rasa-pro 3.14.0.dev6__py3-none-any.whl → 3.14.0.dev7__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of rasa-pro might be problematic. Click here for more details.
- rasa/agents/exceptions.py +31 -1
- rasa/agents/protocol/a2a/a2a_agent.py +1 -1
- rasa/agents/protocol/mcp/mcp_base_agent.py +7 -6
- rasa/agents/protocol/mcp/mcp_task_agent.py +1 -1
- rasa/agents/utils.py +5 -0
- rasa/agents/validation.py +484 -0
- rasa/api.py +9 -6
- rasa/cli/arguments/train.py +2 -0
- rasa/cli/interactive.py +2 -0
- rasa/cli/train.py +2 -0
- rasa/cli/utils.py +85 -1
- rasa/core/actions/action.py +2 -6
- rasa/core/available_agents.py +47 -26
- rasa/core/channels/inspector/dist/assets/{arc-63212852.js → arc-cce7e0a8.js} +1 -1
- rasa/core/channels/inspector/dist/assets/{blockDiagram-38ab4fdb-eecf6b13.js → blockDiagram-38ab4fdb-e2a49be7.js} +1 -1
- rasa/core/channels/inspector/dist/assets/{c4Diagram-3d4e48cf-8f798a9a.js → c4Diagram-3d4e48cf-3def7895.js} +1 -1
- rasa/core/channels/inspector/dist/assets/channel-858c2c20.js +1 -0
- rasa/core/channels/inspector/dist/assets/{classDiagram-70f12bd4-df71a04c.js → classDiagram-70f12bd4-e66fe4df.js} +1 -1
- rasa/core/channels/inspector/dist/assets/{classDiagram-v2-f2320105-9b275968.js → classDiagram-v2-f2320105-eb874aaa.js} +1 -1
- rasa/core/channels/inspector/dist/assets/clone-4b80996c.js +1 -0
- rasa/core/channels/inspector/dist/assets/{createText-2e5e7dd3-1c669cad.js → createText-2e5e7dd3-cf934643.js} +1 -1
- rasa/core/channels/inspector/dist/assets/{edges-e0da2a9e-b1553799.js → edges-e0da2a9e-8fdf9155.js} +1 -1
- rasa/core/channels/inspector/dist/assets/{erDiagram-9861fffd-112388d6.js → erDiagram-9861fffd-6106fb96.js} +1 -1
- rasa/core/channels/inspector/dist/assets/{flowDb-956e92f1-fdebec47.js → flowDb-956e92f1-4c2bb040.js} +1 -1
- rasa/core/channels/inspector/dist/assets/{flowDiagram-66a62f08-6280ede1.js → flowDiagram-66a62f08-f0ff96af.js} +1 -1
- rasa/core/channels/inspector/dist/assets/flowDiagram-v2-96b9c2cf-16f09b7a.js +1 -0
- rasa/core/channels/inspector/dist/assets/{flowchart-elk-definition-4a651766-e1dc03e5.js → flowchart-elk-definition-4a651766-a21707ec.js} +1 -1
- rasa/core/channels/inspector/dist/assets/{ganttDiagram-c361ad54-83f68c51.js → ganttDiagram-c361ad54-c165acb1.js} +1 -1
- rasa/core/channels/inspector/dist/assets/{gitGraphDiagram-72cf32ee-22f8666f.js → gitGraphDiagram-72cf32ee-b0564cf1.js} +1 -1
- rasa/core/channels/inspector/dist/assets/{graph-ca9e6217.js → graph-e557e67a.js} +1 -1
- rasa/core/channels/inspector/dist/assets/{index-3862675e-c5ceb692.js → index-3862675e-1ce60e9e.js} +1 -1
- rasa/core/channels/inspector/dist/assets/{index-3e293924.js → index-996fe816.js} +173 -173
- rasa/core/channels/inspector/dist/assets/{infoDiagram-f8f76790-faa9999b.js → infoDiagram-f8f76790-893569e2.js} +1 -1
- rasa/core/channels/inspector/dist/assets/{journeyDiagram-49397b02-c4dda8d9.js → journeyDiagram-49397b02-c29c864f.js} +1 -1
- rasa/core/channels/inspector/dist/assets/{layout-d4307784.js → layout-649a5eae.js} +1 -1
- rasa/core/channels/inspector/dist/assets/{line-0567aaa7.js → line-0e5685ed.js} +1 -1
- rasa/core/channels/inspector/dist/assets/{linear-c11b95cf.js → linear-eaa320bd.js} +1 -1
- rasa/core/channels/inspector/dist/assets/{mindmap-definition-fc14e90a-0c7d3ca9.js → mindmap-definition-fc14e90a-f35df9e6.js} +1 -1
- rasa/core/channels/inspector/dist/assets/{pieDiagram-8a3498a8-34b433fa.js → pieDiagram-8a3498a8-78339e96.js} +1 -1
- rasa/core/channels/inspector/dist/assets/{quadrantDiagram-120e2f19-4cab816e.js → quadrantDiagram-120e2f19-9b5f2f14.js} +1 -1
- rasa/core/channels/inspector/dist/assets/{requirementDiagram-deff3bca-8c22fa9e.js → requirementDiagram-deff3bca-d05ddb3a.js} +1 -1
- rasa/core/channels/inspector/dist/assets/{sankeyDiagram-04a897e0-70ce9e8e.js → sankeyDiagram-04a897e0-d9be5dfd.js} +1 -1
- rasa/core/channels/inspector/dist/assets/{sequenceDiagram-704730f1-fbcd7fc9.js → sequenceDiagram-704730f1-0f1c4348.js} +1 -1
- rasa/core/channels/inspector/dist/assets/{stateDiagram-587899a1-45f05ea6.js → stateDiagram-587899a1-9ddf63b3.js} +1 -1
