweight HogQL query.
|
|
824
|
+
|
|
825
|
+
Requires:
|
|
826
|
+
• api_host (e.g. https://app.posthog.com or self-hosted URL)
|
|
827
|
+
• project_id (numeric or string project identifier)
|
|
828
|
+
• personal_api_key (token with query access)
|
|
829
|
+
"""
|
|
830
|
+
base_url = (api_host or "").rstrip("/")
|
|
831
|
+
if not base_url:
|
|
832
|
+
return {
|
|
833
|
+
"success": False,
|
|
834
|
+
"status_code": 0,
|
|
835
|
+
"error_message": "Missing api_host for PostHog connectivity test.",
|
|
836
|
+
}
|
|
837
|
+
if not project_id:
|
|
838
|
+
return {
|
|
839
|
+
"success": False,
|
|
840
|
+
"status_code": 0,
|
|
841
|
+
"error_message": "Missing project_id for PostHog connectivity test.",
|
|
842
|
+
}
|
|
843
|
+
if not personal_api_key:
|
|
844
|
+
return {
|
|
845
|
+
"success": False,
|
|
846
|
+
"status_code": 0,
|
|
847
|
+
"error_message": "Missing personal_api_key for PostHog connectivity test.",
|
|
848
|
+
}
|
|
849
|
+
|
|
850
|
+
url = f"{base_url}/api/projects/{project_id}/query/"
|
|
851
|
+
headers = {
|
|
852
|
+
"Authorization": f"Bearer {personal_api_key}",
|
|
853
|
+
"Content-Type": "application/json",
|
|
854
|
+
}
|
|
855
|
+
payload = {"query": {"kind": "HogQLQuery", "query": "SELECT 1"}}
|
|
856
|
+
|
|
857
|
+
try:
|
|
858
|
+
async with aiohttp.ClientSession(timeout=aiohttp.ClientTimeout(total=10)) as session:
|
|
859
|
+
async with session.post(url, headers=headers, json=payload) as response:
|
|
860
|
+
status = response.status
|
|
861
|
+
data = await safe_json(response)
|
|
862
|
+
|
|
863
|
+
if status == 200:
|
|
864
|
+
return {"success": True, "status_code": status, "error_message": None}
|
|
865
|
+
|
|
866
|
+
detail = None
|
|
867
|
+
if isinstance(data, dict):
|
|
868
|
+
detail = (
|
|
869
|
+
data.get("message")
|
|
870
|
+
or data.get("detail")
|
|
871
|
+
or data.get("error")
|
|
872
|
+
or data.get("code")
|
|
873
|
+
)
|
|
874
|
+
return {
|
|
875
|
+
"success": False,
|
|
876
|
+
"status_code": status,
|
|
877
|
+
"error_message": detail or f"PostHog responded with {status}",
|
|
878
|
+
}
|
|
879
|
+
except Exception as exc:
|
|
880
|
+
logger.error(f"PostHog connectivity test failed: {exc}")
|
|
881
|
+
return {"success": False, "status_code": 0, "error_message": str(exc)}
|
|
882
|
+
|
|
883
|
+
###############################################################################
|
|
884
|
+
# MCP SERVER CONNECTIVITY TEST
|
|
885
|
+
###############################################################################
|
|
886
|
+
|
|
887
|
+
async def test_mcp_server(
|
|
888
|
+
base_url: str,
|
|
889
|
+
server_label: str = "",
|
|
890
|
+
header_name: str = "",
|
|
891
|
+
header_value: str = ""
|
|
892
|
+
) -> Dict[str, Any]:
|
|
893
|
+
"""Simple connectivity check for an MCP server using the OpenAI client."""
|
|
894
|
+
|
|
895
|
+
if AsyncOpenAI is None:
|
|
896
|
+
return {
|
|
897
|
+
"success": False,
|
|
898
|
+
"status_code": 0,
|
|
899
|
+
"error_message": "openai package not installed",
|
|
900
|
+
}
|
|
901
|
+
|
|
902
|
+
api_key = os.getenv("OPENAI_API_KEY")
|
|
903
|
+
if not api_key:
|
|
904
|
+
return {
|
|
905
|
+
"success": False,
|
|
906
|
+
"status_code": 0,
|
|
907
|
+
"error_message": "OPENAI_API_KEY environment variable not set",
|
|
908
|
+
}
|
|
909
|
+
|
|
910
|
+
headers: Dict[str, str] = (
|
|
911
|
+
{header_name: header_value} if header_name and header_value else {}
|
|
912
|
+
)
|
|
913
|
+
|
|
914
|
+
tools = [
|
|
915
|
+
{
|
|
916
|
+
"type": "mcp",
|
|
917
|
+
"server_label": server_label,
|
|
918
|
+
"server_url": base_url,
|
|
919
|
+
"require_approval": "never",
|
|
920
|
+
"headers": headers,
|
|
921
|
+
}
|
|
922
|
+
]
|
|
923
|
+
|
|
924
|
+
try:
|
|
925
|
+
client = AsyncOpenAI(api_key=api_key)
|
|
926
|
+
|
|
927
|
+
kwargs: Dict[str, Any] = {
|
|
928
|
+
"input": [
|
|
929
|
+
{"role": "user", "content": "list tools available"},
|
|
930
|
+
],
|
|
931
|
+
"model": "gpt-4",
|
|
932
|
+
"store": False,
|
|
933
|
+
"tools": tools,
|
|
934
|
+
"tool_choice": "required",
|
|
935
|
+
}
|
|
936
|
+
|
|
937
|
+
response = await client.responses.create(**kwargs)
|
|
938
|
+
|
|
939
|
+
# Convert response to dict-like structure for compatibility
|
|
940
|
+
status = 200 # Successful response creation
|
|
941
|
+
data = response.model_dump() if hasattr(response, 'model_dump') else None
|
|
942
|
+
|
|
943
|
+
if data and data.get("error"):
|
|
944
|
+
detail = data["error"].get("message") if isinstance(data["error"], dict) else str(data["error"])
|
|
945
|
+
return {"success": False, "status_code": status, "error_message": detail}
|
|
946
|
+
|
|
947
|
+
return {"success": True, "status_code": status, "error_message": None}
|
|
948
|
+
except Exception as e:
|
|
949
|
+
return {"success": False, "status_code": 0, "error_message": str(e)}
|
|
950
|
+
|
|
951
|
+
|
|
952
|
+
###############################################################################
|
|
953
|
+
# SMTP / IMAP CONNECTIVITY TEST FUNCTION
|
|
954
|
+
###############################################################################
|
|
955
|
+
|
|
956
|
+
async def test_smtp_accounts(
|
|
957
|
+
usernames: str,
|
|
958
|
+
passwords: str,
|
|
959
|
+
smtp_host: str,
|
|
960
|
+
smtp_port: int,
|
|
961
|
+
imap_host: str,
|
|
962
|
+
imap_port: int,
|
|
963
|
+
) -> Dict[str, Any]:
|
|
964
|
+
"""
|
|
965
|
+
Quick “smoke test” for an SMTP + IMAP mailbox configuration.
|
|
966
|
+
|
|
967
|
+
Parameters
|
|
968
|
+
----------
|
|
969
|
+
usernames : str
|
|
970
|
+
Comma-separated list of mailbox usernames.
|
|
971
|
+
passwords : str
|
|
972
|
+
Comma-separated list of passwords or app-passwords, **same order** as *usernames*.
|
|
973
|
+
smtp_host : str
|
|
974
|
+
SMTP server hostname (e.g. ``smtp.gmail.com``).
|
|
975
|
+
smtp_port : int
|
|
976
|
+
SMTP port (587 for STARTTLS, 465 for implicit SSL, etc.).
|
|
977
|
+
imap_host : str
|
|
978
|
+
IMAP server hostname (e.g. ``imap.gmail.com``).
|
|
979
|
+
imap_port : int
|
|
980
|
+
IMAP SSL port (usually 993).
|
|
981
|
+
|
|
982
|
+
Returns
|
|
983
|
+
-------
|
|
984
|
+
dict
|
|
985
|
+
{
|
|
986
|
+
"success": bool,
|
|
987
|
+
"status_code": int, # 250 for SMTP OK, or last IMAP status-code on error
|
|
988
|
+
"error_message": Optional[str]
|
|
989
|
+
}
|
|
990
|
+
"""
|
|
991
|
+
users: List[str] = [u.strip() for u in usernames.split(",") if u.strip()]
|
|
992
|
+
pwds: List[str] = [p.strip() for p in passwords.split(",") if p.strip()]
|
|
993
|
+
|
|
994
|
+
if not users or len(users) != len(pwds):
|
|
995
|
+
return {
|
|
996
|
+
"success": False,
|
|
997
|
+
"status_code": 0,
|
|
998
|
+
"error_message": "Username / password list mismatch or empty."
