rasa-pro 3.14.0.dev6__py3-none-any.whl → 3.14.0.dev7__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of rasa-pro might be problematic. Click here for more details.

Files changed (82) hide show
  1. rasa/agents/exceptions.py +31 -1
  2. rasa/agents/protocol/a2a/a2a_agent.py +1 -1
  3. rasa/agents/protocol/mcp/mcp_base_agent.py +7 -6
  4. rasa/agents/protocol/mcp/mcp_task_agent.py +1 -1
  5. rasa/agents/utils.py +5 -0
  6. rasa/agents/validation.py +484 -0
  7. rasa/api.py +9 -6
  8. rasa/cli/arguments/train.py +2 -0
  9. rasa/cli/interactive.py +2 -0
  10. rasa/cli/train.py +2 -0
  11. rasa/cli/utils.py +85 -1
  12. rasa/core/actions/action.py +2 -6
  13. rasa/core/available_agents.py +47 -26
  14. rasa/core/channels/inspector/dist/assets/{arc-63212852.js → arc-cce7e0a8.js} +1 -1
  15. rasa/core/channels/inspector/dist/assets/{blockDiagram-38ab4fdb-eecf6b13.js → blockDiagram-38ab4fdb-e2a49be7.js} +1 -1
  16. rasa/core/channels/inspector/dist/assets/{c4Diagram-3d4e48cf-8f798a9a.js → c4Diagram-3d4e48cf-3def7895.js} +1 -1
  17. rasa/core/channels/inspector/dist/assets/channel-858c2c20.js +1 -0
  18. rasa/core/channels/inspector/dist/assets/{classDiagram-70f12bd4-df71a04c.js → classDiagram-70f12bd4-e66fe4df.js} +1 -1
  19. rasa/core/channels/inspector/dist/assets/{classDiagram-v2-f2320105-9b275968.js → classDiagram-v2-f2320105-eb874aaa.js} +1 -1
  20. rasa/core/channels/inspector/dist/assets/clone-4b80996c.js +1 -0
  21. rasa/core/channels/inspector/dist/assets/{createText-2e5e7dd3-1c669cad.js → createText-2e5e7dd3-cf934643.js} +1 -1
  22. rasa/core/channels/inspector/dist/assets/{edges-e0da2a9e-b1553799.js → edges-e0da2a9e-8fdf9155.js} +1 -1
  23. rasa/core/channels/inspector/dist/assets/{erDiagram-9861fffd-112388d6.js → erDiagram-9861fffd-6106fb96.js} +1 -1
  24. rasa/core/channels/inspector/dist/assets/{flowDb-956e92f1-fdebec47.js → flowDb-956e92f1-4c2bb040.js} +1 -1
  25. rasa/core/channels/inspector/dist/assets/{flowDiagram-66a62f08-6280ede1.js → flowDiagram-66a62f08-f0ff96af.js} +1 -1
  26. rasa/core/channels/inspector/dist/assets/flowDiagram-v2-96b9c2cf-16f09b7a.js +1 -0
  27. rasa/core/channels/inspector/dist/assets/{flowchart-elk-definition-4a651766-e1dc03e5.js → flowchart-elk-definition-4a651766-a21707ec.js} +1 -1
  28. rasa/core/channels/inspector/dist/assets/{ganttDiagram-c361ad54-83f68c51.js → ganttDiagram-c361ad54-c165acb1.js} +1 -1
  29. rasa/core/channels/inspector/dist/assets/{gitGraphDiagram-72cf32ee-22f8666f.js → gitGraphDiagram-72cf32ee-b0564cf1.js} +1 -1
  30. rasa/core/channels/inspector/dist/assets/{graph-ca9e6217.js → graph-e557e67a.js} +1 -1
  31. rasa/core/channels/inspector/dist/assets/{index-3862675e-c5ceb692.js → index-3862675e-1ce60e9e.js} +1 -1
  32. rasa/core/channels/inspector/dist/assets/{index-3e293924.js → index-996fe816.js} +173 -173
  33. rasa/core/channels/inspector/dist/assets/{infoDiagram-f8f76790-faa9999b.js → infoDiagram-f8f76790-893569e2.js} +1 -1
  34. rasa/core/channels/inspector/dist/assets/{journeyDiagram-49397b02-c4dda8d9.js → journeyDiagram-49397b02-c29c864f.js} +1 -1
  35. rasa/core/channels/inspector/dist/assets/{layout-d4307784.js → layout-649a5eae.js} +1 -1
  36. rasa/core/channels/inspector/dist/assets/{line-0567aaa7.js → line-0e5685ed.js} +1 -1
  37. rasa/core/channels/inspector/dist/assets/{linear-c11b95cf.js → linear-eaa320bd.js} +1 -1
  38. rasa/core/channels/inspector/dist/assets/{mindmap-definition-fc14e90a-0c7d3ca9.js → mindmap-definition-fc14e90a-f35df9e6.js} +1 -1
  39. rasa/core/channels/inspector/dist/assets/{pieDiagram-8a3498a8-34b433fa.js → pieDiagram-8a3498a8-78339e96.js} +1 -1
  40. rasa/core/channels/inspector/dist/assets/{quadrantDiagram-120e2f19-4cab816e.js → quadrantDiagram-120e2f19-9b5f2f14.js} +1 -1