- rasa/core/channels/inspector/dist/assets/{stateDiagram-v2-d93cdb3a-beab1ea6.js → stateDiagram-v2-d93cdb3a-bc2b81ed.js} +1 -1
- rasa/core/channels/inspector/dist/assets/{styles-6aaf32cf-2f29dbd5.js → styles-6aaf32cf-0a287936.js} +1 -1
- rasa/core/channels/inspector/dist/assets/{styles-9a916d00-951eac83.js → styles-9a916d00-e3941990.js} +1 -1
- rasa/core/channels/inspector/dist/assets/{styles-c10674c1-897fbfdd.js → styles-c10674c1-ce4eca24.js} +1 -1
- rasa/core/channels/inspector/dist/assets/{svgDrawCommon-08f97a94-d667fac1.js → svgDrawCommon-08f97a94-d822b1a8.js} +1 -1
- rasa/core/channels/inspector/dist/assets/{timeline-definition-85554ec2-e3205144.js → timeline-definition-85554ec2-e144c7a7.js} +1 -1
- rasa/core/channels/inspector/dist/assets/{xychartDiagram-e933f94c-4abeb0e2.js → xychartDiagram-e933f94c-ab7f4e14.js} +1 -1
- rasa/core/channels/inspector/dist/index.html +1 -1
- rasa/core/channels/inspector/src/App.tsx +28 -4
- rasa/core/channels/inspector/src/components/DialogueAgentStack.tsx +108 -0
- rasa/core/channels/inspector/src/components/{DialogueStack.tsx → DialogueHistoryStack.tsx} +7 -8
- rasa/core/channels/inspector/src/helpers/formatters.test.ts +4 -0
- rasa/core/channels/inspector/src/helpers/utils.test.ts +127 -0
- rasa/core/channels/inspector/src/helpers/utils.ts +66 -1
- rasa/core/channels/inspector/src/types.ts +17 -0
- rasa/core/policies/flows/flow_executor.py +52 -31
- rasa/dialogue_understanding/commands/cancel_flow_command.py +2 -81
- rasa/dialogue_understanding/commands/start_flow_command.py +18 -113
- rasa/dialogue_understanding/commands/utils.py +118 -0
- rasa/dialogue_understanding/patterns/clarify.py +3 -14
- rasa/dialogue_understanding/patterns/continue_interrupted.py +185 -114
- rasa/dialogue_understanding/patterns/default_flows_for_patterns.yml +17 -23
- rasa/dialogue_understanding/stack/utils.py +43 -4
- rasa/dialogue_understanding/utils.py +24 -4
- rasa/model_training.py +8 -6
- rasa/shared/constants.py +3 -0
- rasa/shared/core/constants.py +5 -6
- rasa/shared/utils/health_check/health_check.py +7 -3
- rasa/shared/utils/mcp/server_connection.py +26 -6
- rasa/version.py +1 -1
- {rasa_pro-3.14.0.dev6.dist-info → rasa_pro-3.14.0.dev7.dist-info}/METADATA +1 -1
- {rasa_pro-3.14.0.dev6.dist-info → rasa_pro-3.14.0.dev7.dist-info}/RECORD +79 -76
- rasa/core/channels/inspector/dist/assets/channel-0cd70adf.js +0 -1
- rasa/core/channels/inspector/dist/assets/clone-a0f9c4ed.js +0 -1
- rasa/core/channels/inspector/dist/assets/flowDiagram-v2-96b9c2cf-de9cc4aa.js +0 -1
- {rasa_pro-3.14.0.dev6.dist-info → rasa_pro-3.14.0.dev7.dist-info}/NOTICE +0 -0
- {rasa_pro-3.14.0.dev6.dist-info → rasa_pro-3.14.0.dev7.dist-info}/WHEEL +0 -0
- {rasa_pro-3.14.0.dev6.dist-info → rasa_pro-3.14.0.dev7.dist-info}/entry_points.txt +0 -0
rasa/agents/exceptions.py
CHANGED
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
from rasa.exceptions import RasaException
|
|
1
|
+
from rasa.exceptions import RasaException, ValidationError
|
|
2
2
|
|
|
3
3
|
|
|
4
4
|
class AgentNotFoundException(RasaException):
|
|
@@ -6,3 +6,33 @@ class AgentNotFoundException(RasaException):
|
|
|
6
6
|
|
|
7
7
|
def __init__(self, agent_name: str):
|
|
8
8
|
super().__init__(f"The agent {agent_name} is not defined.")
|
|
9
|
+
|
|
10
|
+
|
|
11
|
+
class DuplicatedAgentNameException(ValidationError):
|
|
12
|
+
"""Raised when agent names are duplicated."""
|
|
13
|
+
|
|
14
|
+
def __init__(self, duplicated_names: list[str]) -> None:
|
|
15
|
+
"""Initialize the exception."""
|
|
16
|
+
event_info = f"Agent names are duplicated: {', '.join(duplicated_names)}"
|
|
17
|
+
|
|
18
|
+
super().__init__(
|
|
19
|
+
code="agent.duplicated_name",
|
|
20
|
+
event_info=event_info,
|
|
21
|
+
duplicated_names=duplicated_names,
|
|
22
|
+
)
|
|
23
|
+
|
|
24
|
+
|
|
25
|
+
class AgentNameFlowConflictException(ValidationError):
|
|
26
|
+
"""Raised when agent names conflict with flow names."""
|
|
27
|
+
|
|
28
|
+
def __init__(self, conflicting_names: list[str]) -> None:
|
|
29
|
+
"""Initialize the exception."""
