mirror of
https://github.com/googleapis/genai-toolbox.git
synced 2026-02-10 23:25:17 -05:00
## Description This PR introduces a new skills-generate command that enables users to generate standardized agent skills from their existing Toolbox tool configurations. This facilitates the integration of Toolbox tools into agentic workflows by automatically creating skill descriptions (SKILL.md) and executable wrappers. - New Subcommand: Implemented skills-generate, which automates the creation of agent skill packages including metadata and executable scripts. - Skill Generation: Added logic to generate SKILL.md files with parameter schemas and Node.js wrappers for cross-platform tool execution. - Toolset Integration: Supports selective generation of skills based on defined toolsets, including support for both local files and prebuilt configurations. - Testing: Added unit tests for the generation logic and integration tests for the CLI command. - Documentation: Created a new "how-to" guide for generating skills and updated the CLI reference documentation.
160 lines
4.4 KiB
Go
160 lines
4.4 KiB
Go
// Copyright 2026 Google LLC
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package server
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
|
|
"github.com/googleapis/genai-toolbox/internal/embeddingmodels"
|
|
"github.com/googleapis/genai-toolbox/internal/prompts"
|
|
"github.com/googleapis/genai-toolbox/internal/tools"
|
|
"github.com/googleapis/genai-toolbox/internal/util/parameters"
|
|
)
|
|
|
|
// MockTool is used to mock tools in tests
|
|
type MockTool struct {
|
|
Name string
|
|
Description string
|
|
Params []parameters.Parameter
|
|
manifest tools.Manifest
|
|
unauthorized bool
|
|
requiresClientAuthrorization bool
|
|
}
|
|
|
|
func (t MockTool) Invoke(context.Context, tools.SourceProvider, parameters.ParamValues, tools.AccessToken) (any, error) {
|
|
mock := []any{t.Name}
|
|
return mock, nil
|
|
}
|
|
|
|
func (t MockTool) ToConfig() tools.ToolConfig {
|
|
return nil
|
|
}
|
|
|
|
// claims is a map of user info decoded from an auth token
|
|
func (t MockTool) ParseParams(data map[string]any, claimsMap map[string]map[string]any) (parameters.ParamValues, error) {
|
|
return parameters.ParseParams(t.Params, data, claimsMap)
|
|
}
|
|
|
|
func (t MockTool) EmbedParams(ctx context.Context, paramValues parameters.ParamValues, embeddingModelsMap map[string]embeddingmodels.EmbeddingModel) (parameters.ParamValues, error) {
|
|
return parameters.EmbedParams(ctx, t.Params, paramValues, embeddingModelsMap, nil)
|
|
}
|
|
|
|
func (t MockTool) Manifest() tools.Manifest {
|
|
pMs := make([]parameters.ParameterManifest, 0, len(t.Params))
|
|
for _, p := range t.Params {
|
|
pMs = append(pMs, p.Manifest())
|
|
}
|
|
return tools.Manifest{Description: t.Description, Parameters: pMs}
|
|
}
|
|
|
|
func (t MockTool) Authorized(verifiedAuthServices []string) bool {
|
|
// defaulted to true
|
|
return !t.unauthorized
|
|
}
|
|
|
|
func (t MockTool) RequiresClientAuthorization(tools.SourceProvider) (bool, error) {
|
|
// defaulted to false
|
|
return t.requiresClientAuthrorization, nil
|
|
}
|
|
|
|
func (t MockTool) GetParameters() parameters.Parameters {
|
|
return t.Params
|
|
}
|
|
|
|
func (t MockTool) McpManifest() tools.McpManifest {
|
|
properties := make(map[string]parameters.ParameterMcpManifest)
|
|
required := make([]string, 0)
|
|
authParams := make(map[string][]string)
|
|
|
|
for _, p := range t.Params {
|
|
name := p.GetName()
|
|
paramManifest, authParamList := p.McpManifest()
|
|
properties[name] = paramManifest
|
|
required = append(required, name)
|
|
|
|
if len(authParamList) > 0 {
|
|
authParams[name] = authParamList
|
|
}
|
|
}
|
|
|
|
toolsSchema := parameters.McpToolsSchema{
|
|
Type: "object",
|
|
Properties: properties,
|
|
Required: required,
|
|
}
|
|
|
|
mcpManifest := tools.McpManifest{
|
|
Name: t.Name,
|
|
Description: t.Description,
|
|
InputSchema: toolsSchema,
|
|
}
|
|
|
|
if len(authParams) > 0 {
|
|
mcpManifest.Metadata = map[string]any{
|
|
"toolbox/authParams": authParams,
|
|
}
|
|
}
|
|
|
|
return mcpManifest
|
|
}
|
|
|
|
func (t MockTool) GetAuthTokenHeaderName(tools.SourceProvider) (string, error) {
|
|
return "Authorization", nil
|
|
}
|
|
|
|
// MockPrompt is used to mock prompts in tests
|
|
type MockPrompt struct {
|
|
Name string
|
|
Description string
|
|
Args prompts.Arguments
|
|
}
|
|
|
|
func (p MockPrompt) SubstituteParams(vals parameters.ParamValues) (any, error) {
|
|
return []prompts.Message{
|
|
{
|
|
Role: "user",
|
|
Content: fmt.Sprintf("substituted %s", p.Name),
|
|
},
|
|
}, nil
|
|
}
|
|
|
|
func (p MockPrompt) ParseArgs(data map[string]any, claimsMap map[string]map[string]any) (parameters.ParamValues, error) {
|
|
var params parameters.Parameters
|
|
for _, arg := range p.Args {
|
|
params = append(params, arg.Parameter)
|
|
}
|
|
return parameters.ParseParams(params, data, claimsMap)
|
|
}
|
|
|
|
func (p MockPrompt) Manifest() prompts.Manifest {
|
|
var argManifests []parameters.ParameterManifest
|
|
for _, arg := range p.Args {
|
|
argManifests = append(argManifests, arg.Manifest())
|
|
}
|
|
return prompts.Manifest{
|
|
Description: p.Description,
|
|
Arguments: argManifests,
|
|
}
|
|
}
|
|
|
|
func (p MockPrompt) McpManifest() prompts.McpManifest {
|
|
return prompts.GetMcpManifest(p.Name, p.Description, p.Args)
|
|
}
|
|
|
|
func (p MockPrompt) ToConfig() prompts.PromptConfig {
|
|
return nil
|
|
}
|