  41. rasa/core/channels/inspector/dist/assets/{requirementDiagram-deff3bca-8c22fa9e.js → requirementDiagram-deff3bca-d05ddb3a.js} +1 -1
  42. rasa/core/channels/inspector/dist/assets/{sankeyDiagram-04a897e0-70ce9e8e.js → sankeyDiagram-04a897e0-d9be5dfd.js} +1 -1
  43. rasa/core/channels/inspector/dist/assets/{sequenceDiagram-704730f1-fbcd7fc9.js → sequenceDiagram-704730f1-0f1c4348.js} +1 -1
  44. rasa/core/channels/inspector/dist/assets/{stateDiagram-587899a1-45f05ea6.js → stateDiagram-587899a1-9ddf63b3.js} +1 -1
  45. rasa/core/channels/inspector/dist/assets/{stateDiagram-v2-d93cdb3a-beab1ea6.js → stateDiagram-v2-d93cdb3a-bc2b81ed.js} +1 -1
  46. rasa/core/channels/inspector/dist/assets/{styles-6aaf32cf-2f29dbd5.js → styles-6aaf32cf-0a287936.js} +1 -1
  47. rasa/core/channels/inspector/dist/assets/{styles-9a916d00-951eac83.js → styles-9a916d00-e3941990.js} +1 -1
  48. rasa/core/channels/inspector/dist/assets/{styles-c10674c1-897fbfdd.js → styles-c10674c1-ce4eca24.js} +1 -1
  49. rasa/core/channels/inspector/dist/assets/{svgDrawCommon-08f97a94-d667fac1.js → svgDrawCommon-08f97a94-d822b1a8.js} +1 -1
  50. rasa/core/channels/inspector/dist/assets/{timeline-definition-85554ec2-e3205144.js → timeline-definition-85554ec2-e144c7a7.js} +1 -1
  51. rasa/core/channels/inspector/dist/assets/{xychartDiagram-e933f94c-4abeb0e2.js → xychartDiagram-e933f94c-ab7f4e14.js} +1 -1
  52. rasa/core/channels/inspector/dist/index.html +1 -1
  53. rasa/core/channels/inspector/src/App.tsx +28 -4
  54. rasa/core/channels/inspector/src/components/DialogueAgentStack.tsx +108 -0
  55. rasa/core/channels/inspector/src/components/{DialogueStack.tsx → DialogueHistoryStack.tsx} +7 -8
  56. rasa/core/channels/inspector/src/helpers/formatters.test.ts +4 -0
  57. rasa/core/channels/inspector/src/helpers/utils.test.ts +127 -0
  58. rasa/core/channels/inspector/src/helpers/utils.ts +66 -1
  59. rasa/core/channels/inspector/src/types.ts +17 -0
  60. rasa/core/policies/flows/flow_executor.py +52 -31
  61. rasa/dialogue_understanding/commands/cancel_flow_command.py +2 -81
  62. rasa/dialogue_understanding/commands/start_flow_command.py +18 -113
  63. rasa/dialogue_understanding/commands/utils.py +118 -0
  64. rasa/dialogue_understanding/patterns/clarify.py +3 -14
  65. rasa/dialogue_understanding/patterns/continue_interrupted.py +185 -114
  66. rasa/dialogue_understanding/patterns/default_flows_for_patterns.yml +17 -23
  67. rasa/dialogue_understanding/stack/utils.py +43 -4
  68. rasa/dialogue_understanding/utils.py +24 -4
  69. rasa/model_training.py +8 -6
  70. rasa/shared/constants.py +3 -0
  71. rasa/shared/core/constants.py +5 -6
  72. rasa/shared/utils/health_check/health_check.py +7 -3
  73. rasa/shared/utils/mcp/server_connection.py +26 -6
  74. rasa/version.py +1 -1
  75. {rasa_pro-3.14.0.dev6.dist-info → rasa_pro-3.14.0.dev7.dist-info}/METADATA +1 -1
  76. {rasa_pro-3.14.0.dev6.dist-info → rasa_pro-3.14.0.dev7.dist-info}/RECORD +79 -76
  77. rasa/core/channels/inspector/dist/assets/channel-0cd70adf.js +0 -1
  78. rasa/core/channels/inspector/dist/assets/clone-a0f9c4ed.js +0 -1
  79. rasa/core/channels/inspector/dist/assets/flowDiagram-v2-96b9c2cf-de9cc4aa.js +0 -1
  80. {rasa_pro-3.14.0.dev6.dist-info → rasa_pro-3.14.0.dev7.dist-info}/NOTICE +0 -0
  81. {rasa_pro-3.14.0.dev6.dist-info → rasa_pro-3.14.0.dev7.dist-info}/WHEEL +0 -0
  82. {rasa_pro-3.14.0.dev6.dist-info → rasa_pro-3.14.0.dev7.dist-info}/entry_points.txt +0 -0
rasa/agents/exceptions.py CHANGED
@@ -1,4 +1,4 @@
1
- from rasa.exceptions import RasaException
1
+ from rasa.exceptions import RasaException, ValidationError
2
2
 