|
|
30
|
+
event_info = (
|
|
31
|
+
f"Agent names conflict with flow names: {', '.join(conflicting_names)}"
|
|
32
|
+
)
|
|
33
|
+
|
|
34
|
+
super().__init__(
|
|
35
|
+
code="agent.flow_name_conflict",
|
|
36
|
+
event_info=event_info,
|
|
37
|
+
conflicting_names=conflicting_names,
|
|
38
|
+
)
|
|
@@ -239,7 +239,7 @@ class A2AAgent(AgentProtocol):
|
|
|
239
239
|
error_message=f"Streaming error: {exception!s}",
|
|
240
240
|
)
|
|
241
241
|
|
|
242
|
-
# In case we didn't receive any response or the
|
|
242
|
+
# In case we didn't receive any response or the stream ended unexpectedly
|
|
243
243
|
structlogger.error(
|
|
244
244
|
"a2a_agent.run_streaming_agent.unexpected_end",
|
|
245
245
|
event_info="Unexpected end of streaming response from A2A server",
|
|
@@ -253,7 +253,8 @@ class MCPBaseAgent(AgentProtocol):
|
|
|
253
253
|
except ConnectionError as ce:
|
|
254
254
|
structlogger.warning(
|
|
255
255
|
"mcp_agent.connect.connection_error",
|
|
256
|
-
event_info=f"Connection attempt {attempt} failed
|
|
256
|
+
event_info=f"Connection attempt {attempt} failed.",
|
|
257
|
+
error=str(ce),
|
|
257
258
|
attempt=attempt,
|
|
258
259
|
max_retries=self._max_retries,
|
|
259
260
|
)
|
|
@@ -296,7 +297,7 @@ class MCPBaseAgent(AgentProtocol):
|
|
|
296
297
|
except Exception as e:
|
|
297
298
|
event_info = (
|
|
298
299
|
f"Agent `{self._name}` failed to connect to MCP server - "
|
|
299
|
-
f"{server_name} @ {server_config.url}
|
|
300
|
+
f"`{server_name}` @ `{server_config.url}`: {e!s}"
|
|
300
301
|
)
|
|
301
302
|
structlogger.error(
|
|
302
303
|
"mcp_agent.connect.failed_to_connect",
|
|
@@ -333,7 +334,7 @@ class MCPBaseAgent(AgentProtocol):
|
|
|
333
334
|
except Exception as e:
|
|
334
335
|
structlogger.error(
|
|
335
336
|
"mcp_agent.disconnect_server.error",
|
|
336
|
-
event_info=f"Failed to disconnect from server `{server_name}`: {e}",
|
|
337
|
+
event_info=f"Failed to disconnect from server `{server_name}`: {e!s}",
|
|
337
338
|
server_name=server_name,
|
|
338
339
|
agent_name=self._name,
|
|
339
340
|
agent_id=str(make_agent_identifier(self._name, self.protocol_type)),
|
|
@@ -566,8 +567,8 @@ class MCPBaseAgent(AgentProtocol):
|
|
|
566
567
|
|
|
567
568
|
server_id = self._tool_to_server_mapper[tool_name]
|
|
568
569
|
connection = self._server_connections[server_id]
|
|
569
|
-
session = await connection.ensure_active_session()
|
|
570
570
|
try:
|
|
571
|
+
session = await connection.ensure_active_session()
|
|
571
572
|
result = await session.call_tool(tool_name, arguments)
|
|
572
573
|
return AgentToolResult.from_mcp_tool_result(tool_name, result)
|
|
573
574
|
except Exception as e:
|
|
@@ -577,7 +578,7 @@ class MCPBaseAgent(AgentProtocol):
|
|
|
577
578
|
is_error=True,
|
|
578
579
|
error_message=(
|
|
579
580
|
f"Failed to execute tool `{tool_name}` via MCP server `{server_id}`"
|
|
580
|
-
f"@ {connection.server_url}
|
|
581
|
+
f" @ `{connection.server_url}`: {e!s}"
|
|
581
582
|
),
|
|
582
583
|
)
|
|
583
584
|
|
|
@@ -606,7 +607,7 @@ class MCPBaseAgent(AgentProtocol):
|
|
|
606
607
|
tool_name=tool_name,
|
|
607
608
|
result=None,
|
|
608
609
|
is_error=True,
|
|
609
|
-
error_message=f"Failed to execute built-in tool `{tool_name}`: {e}",
|
|
610
|
+
error_message=f"Failed to execute built-in tool `{tool_name}`: {e!s}",
|
|
610
611
|
)
|
|
611
612
|
return await self._execute_mcp_tool(tool_name, arguments)
|
|
612
613
|
|
|
@@ -98,7 +98,7 @@ class MCPTaskAgent(MCPBaseAgent):
|
|
|
98
98
|
for name in re.findall(r"\bslots\.(\w+)", condition)
|
|
99
99
|
}
|
|
100
100
|
|
|
101
|
-
slot_names = agent_input.
|
|
101
|
+
slot_names = [slot.name for slot in agent_input.slots]
|
|
102
102
|
|
|
103
103
|
# Keep only slots that actually exist in agent_input.slots
|
|
104
104
|
valid_slot_names = [
|
rasa/agents/utils.py
CHANGED
|
@@ -2,6 +2,7 @@ from typing import List, Optional
|
|
|
2
2
|
|
|
3
3
|
from rasa.agents.agent_manager import AgentManager
|
|
4
4
|
from rasa.agents.exceptions import AgentNotFoundException
|
|
5
|
+
from rasa.agents.validation import validate_agent_names_not_conflicting_with_flows
|
|
5
6
|
from rasa.core.available_agents import (
|
|
6
7
|
AgentConfig,
|
|
7
8
|
AgentMCPServerConfig,
|
|
@@ -46,6 +47,10 @@ async def initialize_agents(
|
|
|
46
47
|
agent_manager: AgentManager = AgentManager()
|
|
47
48
|
endpoints = AvailableEndpoints.get_instance()
|
|
48
49
|
|
|
50
|
+
# Validate agent names don't conflict with flow names
|
|
51
|
+
flow_names = {flow.id for flow in flows.underlying_flows}
|
|
52
|
+
validate_agent_names_not_conflicting_with_flows(sub_agents.agents, flow_names)
|
|
53
|
+
|
|
49
54
|
for flow in flows.underlying_flows:
|
|
50
55
|
for step in flow.steps:
|
|
51
56
|
if isinstance(step, CallFlowStep):
|
|
@@ -0,0 +1,484 @@
|
|
|
1
|
+
"""Validation functions for agent configurations with reduced redundancies."""
