Feat: Further update Bedrock model configs (#12029)

### What problem does this PR solve?

Feat: Further update Bedrock model configs #12020 #12008

<img width="700" alt="2b4f0f7fab803a2a2d5f345c756a2c69"
src="https://github.com/user-attachments/assets/e1b9eaad-5c60-47bd-a6f4-88a104ce0c63"
/>
<img width="700" alt="afe88ec3c58f745f85c5c507b040c250"
src="https://github.com/user-attachments/assets/9de39745-395d-4145-930b-96eb452ad6ef"
/>
<img width="700" alt="1a21bb2b7cd8003dce1e5207f27efc69"
src="https://github.com/user-attachments/assets/ddba1682-6654-4954-aa71-41b8ebc04ac0"
/>

### Type of change


- [x] New Feature (non-breaking change which adds functionality)
This commit is contained in:
Magicbook1108
2025-12-19 11:32:20 +08:00
committed by GitHub
parent 57edc215d7
commit f8fd1ea7e1
7 changed files with 190 additions and 39 deletions

View File

@ -787,6 +787,15 @@ This auto-tagging feature enhances retrieval by adding another layer of domain-s
deleteModel: 'Delete model',
bedrockCredentialsHint:
'Tip: Leave Access Key / Secret Key blank to use AWS IAM authentication.',
awsAuthModeAccessKeySecret: 'Access Key',
awsAuthModeIamRole: 'IAM Role',
awsAuthModeAssumeRole: 'Assume Role',
awsAccessKeyId: 'AWS Access Key ID',
awsSecretAccessKey: 'AWS Secret Access Key',
awsRoleArn: 'AWS Role ARN',
awsRoleArnMessage: 'Please enter AWS Role ARN',
awsAssumeRoleTip:
'If you select this mode, the Amazon EC2 instance will assume its existing role to access AWS services. No additional credentials are required.',
modelEmptyTip:
'No models available. <br>Please add models from the panel on the right.',
sourceEmptyTip: 'No data sources added yet. Select one below to connect.',

View File

@ -546,6 +546,15 @@ export default {
profileDescription: '在此更新您的照片和個人詳細信息。',
bedrockCredentialsHint:
'提示Access Key / Secret Key 可留空,以啟用 AWS IAM 自動驗證。',
awsAuthModeAccessKeySecret: 'Access Key 和 Secret',
awsAuthModeIamRole: 'IAM Role',
awsAuthModeAssumeRole: 'Assume Role',
awsAccessKeyId: 'AWS Access Key ID',
awsSecretAccessKey: 'AWS Secret Access Key',
awsRoleArn: 'AWS Role ARN',
awsRoleArnMessage: '請輸入 AWS Role ARN',
awsAssumeRoleTip:
'選擇此模式後EC2 執行個體將使用其既有的 IAM Role 存取 AWS 服務,無需額外憑證。',
maxTokens: '最大token數',
maxTokensMessage: '最大token數是必填項',
maxTokensTip:

View File

@ -876,6 +876,15 @@ General实体和关系提取提示来自 GitHub - microsoft/graphrag基于
bedrockAKMessage: '请输入 ACCESS KEY',
addBedrockSK: 'SECRET KEY',
bedrockSKMessage: '请输入 SECRET KEY',
awsAuthModeAccessKeySecret: 'Access Key 和 Secret',
awsAuthModeIamRole: 'IAM Role',
awsAuthModeAssumeRole: 'Assume Role',
awsAccessKeyId: 'AWS Access Key ID',
awsSecretAccessKey: 'AWS Secret Access Key',
awsRoleArn: 'AWS Role ARN',
awsRoleArnMessage: '请输入 AWS Role ARN',
awsAssumeRoleTip:
'选择此模式后EC2 实例将使用其已有的 IAM Role 访问 AWS 服务,无需额外的凭证。',
bedrockRegion: 'AWS Region',
bedrockRegionMessage: '请选择!',
'us-east-1': '美国东部 (弗吉尼亚北部)',

