HTTP Proxy provides unified API to different chat completion and embedding models, assistants and applications. Written in Java 17 and built on top of Eclipse Vert.x.
Build the project with Gradle and Java 17:
./gradlew build
Run the project with Gradle:
./gradlew run
Or run com.epam.aidial.core.AIDial class from your favorite IDE.
Static settings are used on startup and cannot be changed while application is running. Priority order:
- Environment variables with extra "aidial." prefix. E.g. "aidial.server.port", "aidial.config.files".
- File specified in "AIDIAL_SETTINGS" environment variable.
- Default resource file: src/main/resources/aidial.settings.json.
Setting | Default | Description |
---|---|---|
config.files | aidial.config.json | Config files with parts of the whole config. |
config.reload | 60000 | Config reload interval in milliseconds. |
identityProviders | - | Map of identity providers. Note. At least one identity provider must be provided. |
identityProviders.*.jwksUrl | - | Url to jwks provider. Required if disabledVerifyJwt is set to false |
identityProviders.*.rolePath | - | Path to the claim user roles in JWT token, e.g. resource_access.chatbot-ui.roles or just roles . Required. |
identityProviders.*.loggingKey | - | User information to search in claims of JWT token. |
identityProviders.*.loggingSalt | - | Salt to hash user information for logging. |
identityProviders.*.cacheSize | 10 | How many JWT tokens to cache. |
identityProviders.*.cacheExpiration | 10 | How long to retain JWT token in cache. |
identityProviders.*.cacheExpirationUnit | MINUTES | Unit of cache expiration. |
identityProviders.*.issuerPattern | - | Regexp to match the claim "iss" to identity provider |
identityProviders.*.disableJwtVerification | false | The flag disables JWT verification |
vertx.* | - | Vertx settings. |
server.* | - | Vertx HTTP server settings for incoming requests. |
client.* | - | Vertx HTTP client settings for outbound requests. |
storage.provider | - | Specifies blob storage provider. Supported providers: s3, aws-s3, azureblob, google-cloud-storage, filesystem |
storage.endpoint | - | Optional. Specifies endpoint url for s3 compatible storages |
storage.identity | - | Blob storage access key. Can be optional for filesystem, aws-s3, google-cloud-storage providers |
storage.credential | - | Blob storage secret key. Can be optional for filesystem, aws-s3, google-cloud-storage providers |
storage.bucket | - | Blob storage bucket |
storage.overrides.* | - | Key-value pairs to override storage settings |
storage.createBucket | false | Indicates whether bucket should be created on start-up |
storage.prefix | - | Base prefix for all stored resources. Must not contain path separators or any invalid chars |
encryption.password | - | Password used for AES encryption |
encryption.salt | - | Salt used for AES encryption |
resources.maxSize | 1048576 | Max allowed size in bytes for a resource |
resources.syncPeriod | 60000 | Period in milliseconds, how frequently check for resources to sync |
resources.syncDelay | 120000 | Delay in milliseconds for a resource to be written back in object storage after last modification |
resources.syncBatch | 4096 | How many resources to sync in one go |
resources.cacheExpiration | 300000 | Expiration in milliseconds for synced resources in Redis |
resources.compressionMinSize | 256 | Compress a resource with gzip if its size in bytes more or equal to this value |
redis.singleServerConfig.address | - | Redis single server addresses, e.g. "redis://host:port" |
redis.clusterServersConfig.nodeAddresses | - | Json array with Redis cluster server addresses, e.g. ["redis://host1:port1","redis://host2:port2"] |
invitations.ttlInSeconds | 259200 | Invitation time to live in seconds |
access.admin.rules | - | Matches claims from identity providers with the rules to figure out whether a user is allowed to perform admin actions, like deleting any resource or approving a publication. Example: [{"source": "roles", "function": "EQUAL", "targets": ["admin"]}]. If roles contain "admin, the actions are allowed. |
There are two types of credential providers supported:
- User credentials. You can create a service account and authenticate using its private key obtained from Developer console
- Temporary credentials. Application default credentials (ADC)
You should set storage.credential
to a path to the private key JSON file and storage.identity
must be unset.
See example below:
{
"type": "service_account",
"project_id": "<your_project_id>",
"private_key_id": "<your_project_key_id>",
"private_key": "-----BEGIN PRIVATE KEY-----\n<your_private_key>\n-----END PRIVATE KEY-----\n",
"client_email": "gcp-dial-core@<your_project_id>.iam.gserviceaccount.com",
"client_id": "<client_id>",
"auth_uri": "https://accounts.google.com/o/oauth2/auth",
"token_uri": "https://oauth2.googleapis.com/token",
"auth_provider_x509_cert_url": "https://www.googleapis.com/oauth2/v1/certs",
"client_x509_cert_url": "https://www.googleapis.com/robot/v1/metadata/x509/gcp-dial-core.iam.gserviceaccount.com",
"universe_domain": "googleapis.com"
}
Otherwise storage.credential
is a private key in PEM format and storage.identity
is a client email address.