|
|
2
|
+
|
|
3
|
+
import os
|
|
4
|
+
import urllib.parse
|
|
5
|
+
from collections import Counter
|
|
6
|
+
from typing import Any, Dict, List, NoReturn, Set
|
|
7
|
+
|
|
8
|
+
from pydantic import ValidationError as PydanticValidationError
|
|
9
|
+
from ruamel import yaml
|
|
10
|
+
|
|
11
|
+
from rasa.agents.exceptions import (
|
|
12
|
+
AgentNameFlowConflictException,
|
|
13
|
+
DuplicatedAgentNameException,
|
|
14
|
+
)
|
|
15
|
+
from rasa.core.available_agents import (
|
|
16
|
+
DEFAULT_AGENTS_CONFIG_FOLDER,
|
|
17
|
+
AgentConfig,
|
|
18
|
+
AgentConfiguration,
|
|
19
|
+
AgentConnections,
|
|
20
|
+
AgentInfo,
|
|
21
|
+
ProtocolConfig,
|
|
22
|
+
)
|
|
23
|
+
from rasa.core.available_endpoints import AvailableEndpoints
|
|
24
|
+
from rasa.exceptions import ValidationError
|
|
25
|
+
|
|
26
|
+
# Centralized allowed keys configuration to eliminate duplication
|
|
27
|
+
ALLOWED_KEYS = {
|
|
28
|
+
"agent": {"name", "protocol", "description"},
|
|
29
|
+
"configuration": {
|
|
30
|
+
"llm",
|
|
31
|
+
"prompt_template",
|
|
32
|
+
"module",
|
|
33
|
+
"timeout",
|
|
34
|
+
"max_retries",
|
|
35
|
+
"agent_card",
|
|
36
|
+
},
|
|
37
|
+
"connections": {"mcp_servers"},
|
|
38
|
+
}
|
|
39
|
+
|
|
40
|
+
|
|
41
|
+
def validate_agent_names_unique(agents: List[AgentConfig]) -> None:
|
|
42
|
+
"""Validate that agent names are unique across all loaded agents.
|
|
43
|
+
|
|
44
|
+
Args:
|
|
45
|
+
agents: List of agent configurations.
|
|
46
|
+
|
|
47
|
+
Raises:
|
|
48
|
+
DuplicatedAgentNameException: If agent names are not unique.
|
|
49
|
+
"""
|
|
50
|
+
agent_names = [agent_config.agent.name for agent_config in agents]
|
|
51
|
+
name_counts = Counter(agent_names)
|
|
52
|
+
|
|
53
|
+
duplicated_names = [name for name, count in name_counts.items() if count > 1]
|
|
54
|
+
|
|
55
|
+
if duplicated_names:
|
|
56
|
+
raise DuplicatedAgentNameException(duplicated_names)
|
|
57
|
+
|
|
58
|
+
|
|
59
|
+
def validate_agent_names_not_conflicting_with_flows(
|
|
60
|
+
agents: Dict[str, AgentConfig], flow_names: Set[str]
|
|
61
|
+
) -> None:
|
|
62
|
+
"""Validate that agent names do not conflict with flow names.
|
|
63
|
+
|
|
64
|
+
Args:
|
|
65
|
+
agents: Dictionary of agent configurations.
|
|
66
|
+
flow_names: Set of flow names to check against.
|
|
67
|
+
|
|
68
|
+
Raises:
|
|
69
|
+
AgentNameFlowConflictException: If agent names conflict with flow names.
|
|
70
|
+
"""
|
|
71
|
+
conflicting_names = [
|
|
72
|
+
agent_name for agent_name in agents.keys() if agent_name in flow_names
|
|
73
|
+
]
|
|
74
|
+
|
|
75
|
+
if conflicting_names:
|
|
76
|
+
raise AgentNameFlowConflictException(conflicting_names)
|
|
77
|
+
|
|
78
|
+
|
|
79
|
+
def _validate_mcp_config(agent_config: AgentConfig) -> None:
|
|
80
|
+
"""Validate MCP-specific configuration requirements."""
|
|
81
|
+
agent_name = agent_config.agent.name
|
|
82
|
+
|
|
83
|
+
# Check connections.mcp_servers exists
|
|
84
|
+
if agent_config.connections is None or agent_config.connections.mcp_servers is None:
|
|
85
|
+
raise ValidationError(
|
|
86
|
+
code="agent.validation.mcp.missing_connections",
|
|
87
|
+
event_info=f"For protocol 'MCP', agent '{agent_name}' must have "
|
|
88
|
+
"'connections.mcp_servers' configured.",
|
|
89
|
+
)
|
|
90
|
+
|
|
91
|
+
# Check mcp_servers list is not empty
|
|
92
|
+
if not agent_config.connections.mcp_servers:
|
|
93
|
+
raise ValidationError(
|
|
94
|
+
code="agent.validation.mcp.empty_servers_list",
|
|
95
|
+
event_info=f"For protocol 'MCP', agent '{agent_name}' must have "
|
|
96
|
+
"at least one MCP server configured in 'connections.mcp_servers'.",
|
|
97
|
+
)
|
|
98
|
+
|
|
99
|
+
# Validate each MCP server configuration
|
|
100
|
+
for i, server in enumerate(agent_config.connections.mcp_servers):
|
|
101
|
+
if not server.name:
|
|
102
|
+
raise ValidationError(
|
|
103
|
+
code="agent.validation.mcp.server_missing_name",
|
|
104
|
+
event_info=f"For protocol 'MCP', agent '{agent_name}' MCP server "
|
|
105
|
+
f"at index {i} must have a 'name' field.",
|
|
106
|
+
)
|
|
107
|
+
|
|
108
|
+
|
|
109
|
+
def _validate_a2a_config(agent_config: AgentConfig) -> None:
|
|
110
|
+
"""Validate A2A-specific configuration requirements."""