View File

@ -1,15 +1,25 @@
import { useTranslate } from '@/hooks/common-hooks';
import { IModalProps } from '@/interfaces/common';
import { IAddLlmRequestBody } from '@/interfaces/request/llm';
import { Form, Input, InputNumber, Modal, Select, Typography } from 'antd';
import { useMemo } from 'react';
import {
Form,
Input,
InputNumber,
Modal,
Segmented,
Select,
Typography,
} from 'antd';
import { useMemo, useState } from 'react';
import { LLMHeader } from '../../components/llm-header';
import { BedrockRegionList } from '../../constant';
type FieldType = IAddLlmRequestBody & {
auth_mode?: 'access_key_secret' | 'iam_role' | 'assume_role';
bedrock_ak: string;
bedrock_sk: string;
bedrock_region: string;
aws_role_arn?: string;
};
const { Option } = Select;
@ -23,6 +33,8 @@ const BedrockModal = ({
llmFactory,
}: IModalProps<IAddLlmRequestBody> & { llmFactory: string }) => {
const [form] = Form.useForm<FieldType>();
const [authMode, setAuthMode] =
useState<FieldType['auth_mode']>('access_key_secret');
const { t } = useTranslate('setting');
const options = useMemo(
@ -33,13 +45,32 @@ const BedrockModal = ({
const handleOk = async () => {
const values = await form.validateFields();
// Only submit fields related to the active auth mode.
const cleanedValues: Record<string, any> = { ...values };
const fieldsByMode: Record<string, string[]> = {
access_key_secret: ['bedrock_ak', 'bedrock_sk'],
iam_role: ['aws_role_arn'],
assume_role: [],
};
cleanedValues.auth_mode = authMode;
Object.keys(fieldsByMode).forEach((mode) => {
if (mode !== authMode) {
fieldsByMode[mode].forEach((field) => {
delete cleanedValues[field];
});
}
});
const data = {
...values,
...cleanedValues,
llm_factory: llmFactory,
max_tokens: values.max_tokens,
};
onOk?.(data);
onOk?.(data as unknown as IAddLlmRequestBody);
};
return (
@ -47,9 +78,6 @@ const BedrockModal = ({
title={
<div>
<LLMHeader name={llmFactory} />
<Text type="secondary" style={{ display: 'block', marginTop: 4 }}>
{t('bedrockCredentialsHint')}
</Text>
</div>
}
open={visible}
@ -82,20 +110,75 @@ const BedrockModal = ({
>
<Input placeholder={t('bedrockModelNameMessage')} />
</Form.Item>
<Form.Item<FieldType>
label={t('addBedrockEngineAK')}
name="bedrock_ak"
rules={[{ message: t('bedrockAKMessage') }]}
>
<Input placeholder={t('bedrockAKMessage')} />
</Form.Item>
<Form.Item<FieldType>
label={t('addBedrockSK')}
name="bedrock_sk"
rules={[{ message: t('bedrockSKMessage') }]}
>
<Input placeholder={t('bedrockSKMessage')} />
{/* AWS Credential Mode Switch (AK/SK section only) */}
<Form.Item>
<Segmented
block
value={authMode}
onChange={(v) => {
const next = v as FieldType['auth_mode'];
setAuthMode(next);
// Clear non-active fields so they won't be validated/submitted by accident.
if (next !== 'access_key_secret') {
form.setFieldsValue({ bedrock_ak: '', bedrock_sk: '' } as any);
}
if (next !== 'iam_role') {
form.setFieldsValue({ aws_role_arn: '' } as any);
}
if (next !== 'assume_role') {
form.setFieldsValue({ role_arn: '' } as any);
}
}}
options={[
{
label: t('awsAuthModeAccessKeySecret'),
value: 'access_key_secret',
},
{ label: t('awsAuthModeIamRole'), value: 'iam_role' },
{ label: t('awsAuthModeAssumeRole'), value: 'assume_role' },
]}
/>
</Form.Item>
{authMode === 'access_key_secret' && (
<>
<Form.Item<FieldType>
label={t('awsAccessKeyId')}
name="bedrock_ak"
rules={[{ required: true, message: t('bedrockAKMessage') }]}
>
<Input placeholder={t('bedrockAKMessage')} />
</Form.Item>
<Form.Item<FieldType>
label={t('awsSecretAccessKey')}
name="bedrock_sk"
rules={[{ required: true, message: t('bedrockSKMessage') }]}
>
<Input placeholder={t('bedrockSKMessage')} />
</Form.Item>
</>
)}
{authMode === 'iam_role' && (
<Form.Item<FieldType>
label={t('awsRoleArn')}
name="aws_role_arn"
rules={[{ required: true, message: t('awsRoleArnMessage') }]}
>
<Input placeholder={t('awsRoleArnMessage')} />
</Form.Item>
)}
{authMode === 'assume_role' && (
<Form.Item
style={{ marginTop: -8, marginBottom: 16 }}
// keep layout consistent with other modes
>
<Text type="secondary">{t('awsAssumeRoleTip')}</Text>
</Form.Item>
)}
<Form.Item<FieldType>
label={t('bedrockRegion')}
name="bedrock_region"