|
|
999
|
+
}
|
|
1000
|
+
|
|
1001
|
+
# --- use the first account for the connectivity check ---
|
|
1002
|
+
user, pwd = users[0], pwds[0]
|
|
1003
|
+
|
|
1004
|
+
# 1) SMTP LOGIN ----------------------------------------------------------
|
|
1005
|
+
try:
|
|
1006
|
+
smtp_kwargs = dict(hostname=smtp_host, port=smtp_port, timeout=10)
|
|
1007
|
+
if smtp_port == 587:
|
|
1008
|
+
smtp_kwargs["start_tls"] = True # STARTTLS upgrade
|
|
1009
|
+
else:
|
|
1010
|
+
smtp_kwargs["tls"] = (smtp_port == 465) # implicit SSL on 465
|
|
1011
|
+
|
|
1012
|
+
smtp = aiosmtplib.SMTP(**smtp_kwargs)
|
|
1013
|
+
await smtp.connect()
|
|
1014
|
+
|
|
1015
|
+
code, _msg = await smtp.login(user, pwd)
|
|
1016
|
+
await smtp.quit()
|
|
1017
|
+
|
|
1018
|
+
if code not in (235, 250): # 235 = Auth OK, 250 = generic OK
|
|
1019
|
+
return {
|
|
1020
|
+
"success": False,
|
|
1021
|
+
"status_code": code,
|
|
1022
|
+
"error_message": f"SMTP login failed with code {code}"
|
|
1023
|
+
}
|
|
1024
|
+
except Exception as e:
|
|
1025
|
+
return {
|
|
1026
|
+
"success": False,
|
|
1027
|
+
"status_code": 0,
|
|
1028
|
+
"error_message": f"SMTP error: {e}"
|
|
1029
|
+
}
|
|
1030
|
+
|
|
1031
|
+
# 2) IMAP LOGIN ----------------------------------------------------------
|
|
1032
|
+
try:
|
|
1033
|
+
conn = imaplib.IMAP4_SSL(imap_host, imap_port) # SSL always for 993
|
|
1034
|
+
status, _ = conn.login(user, pwd)
|
|
1035
|
+
conn.logout()
|
|
1036
|
+
|
|
1037
|
+
if status != "OK":
|
|
1038
|
+
return {
|
|
1039
|
+
"success": False,
|
|
1040
|
+
"status_code": 0,
|
|
1041
|
+
"error_message": f"IMAP login failed: {status}"
|
|
1042
|
+
}
|
|
1043
|
+
except Exception as e:
|
|
1044
|
+
return {
|
|
1045
|
+
"success": False,
|
|
1046
|
+
"status_code": 0,
|
|
1047
|
+
"error_message": f"IMAP error: {e}"
|
|
1048
|
+
}
|
|
1049
|
+
|
|
1050
|
+
# ------------------------------------------------------------------------
|
|
1051
|
+
return {
|
|
1052
|
+
"success": True,
|
|
1053
|
+
"status_code": 250, # canonical “OK” code for SMTP success
|
|
1054
|
+
"error_message": None
|
|
1055
|
+
}
|
|
1056
|
+
|
|
1057
|
+
async def test_slack(webhook_url: str) -> Dict[str, Any]:
|
|
1058
|
+
"""
|
|
1059
|
+
Sends a test JSON payload to the provided Slack Webhook URL.
|
|
1060
|
+
Slack typically returns a 200 status with 'ok' in the body if successful.
|
|
1061
|
+
"""
|
|
1062
|
+
try:
|
|
1063
|
+
async with aiohttp.ClientSession(timeout=aiohttp.ClientTimeout(total=10)) as session:
|
|
1064
|
+
payload = {"text": "Hello from Dhisana connectivity test!"}
|
|
1065
|
+
async with session.post(webhook_url, json=payload) as response:
|
|
1066
|
+
status = response.status
|
|
1067
|
+
text_response = await response.text()
|
|
1068
|
+
|
|
1069
|
+
if status != 200:
|
|
1070
|
+
return {
|
|
1071
|
+
"success": False,
|
|
1072
|
+
"status_code": status,
|
|
1073
|
+
"error_message": f"Slack webhook returned non-200 status: {status}"
|
|
1074
|
+
}
|
|
1075
|
+
|
|
1076
|
+
# Slack returns "ok" if the message was posted successfully
|
|
1077
|
+
if text_response.strip().lower() != "ok":
|
|
1078
|
+
return {
|
|
1079
|
+
"success": False,
|
|
1080
|
+
"status_code": status,
|
|
1081
|
+
"error_message": f"Unexpected Slack response: {text_response}"
|
|
1082
|
+
}
|
|
1083
|
+
|
|
1084
|
+
return {"success": True, "status_code": status, "error_message": None}
|
|
1085
|
+
|
|
1086
|
+
except Exception as e:
|
|
1087
|
+
logger.error(f"Slack connectivity test failed: {e}")
|
|
1088
|
+
return {"success": False, "status_code": 0, "error_message": str(e)}
|
|
1089
|
+
|
|
1090
|
+
|
|
1091
|
+
async def test_jinaai(api_key: str) -> Dict[str, Any]:
|
|
1092
|
+
"""Simple connectivity test for the Jina AI API."""
|
|
1093
|
+
url = "https://api.jina.ai/v1/embeddings"
|
|
1094
|
+
headers = {
|
|
1095
|
+
"Authorization": f"Bearer {api_key}",
|
|
1096
|
+
"Content-Type": "application/json"
|
|
1097
|
+
}
|
|
1098
|
+
payload = {
|
|
1099
|
+
"model": "jina-embeddings-v2-base-en",
|
|
1100
|
+
"input": ["ping"]
|
|
1101
|
+
}
|
|
1102
|
+
try:
|
|
1103
|
+
async with aiohttp.ClientSession(timeout=aiohttp.ClientTimeout(total=10)) as session:
|
|
1104
|
+
async with session.post(url, headers=headers, json=payload) as response:
|
|
1105
|
+
status = response.status
|
|
1106
|
+
data = await safe_json(response)
|
|
1107
|
+
|
|
1108
|
+
if status != 200:
|
|
1109
|
+
message = data.get("message") if isinstance(data, dict) else None
|
|
1110
|
+
return {
|
|
1111
|
+
"success": False,
|
|
1112
|
+
"status_code": status,
|
|
1113
|
+
"error_message": message or f"Non-200 from Jina AI: {status}",
|
|
1114
|
+
}
|
|
1115
|
+
|
|
1116
|
+
if data and "error" in data:
|
|
1117
|
+
err = data["error"]
|
|
1118
|
+
if isinstance(err, dict):
|
|
1119
|
+
err = err.get("message", str(err))
|
|
1120
|
+
return {"success": False, "status_code": status, "error_message": err}
|
|
1121
|
+
|
|
1122
|
+
return {"success": True, "status_code": status, "error_message": None}
|
|
1123
|
+
except Exception as exc:
|
|
1124
|
+
logger.error(f"Jina AI connectivity test failed: {exc}")
|
|
1125
|
+
return {"success": False, "status_code": 0, "error_message": str(exc)}
|
|
1126
|
+
|
|
1127
|
+
|
|
1128
|
+
async def test_firefliesai(api_key: str) -> Dict[str, Any]:
|
|
1129
|
+
"""Validate Fireflies.ai API key by querying user metadata via GraphQL."""