|
|
111
|
+
agent_name = agent_config.agent.name
|
|
112
|
+
|
|
113
|
+
# Check configuration.agent_card exists
|
|
114
|
+
if (
|
|
115
|
+
agent_config.configuration is None
|
|
116
|
+
or agent_config.configuration.agent_card is None
|
|
117
|
+
):
|
|
118
|
+
raise ValidationError(
|
|
119
|
+
code="agent.validation.a2a.missing_agent_card",
|
|
120
|
+
event_info=f"For protocol 'A2A', agent '{agent_name}' must have "
|
|
121
|
+
"'configuration.agent_card' specified.",
|
|
122
|
+
)
|
|
123
|
+
|
|
124
|
+
# Validate agent_card path or URL
|
|
125
|
+
agent_card = agent_config.configuration.agent_card
|
|
126
|
+
if not agent_card:
|
|
127
|
+
raise ValidationError(
|
|
128
|
+
code="agent.validation.a2a.empty_agent_card",
|
|
129
|
+
event_info=f"Agent '{agent_name}' has empty 'agent_card' value",
|
|
130
|
+
)
|
|
131
|
+
|
|
132
|
+
# Check if it's a URL
|
|
133
|
+
parsed_url = urllib.parse.urlparse(agent_card)
|
|
134
|
+
if parsed_url.scheme and parsed_url.netloc:
|
|
135
|
+
# It's a URL, validate format
|
|
136
|
+
if parsed_url.scheme not in ["http", "https"]:
|
|
137
|
+
raise ValidationError(
|
|
138
|
+
code="agent.validation.a2a.invalid_agent_card_url",
|
|
139
|
+
event_info=f"Agent '{agent_name}' has invalid URL scheme "
|
|
140
|
+
f"'{parsed_url.scheme}' for 'agent_card'",
|
|
141
|
+
)
|
|
142
|
+
else:
|
|
143
|
+
# It's a file path, check if it exists
|
|
144
|
+
if not os.path.exists(agent_card):
|
|
145
|
+
raise ValidationError(
|
|
146
|
+
code="agent.validation.a2a.agent_card_file_not_found",
|
|
147
|
+
event_info=f"Agent '{agent_name}' has 'agent_card' file that doesn't "
|
|
148
|
+
f"exist: {agent_card}",
|
|
149
|
+
)
|
|
150
|
+
|
|
151
|
+
|
|
152
|
+
def _validate_optional_keys(agent_config: AgentConfig) -> None:
|
|
153
|
+
"""Validate optional keys in agent configuration."""
|
|
154
|
+
agent_name = agent_config.agent.name
|
|
155
|
+
|
|
156
|
+
# Validate prompt_template if present
|
|
157
|
+
if agent_config.configuration and agent_config.configuration.prompt_template:
|
|
158
|
+
prompt_path = agent_config.configuration.prompt_template
|
|
159
|
+
if not os.path.exists(prompt_path):
|
|
160
|
+
raise ValidationError(
|
|
161
|
+
code="agent.validation.optional.prompt_template_not_found",
|
|
162
|
+
event_info=f"Agent '{agent_name}' has prompt template that "
|
|
163
|
+
f"does not exist: {prompt_path}",
|
|
164
|
+
)
|
|
165
|
+
|
|
166
|
+
# Validate module if present
|
|
167
|
+
if agent_config.configuration and agent_config.configuration.module:
|
|
168
|
+
import importlib
|
|
169
|
+
|
|
170
|
+
module_name = agent_config.configuration.module
|
|
171
|
+
try:
|
|
172
|
+
module_path, class_name = module_name.rsplit(".", 1)
|
|
173
|
+
getattr(importlib.import_module(module_path), class_name)
|
|
174
|
+
except (ImportError, AttributeError) as e:
|
|
175
|
+
raise ValidationError(
|
|
176
|
+
code="agent.validation.optional.module_not_found",
|
|
177
|
+
event_info=f"Agent '{agent_name}' has module '{module_name}' "
|
|
178
|
+
f"that could not be imported: {e}",
|
|
179
|
+
)
|
|
180
|
+
|
|
181
|
+
|
|
182
|
+
def _validate_llm_references(
|
|
183
|
+
llm_config: Dict[str, Any],
|
|
184
|
+
endpoints: "AvailableEndpoints",
|
|
185
|
+
agent_name: str,
|
|
186
|
+
) -> None:
|
|
187
|
+
"""Validate LLM configuration references against endpoints."""
|
|
188
|
+
if "model_group" in llm_config:
|
|
189
|
+
from rasa.engine.validation import (
|
|
190
|
+
_validate_component_model_client_config_has_references_to_endpoints,
|
|
191
|
+
)
|
|
192
|
+
|
|
193
|
+
component_config = {"llm": llm_config}
|
|
194
|
+
_validate_component_model_client_config_has_references_to_endpoints(
|
|
195
|
+
component_config, "llm", component_name=agent_name
|
|
196
|
+
)
|
|
197
|
+
|
|
198
|
+
|
|
199
|
+
def _validate_mcp_server_references(
|
|
200
|
+
mcp_servers: list, endpoints: "AvailableEndpoints", agent_name: str
|
|
201
|
+
) -> None:
|
|
202
|
+
"""Validate MCP server references against endpoints."""
|
|
203
|
+
if not endpoints.mcp_servers:
|
|
204
|
+
raise ValidationError(
|
|
205
|
+
code="agent.validation.endpoints.no_mcp_servers",
|
|
206
|
+
event_info=(
|
|
207
|
+
f"Agent '{agent_name}' references MCP servers but no MCP "
|
|
208
|
+
"servers are defined in endpoints.yml."
|
|
209
|
+
),
|
|
210
|
+
)
|
|
211
|
+
|
|
212
|
+
available_mcp_server_names = [server.name for server in endpoints.mcp_servers]
|
|
213
|
+
|
|
214
|
+
for i, mcp_server in enumerate(mcp_servers):
|
|
215
|
+
server_name = mcp_server.name
|
|
216
|
+
if server_name not in available_mcp_server_names:
|
|
217
|
+
raise ValidationError(
|
|
218
|
+
code="agent.validation.endpoints.invalid_mcp_server",
|
|
219
|
+
event_info=(
|
|
220
|
+
f"MCP server '{server_name}' at index {i} for Agent "
|
|
221
|
+
f"'{agent_name}' does not exist in endpoints.yml. Available MCP "
|
|
222
|
+
f"servers: {', '.join(available_mcp_server_names)}"
|
|
223
|
+
),
|
|
224
|
+
)
|
|
225
|
+
|
|
226
|
+
|
|
227
|
+
def _handle_pydantic_validation_error(
|
|
228
|
+
error: PydanticValidationError, agent_name: str
|
|
229
|
+
) -> NoReturn:
|
|
230
|
+
"""Handle specific Pydantic validation errors that are actually possible.