3
3
 
4
4
  class AgentNotFoundException(RasaException):
@@ -6,3 +6,33 @@ class AgentNotFoundException(RasaException):
6
6
 
7
7
  def __init__(self, agent_name: str):
8
8
  super().__init__(f"The agent {agent_name} is not defined.")
9
+
10
+
11
+ class DuplicatedAgentNameException(ValidationError):
12
+ """Raised when agent names are duplicated."""
13
+
14
+ def __init__(self, duplicated_names: list[str]) -> None:
15
+ """Initialize the exception."""
16
+ event_info = f"Agent names are duplicated: {', '.join(duplicated_names)}"
17
+
18
+ super().__init__(
19
+ code="agent.duplicated_name",
20
+ event_info=event_info,
21
+ duplicated_names=duplicated_names,
22
+ )
23
+
24
+
25
+ class AgentNameFlowConflictException(ValidationError):
26
+ """Raised when agent names conflict with flow names."""
27
+
28
+ def __init__(self, conflicting_names: list[str]) -> None:
29
+ """Initialize the exception."""
30
+ event_info = (
31
+ f"Agent names conflict with flow names: {', '.join(conflicting_names)}"
32
+ )
33
+
34
+ super().__init__(
35
+ code="agent.flow_name_conflict",
36
+ event_info=event_info,
37
+ conflicting_names=conflicting_names,
38
+ )
@@ -239,7 +239,7 @@ class A2AAgent(AgentProtocol):
239
239
  error_message=f"Streaming error: {exception!s}",
240
240
  )
241
241
 
242
- # In case we didn't receive any response or the response ended unexpectedly
242
+ # In case we didn't receive any response or the stream ended unexpectedly
243
243
  structlogger.error(
244
244
  "a2a_agent.run_streaming_agent.unexpected_end",
245
245
  event_info="Unexpected end of streaming response from A2A server",
@@ -253,7 +253,8 @@ class MCPBaseAgent(AgentProtocol):
253
253
  except ConnectionError as ce:
254
254
  structlogger.warning(
255
255
  "mcp_agent.connect.connection_error",
256
- event_info=f"Connection attempt {attempt} failed: {ce}",
256
+ event_info=f"Connection attempt {attempt} failed.",
257
+ error=str(ce),
257
258
  attempt=attempt,
258
259
  max_retries=self._max_retries,
259
260
  )
@@ -296,7 +297,7 @@ class MCPBaseAgent(AgentProtocol):
296
297
  except Exception as e:
297
298
  event_info = (
298
299
  f"Agent `{self._name}` failed to connect to MCP server - "
299
- f"{server_name} @ {server_config.url}: {e}"
300
+ f"`{server_name}` @ `{server_config.url}`: {e!s}"
300
301
  )
301
302
  structlogger.error(
302
303
  "mcp_agent.connect.failed_to_connect",
@@ -333,7 +334,7 @@ class MCPBaseAgent(AgentProtocol):
333
334
  except Exception as e:
334
335
  structlogger.error(
335
336
  "mcp_agent.disconnect_server.error",
336
- event_info=f"Failed to disconnect from server `{server_name}`: {e}",
337
+ event_info=f"Failed to disconnect from server `{server_name}`: {e!s}",
337
338
  server_name=server_name,
338
339
  agent_name=self._name,
339
340
  agent_id=str(make_agent_identifier(self._name, self.protocol_type)),
@@ -566,8 +567,8 @@ class MCPBaseAgent(AgentProtocol):
566
567
 
567
568
  server_id = self._tool_to_server_mapper[tool_name]
568
569
  connection = self._server_connections[server_id]
569
- session = await connection.ensure_active_session()
570
570
  try:
571
+ session = await connection.ensure_active_session()
571
572
  result = await session.call_tool(tool_name, arguments)
572
573
  return AgentToolResult.from_mcp_tool_result(tool_name, result)
573
574
  except Exception as e:
@@ -577,7 +578,7 @@ class MCPBaseAgent(AgentProtocol):
577
578
  is_error=True,
578
579
  error_message=(
579
580
  f"Failed to execute tool `{tool_name}` via MCP server `{server_id}`"
580
- f"@ {connection.server_url}: {e}"
581
+ f" @ `{connection.server_url}`: {e!s}"
581
582
  ),
582
583
  )
583
584
 