|
|
1130
|
+
url = "https://api.fireflies.ai/graphql"
|
|
1131
|
+
headers = {
|
|
1132
|
+
"Authorization": f"Bearer {api_key}",
|
|
1133
|
+
"Content-Type": "application/json",
|
|
1134
|
+
}
|
|
1135
|
+
|
|
1136
|
+
# Try a couple of documented/observed query shapes — Fireflies occasionally
|
|
1137
|
+
# aliases the viewer field, so we fall back if the first choice is rejected.
|
|
1138
|
+
queries = [
|
|
1139
|
+
("users", {"query": "{ users { name user_id } }"}, ("data", "users")),
|
|
1140
|
+
("viewer", {"query": "query { viewer { id email } }"}, ("data", "viewer")),
|
|
1141
|
+
("me", {"query": "query { me { id email } }"}, ("data", "me")),
|
|
1142
|
+
("currentUser", {"query": "query { currentUser { id email } }"}, ("data", "currentUser")),
|
|
1143
|
+
]
|
|
1144
|
+
|
|
1145
|
+
def extract_error(payload: Optional[Dict[str, Any]]) -> Optional[str]:
|
|
1146
|
+
if not isinstance(payload, dict):
|
|
1147
|
+
return None
|
|
1148
|
+
errors = payload.get("errors")
|
|
1149
|
+
if isinstance(errors, list):
|
|
1150
|
+
messages = [
|
|
1151
|
+
err.get("message") for err in errors
|
|
1152
|
+
if isinstance(err, dict) and err.get("message")
|
|
1153
|
+
]
|
|
1154
|
+
if messages:
|
|
1155
|
+
return "; ".join(messages)
|
|
1156
|
+
elif errors:
|
|
1157
|
+
return str(errors)
|
|
1158
|
+
return (
|
|
1159
|
+
payload.get("message")
|
|
1160
|
+
or payload.get("error_description")
|
|
1161
|
+
or payload.get("error")
|
|
1162
|
+
)
|
|
1163
|
+
|
|
1164
|
+
try:
|
|
1165
|
+
timeout = aiohttp.ClientTimeout(total=10)
|
|
1166
|
+
async with aiohttp.ClientSession(timeout=timeout) as session:
|
|
1167
|
+
last_error: Optional[str] = None
|
|
1168
|
+
|
|
1169
|
+
for query_name, payload, data_path in queries:
|
|
1170
|
+
async with session.post(url, headers=headers, json=payload) as response:
|
|
1171
|
+
status = response.status
|
|
1172
|
+
data = await safe_json(response)
|
|
1173
|
+
|
|
1174
|
+
if status != 200:
|
|
1175
|
+
error_message = extract_error(data)
|
|
1176
|
+
if (
|
|
1177
|
+
error_message
|
|
1178
|
+
and "Cannot query field" in error_message
|
|
1179
|
+
and query_name != queries[-1][0]
|
|
1180
|
+
):
|
|
1181
|
+
last_error = error_message
|
|
1182
|
+
continue
|
|
1183
|
+
return {
|
|
1184
|
+
"success": False,
|
|
1185
|
+
"status_code": status,
|
|
1186
|
+
"error_message": error_message or f"Non-200 from Fireflies.ai ({query_name})",
|
|
1187
|
+
}
|
|
1188
|
+
|
|
1189
|
+
if not isinstance(data, dict):
|
|
1190
|
+
return {
|
|
1191
|
+
"success": False,
|
|
1192
|
+
"status_code": status,
|
|
1193
|
+
"error_message": "Fireflies.ai returned non-JSON response.",
|
|
1194
|
+
}
|
|
1195
|
+
|
|
1196
|
+
error_message = extract_error(data)
|
|
1197
|
+
if error_message:
|
|
1198
|
+
last_error = error_message
|
|
1199
|
+
# If the error indicates the field is unknown, try the next query option.
|
|
1200
|
+
if "Cannot query field" in error_message and query_name != queries[-1][0]:
|
|
1201
|
+
continue
|
|
1202
|
+
return {
|
|
1203
|
+
"success": False,
|
|
1204
|
+
"status_code": status,
|
|
1205
|
+
"error_message": error_message,
|
|
1206
|
+
}
|
|
1207
|
+
|
|
1208
|
+
# Walk the data path to ensure the expected field exists.
|
|
1209
|
+
cursor: Any = data
|
|
1210
|
+
for key in data_path:
|
|
1211
|
+
if not isinstance(cursor, dict):
|
|
1212
|
+
cursor = None
|
|
1213
|
+
break
|
|
1214
|
+
cursor = cursor.get(key)
|
|
1215
|
+
|
|
1216
|
+
if cursor is not None:
|
|
1217
|
+
return {"success": True, "status_code": status, "error_message": None}
|
|
1218
|
+
|
|
1219
|
+
last_error = f"Fireflies.ai {query_name} response missing expected fields."
|
|
1220
|
+
|
|
1221
|
+
return {
|
|
1222
|
+
"success": False,
|
|
1223
|
+
"status_code": 200,
|
|
1224
|
+
"error_message": last_error or "Fireflies.ai queries did not return user data.",
|
|
1225
|
+
}
|
|
1226
|
+
except Exception as exc:
|
|
1227
|
+
logger.error(f"Fireflies.ai connectivity test failed: {exc}")
|
|
1228
|
+
return {"success": False, "status_code": 0, "error_message": str(exc)}
|
|
1229
|
+
|
|
1230
|
+
|
|
1231
|
+
async def test_firecrawl(api_key: str) -> Dict[str, Any]:
|
|
1232
|
+
"""Quick check for Firecrawl API key validity (official v1 endpoint)."""
|
|
1233
|
+
url = "https://api.firecrawl.dev/v1/scrape"
|
|
1234
|
+
headers = {
|
|
1235
|
+
"Authorization": f"Bearer {api_key}", # per Firecrawl v1 docs
|
|
1236
|
+
"Content-Type": "application/json",
|
|
1237
|
+
}
|
|
1238
|
+
payload = {"url": "https://example.com"}
|
|
1239
|
+
|
|
1240
|
+
try:
|
|
1241
|
+
async with aiohttp.ClientSession(timeout=aiohttp.ClientTimeout(total=10)) as session:
|
|
1242
|
+
async with session.post(url, headers=headers, json=payload) as response:
|
|
1243
|
+
status = response.status
|
|
1244
|
+
data = await safe_json(response)
|
|
1245
|
+
|
|
1246
|
+
if status != 200:
|
|
1247
|
+
message = data.get("message") if isinstance(data, dict) else None
|
|
1248
|
+
return {
|
|
1249
|
+
"success": False,
|
|
1250
|
+
"status_code": status,
|
|
1251
|
+
"error_message": message or f"Non-200 from Firecrawl: {status}",
|
|
1252
|
+
}
|
|
1253
|
+
|
|
1254
|
+
if data and "error" in data:
|
|
1255
|
+
err = data["error"]
|
|
1256
|
+
if isinstance(err, dict):
|
|
1257
|
+
err = err.get("message", str(err))
|
|
1258
|
+
return {"success": False, "status_code": status, "error_message": err}
|
|
1259
|
+
|
|
1260
|
+
return {"success": True, "status_code": status, "error_message": None}
|
|
1261
|
+
except Exception as exc:
|
|
1262
|
+
logger.error(f"Firecrawl connectivity test failed: {exc}")
|
|
1263
|
+
return {"success": False, "status_code": 0, "error_message": str(exc)}
|
|
1264
|
+
|
|
1265
|
+
|
|
1266
|
+
async def test_scraperapi(api_key: str) -> Dict[str, Any]:
|
|
1267
|
+
"""Connectivity check for ScraperAPI using a simple NYTimes scrape."""
|
|
1268
|
+
url = "https://api.scraperapi.com/"
|
|
1269
|
+
params = {
|
|
1270
|
+
"api_key": api_key,
|
|
1271
|
+
"url": "https://example.com/", # lightweight public page to minimize credit usage
|
|
1272
|
+
"output_format": "markdown",
|
|
1273
|
+
}
|
|
1274
|
+
try:
|
|
1275
|
+
async with aiohttp.ClientSession(timeout=aiohttp.ClientTimeout(total=10)) as session:
|
|
1276
|
+
async with session.get(url, params=params) as response:
|
|
1277
|
+
status = response.status
|
|
1278
|
+
body_text = await response.text()
|
|
1279
|
+
|
|
1280
|
+
if status != 200:
|
|
1281
|
+
snippet = body_text[:200] if body_text else None
|
|
1282
|
+
return {
|
|
1283
|
+
"success": False,
|
|
1284
|
+
"status_code": status,
|
|
1285
|
+
"error_message": snippet or f"Non-200 from ScraperAPI: {status}",
|
|
1286
|
+
}
|
|
1287
|
+
|
|
1288
|
+
if not body_text:
|
|
1289
|
+
return {
|
|
1290
|
+
"success": False,
|
|
1291
|
+
"status_code": status,
|
|
1292
|
+
"error_message": "ScraperAPI returned an empty response.",
|
|
1293
|
+
}
|
|
1294
|
+
|
|
1295
|
+
return {"success": True, "status_code": status, "error_message": None}
|
|
1296
|
+
except Exception as exc:
|
|
1297
|
+
logger.error(f"ScraperAPI connectivity test failed: {exc}")
|
|
1298
|
+
return {"success": False, "status_code": 0, "error_message": str(exc)}
|
|
1299
|
+
|
|
1300
|
+
|
|
1301
|
+
async def test_youtube(api_key: str) -> Dict[str, Any]:
|
|
1302
|
+
"""
|
|
1303
|
+
Tests YouTube Data API v3 by making a simple search request.