|
|
231
|
+
|
|
232
|
+
Args:
|
|
233
|
+
error: The Pydantic validation error to handle
|
|
234
|
+
agent_name: Name of the agent for error messages
|
|
235
|
+
"""
|
|
236
|
+
missing_fields = []
|
|
237
|
+
invalid_protocol = False
|
|
238
|
+
type_error = None
|
|
239
|
+
|
|
240
|
+
for pydantic_error in error.errors():
|
|
241
|
+
error_type = pydantic_error["type"]
|
|
242
|
+
field_path = ".".join(str(loc) for loc in pydantic_error["loc"])
|
|
243
|
+
|
|
244
|
+
if error_type == "missing":
|
|
245
|
+
for field in ["name", "protocol", "description"]:
|
|
246
|
+
if field in field_path:
|
|
247
|
+
missing_fields.append(field)
|
|
248
|
+
elif error_type == "enum" and "protocol" in field_path:
|
|
249
|
+
invalid_protocol = True
|
|
250
|
+
elif error_type in ["string_type", "int_parsing"]:
|
|
251
|
+
type_error = (field_path, pydantic_error["msg"])
|
|
252
|
+
|
|
253
|
+
# Handle missing required fields
|
|
254
|
+
if missing_fields:
|
|
255
|
+
raise ValidationError(
|
|
256
|
+
code="agent.validation.mandatory.fields_missing",
|
|
257
|
+
event_info=(
|
|
258
|
+
f"Agent '{agent_name}' is missing required fields "
|
|
259
|
+
f"in agent section: {', '.join(missing_fields)}"
|
|
260
|
+
),
|
|
261
|
+
)
|
|
262
|
+
|
|
263
|
+
# Handle invalid protocol
|
|
264
|
+
elif invalid_protocol:
|
|
265
|
+
raise ValidationError(
|
|
266
|
+
code="agent.validation.pydantic.invalid_protocol",
|
|
267
|
+
event_info=(
|
|
268
|
+
f"Agent '{agent_name}' has invalid protocol value. "
|
|
269
|
+
"Supported protocols: MCP, A2A"
|
|
270
|
+
),
|
|
271
|
+
)
|
|
272
|
+
|
|
273
|
+
# Handle type errors
|
|
274
|
+
elif type_error:
|
|
275
|
+
field, msg = type_error
|
|
276
|
+
raise ValidationError(
|
|
277
|
+
code="agent.validation.pydantic.type_error",
|
|
278
|
+
event_info=(
|
|
279
|
+
f"Agent '{agent_name}' has invalid type for field " f"'{field}': {msg}"
|
|
280
|
+
),
|
|
281
|
+
)
|
|
282
|
+
|
|
283
|
+
# Handle other Pydantic validation errors
|
|
284
|
+
else:
|
|
285
|
+
raise ValidationError(
|
|
286
|
+
code="agent.validation.pydantic.failed",
|
|
287
|
+
event_info=f"Agent '{agent_name}' validation failed: {error}",
|
|
288
|
+
)
|
|
289
|
+
|
|
290
|
+
|
|
291
|
+
def _validate_endpoint_references(agent_config: AgentConfig) -> None:
|
|
292
|
+
"""Validate that LLM and MCP server references in agent config are valid."""
|
|
293
|
+
agent_name = agent_config.agent.name
|
|
294
|
+
|
|
295
|
+
# Get available endpoints
|
|
296
|
+
endpoints = AvailableEndpoints.get_instance()
|
|
297
|
+
|
|
298
|
+
# Validate LLM configuration references
|
|
299
|
+
if agent_config.configuration and agent_config.configuration.llm:
|
|
300
|
+
_validate_llm_references(agent_config.configuration.llm, endpoints, agent_name)
|
|
301
|
+
|
|
302
|
+
# Validate MCP server references
|
|
303
|
+
if agent_config.connections and agent_config.connections.mcp_servers:
|
|
304
|
+
_validate_mcp_server_references(
|
|
305
|
+
agent_config.connections.mcp_servers, endpoints, agent_name
|
|
306
|
+
)
|
|
307
|
+
|
|
308
|
+
|
|
309
|
+
def _validate_section_keys(
|
|
310
|
+
data: Dict[str, Any], section: str, allowed_keys: set
|
|
311
|
+
) -> None:
|
|
312
|
+
"""Generic function to validate keys in a specific section."""
|
|
313
|
+
if section not in data:
|
|
314
|
+
return
|
|
315
|
+
|
|
316
|
+
section_data = data[section]
|
|
317
|
+
if not isinstance(section_data, dict):
|
|
318
|
+
return
|
|
319
|
+
|
|
320
|
+
additional_keys = set(section_data.keys()) - allowed_keys
|
|
321
|
+
if additional_keys:
|
|
322
|
+
agent_name = data.get("agent", {}).get("name", "unknown")
|
|
323
|
+
raise ValidationError(
|
|
324
|
+
code=f"agent.validation.structure.additional_{section}_keys",
|
|
325
|
+
event_info=(
|
|
326
|
+
f"Agent '{agent_name}' contains additional keys in "
|
|
327
|
+
f"'{section}' section: {', '.join(sorted(additional_keys))}"
|
|
328
|
+
),
|
|
329
|
+
)
|
|
330
|
+
|
|
331
|
+
|
|
332
|
+
def _validate_mandatory_fields(data: Dict[str, Any], agent_name: str) -> None:
|
|
333
|
+
"""Validate that all mandatory fields are present in the agent section."""