You should follow instructions to setup your pod in GKE.
storage.credential
and storage.identity
must be unset.
JClouds property jclouds.oauth.credential-type
should be set bearerTokenCredentials
, e.g.
{
"storage": {
"overrides": {
"jclouds.oauth.credential-type": "bearerTokenCredentials"
}
}
}
There are two types of credential providers supported:
- User credentials. You can create a service principle and authenticate using its secret from Azure console
- Temporary credentials with Azure AD Workload Identity
You should set storage.credential
to service principle secret and storage.identity
- service principle ID.
You should follow instructions to setup your pod in Azure k8s.
storage.credential
and storage.identity
must be unset.
The properties to be overridden are below:
{
"storage": {
"endpoint": "https://<Azure Blob storage account>.blob.core.windows.net"
"overrides": {
"jclouds.azureblob.auth": "azureAd",
"jclouds.oauth.credential-type": "bearerTokenCredentials"
}
}
}
The Redis can be used as a cache with volatile-* eviction policies:
maxmemory 4G
maxmemory-policy volatile-lfu
Note: Redis will be strictly required in the upcoming releases 0.8+.
Dynamic settings are stored in JSON files, specified via "config.files" static setting, and reloaded at interval, specified via "config.reload" static setting. Dynamic settings include:
- Models
- Assistant
- Applications
- Access Keys
- Access Permissions
- Rate Limits
Parameter | Description |
---|---|
routes | Path(s) for specific upstream routing or to respond with a configured body. |
applications | A list of deployed AI DIAL Applications and their parameters:<application_name> : Unique application name. |
applications.<application_name> | endpoint : AI DIAL Application API for chat completions.iconUrl : Icon path for the AI DIAL Application on UI.description : Brief AI DIAL Application description.displayName : AI DIAL Application name on UI.inputAttachmentTypes : A list of allowed MIME types for the input attachments.maxInputAttachments : Maximum number of input attachments (default is zero when inputAttachmentTypes is unset, otherwise, infinity) |
models | A list of deployed models and their parameters:<model_name> : Unique model name. |
models.<model_name> | type : Model type—chat or embedding .iconUrl : Icon path for the model on UI.description : Brief model description.displayName : Model name on UI.displayVersion : Model version on UI.endpoint : Model API for chat completions or embeddings.tokenizerModel : Identifies the specific model whose tokenization algorithm exactly matches that of the referenced model. This is typically the name of the earliest-released model in a series of models sharing an identical tokenization algorithm (e.g. gpt-3.5-turbo-0301 , gpt-4-0314 , or gpt-4-1106-vision-preview ). This parameter is essential for DIAL clients that reimplement tokenization algorithms on their side, instead of utilizing the tokenizeEndpoint provided by the model.features : Model features.limits : Model token limits.pricing : Model pricing.upstreams : Used for load-balancing—request is sent to model endpoint containing X-UPSTREAM-ENDPOINT and X-UPSTREAM-KEY headers. |
models.<model_name>.limits | maxPromptTokens : maximum number of tokens in a completion request.maxCompletionTokens : maximum number of tokens in a completion response.maxTotalTokens : maximum number of tokens in completion request and response combined.Typically either maxTotalTokens is specified or maxPromptTokens and maxCompletionTokens . |
models.<model_name>.pricing | unit : the pricing units (currently token and char_without_whitespace are supported).prompt : per-unit price for the completion request in USD.completion : per-unit price for the completion response in USD. |
models.<model_name>.features | rateEndpoint : endpoint for rate requests (exposed by core as <deployment name>/rate ).tokenizeEndpoint : endpoint for requests to the model tokenizer (exposed by core as <deployment name>/tokenize ).truncatePromptEndpoint : endpoint for truncating prompt requests (exposed by core as <deployment name>/truncate_prompt ).systemPromptSupported : does the model support system prompt (default is true ).toolsSupported : does the model support tools (default is false ).seedSupported : does the model support seed request parameter (default is false ).urlAttachmentsSupported : does the model/application support attachments with URLs (default is false ).folderAttachmentsSupported : does the model/application support folder attachments (default is false ) |
models.<model_name>.upstreams | endpoint : Model endpoint.key : Your API key. |
keys | API Keys parameters:<core_key> : Your API key. |
keys.<core_key> | project : Project name assigned to this key.role : A configured role name that defines key permissions. |
roles | API key roles <role_name> with associated limits. Each API key has one role defined in the list of roles. Roles are associated with models, applications, assistants, and defined limits. |
roles.<role_name> | limits : Limits for models, applications, or assistants. |
roles.<role_name>.limits | minute : Total tokens per minute limit sent to the model, managed via floating window approach for well-distributed rate limiting.day : Total tokens per day limit sent to the model, managed via floating window approach for balanced rate limiting. |
Copyright (C) 2023 EPAM Systems
Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.