|
|
1304
|
+
Uses a basic search query that works with API key authentication only.
|
|
1305
|
+
"""
|
|
1306
|
+
url = "https://www.googleapis.com/youtube/v3/search"
|
|
1307
|
+
params = {
|
|
1308
|
+
"part": "snippet",
|
|
1309
|
+
"q": "test",
|
|
1310
|
+
"type": "video",
|
|
1311
|
+
"maxResults": 1,
|
|
1312
|
+
"key": api_key
|
|
1313
|
+
}
|
|
1314
|
+
|
|
1315
|
+
try:
|
|
1316
|
+
async with aiohttp.ClientSession(timeout=aiohttp.ClientTimeout(total=10)) as session:
|
|
1317
|
+
async with session.get(url, params=params) as response:
|
|
1318
|
+
status = response.status
|
|
1319
|
+
|
|
1320
|
+
# Get response text first for debugging
|
|
1321
|
+
response_text = await response.text()
|
|
1322
|
+
logger.debug(f"YouTube API response status: {status}, text: {response_text[:500]}")
|
|
1323
|
+
|
|
1324
|
+
# Try to parse as JSON
|
|
1325
|
+
data = None
|
|
1326
|
+
try:
|
|
1327
|
+
data = json.loads(response_text) if response_text else None
|
|
1328
|
+
except json.JSONDecodeError:
|
|
1329
|
+
logger.warning(f"YouTube API returned non-JSON response: {response_text[:200]}")
|
|
1330
|
+
|
|
1331
|
+
if status != 200:
|
|
1332
|
+
error_message = None
|
|
1333
|
+
if data and isinstance(data, dict):
|
|
1334
|
+
error = data.get("error", {})
|
|
1335
|
+
if isinstance(error, dict):
|
|
1336
|
+
error_message = error.get("message")
|
|
1337
|
+
else:
|
|
1338
|
+
error_message = str(error)
|
|
1339
|
+
|
|
1340
|
+
return {
|
|
1341
|
+
"success": False,
|
|
1342
|
+
"status_code": status,
|
|
1343
|
+
"error_message": error_message or f"Non-200 from YouTube API: {status}. Response: {response_text[:200]}"
|
|
1344
|
+
}
|
|
1345
|
+
|
|
1346
|
+
# Handle case where we got 200 but no valid JSON data
|
|
1347
|
+
if not data:
|
|
1348
|
+
return {
|
|
1349
|
+
"success": False,
|
|
1350
|
+
"status_code": status,
|
|
1351
|
+
"error_message": f"YouTube API returned empty or invalid JSON response: {response_text[:200]}"
|
|
1352
|
+
}
|
|
1353
|
+
|
|
1354
|
+
# Check for API errors in 200 response
|
|
1355
|
+
if "error" in data:
|
|
1356
|
+
error = data["error"]
|
|
1357
|
+
error_message = error.get("message") if isinstance(error, dict) else str(error)
|
|
1358
|
+
return {
|
|
1359
|
+
"success": False,
|
|
1360
|
+
"status_code": status,
|
|
1361
|
+
"error_message": f"YouTube API error: {error_message}"
|
|
1362
|
+
}
|
|
1363
|
+
|
|
1364
|
+
# Check if we got valid response structure
|
|
1365
|
+
if "kind" in data and data["kind"] == "youtube#searchListResponse":
|
|
1366
|
+
return {"success": True, "status_code": status, "error_message": None}
|
|
1367
|
+
|
|
1368
|
+
return {
|
|
1369
|
+
"success": False,
|
|
1370
|
+
"status_code": status,
|
|
1371
|
+
"error_message": f"Invalid response format from YouTube API. Expected 'youtube#searchListResponse', got: {data.get('kind', 'unknown')}"
|
|
1372
|
+
}
|
|
1373
|
+
|
|
1374
|
+
except Exception as exc:
|
|
1375
|
+
logger.error(f"YouTube API connectivity test failed: {exc}")
|
|
1376
|
+
return {"success": False, "status_code": 0, "error_message": str(exc)}
|
|
1377
|
+
|
|
1378
|
+
|
|
1379
|
+
async def test_orum(api_key: str) -> Dict[str, Any]:
|
|
1380
|
+
"""
|
|
1381
|
+
Validate an Orum API key by calling a lightweight authenticated endpoint.
|
|
1382
|
+
|
|
1383
|
+
The base URL can be overridden with ORUM_API_BASE_URL if needed.
|
|
1384
|
+
"""
|
|
1385
|
+
base_url = os.getenv("ORUM_API_BASE_URL", "https://api.orum.com")
|
|
1386
|
+
url = f"{base_url.rstrip('/')}/api/v1/users/me"
|
|
1387
|
+
headers = {
|
|
1388
|
+
"Authorization": f"Bearer {api_key}",
|
|
1389
|
+
"Accept": "application/json",
|
|
1390
|
+
}
|
|
1391
|
+
|
|
1392
|
+
try:
|
|
1393
|
+
async with aiohttp.ClientSession(timeout=aiohttp.ClientTimeout(total=10)) as session:
|
|
1394
|
+
async with session.get(url, headers=headers) as response:
|
|
1395
|
+
status = response.status
|
|
1396
|
+
data = await safe_json(response)
|
|
1397
|
+
|
|
1398
|
+
if status == 200:
|
|
1399
|
+
return {"success": True, "status_code": status, "error_message": None}
|
|
1400
|
+
|
|
1401
|
+
message = None
|
|
1402
|
+
if isinstance(data, dict):
|
|
1403
|
+
message = data.get("message") or data.get("error") or data.get("detail")
|
|
1404
|
+
return {
|
|
1405
|
+
"success": False,
|
|
1406
|
+
"status_code": status,
|
|
1407
|
+
"error_message": message or f"Orum responded with {status}",
|
|
1408
|
+
}
|
|
1409
|
+
except Exception as exc:
|
|
1410
|
+
logger.error(f"Orum connectivity test failed: {exc}")
|
|
1411
|
+
return {"success": False, "status_code": 0, "error_message": str(exc)}
|
|
1412
|
+
|
|
1413
|
+
|
|
1414
|
+
async def test_aircall(app_id: str, api_token: str) -> Dict[str, Any]:
|
|
1415
|
+
"""
|
|
1416
|
+
Validate Aircall credentials via a lightweight authenticated call.
|
|
1417
|
+
Uses HTTP Basic Auth (app_id:api_token).
|
|
1418
|
+
"""
|
|
1419
|
+
url = "https://api.aircall.io/v1/users"
|
|
1420
|
+
params = {"per_page": 1}
|
|
1421
|
+
|
|
1422
|
+
try:
|
|
1423
|
+
auth = aiohttp.BasicAuth(app_id, api_token)
|
|
1424
|
+
async with aiohttp.ClientSession(timeout=aiohttp.ClientTimeout(total=10), auth=auth) as session:
|
|
1425
|
+
async with session.get(url, params=params) as response:
|
|
1426
|
+
status = response.status
|
|
1427
|
+
data = await safe_json(response)
|
|
1428
|
+
|
|
1429
|
+
if status == 200 and isinstance(data, dict) and "users" in data:
|
|
1430
|
+
return {"success": True, "status_code": status, "error_message": None}
|
|
1431
|
+
|
|
1432
|
+
message = None
|
|
1433
|
+
if isinstance(data, dict):
|
|
1434
|
+
message = data.get("message") or data.get("error")
|
|
1435
|
+
return {
|
|
1436
|
+
"success": False,
|
|
1437
|
+
"status_code": status,
|
|
1438
|
+
"error_message": message or f"Aircall responded with {status}",
|
|
1439
|
+
}
|
|
1440
|
+
except Exception as exc:
|
|
1441
|
+
logger.error(f"Aircall connectivity test failed: {exc}")
|
|
1442
|
+
return {"success": False, "status_code": 0, "error_message": str(exc)}
|
|
1443
|
+
|
|
1444
|
+
|
|
1445
|
+
async def test_ringover(api_key: str) -> Dict[str, Any]:
|
|
1446
|
+
"""
|
|
1447
|
+
Validate Ringover API key using a minimal authenticated request.