|
|
334
|
+
if "agent" not in data:
|
|
335
|
+
raise ValidationError(
|
|
336
|
+
code="agent.validation.mandatory.agent_section_missing",
|
|
337
|
+
event_info=f"Agent '{agent_name}' is missing 'agent' section",
|
|
338
|
+
)
|
|
339
|
+
|
|
340
|
+
agent_data = data["agent"]
|
|
341
|
+
if not isinstance(agent_data, dict):
|
|
342
|
+
raise ValidationError(
|
|
343
|
+
code="agent.validation.mandatory.agent_section_invalid",
|
|
344
|
+
event_info=(
|
|
345
|
+
f"Agent '{agent_name}' has invalid 'agent' section - "
|
|
346
|
+
"must be a dictionary"
|
|
347
|
+
),
|
|
348
|
+
)
|
|
349
|
+
|
|
350
|
+
# Check for required fields
|
|
351
|
+
missing_fields = []
|
|
352
|
+
for field in ["name", "protocol", "description"]:
|
|
353
|
+
if field not in agent_data or not agent_data[field]:
|
|
354
|
+
missing_fields.append(field)
|
|
355
|
+
|
|
356
|
+
if missing_fields:
|
|
357
|
+
raise ValidationError(
|
|
358
|
+
code="agent.validation.mandatory.fields_missing",
|
|
359
|
+
event_info=(
|
|
360
|
+
f"Agent '{agent_name}' is missing required fields in agent section: "
|
|
361
|
+
f"{', '.join(missing_fields)}"
|
|
362
|
+
),
|
|
363
|
+
)
|
|
364
|
+
|
|
365
|
+
|
|
366
|
+
def _validate_no_additional_keys_raw_data(data: Dict[str, Any]) -> None:
|
|
367
|
+
"""Validate that no additional, unexpected keys are present in the raw data."""
|
|
368
|
+
# Use the generic validation function for each section
|
|
369
|
+
_validate_section_keys(data, "agent", ALLOWED_KEYS["agent"])
|
|
370
|
+
_validate_section_keys(data, "configuration", ALLOWED_KEYS["configuration"])
|
|
371
|
+
_validate_section_keys(data, "connections", ALLOWED_KEYS["connections"])
|
|
372
|
+
|
|
373
|
+
|
|
374
|
+
def _validate_folder_structure(agent_folder: str) -> None:
|
|
375
|
+
"""Validate agent folder structure."""
|
|
376
|
+
if not os.path.exists(agent_folder):
|
|
377
|
+
raise ValidationError(
|
|
378
|
+
code="agent.validation.folder.not_found",
|
|
379
|
+
event_info=f"Agent folder does not exist: {agent_folder}",
|
|
380
|
+
)
|
|
381
|
+
|
|
382
|
+
if not os.path.isdir(agent_folder):
|
|
383
|
+
raise ValidationError(
|
|
384
|
+
code="agent.validation.folder.not_directory",
|
|
385
|
+
event_info=f"Agent folder is not a directory: {agent_folder}",
|
|
386
|
+
)
|
|
387
|
+
|
|
388
|
+
|
|
389
|
+
def _validate_config_file_exists(config_path: str, agent_name: str) -> None:
|
|
390
|
+
"""Validate config.yml file exists."""
|
|
391
|
+
if not os.path.isfile(config_path):
|
|
392
|
+
raise ValidationError(
|
|
393
|
+
code="agent.validation.folder.missing_config",
|
|
394
|
+
event_info=f"Agent '{agent_name}' is missing 'config.yml' file",
|
|
395
|
+
)
|
|
396
|
+
|
|
397
|
+
|
|
398
|
+
def validate_agent_config(agent_config: AgentConfig) -> None:
|
|
399
|
+
"""Validate an agent configuration using all applicable validators."""
|
|
400
|
+
protocol = agent_config.agent.protocol
|
|
401
|
+
|
|
402
|
+
# Run protocol-specific validation
|
|
403
|
+
if protocol == ProtocolConfig.MCP:
|
|
404
|
+
_validate_mcp_config(agent_config)
|
|
405
|
+
elif protocol == ProtocolConfig.A2A:
|
|
406
|
+
_validate_a2a_config(agent_config)
|
|
407
|
+
|
|
408
|
+
# Run optional keys validation
|
|
409
|
+
_validate_optional_keys(agent_config)
|
|
410
|
+
|
|
411
|
+
# Run endpoint references validation
|
|
412
|
+
_validate_endpoint_references(agent_config)
|
|
413
|
+
|
|
414
|
+
|
|
415
|
+
def validate_agent_folder(agent_folder: str = DEFAULT_AGENTS_CONFIG_FOLDER) -> None:
|
|
416
|
+
"""Validate all agent configurations in a folder."""
|
|
417
|
+
# Validate folder structure
|
|
418
|
+
_validate_folder_structure(agent_folder)
|
|
419
|
+
|
|
420
|
+
# Scan for agent folders
|
|
421
|
+
for agent_folder_name in os.listdir(agent_folder):
|
|
422
|
+
agent_path = os.path.join(agent_folder, agent_folder_name)
|
|
423
|
+
|
|
424
|
+
if not os.path.isdir(agent_path):
|
|
425
|
+
continue
|
|
426
|
+
|
|
427
|
+
config_path = os.path.join(agent_path, "config.yml")
|
|
428
|
+
|
|
429
|
+
# Validate config file exists
|
|
430
|
+
_validate_config_file_exists(config_path, agent_folder_name)
|
|
431
|
+
|
|
432
|
+
# Read and validate the config content
|
|
433
|
+
try:
|
|
434
|
+
# First read the raw YAML data to validate structure
|
|
435
|
+
with open(config_path, "r") as f:
|
|
436
|
+
data = yaml.safe_load(f)
|
|
437
|
+
|
|
438
|
+
# Validate no additional keys
|
|
439
|
+
_validate_no_additional_keys_raw_data(data)
|
|
440
|
+
|
|
441
|
+
# Validate mandatory fields before creating Pydantic models
|
|
442
|
+
_validate_mandatory_fields(data, agent_folder_name)
|
|
443
|
+
|
|
444
|
+
# Create the agent config using AvailableAgents
|
|
445
|
+
from rasa.core.available_agents import AvailableAgents
|
|
446
|
+
|
|
447
|
+
agent_config = AvailableAgents._read_agent_config(config_path)
|
|
448
|
+
|
|
449
|
+
# Validate the agent config (protocol-specific and endpoint references)
|
|
450
|
+
validate_agent_config(agent_config)
|
|
451
|
+
except PydanticValidationError as e:
|
|
452
|
+
_handle_pydantic_validation_error(e, agent_folder_name)
|
|
453
|
+
except Exception as e:
|
|
454
|
+
# Handle non-Pydantic exceptions
|
|
455
|
+
raise ValidationError(
|
|
456
|
+
code="agent.validation.folder.config_validation_failed",
|
|
457
|
+
event_info=f"Agent '{agent_folder_name}' validation failed: {e}",
|
|
458
|
+
)
|
|
459
|
+
|
|
460
|
+
|
|
461
|
+
def validate_agent_config_data(data: Dict[str, Any]) -> "AgentConfig":
|
|
462
|
+
"""Validate agent configuration data."""
