mirror of
https://github.com/NousResearch/hermes-agent.git
synced 2026-04-25 00:51:20 +00:00
Replace the HERMES_ENABLE_NOUS_MANAGED_TOOLS env-var feature flag with subscription-based detection. The Tool Gateway is now available to any paid Nous subscriber without needing a hidden env var. Core changes: - managed_nous_tools_enabled() checks get_nous_auth_status() + check_nous_free_tier() instead of an env var - New use_gateway config flag per tool section (web, tts, browser, image_gen) records explicit user opt-in and overrides direct API keys at runtime - New prefers_gateway(section) shared helper in tool_backend_helpers.py used by all 4 tool runtimes (web, tts, image gen, browser) UX flow: - hermes model: after Nous login/model selection, shows a curses prompt listing all gateway-eligible tools with current status. User chooses to enable all, enable only unconfigured tools, or skip. Defaults to Enable for new users, Skip when direct keys exist. - hermes tools: provider selection now manages use_gateway flag — selecting Nous Subscription sets it, selecting any other provider clears it - hermes status: renamed section to Nous Tool Gateway, added free-tier upgrade nudge for logged-in free users - curses_radiolist: new description parameter for multi-line context that survives the screen clear Runtime behavior: - Each tool runtime (web_tools, tts_tool, image_generation_tool, browser_use) checks prefers_gateway() before falling back to direct env-var credentials - get_nous_subscription_features() respects use_gateway flags, suppressing direct credential detection when the user opted in Removed: - HERMES_ENABLE_NOUS_MANAGED_TOOLS env var and all references - apply_nous_provider_defaults() silent TTS auto-set - get_nous_subscription_explainer_lines() static text - Override env var warnings (use_gateway handles this properly now)
215 lines
7.2 KiB
Python
215 lines
7.2 KiB
Python
"""Browser Use cloud browser provider."""
|
|
|
|
import logging
|
|
import os
|
|
import threading
|
|
import uuid
|
|
from typing import Any, Dict, Optional
|
|
|
|
import requests
|
|
|
|
from tools.browser_providers.base import CloudBrowserProvider
|
|
from tools.managed_tool_gateway import resolve_managed_tool_gateway
|
|
from tools.tool_backend_helpers import managed_nous_tools_enabled, prefers_gateway
|
|
|
|
logger = logging.getLogger(__name__)
|
|
_pending_create_keys: Dict[str, str] = {}
|
|
_pending_create_keys_lock = threading.Lock()
|
|
|
|
_BASE_URL = "https://api.browser-use.com/api/v3"
|
|
_DEFAULT_MANAGED_TIMEOUT_MINUTES = 5
|
|
_DEFAULT_MANAGED_PROXY_COUNTRY_CODE = "us"
|
|
|
|
|
|
def _get_or_create_pending_create_key(task_id: str) -> str:
|
|
with _pending_create_keys_lock:
|
|
existing = _pending_create_keys.get(task_id)
|
|
if existing:
|
|
return existing
|
|
|
|
created = f"browser-use-session-create:{uuid.uuid4().hex}"
|
|
_pending_create_keys[task_id] = created
|
|
return created
|
|
|
|
|
|
def _clear_pending_create_key(task_id: str) -> None:
|
|
with _pending_create_keys_lock:
|
|
_pending_create_keys.pop(task_id, None)
|
|
|
|
|
|
def _should_preserve_pending_create_key(response: requests.Response) -> bool:
|
|
if response.status_code >= 500:
|
|
return True
|
|
|
|
if response.status_code != 409:
|
|
return False
|
|
|
|
try:
|
|
payload = response.json()
|
|
except Exception:
|
|
return False
|
|
|
|
if not isinstance(payload, dict):
|
|
return False
|
|
|
|
error = payload.get("error")
|
|
if not isinstance(error, dict):
|
|
return False
|
|
|
|
message = str(error.get("message") or "").lower()
|
|
return "already in progress" in message
|
|
|
|
|
|
class BrowserUseProvider(CloudBrowserProvider):
|
|
"""Browser Use (https://browser-use.com) cloud browser backend."""
|
|
|
|
def provider_name(self) -> str:
|
|
return "Browser Use"
|
|
|
|
def is_configured(self) -> bool:
|
|
return self._get_config_or_none() is not None
|
|
|
|
# ------------------------------------------------------------------
|
|
# Config resolution (direct API key OR managed Nous gateway)
|
|
# ------------------------------------------------------------------
|
|
|
|
def _get_config_or_none(self) -> Optional[Dict[str, Any]]:
|
|
api_key = os.environ.get("BROWSER_USE_API_KEY")
|
|
if api_key and not prefers_gateway("browser"):
|
|
return {
|
|
"api_key": api_key,
|
|
"base_url": _BASE_URL,
|
|
"managed_mode": False,
|
|
}
|
|
|
|
managed = resolve_managed_tool_gateway("browser-use")
|
|
if managed is None:
|
|
return None
|
|
|
|
return {
|
|
"api_key": managed.nous_user_token,
|
|
"base_url": managed.gateway_origin.rstrip("/"),
|
|
"managed_mode": True,
|
|
}
|
|
|
|
def _get_config(self) -> Dict[str, Any]:
|
|
config = self._get_config_or_none()
|
|
if config is None:
|
|
message = (
|
|
"Browser Use requires a direct BROWSER_USE_API_KEY credential."