|
|
1448
|
+
"""
|
|
1449
|
+
base_url = os.getenv("RINGOVER_API_BASE_URL", "https://public-api.ringover.com")
|
|
1450
|
+
url = f"{base_url.rstrip('/')}/v2/users"
|
|
1451
|
+
headers = {
|
|
1452
|
+
"X-API-KEY": api_key,
|
|
1453
|
+
"Accept": "application/json",
|
|
1454
|
+
}
|
|
1455
|
+
params = {"limit": 1}
|
|
1456
|
+
|
|
1457
|
+
try:
|
|
1458
|
+
async with aiohttp.ClientSession(timeout=aiohttp.ClientTimeout(total=10)) as session:
|
|
1459
|
+
async with session.get(url, headers=headers, params=params) as response:
|
|
1460
|
+
status = response.status
|
|
1461
|
+
data = await safe_json(response)
|
|
1462
|
+
|
|
1463
|
+
if status == 200:
|
|
1464
|
+
return {"success": True, "status_code": status, "error_message": None}
|
|
1465
|
+
|
|
1466
|
+
message = None
|
|
1467
|
+
if isinstance(data, dict):
|
|
1468
|
+
message = data.get("message") or data.get("error") or data.get("detail")
|
|
1469
|
+
return {
|
|
1470
|
+
"success": False,
|
|
1471
|
+
"status_code": status,
|
|
1472
|
+
"error_message": message or f"Ringover responded with {status}",
|
|
1473
|
+
}
|
|
1474
|
+
except Exception as exc:
|
|
1475
|
+
logger.error(f"Ringover connectivity test failed: {exc}")
|
|
1476
|
+
return {"success": False, "status_code": 0, "error_message": str(exc)}
|
|
1477
|
+
|
|
1478
|
+
|
|
1479
|
+
async def test_dialpad(client_id: str, client_secret: str) -> Dict[str, Any]:
|
|
1480
|
+
"""
|
|
1481
|
+
Validate Dialpad client credentials via client_credentials token exchange, then whoami.
|
|
1482
|
+
"""
|
|
1483
|
+
base_url = os.getenv("DIALPAD_API_BASE_URL", "https://dialpad.com")
|
|
1484
|
+
token_url = f"{base_url.rstrip('/')}/oauth/token"
|
|
1485
|
+
whoami_url = f"{base_url.rstrip('/')}/api/v2/whoami"
|
|
1486
|
+
|
|
1487
|
+
try:
|
|
1488
|
+
async with aiohttp.ClientSession(timeout=aiohttp.ClientTimeout(total=10)) as session:
|
|
1489
|
+
token_resp = await session.post(
|
|
1490
|
+
token_url,
|
|
1491
|
+
data={
|
|
1492
|
+
"grant_type": "client_credentials",
|
|
1493
|
+
"client_id": client_id,
|
|
1494
|
+
"client_secret": client_secret,
|
|
1495
|
+
},
|
|
1496
|
+
headers={"Accept": "application/json"},
|
|
1497
|
+
)
|
|
1498
|
+
token_status = token_resp.status
|
|
1499
|
+
token_data = await safe_json(token_resp)
|
|
1500
|
+
|
|
1501
|
+
access_token = None
|
|
1502
|
+
if isinstance(token_data, dict):
|
|
1503
|
+
access_token = token_data.get("access_token")
|
|
1504
|
+
|
|
1505
|
+
if token_status != 200 or not access_token:
|
|
1506
|
+
message = None
|
|
1507
|
+
if isinstance(token_data, dict):
|
|
1508
|
+
message = token_data.get("error_description") or token_data.get("error")
|
|
1509
|
+
return {
|
|
1510
|
+
"success": False,
|
|
1511
|
+
"status_code": token_status,
|
|
1512
|
+
"error_message": message or "Failed to obtain Dialpad access token.",
|
|
1513
|
+
}
|
|
1514
|
+
|
|
1515
|
+
headers = {
|
|
1516
|
+
"Authorization": f"Bearer {access_token}",
|
|
1517
|
+
"Accept": "application/json",
|
|
1518
|
+
}
|
|
1519
|
+
async with session.get(whoami_url, headers=headers) as response:
|
|
1520
|
+
status = response.status
|
|
1521
|
+
data = await safe_json(response)
|
|
1522
|
+
|
|
1523
|
+
if status == 200:
|
|
1524
|
+
return {"success": True, "status_code": status, "error_message": None}
|
|
1525
|
+
|
|
1526
|
+
message = None
|
|
1527
|
+
if isinstance(data, dict):
|
|
1528
|
+
message = data.get("message") or data.get("error") or data.get("detail")
|
|
1529
|
+
return {
|
|
1530
|
+
"success": False,
|
|
1531
|
+
"status_code": status,
|
|
1532
|
+
"error_message": message or f"Dialpad responded with {status}",
|
|
1533
|
+
}
|
|
1534
|
+
except Exception as exc:
|
|
1535
|
+
logger.error(f"Dialpad connectivity test failed: {exc}")
|
|
1536
|
+
return {"success": False, "status_code": 0, "error_message": str(exc)}
|
|
1537
|
+
|
|
1538
|
+
|
|
1539
|
+
async def test_nooks(api_key: str) -> Dict[str, Any]:
|
|
1540
|
+
"""
|
|
1541
|
+
Validate Nooks.ai API key via a simple authenticated call.
|
|
1542
|
+
"""
|
|
1543
|
+
base_url = os.getenv("NOOKS_API_BASE_URL", "https://api.nooks.ai")
|
|
1544
|
+
url = f"{base_url.rstrip('/')}/v1/users/me"
|
|
1545
|
+
headers = {
|
|
1546
|
+
"Authorization": f"Bearer {api_key}",
|
|
1547
|
+
"Accept": "application/json",
|
|
1548
|
+
}
|
|
1549
|
+
|
|
1550
|
+
try:
|
|
1551
|
+
async with aiohttp.ClientSession(timeout=aiohttp.ClientTimeout(total=10)) as session:
|
|
1552
|
+
async with session.get(url, headers=headers) as response:
|
|
1553
|
+
status = response.status
|
|
1554
|
+
data = await safe_json(response)
|
|
1555
|
+
|
|
1556
|
+
if status == 200:
|
|
1557
|
+
return {"success": True, "status_code": status, "error_message": None}
|
|
1558
|
+
|
|
1559
|
+
message = None
|
|
1560
|
+
if isinstance(data, dict):
|
|
1561
|
+
message = data.get("message") or data.get("error") or data.get("detail")
|
|
1562
|
+
return {
|
|
1563
|
+
"success": False,
|
|
1564
|
+
"status_code": status,
|
|
1565
|
+
"error_message": message or f"Nooks.ai responded with {status}",
|
|
1566
|
+
}
|
|
1567
|
+
except Exception as exc:
|
|
1568
|
+
logger.error(f"Nooks.ai connectivity test failed: {exc}")
|
|
1569
|
+
return {"success": False, "status_code": 0, "error_message": str(exc)}
|
|
1570
|
+
|
|
1571
|
+
|
|
1572
|
+
async def test_commonroom(api_key: str) -> Dict[str, Any]:
|
|
1573
|
+
"""Validate a Common Room API token via the token status endpoint."""
|
|
1574
|
+
url = "https://api.commonroom.io/community/v1/api-token-status"
|
|
1575
|
+
headers = {
|
|
1576
|
+
"Authorization": f"Bearer {api_key}",
|
|
1577
|
+
"Accept": "application/json",
|
|
1578
|
+
}
|
|
1579
|
+
|
|
1580
|
+
try:
|
|
1581
|
+
async with aiohttp.ClientSession(timeout=aiohttp.ClientTimeout(total=10)) as session:
|
|
1582
|
+
async with session.get(url, headers=headers) as response:
|
|
1583
|
+
status = response.status
|
|
1584
|
+
data = await safe_json(response)
|
|
1585
|
+
|
|
1586
|
+
if status == 200:
|
|
1587
|
+
return {"success": True, "status_code": status, "error_message": None}
|
|
1588
|
+
|
|
1589
|
+
message = None
|
|
1590
|
+
if isinstance(data, dict):
|
|
1591
|
+
message = (
|
|
1592
|
+
data.get("message")
|
|
1593
|
+
or data.get("reason")
|
|
1594
|
+
or data.get("error")
|
|
1595
|
+
or data.get("docs")
|
|
1596
|
+
)
|
|
1597
|
+
return {
|
|
1598
|
+
"success": False,
|
|
1599
|
+
"status_code": status,
|
|
1600
|
+
"error_message": message or f"Common Room responded with {status}",
|
|
1601
|
+
}
|
|
1602
|
+
except Exception as exc:
|
|
1603
|
+
logger.error(f"Common Room connectivity test failed: {exc}")
|
|
1604
|
+
return {"success": False, "status_code": 0, "error_message": str(exc)}
|
|
1605
|
+
|
|
1606
|
+
|
|
1607
|
+
async def test_scarf(api_key: str) -> Dict[str, Any]:
|
|
1608
|
+
"""
|
|
1609
|
+
Validate a Scarf API token via the lightweight /v2/search endpoint.