@@ -606,7 +607,7 @@ class MCPBaseAgent(AgentProtocol):
606
607
  tool_name=tool_name,
607
608
  result=None,
608
609
  is_error=True,
609
- error_message=f"Failed to execute built-in tool `{tool_name}`: {e}",
610
+ error_message=f"Failed to execute built-in tool `{tool_name}`: {e!s}",
610
611
  )
611
612
  return await self._execute_mcp_tool(tool_name, arguments)
612
613
 
@@ -98,7 +98,7 @@ class MCPTaskAgent(MCPBaseAgent):
98
98
  for name in re.findall(r"\bslots\.(\w+)", condition)
99
99
  }
100
100
 
101
- slot_names = agent_input.slot_names
101
+ slot_names = [slot.name for slot in agent_input.slots]
102
102
 
103
103
  # Keep only slots that actually exist in agent_input.slots
104
104
  valid_slot_names = [
rasa/agents/utils.py CHANGED
@@ -2,6 +2,7 @@ from typing import List, Optional
2
2
 
3
3
  from rasa.agents.agent_manager import AgentManager
4
4
  from rasa.agents.exceptions import AgentNotFoundException
5
+ from rasa.agents.validation import validate_agent_names_not_conflicting_with_flows
5
6
  from rasa.core.available_agents import (
6
7
  AgentConfig,
7
8
  AgentMCPServerConfig,
@@ -46,6 +47,10 @@ async def initialize_agents(
46
47
  agent_manager: AgentManager = AgentManager()
47
48
  endpoints = AvailableEndpoints.get_instance()
48
49
 