|
|
463
|
+
try:
|
|
464
|
+
# Validate no additional keys before creating Pydantic models
|
|
465
|
+
_validate_no_additional_keys_raw_data(data)
|
|
466
|
+
|
|
467
|
+
# Create the agent config (this will trigger Pydantic validation)
|
|
468
|
+
agent_config = AgentConfig(
|
|
469
|
+
agent=AgentInfo(**data.get("agent", {})),
|
|
470
|
+
configuration=AgentConfiguration(**data.get("configuration", {}))
|
|
471
|
+
if data.get("configuration")
|
|
472
|
+
else None,
|
|
473
|
+
connections=AgentConnections(**data.get("connections", {}))
|
|
474
|
+
if data.get("connections")
|
|
475
|
+
else None,
|
|
476
|
+
)
|
|
477
|
+
|
|
478
|
+
return agent_config
|
|
479
|
+
|
|
480
|
+
except PydanticValidationError as e:
|
|
481
|
+
_handle_pydantic_validation_error(e, "Agent configuration")
|
|
482
|
+
except Exception:
|
|
483
|
+
# Re-raise other exceptions
|
|
484
|
+
raise
|
rasa/api.py
CHANGED
|
@@ -71,22 +71,23 @@ def run(
|
|
|
71
71
|
|
|
72
72
|
|
|
73
73
|
def train(
|
|
74
|
-
domain:
|
|
75
|
-
config:
|
|
76
|
-
training_files: "Union[
|
|
77
|
-
output:
|
|
74
|
+
domain: str,
|
|
75
|
+
config: str,
|
|
76
|
+
training_files: "Union[str, List[str]]",
|
|
77
|
+
output: str = rasa.shared.constants.DEFAULT_MODELS_PATH,
|
|
78
78
|
dry_run: bool = False,
|
|
79
79
|
force_training: bool = False,
|
|
80
|
-
fixed_model_name: Optional[
|
|
80
|
+
fixed_model_name: Optional[str] = None,
|
|
81
81
|
persist_nlu_training_data: bool = False,
|
|
82
82
|
core_additional_arguments: Optional[Dict] = None,
|
|
83
83
|
nlu_additional_arguments: Optional[Dict] = None,
|
|
84
|
-
model_to_finetune: Optional[
|
|
84
|
+
model_to_finetune: Optional[str] = None,
|
|
85
85
|
finetuning_epoch_fraction: float = 1.0,
|
|
86
86
|
remote_storage: Optional[StorageType] = None,
|
|
87
87
|
file_importer: Optional["TrainingDataImporter"] = None,
|
|
88
88
|
keep_local_model_copy: bool = False,
|
|
89
89
|
remote_root_only: bool = False,
|
|
90
|
+
sub_agents: Optional[str] = None,
|
|
90
91
|
) -> "TrainingResult":
|
|
91
92
|
"""Runs Rasa Core and NLU training in `async` loop.
|
|
92
93
|
|
|
@@ -116,6 +117,7 @@ def train(
|
|
|
116
117
|
remote storage is configured.
|
|
117
118
|
remote_root_only: If `True`, the model will be stored in the root of the
|
|
118
119
|
remote model storage.
|
|
120
|
+
sub_agents: Path to sub-agents directory.
|
|
119
121
|
|
|
120
122
|
Returns:
|
|
121
123
|
An instance of `TrainingResult`.
|
|
@@ -140,6 +142,7 @@ def train(
|
|
|
140
142
|
file_importer=file_importer,
|
|
141
143
|
keep_local_model_copy=keep_local_model_copy,
|
|
142
144
|
remote_root_only=remote_root_only,
|
|
145
|
+
sub_agents=sub_agents,
|
|
143
146
|
)
|
|
144
147
|
)
|
|
145
148
|
|
rasa/cli/arguments/train.py
CHANGED
|
@@ -10,6 +10,7 @@ from rasa.cli.arguments.default_arguments import (
|
|
|
10
10
|
add_remote_root_only_param,
|
|
11
11
|
add_remote_storage_param,
|
|
12
12
|
add_stories_param,
|
|
13
|
+
add_sub_agents_param,
|
|
13
14
|
)
|
|
14
15
|
from rasa.graph_components.providers.training_tracker_provider import (
|
|
15
16
|
TrainingTrackerProvider,
|
|
@@ -43,6 +44,7 @@ def set_train_arguments(parser: argparse.ArgumentParser) -> None:
|
|
|
43
44
|
)
|
|
44
45
|
add_remote_storage_param(parser)
|
|
45
46
|
add_remote_root_only_param(parser)
|
|
47
|
+
add_sub_agents_param(parser)
|
|
46
48
|
|
|
47
49
|
|
|
48
50
|
def set_train_core_arguments(parser: argparse.ArgumentParser) -> None:
|