|
|
1610
|
+
|
|
1611
|
+
The endpoint requires only the bearer token and a simple query string.
|
|
1612
|
+
"""
|
|
1613
|
+
url = "https://api.scarf.sh/v2/search"
|
|
1614
|
+
headers = {
|
|
1615
|
+
"Authorization": f"Bearer {api_key}",
|
|
1616
|
+
"Content-Type": "application/json",
|
|
1617
|
+
}
|
|
1618
|
+
payload = {"query": "dhisana connectivity test"}
|
|
1619
|
+
|
|
1620
|
+
try:
|
|
1621
|
+
async with aiohttp.ClientSession(timeout=aiohttp.ClientTimeout(total=10)) as session:
|
|
1622
|
+
async with session.post(url, headers=headers, json=payload) as response:
|
|
1623
|
+
status = response.status
|
|
1624
|
+
data = await safe_json(response)
|
|
1625
|
+
|
|
1626
|
+
if status != 200:
|
|
1627
|
+
message = None
|
|
1628
|
+
if isinstance(data, dict):
|
|
1629
|
+
message = data.get("message") or data.get("error") or data.get("detail")
|
|
1630
|
+
return {
|
|
1631
|
+
"success": False,
|
|
1632
|
+
"status_code": status,
|
|
1633
|
+
"error_message": message or f"Scarf responded with {status}",
|
|
1634
|
+
}
|
|
1635
|
+
|
|
1636
|
+
if isinstance(data, dict) and "results" in data:
|
|
1637
|
+
return {"success": True, "status_code": status, "error_message": None}
|
|
1638
|
+
|
|
1639
|
+
return {
|
|
1640
|
+
"success": False,
|
|
1641
|
+
"status_code": status,
|
|
1642
|
+
"error_message": "Unexpected Scarf response payload.",
|
|
1643
|
+
}
|
|
1644
|
+
except Exception as exc:
|
|
1645
|
+
logger.error(f"Scarf connectivity test failed: {exc}")
|
|
1646
|
+
return {"success": False, "status_code": 0, "error_message": str(exc)}
|
|
1647
|
+
|
|
1648
|
+
|
|
1649
|
+
###############################################################################
|
|
1650
|
+
# DATAGMA CONNECTIVITY
|
|
1651
|
+
###############################################################################
|
|
1652
|
+
|
|
1653
|
+
async def test_datagma(api_key: str) -> Dict[str, Any]:
|
|
1654
|
+
"""
|
|
1655
|
+
Connectivity test for Datagma using the documented Get Credit endpoint
|
|
1656
|
+
with query param authentication.
|
|
1657
|
+
|
|
1658
|
+
Endpoint: GET https://gateway.datagma.net/api/ingress/v1/mine?apiId=<KEY>
|
|
1659
|
+
"""
|
|
1660
|
+
base_url = "https://gateway.datagma.net/api/ingress/v1/mine"
|
|
1661
|
+
url = f"{base_url}?apiId={api_key}"
|
|
1662
|
+
|
|
1663
|
+
try:
|
|
1664
|
+
timeout = aiohttp.ClientTimeout(total=10)
|
|
1665
|
+
async with aiohttp.ClientSession(timeout=timeout) as session:
|
|
1666
|
+
async with session.get(url) as resp:
|
|
1667
|
+
status = resp.status
|
|
1668
|
+
data = await safe_json(resp)
|
|
1669
|
+
|
|
1670
|
+
if status == 200:
|
|
1671
|
+
if isinstance(data, dict) and ("error" in data or "errors" in data):
|
|
1672
|
+
err = data.get("error") or data.get("errors")
|
|
1673
|
+
if isinstance(err, dict):
|
|
1674
|
+
err = err.get("message") or str(err)
|
|
1675
|
+
return {"success": False, "status_code": status, "error_message": str(err)}
|
|
1676
|
+
return {"success": True, "status_code": status, "error_message": None}
|
|
1677
|
+
|
|
1678
|
+
if status in (401, 403):
|
|
1679
|
+
msg = None
|
|
1680
|
+
if isinstance(data, dict):
|
|
1681
|
+
msg = data.get("message") or data.get("error")
|
|
1682
|
+
return {
|
|
1683
|
+
"success": False,
|
|
1684
|
+
"status_code": status,
|
|
1685
|
+
"error_message": msg or "Unauthorized – check Datagma API key",
|
|
1686
|
+
}
|
|
1687
|
+
|
|
1688
|
+
return {
|
|
1689
|
+
"success": False,
|
|
1690
|
+
"status_code": status,
|
|
1691
|
+
"error_message": f"Datagma responded with {status}",
|
|
1692
|
+
}
|
|
1693
|
+
except Exception as e:
|
|
1694
|
+
logger.error(f"Datagma connectivity test failed: {e}")
|
|
1695
|
+
return {"success": False, "status_code": 0, "error_message": str(e)}
|
|
1696
|
+
|
|
1697
|
+
|
|
1698
|
+
###############################################################################
|
|
1699
|
+
# MAIN CONNECTIVITY FUNCTION
|
|
1700
|
+
###############################################################################
|
|
1701
|
+
|
|
1702
|
+
async def test_connectivity(tool_config: List[Dict[str, Any]]) -> Dict[str, Dict[str, Any]]:
|
|
1703
|
+
"""
|
|
1704
|
+
Checks connectivity for multiple tools and returns a dictionary
|
|
1705
|
+
with the result for each.
|
|
1706
|
+
|
|
1707
|
+
Special-cases:
|
|
1708
|
+
• 'openai' – needs modelName & reasoningEffort
|
|
1709
|
+
• 'googleworkspace' – needs subjectEmail
|
|
1710
|
+
• 'googledrive' – needs subjectEmail
|
|
1711
|
+
• 'smtpEmail' – has *no* apiKey; instead requires usernames,
|
|
1712
|
+
passwords, smtp/imap hosts & ports
|
|
1713
|
+
"""
|
|
1714
|
+
# Updated test_mapping with the revised test_* functions
|
|
1715
|
+
test_mapping: Dict[str, Callable[..., Awaitable[Dict[str, Any]]]] = {
|
|
1716
|
+
"zerobounce": test_zerobounce,
|
|
1717
|
+
"openai": test_openai,
|
|
1718
|
+
"googleworkspace": test_google_workspace,
|
|
1719
|
+
"googledrive": test_google_drive,
|
|
1720
|
+
"serpapi": test_serpapi,
|
|
1721
|
+
"serperdev": test_serperdev,
|
|
1722
|
+
"proxycurl": test_proxycurl,
|
|
1723
|
+
"exa": test_exa,
|
|
1724
|
+
"apollo": test_apollo,
|
|
1725
|
+
"hubspot": test_hubspot,
|
|
1726
|
+
"github": test_github,
|
|
1727
|
+
"smtpEmail": test_smtp_accounts,
|
|
1728
|
+
"hunter": test_hunter,
|
|
1729
|
+
"findymail": test_findyemail,
|
|
1730
|
+
"datagma": test_datagma,
|
|
1731
|
+
"jinaai": test_jinaai,
|
|
1732
|
+
"firefliesai": test_firefliesai,
|
|
1733
|
+
"firecrawl": test_firecrawl,
|
|
1734
|
+
"youtube": test_youtube,
|
|
1735
|
+
"orum": test_orum,
|
|
1736
|
+
"aircall": test_aircall, # handled specially to pass appId + apiToken
|
|
1737
|
+
"ringover": test_ringover,
|
|
1738
|
+
"dialpad": test_dialpad, # handled specially to pass client credentials
|
|
1739
|
+
"nooks": test_nooks,
|
|
1740
|
+
"commonRoom": test_commonroom,
|
|
1741
|
+
"scarf": test_scarf,
|
|
1742
|
+
"salesforce": test_salesforce,
|
|
1743
|
+
"clay": test_clay,
|
|
1744
|
+
"posthog": test_posthog,
|
|
1745
|
+
"mcpServer": test_mcp_server,
|
|
1746
|
+
"slack": test_slack,
|
|
1747
|
+
"mailgun": test_mailgun,
|
|
1748
|
+
"sendgrid": test_sendgrid,
|
|
1749
|
+
"samgov": test_samgov,
|
|
1750
|
+
"scraperapi": test_scraperapi,
|
|
1751
|
+
}
|
|
1752
|
+
|
|
1753
|
+
results: Dict[str, Dict[str, Any]] = {}
|
|
1754
|
+
|
|
1755
|
+
for tool in tool_config:
|
|
1756
|
+
tool_name: str = tool.get("name", "")
|
|
1757
|
+
config_entries: List[Dict[str, Any]] = tool.get("configuration", [])
|
|
1758
|
+
|
|
1759
|
+
if not tool_name:
|
|
1760
|
+
logger.warning("Tool entry missing 'name' field.")