50
+ # Validate agent names don't conflict with flow names
51
+ flow_names = {flow.id for flow in flows.underlying_flows}
52
+ validate_agent_names_not_conflicting_with_flows(sub_agents.agents, flow_names)
53
+
49
54
  for flow in flows.underlying_flows:
50
55
  for step in flow.steps:
51
56
  if isinstance(step, CallFlowStep):
@@ -0,0 +1,484 @@
1
+ """Validation functions for agent configurations with reduced redundancies."""
2
+
3
+ import os
4
+ import urllib.parse
5
+ from collections import Counter
6
+ from typing import Any, Dict, List, NoReturn, Set
7
+
8
+ from pydantic import ValidationError as PydanticValidationError
9
+ from ruamel import yaml
10
+
11
+ from rasa.agents.exceptions import (
12
+ AgentNameFlowConflictException,
13
+ DuplicatedAgentNameException,
14
+ )
15
+ from rasa.core.available_agents import (
16
+ DEFAULT_AGENTS_CONFIG_FOLDER,
17
+ AgentConfig,
18
+ AgentConfiguration,
19
+ AgentConnections,
20
+ AgentInfo,
21
+ ProtocolConfig,
22
+ )
23
+ from rasa.core.available_endpoints import AvailableEndpoints
24
+ from rasa.exceptions import ValidationError
25
+
26
+ # Centralized allowed keys configuration to eliminate duplication
27
+ ALLOWED_KEYS = {
28
+ "agent": {"name", "protocol", "description"},
29
+ "configuration": {
30
+ "llm",
31
+ "prompt_template",
32
+ "module",
33
+ "timeout",
34
+ "max_retries",
35
+ "agent_card",
36
+ },
37
+ "connections": {"mcp_servers"},
38
+ }
39
+
40
+
41
+ def validate_agent_names_unique(agents: List[AgentConfig]) -> None:
42
+ """Validate that agent names are unique across all loaded agents.
43
+
44
+ Args:
45
+ agents: List of agent configurations.
46
+
47
+ Raises:
48
+ DuplicatedAgentNameException: If agent names are not unique.
49
+ """
50
+ agent_names = [agent_config.agent.name for agent_config in agents]
51
+ name_counts = Counter(agent_names)
52
+
53
+ duplicated_names = [name for name, count in name_counts.items() if count > 1]
54
+
55
+ if duplicated_names:
56
+ raise DuplicatedAgentNameException(duplicated_names)
57
+
58
+
59
+ def validate_agent_names_not_conflicting_with_flows(
60
+ agents: Dict[str, AgentConfig], flow_names: Set[str]
61
+ ) -> None:
62
+ """Validate that agent names do not conflict with flow names.
63
+
64
+ Args:
65
+ agents: Dictionary of agent configurations.
66
+ flow_names: Set of flow names to check against.
67
+
68
+ Raises:
69
+ AgentNameFlowConflictException: If agent names conflict with flow names.
70
+ """
71
+ conflicting_names = [
72
+ agent_name for agent_name in agents.keys() if agent_name in flow_names
73
+ ]
74
+
75
+ if conflicting_names:
76
+ raise AgentNameFlowConflictException(conflicting_names)
77
+
78
+
79
+ def _validate_mcp_config(agent_config: AgentConfig) -> None:
80
+ """Validate MCP-specific configuration requirements."""
81
+ agent_name = agent_config.agent.name
82
+
83
+ # Check connections.mcp_servers exists
84
+ if agent_config.connections is None or agent_config.connections.mcp_servers is None:
85
+ raise ValidationError(
86
+ code="agent.validation.mcp.missing_connections",
87
+ event_info=f"For protocol 'MCP', agent '{agent_name}' must have "
88
+ "'connections.mcp_servers' configured.",
89
+ )
90
+
91
+ # Check mcp_servers list is not empty
92
+ if not agent_config.connections.mcp_servers:
93
+ raise ValidationError(
94
+ code="agent.validation.mcp.empty_servers_list",
95
+ event_info=f"For protocol 'MCP', agent '{agent_name}' must have "
96
+ "at least one MCP server configured in 'connections.mcp_servers'.",
97
+ )
98
+
99
+ # Validate each MCP server configuration
100
+ for i, server in enumerate(agent_config.connections.mcp_servers):
101
+ if not server.name:
102
+ raise ValidationError(
103
+ code="agent.validation.mcp.server_missing_name",
104
+ event_info=f"For protocol 'MCP', agent '{agent_name}' MCP server "
105
+ f"at index {i} must have a 'name' field.",
106
+ )
107
+
108
+
109
+ def _validate_a2a_config(agent_config: AgentConfig) -> None:
110
+ """Validate A2A-specific configuration requirements."""
111
+ agent_name = agent_config.agent.name
112
+
113
+ # Check configuration.agent_card exists
114
+ if (
115
+ agent_config.configuration is None
116
+ or agent_config.configuration.agent_card is None
117
+ ):
118
+ raise ValidationError(
119
+ code="agent.validation.a2a.missing_agent_card",
120
+ event_info=f"For protocol 'A2A', agent '{agent_name}' must have "
121
+ "'configuration.agent_card' specified.",
122
+ )
123
+
124
+ # Validate agent_card path or URL
125
+ agent_card = agent_config.configuration.agent_card
126
+ if not agent_card:
127
+ raise ValidationError(
128
+ code="agent.validation.a2a.empty_agent_card",
129
+ event_info=f"Agent '{agent_name}' has empty 'agent_card' value",
130
+ )
131
+
132
+ # Check if it's a URL
133
+ parsed_url = urllib.parse.urlparse(agent_card)
134
+ if parsed_url.scheme and parsed_url.netloc:
135
+ # It's a URL, validate format
136
+ if parsed_url.scheme not in ["http", "https"]:
137
+ raise ValidationError(
138
+ code="agent.validation.a2a.invalid_agent_card_url",
139
+ event_info=f"Agent '{agent_name}' has invalid URL scheme "
140
+ f"'{parsed_url.scheme}' for 'agent_card'",
141
+ )
142
+ else:
143
+ # It's a file path, check if it exists
144
+ if not os.path.exists(agent_card):
145
+ raise ValidationError(
146
+ code="agent.validation.a2a.agent_card_file_not_found",
147
+ event_info=f"Agent '{agent_name}' has 'agent_card' file that doesn't "
148
+ f"exist: {agent_card}",
149
+ )
150
+
151
+
152
+ def _validate_optional_keys(agent_config: AgentConfig) -> None:
153
+ """Validate optional keys in agent configuration."""
154
+ agent_name = agent_config.agent.name
155
+
156
+ # Validate prompt_template if present
157
+ if agent_config.configuration and agent_config.configuration.prompt_template:
158
+ prompt_path = agent_config.configuration.prompt_template
159
+ if not os.path.exists(prompt_path):
