mirror of
https://github.com/tencentmusic/supersonic.git
synced 2025-12-11 12:07:42 +00:00
[improvement][supersonic] add text-to-sql evaluation (#696)
* [improvement] llm supports all models * [improvement] alias convert to SemanticParseInfo * [improvement] support join * [improvement] add evaluation.py * [improvement] add text2sql_evalution.py * [improvement] add text2sql_evalution.py * [improvement] add evalution * [improvement] add evalution * [improvement] add evalution --------- Co-authored-by: zuopengge <hwzuopengge@tencent.com>
This commit is contained in:
74
evaluation/build_pred_result.py
Normal file
74
evaluation/build_pred_result.py
Normal file
@@ -0,0 +1,74 @@
|
||||
import requests
|
||||
import logging
|
||||
import json
|
||||
import jwt
|
||||
import time
|
||||
import os
|
||||
import yaml
|
||||
|
||||
def read_query(input_path):
|
||||
result=[]
|
||||
with open(input_path, "r") as f:
|
||||
for line in f.readlines():
|
||||
line = line.strip('\n')
|
||||
result.append(line)
|
||||
return result
|
||||
def write_sql(output_path,result):
|
||||
file = open(output_path, mode='a')
|
||||
file.writelines(result)
|
||||
file.close()
|
||||
def get_pred_sql(query,url,agentId,chatId,authorization,default_sql):
|
||||
url=url+"/api/chat/query/parse"
|
||||
data = {"agentId": agentId, "chatId":chatId,"queryText":query}
|
||||
header = {}
|
||||
header["Authorization"] =authorization
|
||||
try:
|
||||
result = requests.post(url=url, headers=header, json=data)
|
||||
if result.status_code == 200:
|
||||
data = result.json()["data"]
|
||||
selectedParses = data["selectedParses"]
|
||||
if selectedParses is not None and len(selectedParses) > 0:
|
||||
querySQL = selectedParses[0]["sqlInfo"]["querySQL"]
|
||||
querySQL=querySQL.replace("`dusql`.", "").replace("dusql", "").replace("\n", "")
|
||||
return querySQL+'\n'
|
||||
return default_sql+'\n'
|
||||
except Exception as e:
|
||||
print(url)
|
||||
print(result.json())
|
||||
print(e)
|
||||
logging.info(e)
|
||||
return default_sql+'\n'
|
||||
def get_authorization():
|
||||
exp = time.time() + 1000
|
||||
token= jwt.encode({"token_user_name": "admin","exp": exp}, "secret", algorithm="HS512")
|
||||
return "Bearer "+token
|
||||
|
||||
def get_pred_result():
|
||||
current_directory = os.path.dirname(os.path.abspath(__file__))
|
||||
config_file=current_directory+"/config/config.yaml"
|
||||
with open(config_file, 'r') as file:
|
||||
config = yaml.safe_load(file)
|
||||
input_path=current_directory+"/data/"+config["domain"]+".txt"
|
||||
pred_sql_path = current_directory+"/data/"+"pred_example_dusql.txt"
|
||||
pred_sql_exist=os.path.exists(pred_sql_path)
|
||||
if pred_sql_exist:
|
||||
os.remove(pred_sql_path)
|
||||
print("pred_sql_path removed!")
|
||||
agent_id=config["agent_id"]
|
||||
chat_id=config["chat_id"]
|
||||
url=config["url"]
|
||||
authorization=get_authorization()
|
||||
print(input_path)
|
||||
print(pred_sql_path)
|
||||
questions=read_query(input_path)
|
||||
pred_sql_list=[]
|
||||
default_sql="select * from tablea "
|
||||
for i in range(0,len(questions)):
|
||||
pred_sql=get_pred_sql(questions[i],url,agent_id,chat_id,authorization,default_sql)
|
||||
pred_sql_list.append(pred_sql)
|
||||
write_sql(pred_sql_path, pred_sql_list)
|
||||
|
||||
if __name__ == "__main__":
|
||||
print("pred")
|
||||
|
||||
|
||||
Reference in New Issue
Block a user