|
|
1761
|
+
results.setdefault("unknown_tool", {
|
|
1762
|
+
"success": False,
|
|
1763
|
+
"status_code": 0,
|
|
1764
|
+
"error_message": "Tool entry missing 'name'."
|
|
1765
|
+
})
|
|
1766
|
+
continue
|
|
1767
|
+
|
|
1768
|
+
if tool_name not in test_mapping:
|
|
1769
|
+
logger.warning(f"No test function found for tool: {tool_name}")
|
|
1770
|
+
results[tool_name] = {
|
|
1771
|
+
"success": False,
|
|
1772
|
+
"status_code": 0,
|
|
1773
|
+
"error_message": f"No test function for tool '{tool_name}'."
|
|
1774
|
+
}
|
|
1775
|
+
continue
|
|
1776
|
+
|
|
1777
|
+
# ------------------------------------------------------------------ #
|
|
1778
|
+
# Special-case: SMTP / IMAP connectivity (no apiKey)
|
|
1779
|
+
# ------------------------------------------------------------------ #
|
|
1780
|
+
if tool_name == "smtpEmail":
|
|
1781
|
+
def _get(name: str, default: Any = None):
|
|
1782
|
+
return next((c["value"] for c in config_entries if c["name"] == name), default)
|
|
1783
|
+
|
|
1784
|
+
usernames = _get("usernames", "")
|
|
1785
|
+
passwords = _get("passwords", "")
|
|
1786
|
+
smtp_host = _get("smtpEndpoint", "smtp.gmail.com")
|
|
1787
|
+
smtp_port = int(_get("smtpPort", 587))
|
|
1788
|
+
imap_host = _get("imapEndpoint", "imap.gmail.com")
|
|
1789
|
+
imap_port = int(_get("imapPort", 993))
|
|
1790
|
+
|
|
1791
|
+
if not usernames or not passwords:
|
|
1792
|
+
results[tool_name] = {
|
|
1793
|
+
"success": False,
|
|
1794
|
+
"status_code": 0,
|
|
1795
|
+
"error_message": "Missing usernames or passwords."
|
|
1796
|
+
}
|
|
1797
|
+
else:
|
|
1798
|
+
logger.info("Testing connectivity for smtpEmail…")
|
|
1799
|
+
results[tool_name] = await test_smtp_accounts(
|
|
1800
|
+
usernames,
|
|
1801
|
+
passwords,
|
|
1802
|
+
smtp_host,
|
|
1803
|
+
smtp_port,
|
|
1804
|
+
imap_host,
|
|
1805
|
+
imap_port,
|
|
1806
|
+
)
|
|
1807
|
+
continue # handled – move to next tool
|
|
1808
|
+
|
|
1809
|
+
# ------------------------------------------------------------------ #
|
|
1810
|
+
# Special-case: MCP server (headers instead of apiKey)
|
|
1811
|
+
# ------------------------------------------------------------------ #
|
|
1812
|
+
if tool_name == "mcpServer":
|
|
1813
|
+
server_url = next((c["value"] for c in config_entries if c["name"] == "serverUrl"), "")
|
|
1814
|
+
server_label = next((c["value"] for c in config_entries if c["name"] == "serverLabel"), "")
|
|
1815
|
+
header_name = next((c["value"] for c in config_entries if c["name"] == "apiKeyHeaderName"), "")
|
|
1816
|
+
header_value = next((c["value"] for c in config_entries if c["name"] == "apiKeyHeaderValue"), "")
|
|
1817
|
+
if not server_url or not header_name or not header_value:
|
|
1818
|
+
results[tool_name] = {
|
|
1819
|
+
"success": False,
|
|
1820
|
+
"status_code": 0,
|
|
1821
|
+
"error_message": "Missing serverUrl or API key header info.",
|
|
1822
|
+
}
|
|
1823
|
+
else:
|
|
1824
|
+
logger.info("Testing connectivity for mcpServer…")
|
|
1825
|
+
results[tool_name] = await test_mcp_server(server_url, server_label, header_name, header_value)
|
|
1826
|
+
continue
|
|
1827
|
+
|
|
1828
|
+
# ------------------------------------------------------------------ #
|
|
1829
|
+
# Special-case: Slack (webhookUrl instead of an apiKey)
|
|
1830
|
+
# ------------------------------------------------------------------ #
|
|
1831
|
+
if tool_name == "slack":
|
|
1832
|
+
webhook_url = next(
|
|
1833
|
+
(c["value"] for c in config_entries if c["name"] == "webhookUrl"),
|
|
1834
|
+
None
|
|
1835
|
+
)
|
|
1836
|
+
if not webhook_url:
|
|
1837
|
+
results[tool_name] = {
|
|
1838
|
+
"success": False,
|
|
1839
|
+
"status_code": 0,
|
|
1840
|
+
"error_message": "Missing 'webhookUrl' for Slack."