160
+ raise ValidationError(
161
+ code="agent.validation.optional.prompt_template_not_found",
162
+ event_info=f"Agent '{agent_name}' has prompt template that "
163
+ f"does not exist: {prompt_path}",
164
+ )
165
+
166
+ # Validate module if present
167
+ if agent_config.configuration and agent_config.configuration.module:
168
+ import importlib
169
+
170
+ module_name = agent_config.configuration.module
171
+ try:
172
+ module_path, class_name = module_name.rsplit(".", 1)
173
+ getattr(importlib.import_module(module_path), class_name)
174
+ except (ImportError, AttributeError) as e:
175
+ raise ValidationError(
176
+ code="agent.validation.optional.module_not_found",
177
+ event_info=f"Agent '{agent_name}' has module '{module_name}' "
178
+ f"that could not be imported: {e}",
179
+ )
180
+
181
+
182
+ def _validate_llm_references(
183
+ llm_config: Dict[str, Any],
184
+ endpoints: "AvailableEndpoints",
185
+ agent_name: str,
186
+ ) -> None:
187
+ """Validate LLM configuration references against endpoints."""
188
+ if "model_group" in llm_config:
189
+ from rasa.engine.validation import (
190
+ _validate_component_model_client_config_has_references_to_endpoints,
191
+ )
192
+
193
+ component_config = {"llm": llm_config}
194
+ _validate_component_model_client_config_has_references_to_endpoints(
195
+ component_config, "llm", component_name=agent_name
196
+ )
197
+
198
+
199
+ def _validate_mcp_server_references(
200
+ mcp_servers: list, endpoints: "AvailableEndpoints", agent_name: str
201
+ ) -> None:
202
+ """Validate MCP server references against endpoints."""
203
+ if not endpoints.mcp_servers:
204
+ raise ValidationError(
205
+ code="agent.validation.endpoints.no_mcp_servers",
206
+ event_info=(
207
+ f"Agent '{agent_name}' references MCP servers but no MCP "
208
+ "servers are defined in endpoints.yml."
209
+ ),
210
+ )
211
+
212
+ available_mcp_server_names = [server.name for server in endpoints.mcp_servers]
213
+
214
+ for i, mcp_server in enumerate(mcp_servers):
215
+ server_name = mcp_server.name
216
+ if server_name not in available_mcp_server_names:
217
+ raise ValidationError(
218
+ code="agent.validation.endpoints.invalid_mcp_server",
219
+ event_info=(
220
+ f"MCP server '{server_name}' at index {i} for Agent "
221
+ f"'{agent_name}' does not exist in endpoints.yml. Available MCP "
222
+ f"servers: {', '.join(available_mcp_server_names)}"
223
+ ),
224
+ )
225
+
226
+
227
+ def _handle_pydantic_validation_error(
228
+ error: PydanticValidationError, agent_name: str
229
+ ) -> NoReturn:
230
+ """Handle specific Pydantic validation errors that are actually possible.
231
+
232
+ Args:
233
+ error: The Pydantic validation error to handle
234
+ agent_name: Name of the agent for error messages
235
+ """
236
+ missing_fields = []
237
+ invalid_protocol = False
238
+ type_error = None
239
+
240
+ for pydantic_error in error.errors():
241
+ error_type = pydantic_error["type"]
242
+ field_path = ".".join(str(loc) for loc in pydantic_error["loc"])
243
+
244
+ if error_type == "missing":
245
+ for field in ["name", "protocol", "description"]:
246
+ if field in field_path:
247
+ missing_fields.append(field)
248
+ elif error_type == "enum" and "protocol" in field_path:
249
+ invalid_protocol = True
250
+ elif error_type in ["string_type", "int_parsing"]:
251
+ type_error = (field_path, pydantic_error["msg"])
252
+
253
+ # Handle missing required fields
254
+ if missing_fields:
255
+ raise ValidationError(
256
+ code="agent.validation.mandatory.fields_missing",
257
+ event_info=(
258
+ f"Agent '{agent_name}' is missing required fields "
259
+ f"in agent section: {', '.join(missing_fields)}"
260
+ ),
261
+ )
262
+
263
+ # Handle invalid protocol
264
+ elif invalid_protocol:
265
+ raise ValidationError(
266
+ code="agent.validation.pydantic.invalid_protocol",
267
+ event_info=(
268
+ f"Agent '{agent_name}' has invalid protocol value. "
269
+ "Supported protocols: MCP, A2A"
270
+ ),
271
+ )
272
+
273
+ # Handle type errors
274
+ elif type_error:
275
+ field, msg = type_error
276
+ raise ValidationError(
277
+ code="agent.validation.pydantic.type_error",
278
+ event_info=(
279
+ f"Agent '{agent_name}' has invalid type for field " f"'{field}': {msg}"
280
+ ),
281
+ )
282
+
283
+ # Handle other Pydantic validation errors
284
+ else:
285
+ raise ValidationError(
286
+ code="agent.validation.pydantic.failed",
287
+ event_info=f"Agent '{agent_name}' validation failed: {error}",
288
+ )
289
+
290
+
291
+ def _validate_endpoint_references(agent_config: AgentConfig) -> None:
292
+ """Validate that LLM and MCP server references in agent config are valid."""
293
+ agent_name = agent_config.agent.name
294
+
295
+ # Get available endpoints
296
+ endpoints = AvailableEndpoints.get_instance()
297
+
298
+ # Validate LLM configuration references
299
+ if agent_config.configuration and agent_config.configuration.llm:
300
+ _validate_llm_references(agent_config.configuration.llm, endpoints, agent_name)
301
+
302
+ # Validate MCP server references
303
+ if agent_config.connections and agent_config.connections.mcp_servers:
304
+ _validate_mcp_server_references(
305
+ agent_config.connections.mcp_servers, endpoints, agent_name
306
+ )
307
+
308
+
309
+ def _validate_section_keys(
310
+ data: Dict[str, Any], section: str, allowed_keys: set
311
+ ) -> None:
312
+ """Generic function to validate keys in a specific section."""
313
+ if section not in data:
314
+ return
315
+
316
+ section_data = data[section]
317
+ if not isinstance(section_data, dict):
318
+ return
319
+
320
+ additional_keys = set(section_data.keys()) - allowed_keys
321
+ if additional_keys:
322
+ agent_name = data.get("agent", {}).get("name", "unknown")
323
+ raise ValidationError(
324
+ code=f"agent.validation.structure.additional_{section}_keys",
325
+ event_info=(
326
+ f"Agent '{agent_name}' contains additional keys in "
