mirror of
https://github.com/googleapis/genai-toolbox.git
synced 2026-01-09 15:38:08 -05:00
## Description Add support for healthcare source, tool and prebuilt config. This branch consist of all previously approved PRs. 🛠️ Fixes #1648 --------- Co-authored-by: Marwan Tammam <15021613+Quarz0@users.noreply.github.com>
177 lines
5.4 KiB
Go
177 lines
5.4 KiB
Go
// Copyright 2025 Google LLC
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package getfhirstore
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
|
|
"github.com/goccy/go-yaml"
|
|
"github.com/googleapis/genai-toolbox/internal/sources"
|
|
healthcareds "github.com/googleapis/genai-toolbox/internal/sources/cloudhealthcare"
|
|
"github.com/googleapis/genai-toolbox/internal/tools"
|
|
"github.com/googleapis/genai-toolbox/internal/tools/cloudhealthcare/common"
|
|
"google.golang.org/api/healthcare/v1"
|
|
)
|
|
|
|
const kind string = "cloud-healthcare-get-fhir-store"
|
|
|
|
func init() {
|
|
if !tools.Register(kind, newConfig) {
|
|
panic(fmt.Sprintf("tool kind %q already registered", kind))
|
|
}
|
|
}
|
|
|
|
func newConfig(ctx context.Context, name string, decoder *yaml.Decoder) (tools.ToolConfig, error) {
|
|
actual := Config{Name: name}
|
|
if err := decoder.DecodeContext(ctx, &actual); err != nil {
|
|
return nil, err
|
|
}
|
|
return actual, nil
|
|
}
|
|
|
|
type compatibleSource interface {
|
|
Project() string
|
|
Region() string
|
|
DatasetID() string
|
|
AllowedFHIRStores() map[string]struct{}
|
|
Service() *healthcare.Service
|
|
ServiceCreator() healthcareds.HealthcareServiceCreator
|
|
UseClientAuthorization() bool
|
|
}
|
|
|
|
// validate compatible sources are still compatible
|
|
var _ compatibleSource = &healthcareds.Source{}
|
|
|
|
var compatibleSources = [...]string{healthcareds.SourceKind}
|
|
|
|
type Config struct {
|
|
Name string `yaml:"name" validate:"required"`
|
|
Kind string `yaml:"kind" validate:"required"`
|
|
Source string `yaml:"source" validate:"required"`
|
|
Description string `yaml:"description" validate:"required"`
|
|
AuthRequired []string `yaml:"authRequired"`
|
|
}
|
|
|
|
// validate interface
|
|
var _ tools.ToolConfig = Config{}
|
|
|
|
func (cfg Config) ToolConfigKind() string {
|
|
return kind
|
|
}
|
|
|
|
func (cfg Config) Initialize(srcs map[string]sources.Source) (tools.Tool, error) {
|
|
// verify source exists
|
|
rawS, ok := srcs[cfg.Source]
|
|
if !ok {
|
|
return nil, fmt.Errorf("no source named %q configured", cfg.Source)
|
|
}
|
|
|
|
// verify the source is compatible
|
|
s, ok := rawS.(compatibleSource)
|
|
if !ok {
|
|
return nil, fmt.Errorf("invalid source for %q tool: source kind must be one of %q", kind, compatibleSources)
|
|
}
|
|
|
|
parameters := tools.Parameters{}
|
|
if len(s.AllowedFHIRStores()) != 1 {
|
|
parameters = append(parameters, tools.NewStringParameter(common.StoreKey, "The FHIR store ID to get details for."))
|
|
}
|
|
mcpManifest := tools.GetMcpManifest(cfg.Name, cfg.Description, cfg.AuthRequired, parameters)
|
|
|
|
// finish tool setup
|
|
t := Tool{
|
|
Name: cfg.Name,
|
|
Kind: kind,
|
|
Parameters: parameters,
|
|
AuthRequired: cfg.AuthRequired,
|
|
Project: s.Project(),
|
|
Region: s.Region(),
|
|
Dataset: s.DatasetID(),
|
|
AllowedStores: s.AllowedFHIRStores(),
|
|
UseClientOAuth: s.UseClientAuthorization(),
|
|
ServiceCreator: s.ServiceCreator(),
|
|
Service: s.Service(),
|
|
manifest: tools.Manifest{Description: cfg.Description, Parameters: parameters.Manifest(), AuthRequired: cfg.AuthRequired},
|
|
mcpManifest: mcpManifest,
|
|
}
|
|
return t, nil
|
|
}
|
|
|
|
// validate interface
|
|
var _ tools.Tool = Tool{}
|
|
|
|
type Tool struct {
|
|
Name string `yaml:"name"`
|
|
Kind string `yaml:"kind"`
|
|
AuthRequired []string `yaml:"authRequired"`
|
|
UseClientOAuth bool `yaml:"useClientOAuth"`
|
|
Parameters tools.Parameters `yaml:"parameters"`
|
|
|
|
Project, Region, Dataset string
|
|
AllowedStores map[string]struct{}
|
|
Service *healthcare.Service
|
|
ServiceCreator healthcareds.HealthcareServiceCreator
|
|
manifest tools.Manifest
|
|
mcpManifest tools.McpManifest
|
|
}
|
|
|
|
func (t Tool) Invoke(ctx context.Context, params tools.ParamValues, accessToken tools.AccessToken) (any, error) {
|
|
storeID, err := common.ValidateAndFetchStoreID(params, t.AllowedStores)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
svc := t.Service
|
|
// Initialize new service if using user OAuth token
|
|
if t.UseClientOAuth {
|
|
tokenStr, err := accessToken.ParseBearerToken()
|
|
if err != nil {
|
|
return nil, fmt.Errorf("error parsing access token: %w", err)
|
|
}
|
|
svc, err = t.ServiceCreator(tokenStr)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("error creating service from OAuth access token: %w", err)
|
|
}
|
|
}
|
|
|
|
storeName := fmt.Sprintf("projects/%s/locations/%s/datasets/%s/fhirStores/%s", t.Project, t.Region, t.Dataset, storeID)
|
|
store, err := svc.Projects.Locations.Datasets.FhirStores.Get(storeName).Do()
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to get FHIR store %q: %w", storeName, err)
|
|
}
|
|
return store, nil
|
|
}
|
|
|
|
func (t Tool) ParseParams(data map[string]any, claims map[string]map[string]any) (tools.ParamValues, error) {
|
|
return tools.ParseParams(t.Parameters, data, claims)
|
|
}
|
|
|
|
func (t Tool) Manifest() tools.Manifest {
|
|
return t.manifest
|
|
}
|
|
|
|
func (t Tool) McpManifest() tools.McpManifest {
|
|
return t.mcpManifest
|
|
}
|
|
|
|
func (t Tool) Authorized(verifiedAuthServices []string) bool {
|
|
return tools.IsAuthorized(t.AuthRequired, verifiedAuthServices)
|
|
}
|
|
|
|
func (t Tool) RequiresClientAuthorization() bool {
|
|
return t.UseClientOAuth
|
|
}
|