|
|
1841
|
+
}
|
|
1842
|
+
else:
|
|
1843
|
+
logger.info("Testing connectivity for Slack…")
|
|
1844
|
+
results[tool_name] = await test_slack(webhook_url)
|
|
1845
|
+
continue
|
|
1846
|
+
|
|
1847
|
+
# ------------------------------------------------------------------ #
|
|
1848
|
+
# Special-case: Mailgun (needs notifyDomain in addition to apiKey)
|
|
1849
|
+
# ------------------------------------------------------------------ #
|
|
1850
|
+
if tool_name == "mailgun":
|
|
1851
|
+
api_key = next((c["value"] for c in config_entries if c["name"] == "apiKey"), None)
|
|
1852
|
+
# Prefer new field name 'domain', fall back to legacy 'notifyDomain'
|
|
1853
|
+
domain = next((c["value"] for c in config_entries if c["name"] == "domain"), None)
|
|
1854
|
+
if not domain:
|
|
1855
|
+
domain = next((c["value"] for c in config_entries if c["name"] == "notifyDomain"), None)
|
|
1856
|
+
if not api_key or not domain:
|
|
1857
|
+
results[tool_name] = {
|
|
1858
|
+
"success": False,
|
|
1859
|
+
"status_code": 0,
|
|
1860
|
+
"error_message": "Missing apiKey or domain for Mailgun.",
|
|
1861
|
+
}
|
|
1862
|
+
else:
|
|
1863
|
+
logger.info("Testing connectivity for Mailgun…")
|
|
1864
|
+
results[tool_name] = await test_mailgun(api_key, domain)
|
|
1865
|
+
continue
|
|
1866
|
+
|
|
1867
|
+
# ------------------------------------------------------------------ #
|
|
1868
|
+
# Special-case: PostHog (needs host + project id + personal API key)
|
|
1869
|
+
# ------------------------------------------------------------------ #
|
|
1870
|
+
if tool_name == "posthog":
|
|
1871
|
+
api_host = next((c["value"] for c in config_entries if c["name"] == "api_host"), None)
|
|
1872
|
+
project_id = next((c["value"] for c in config_entries if c["name"] == "project_id"), None)
|
|
1873
|
+
personal_api_key = next(
|
|
1874
|
+
(c["value"] for c in config_entries if c["name"] in ("personal_api_key", "personalApiKey")),
|
|
1875
|
+
None,
|
|
1876
|
+
)
|
|
1877
|
+
|
|
1878
|
+
if not api_host or not project_id or not personal_api_key:
|
|
1879
|
+
results[tool_name] = {
|
|
1880
|
+
"success": False,
|
|
1881
|
+
"status_code": 0,
|
|
1882
|
+
"error_message": "Missing api_host, project_id, or personal_api_key for PostHog.",
|
|
1883
|
+
}
|
|
1884
|
+
else:
|
|
1885
|
+
logger.info("Testing connectivity for PostHog…")
|
|
1886
|
+
results[tool_name] = await test_posthog(api_host, project_id, personal_api_key)
|
|
1887
|
+
continue
|
|
1888
|
+
|
|
1889
|
+
# ------------------------------------------------------------------ #
|
|
1890
|
+
# Special-case: Salesforce (requires credentials)
|
|
1891
|
+
# ------------------------------------------------------------------ #
|
|
1892
|
+
if tool_name == "salesforce":
|
|
1893
|
+
cfg_map = {c.get("name"): c.get("value") for c in config_entries if c}
|
|
1894
|
+
username = cfg_map.get("username")
|
|
1895
|
+
password = cfg_map.get("password")
|
|
1896
|
+
security_token = cfg_map.get("security_token")
|
|
1897
|
+
domain = cfg_map.get("domain", "login")
|
|
1898
|
+
client_id = cfg_map.get("client_id")
|
|
1899
|
+
client_secret = cfg_map.get("client_secret")
|
|
1900
|
+
|
|
1901
|
+
if not all([username, password, security_token]):
|
|
1902
|
+
results[tool_name] = {
|
|
1903
|
+
"success": False,
|
|
1904
|
+
"status_code": 0,
|
|
1905
|
+
"error_message": "Missing Salesforce credentials.",
|
|
1906
|
+
}
|
|
1907
|
+
else:
|
|
1908
|
+
logger.info("Testing connectivity for salesforce…")
|
|
1909
|
+
results[tool_name] = await test_salesforce(
|
|
1910
|
+
username,
|
|
1911
|
+
password,
|
|
1912
|
+
security_token,
|
|
1913
|
+
domain,
|
|
1914
|
+
client_id,
|
|
1915
|
+
client_secret,
|
|
1916
|
+
)
|
|
1917
|
+
continue
|
|
1918
|
+
|
|
1919
|
+
# ------------------------------------------------------------------ #
|
|
1920
|
+
# Special-case: Aircall (app_id + api_token)
|
|
1921
|
+
# ------------------------------------------------------------------ #
|
|
1922
|
+
if tool_name == "aircall":
|
|
1923
|
+
app_id = next((c["value"] for c in config_entries if c["name"] == "apiId"), None)
|
|
1924
|
+
api_token = next((c["value"] for c in config_entries if c["name"] == "apiToken"), None)
|
|
1925
|
+
if not app_id or not api_token:
|
|
1926
|
+
results[tool_name] = {
|
|
1927
|
+
"success": False,
|
|
1928
|
+
"status_code": 0,
|
|
1929
|
+
"error_message": "Missing apiId or apiToken for Aircall.",
|
|
1930
|
+
}
|
|
1931
|
+
else:
|
|
1932
|
+
logger.info("Testing connectivity for Aircall…")
|
|
1933
|
+
results[tool_name] = await test_aircall(app_id, api_token)
|
|
1934
|
+
continue
|
|
1935
|
+
|
|
1936
|
+
# ------------------------------------------------------------------ #
|
|
1937
|
+
# Special-case: Dialpad (client credentials)
|
|
1938
|
+
# ------------------------------------------------------------------ #
|
|
1939
|
+
if tool_name == "dialpad":
|
|
1940
|
+
client_id = next((c["value"] for c in config_entries if c["name"] == "clientId"), None)
|
|
1941
|
+
client_secret = next((c["value"] for c in config_entries if c["name"] == "clientSecret"), None)
|
|
1942
|
+
if not client_id or not client_secret:
|
|
1943
|
+
results[tool_name] = {
|
|
1944
|
+
"success": False,
|
|
1945
|
+
"status_code": 0,
|
|
1946
|
+
"error_message": "Missing clientId or clientSecret for Dialpad.",
|
|
1947
|
+
}
|
|
1948
|
+
else:
|
|
1949
|
+
logger.info("Testing connectivity for Dialpad…")
|
|
1950
|
+
results[tool_name] = await test_dialpad(client_id, client_secret)
|
|
1951
|
+
continue
|
|
1952
|
+
|
|
1953
|
+
# ------------------------------------------------------------------ #
|
|
1954
|
+
# All other tools – expect an apiKey by default
|
|
1955
|
+
# ------------------------------------------------------------------ #
|
|
1956
|
+
api_key = next((c["value"] for c in config_entries if c["name"] == "apiKey"), None)
|
|
1957
|
+
if not api_key:
|
|
1958
|
+
logger.warning(f"Tool '{tool_name}' missing 'apiKey' in configuration.")
|
|
1959
|
+
results[tool_name] = {
|
|
1960
|
+
"success": False,
|
|
1961
|
+
"status_code": 0,
|
|
1962
|
+
"error_message": "Missing apiKey."
|
|
1963
|
+
}
|
|
1964
|
+
continue
|
|
1965
|
+
|
|
1966
|
+
logger.info(f"Testing connectivity for {tool_name}…")
|
|
1967
|
+
|
|
1968
|
+
# OpenAI needs extra args
|
|
1969
|
+
if tool_name == "openai":
|
|
1970
|
+
model_name = next((c["value"] for c in config_entries if c["name"] == "modelName"), "gpt-5.1-chat")
|
|
1971
|
+
reasoning_effort = next((c["value"] for c in config_entries if c["name"] == "reasoningEffort"), "medium")
|
|
1972
|
+
results[tool_name] = await test_openai(api_key, model_name, reasoning_effort)
|
|
1973
|
+
|
|
1974
|
+
# Google Workspace needs subjectEmail
|
|
1975
|
+
elif tool_name == "googleworkspace":
|
|
1976
|
+
subject_email = next((c["value"] for c in config_entries if c["name"] == "subjectEmail"), "")
|
|
1977
|
+
if not subject_email:
|
|
1978
|
+
results[tool_name] = {
|
|
1979
|
+
"success": False,
|
|
1980
|
+
"status_code": 0,
|
|
1981
|
+
"error_message": "Missing subjectEmail for Google Workspace."
|
|
1982
|
+
}
|
|
1983
|
+
else:
|
|
1984
|
+
results[tool_name] = await test_google_workspace(api_key, subject_email)
|
|
1985
|
+
|
|
1986
|
+
# Google Drive also needs subjectEmail
|
|
1987
|
+
elif tool_name == "googledrive":
|
|
1988
|
+
subject_email = next((c["value"] for c in config_entries if c["name"] == "subjectEmail"), "")
|
|
1989
|
+
if not subject_email:
|
|
1990
|
+
results[tool_name] = {
|
|
1991
|
+
"success": False,
|
|
1992
|
+
"status_code": 0,
|
|
1993
|
+
"error_message": "Missing subjectEmail for Google Drive.",
|
|
1994
|
+
}
|
|
1995
|
+
else:
|
|
1996
|
+
results[tool_name] = await test_google_drive(api_key, subject_email)
|
|
1997
|
+
|
|
1998
|
+
# Clay needs webhook URL in addition to apiKey
|
|
1999
|
+
elif tool_name == "clay":
|
|
2000
|
+
webhook = next(
|
|
2001
|
+
(c["value"] for c in config_entries if c["name"] in ("webhook", "webhookUrl", "webhook_url")),
|
|
2002
|
+
None,
|
|
2003
|
+
)
|
|
2004
|
+
if not webhook:
|
|
2005
|
+
results[tool_name] = {
|
|
2006
|
+
"success": False,
|
|
2007
|
+
"status_code": 0,
|
|
2008
|
+
"error_message": "Missing webhook URL for Clay.",
|
|
2009
|
+
}
|
|
2010
|
+
else:
|
|
2011
|
+
results[tool_name] = await test_clay(api_key, webhook)
|
|
2012
|
+
|
|
2013
|
+
# Everything else calls the mapped test function with just api_key
|
|
340
2014
|
else:
|
|
341
|
-
# Directly call the mapped test function with just api_key
|
|
342
2015
|
results[tool_name] = await test_mapping[tool_name](api_key)
|
|
343
2016
|
|
|
344
2017
|
return results
|