327
+ f"'{section}' section: {', '.join(sorted(additional_keys))}"
328
+ ),
329
+ )
330
+
331
+
332
+ def _validate_mandatory_fields(data: Dict[str, Any], agent_name: str) -> None:
333
+ """Validate that all mandatory fields are present in the agent section."""
334
+ if "agent" not in data:
335
+ raise ValidationError(
336
+ code="agent.validation.mandatory.agent_section_missing",
337
+ event_info=f"Agent '{agent_name}' is missing 'agent' section",
338
+ )
339
+
340
+ agent_data = data["agent"]
341
+ if not isinstance(agent_data, dict):
342
+ raise ValidationError(
343
+ code="agent.validation.mandatory.agent_section_invalid",
344
+ event_info=(
345
+ f"Agent '{agent_name}' has invalid 'agent' section - "
346
+ "must be a dictionary"
347
+ ),
348
+ )
349
+
350
+ # Check for required fields
351
+ missing_fields = []
352
+ for field in ["name", "protocol", "description"]:
353
+ if field not in agent_data or not agent_data[field]:
354
+ missing_fields.append(field)
355
+
356
+ if missing_fields:
357
+ raise ValidationError(
358
+ code="agent.validation.mandatory.fields_missing",
359
+ event_info=(
360
+ f"Agent '{agent_name}' is missing required fields in agent section: "
361
+ f"{', '.join(missing_fields)}"
362
+ ),
363
+ )
364
+
365
+
366
+ def _validate_no_additional_keys_raw_data(data: Dict[str, Any]) -> None:
367
+ """Validate that no additional, unexpected keys are present in the raw data."""
368
+ # Use the generic validation function for each section
369
+ _validate_section_keys(data, "agent", ALLOWED_KEYS["agent"])
370
+ _validate_section_keys(data, "configuration", ALLOWED_KEYS["configuration"])
371
+ _validate_section_keys(data, "connections", ALLOWED_KEYS["connections"])
372
+
373
+
374
+ def _validate_folder_structure(agent_folder: str) -> None:
375
+ """Validate agent folder structure."""
376
+ if not os.path.exists(agent_folder):
377
+ raise ValidationError(
378
+ code="agent.validation.folder.not_found",
379
+ event_info=f"Agent folder does not exist: {agent_folder}",
380
+ )
381
+
382
+ if not os.path.isdir(agent_folder):
383
+ raise ValidationError(
384
+ code="agent.validation.folder.not_directory",
385
+ event_info=f"Agent folder is not a directory: {agent_folder}",
386
+ )
387
+
388
+
389
+ def _validate_config_file_exists(config_path: str, agent_name: str) -> None:
390
+ """Validate config.yml file exists."""
391
+ if not os.path.isfile(config_path):
392
+ raise ValidationError(
393
+ code="agent.validation.folder.missing_config",
394
+ event_info=f"Agent '{agent_name}' is missing 'config.yml' file",
395
+ )
396
+
397
+
398
+ def validate_agent_config(agent_config: AgentConfig) -> None:
399
+ """Validate an agent configuration using all applicable validators."""
400
+ protocol = agent_config.agent.protocol
401
+
402
+ # Run protocol-specific validation
403
+ if protocol == ProtocolConfig.MCP:
404
+ _validate_mcp_config(agent_config)
405
+ elif protocol == ProtocolConfig.A2A:
406
+ _validate_a2a_config(agent_config)
407
+
408
+ # Run optional keys validation
409
+ _validate_optional_keys(agent_config)
410
+
411
+ # Run endpoint references validation
412
+ _validate_endpoint_references(agent_config)
413
+
414
+
415
+ def validate_agent_folder(agent_folder: str = DEFAULT_AGENTS_CONFIG_FOLDER) -> None:
416
+ """Validate all agent configurations in a folder."""
417
+ # Validate folder structure
418
+ _validate_folder_structure(agent_folder)
419
+
420
+ # Scan for agent folders
421
+ for agent_folder_name in os.listdir(agent_folder):
422
+ agent_path = os.path.join(agent_folder, agent_folder_name)
423
+
424
+ if not os.path.isdir(agent_path):
425
+ continue
426
+
427
+ config_path = os.path.join(agent_path, "config.yml")
428
+
429
+ # Validate config file exists
430
+ _validate_config_file_exists(config_path, agent_folder_name)
431
+
432
+ # Read and validate the config content
433
+ try:
434
+ # First read the raw YAML data to validate structure
435
+ with open(config_path, "r") as f:
436
+ data = yaml.safe_load(f)
437
+
438
+ # Validate no additional keys
439
+ _validate_no_additional_keys_raw_data(data)
440
+
441
+ # Validate mandatory fields before creating Pydantic models
442
+ _validate_mandatory_fields(data, agent_folder_name)
443
+
444
+ # Create the agent config using AvailableAgents
445
+ from rasa.core.available_agents import AvailableAgents
446
+
447
+ agent_config = AvailableAgents._read_agent_config(config_path)
448
+
449
+ # Validate the agent config (protocol-specific and endpoint references)
450
+ validate_agent_config(agent_config)
451
+ except PydanticValidationError as e:
452
+ _handle_pydantic_validation_error(e, agent_folder_name)
453
+ except Exception as e:
454
+ # Handle non-Pydantic exceptions
455
+ raise ValidationError(
456
+ code="agent.validation.folder.config_validation_failed",
457
+ event_info=f"Agent '{agent_folder_name}' validation failed: {e}",
458
+ )
459
+
460
+
461
+ def validate_agent_config_data(data: Dict[str, Any]) -> "AgentConfig":
462
+ """Validate agent configuration data."""
463
+ try:
464
+ # Validate no additional keys before creating Pydantic models
465
+ _validate_no_additional_keys_raw_data(data)
466
+
467
+ # Create the agent config (this will trigger Pydantic validation)
468
+ agent_config = AgentConfig(
469
+ agent=AgentInfo(**data.get("agent", {})),
470
+ configuration=AgentConfiguration(**data.get("configuration", {}))
471
+ if data.get("configuration")
472
+ else None,
473
+ connections=AgentConnections(**data.get("connections", {}))
474
+ if data.get("connections")
475
+ else None,
476
+ )
477
+
478
+ return agent_config
479
+
480
+ except PydanticValidationError as e:
481
+ _handle_pydantic_validation_error(e, "Agent configuration")
482
+ except Exception:
483
+ # Re-raise other exceptions
484
+ raise
rasa/api.py CHANGED
@@ -71,22 +71,23 @@ def run(
71
71
 