|
|
)
|
|
if managed_nous_tools_enabled():
|
|
message = (
|
|
"Browser Use requires either a direct BROWSER_USE_API_KEY "
|
|
"credential or a managed Browser Use gateway configuration."
|
|
)
|
|
raise ValueError(message)
|
|
return config
|
|
|
|
# ------------------------------------------------------------------
|
|
# Session lifecycle
|
|
# ------------------------------------------------------------------
|
|
|
|
def _headers(self, config: Dict[str, Any]) -> Dict[str, str]:
|
|
headers = {
|
|
"Content-Type": "application/json",
|
|
"X-Browser-Use-API-Key": config["api_key"],
|
|
}
|
|
return headers
|
|
|
|
def create_session(self, task_id: str) -> Dict[str, object]:
|
|
config = self._get_config()
|
|
managed_mode = bool(config.get("managed_mode"))
|
|
|
|
headers = self._headers(config)
|
|
if managed_mode:
|
|
headers["X-Idempotency-Key"] = _get_or_create_pending_create_key(task_id)
|
|
|
|
# Keep gateway-backed sessions short so billing authorization does not
|
|
# default to a long Browser-Use timeout when Hermes only needs a task-
|
|
# scoped ephemeral browser.
|
|
payload = (
|
|
{
|
|
"timeout": _DEFAULT_MANAGED_TIMEOUT_MINUTES,
|
|
"proxyCountryCode": _DEFAULT_MANAGED_PROXY_COUNTRY_CODE,
|
|
}
|
|
if managed_mode
|
|
else {}
|
|
)
|
|
|
|
response = requests.post(
|
|
f"{config['base_url']}/browsers",
|
|
headers=headers,
|
|
json=payload,
|
|
timeout=30,
|
|
)
|
|
|
|
if not response.ok:
|
|
if managed_mode and not _should_preserve_pending_create_key(response):
|
|
_clear_pending_create_key(task_id)
|
|
raise RuntimeError(
|
|
f"Failed to create Browser Use session: "
|
|
f"{response.status_code} {response.text}"
|
|
)
|
|
|
|
session_data = response.json()
|
|
if managed_mode:
|
|
_clear_pending_create_key(task_id)
|
|
session_name = f"hermes_{task_id}_{uuid.uuid4().hex[:8]}"
|
|
external_call_id = response.headers.get("x-external-call-id") if managed_mode else None
|
|
|
|
logger.info("Created Browser Use session %s", session_name)
|
|
|
|
cdp_url = session_data.get("cdpUrl") or session_data.get("connectUrl") or ""
|
|
|
|
return {
|
|
"session_name": session_name,
|
|
"bb_session_id": session_data["id"],
|
|
"cdp_url": cdp_url,
|
|
"features": {"browser_use": True},
|
|
"external_call_id": external_call_id,
|
|
}
|
|
|
|
def close_session(self, session_id: str) -> bool:
|
|
try:
|
|
config = self._get_config()
|
|
except ValueError:
|
|
logger.warning("Cannot close Browser Use session %s — missing credentials", session_id)
|
|
return False
|
|
|
|
try:
|
|
response = requests.patch(
|
|
f"{config['base_url']}/browsers/{session_id}",
|
|
headers=self._headers(config),
|
|
json={"action": "stop"},
|
|
timeout=10,
|
|
)
|
|
if response.status_code in (200, 201, 204):
|
|
logger.debug("Successfully closed Browser Use session %s", session_id)
|
|
return True
|
|
else:
|
|
logger.warning(
|
|
"Failed to close Browser Use session %s: HTTP %s - %s",
|
|
session_id,
|
|
response.status_code,
|
|
response.text[:200],
|
|
)
|
|
return False
|
|
except Exception as e:
|
|
logger.error("Exception closing Browser Use session %s: %s", session_id, e)
|
|
return False
|
|
|
|
def emergency_cleanup(self, session_id: str) -> None:
|
|
config = self._get_config_or_none()
|
|
if config is None:
|
|
logger.warning("Cannot emergency-cleanup Browser Use session %s — missing credentials", session_id)
|
|
return
|
|
try:
|
|
requests.patch(
|
|
f"{config['base_url']}/browsers/{session_id}",
|
|
headers=self._headers(config),
|
|
json={"action": "stop"},
|
|
timeout=5,
|
|
)
|
|
except Exception as e:
|
|
logger.debug("Emergency cleanup failed for Browser Use session %s: %s", session_id, e)
|