72
72
 
73
73
  def train(
74
- domain: Text,
75
- config: Text,
76
- training_files: "Union[Text, List[Text]]",
77
- output: Text = rasa.shared.constants.DEFAULT_MODELS_PATH,
74
+ domain: str,
75
+ config: str,
76
+ training_files: "Union[str, List[str]]",
77
+ output: str = rasa.shared.constants.DEFAULT_MODELS_PATH,
78
78
  dry_run: bool = False,
79
79
  force_training: bool = False,
80
- fixed_model_name: Optional[Text] = None,
80
+ fixed_model_name: Optional[str] = None,
81
81
  persist_nlu_training_data: bool = False,
82
82
  core_additional_arguments: Optional[Dict] = None,
83
83
  nlu_additional_arguments: Optional[Dict] = None,
84
- model_to_finetune: Optional[Text] = None,
84
+ model_to_finetune: Optional[str] = None,
85
85
  finetuning_epoch_fraction: float = 1.0,
86
86
  remote_storage: Optional[StorageType] = None,
87
87
  file_importer: Optional["TrainingDataImporter"] = None,
88
88
  keep_local_model_copy: bool = False,
89
89
  remote_root_only: bool = False,
90
+ sub_agents: Optional[str] = None,
90
91
  ) -> "TrainingResult":
91
92
  """Runs Rasa Core and NLU training in `async` loop.
92
93
 
@@ -116,6 +117,7 @@ def train(
116
117
  remote storage is configured.
117
118
  remote_root_only: If `True`, the model will be stored in the root of the
118
119
  remote model storage.
120
+ sub_agents: Path to sub-agents directory.
119
121
 
120
122
  Returns:
121
123
  An instance of `TrainingResult`.
@@ -140,6 +142,7 @@ def train(
140
142
  file_importer=file_importer,
141
143
  keep_local_model_copy=keep_local_model_copy,
142
144
  remote_root_only=remote_root_only,
145
+ sub_agents=sub_agents,
143
146
  )
144
147
  )
145
148
 
@@ -10,6 +10,7 @@ from rasa.cli.arguments.default_arguments import (
10
10
  add_remote_root_only_param,
11
11
  add_remote_storage_param,
12
12
  add_stories_param,
13
+ add_sub_agents_param,
13
14
  )
14
15
  from rasa.graph_components.providers.training_tracker_provider import (
15
16
  TrainingTrackerProvider,
@@ -43,6 +44,7 @@ def set_train_arguments(parser: argparse.ArgumentParser) -> None:
43
44
  )
44
45
  add_remote_storage_param(parser)
45
46
  add_remote_root_only_param(parser)
47
+ add_sub_agents_param(parser)
46
48
 
47
49
 
48
50
  def set_train_core_arguments(parser: argparse.ArgumentParser) -> None: