Build your own Blocks
This guide will walk you through the process of creating and testing a new block for the AutoGPT Agent Server, using the WikipediaSummaryBlock as an example.
!!! tip "New SDK-Based Approach" For a more comprehensive guide using the new SDK pattern with ProviderBuilder and advanced features like OAuth and webhooks, see the Block SDK Guide.
Understanding Blocks and Testing
Blocks are reusable components that can be connected to form a graph representing an agent's behavior. Each block has inputs, outputs, and a specific function. Proper testing is crucial to ensure blocks work correctly and consistently.
Creating and Testing a New Block
Follow these steps to create and test a new block:
Create a new Python file for your block in the
autogpt_platform/backend/backend/blocksdirectory. Name it descriptively and use snake_case. For example:get_wikipedia_summary.py.Import necessary modules and create a class that inherits from
Block. Make sure to include all necessary imports for your block.Every block should contain the following:
from backend.data.block import Block, BlockSchemaInput, BlockSchemaOutput, BlockOutputExample for the Wikipedia summary block:
from backend.data.block import Block, BlockSchemaInput, BlockSchemaOutput, BlockOutput from backend.utils.get_request import GetRequest import requests class WikipediaSummaryBlock(Block, GetRequest): # Block implementation will go hereDefine the input and output schemas using
BlockSchema. These schemas specify the data structure that the block expects to receive (input) and produce (output).The input schema defines the structure of the data the block will process. Each field in the schema represents a required piece of input data.
The output schema defines the structure of the data the block will return after processing. Each field in the schema represents a piece of output data.
Example:
class Input(BlockSchemaInput): topic: str # The topic to get the Wikipedia summary for class Output(BlockSchemaOutput): summary: str # The summary of the topic from WikipediaImplement the
__init__method, including test data and mocks:!!! important Use UUID generator (e.g. https://www.uuidgenerator.net/) for every new block
idand do not make up your own. Alternatively, you can run this python code to generate an uuid:print(__import__('uuid').uuid4())def __init__(self): super().__init__( # Unique ID for the block, used across users for templates # If you are an AI leave it as is or change to "generate-proper-uuid" id="xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx", input_schema=WikipediaSummaryBlock.Input, # Assign input schema output_schema=WikipediaSummaryBlock.Output, # Assign output schema # Provide sample input, output and test mock for testing the block test_input={"topic": "Artificial Intelligence"}, test_output=("summary", "summary content"), test_mock={"get_request": lambda url, json: {"extract": "summary content"}}, )id: A unique identifier for the block.input_schemaandoutput_schema: Define the structure of the input and output data.
Let's break down the testing components:
test_input: This is a sample input that will be used to test the block. It should be a valid input according to your Input schema.test_output: This is the expected output when running the block with thetest_input. It should match your Output schema. For non-deterministic outputs or when you only want to assert the type, you can use Python types instead of specific values. In this example,("summary", str)asserts that the output key is "summary" and its value is a string.test_mock: This is crucial for blocks that make network calls. It provides a mock function that replaces the actual network call during testing.
In this case, we're mocking the
get_requestmethod to always return a dictionary with an 'extract' key, simulating a successful API response. This allows us to test the block's logic without making actual network requests, which could be slow, unreliable, or rate-limited.Implement the
runmethod with error handling. This should contain the main logic of the block:def run(self, input_data: Input, **kwargs) -> BlockOutput: try: topic = input_data.topic url = f"https://en.wikipedia.org/api/rest_v1/page/summary/{topic}" response = self.get_request(url, json=True) yield "summary", response['extract'] except requests.exceptions.HTTPError as http_err: raise RuntimeError(f"HTTP error occurred: {http_err}")Try block: Contains the main logic to fetch and process the Wikipedia summary.
API request: Send a GET request to the Wikipedia API.
Error handling: Handle various exceptions that might occur during the API request and data processing. We don't need to catch all exceptions, only the ones we expect and can handle. The uncaught exceptions will be automatically yielded as
errorin the output. Any block that raises an exception (or yields anerroroutput) will be marked as failed. Prefer raising exceptions over yieldingerror, as it will stop the execution immediately.Yield: Use
yieldto output the results. Prefer to output one result object at a time. If you are calling a function that returns a list, you can yield each item in the list separately. You can also yield the whole list as well, but do both rather than yielding the list. For example: If you were writing a block that outputs emails, you'd yield each email as a separate result object, but you could also yield the whole list as an additional single result object. Yielding output namederrorwill break the execution right away and mark the block execution as failed.kwargs: The
kwargsparameter is used to pass additional arguments to the block. It is not used in the example above, but it is available to the block. You can also have args as inline signatures in the run method aladef run(self, input_data: Input, *, user_id: str, **kwargs) -> BlockOutput:. Available kwargs are:user_id: The ID of the user running the block.graph_id: The ID of the agent that is executing the block. This is the same for every version of the agentgraph_exec_id: The ID of the execution of the agent. This changes every time the agent has a new "run"node_exec_id: The ID of the execution of the node. This changes every time the node is executednode_id: The ID of the node that is being executed. It changes every version of the graph, but not every time the node is executed.
Field Types
oneOf fields
oneOf allows you to specify that a field must be exactly one of several possible options. This is useful when you want your block to accept different types of inputs that are mutually exclusive.
Example:
The discriminator parameter tells AutoGPT which field to look at in the input to determine which type it is.
In each model, you need to define the discriminator value:
OptionalOneOf fields
OptionalOneOf is similar to oneOf but allows the field to be optional (None). This means the field can be either one of the specified types or None.
Example:
The key difference is the | None which makes the entire field optional.
Blocks with authentication
Our system supports auth offloading for API keys and OAuth2 authorization flows. Adding a block with API key authentication is straight-forward, as is adding a block for a service that we already have OAuth2 support for.
Implementing the block itself is relatively simple. On top of the instructions above, you're going to add a credentials parameter to the Input model and the run method:
The credentials will be automagically injected by the executor in the back end.
The APIKeyCredentials and OAuth2Credentials models are defined here. To use them in e.g. an API request, you can either access the token directly:
or use the shortcut credentials.auth_header():
The ProviderName enum is the single source of truth for which providers exist in our system. Naturally, to add an authenticated block for a new provider, you'll have to add it here too.
Multiple credentials inputs
Multiple credentials inputs are supported, under the following conditions:
The name of each of the credentials input fields must end with
_credentials.The names of the credentials input fields must match the names of the corresponding parameters on the
run(..)method of the block.If more than one of the credentials parameters are required,
test_credentialsis adict[str, Credentials], with for each required credentials input the parameter name as the key and suitable test credentials as the value.
Adding an OAuth2 service integration
To add support for a new OAuth2-authenticated service, you'll need to add an OAuthHandler. All our existing handlers and the base class can be found here.
Every handler must implement the following parts of the BaseOAuthHandler interface:
As you can see, this is modeled after the standard OAuth2 flow.
Aside from implementing the OAuthHandler itself, adding a handler into the system requires two more things:
Adding the handler class to
HANDLERS_BY_NAMEunderintegrations/oauth/__init__.py
Adding
{provider}_client_idand{provider}_client_secretto the application'sSecretsunderutil/settings.py
Adding to the frontend
You will need to add the provider (api or oauth) to the CredentialsInput component in /frontend/src/app/(platform)/library/agents/[id]/components/AgentRunsView/components/CredentialsInputs/CredentialsInputs.tsx.
You will also need to add the provider to the credentials provider list in frontend/src/components/integrations/helper.ts.
Finally you will need to add the provider to the CredentialsType enum in frontend/src/lib/autogpt-server-api/types.ts.
Example: GitHub integration
GitHub blocks with API key + OAuth2 support:
blocks/github
GitHub OAuth2 handler:
integrations/oauth/github.py
Example: Google integration
Google OAuth2 handler:
integrations/oauth/google.py
You can see that google has defined a DEFAULT_SCOPES variable, this is used to set the scopes that are requested no matter what the user asks for.
You can also see that GOOGLE_OAUTH_IS_CONFIGURED is used to disable the blocks that require OAuth if the oauth is not configured. This is in the __init__ method of each block. This is because there is no api key fallback for google blocks so we need to make sure that the oauth is configured before we allow the user to use the blocks.
Webhook-triggered Blocks
Webhook-triggered blocks allow your agent to respond to external events in real-time. These blocks are triggered by incoming webhooks from third-party services rather than being executed manually.
Creating and running a webhook-triggered block involves three main components:
The block itself, which specifies:
Inputs for the user to select a resource and events to subscribe to
A
credentialsinput with the scopes needed to manage webhooksLogic to turn the webhook payload into outputs for the webhook block
The
WebhooksManagerfor the corresponding webhook service provider, which handles:(De)registering webhooks with the provider
Parsing and validating incoming webhook payloads
The credentials system for the corresponding service provider, which may include an
OAuthHandler
There is more going on under the hood, e.g. to store and retrieve webhooks and their links to nodes, but to add a webhook-triggered block you shouldn't need to make changes to those parts of the system.
Creating a Webhook-triggered Block
To create a webhook-triggered block, follow these additional steps on top of the basic block creation process:
Define
webhook_configin your block's__init__method.Define event filter input in your block's Input schema. This allows the user to select which specific types of events will trigger the block in their agent.
The name of the input field (
eventsin this case) must matchwebhook_config.event_filter_input.The event filter itself must be a Pydantic model with only boolean fields.
Include payload field in your block's Input schema.
Define
credentialsinput in your block's Input schema.Its scopes must be sufficient to manage a user's webhooks through the provider's API
See Blocks with authentication for further details
Process webhook payload and output relevant parts of it in your block's
runmethod.
Adding a Webhooks Manager
To add support for a new webhook provider, you'll need to create a WebhooksManager that implements the BaseWebhooksManager interface:
And add a reference to your WebhooksManager class in load_webhook_managers:
Example: GitHub Webhook Integration
Key Points to Remember
Unique ID: Give your block a unique ID in the init method.
Input and Output Schemas: Define clear input and output schemas.
Error Handling: Implement error handling in the
runmethod.Output Results: Use
yieldto output results in therunmethod.Testing: Provide test input and output in the init method for automatic testing.
Understanding the Testing Process
The testing of blocks is handled by test_block.py, which does the following:
It calls the block with the provided
test_input. If the block has acredentialsfield,test_credentialsis passed in as well.If a
test_mockis provided, it temporarily replaces the specified methods with the mock functions.It then asserts that the output matches the
test_output.
For the WikipediaSummaryBlock:
The test will call the block with the topic "Artificial Intelligence".
Instead of making a real API call, it will use the mock function, which returns
{"extract": "summary content"}.It will then check if the output key is "summary" and its value is a string.
This approach allows us to test the block's logic comprehensively without relying on external services, while also accommodating non-deterministic outputs.
Security Best Practices for SSRF Prevention
When creating blocks that handle external URL inputs or make network requests, it's crucial to use the platform's built-in SSRF protection mechanisms. The backend.util.request module provides a secure Requests wrapper class that should be used for all HTTP requests.
Using the Secure Requests Wrapper
The Requests wrapper provides these security features:
URL Validation:
Blocks requests to private IP ranges (RFC 1918)
Validates URL format and protocol
Resolves DNS and checks IP addresses
Supports whitelisting trusted origins
Secure Defaults:
Disables redirects by default
Raises exceptions for non-200 status codes
Supports custom headers and validators
Protected IP Ranges: The wrapper denies requests to these networks:
Custom Request Configuration
If you need to customize the request behavior:
Error Handling
Blocks should raise appropriate exceptions for errors that users can fix. The executor classifies errors based on whether they inherit from ValueError - these are treated as "expected failures" (user-fixable) rather than system errors.
Block Exception Classes
Import from backend.util.exceptions:
BlockInputError
Invalid user input, validation failures, missing required fields
Bad API key format, invalid URL, missing credentials
BlockExecutionError
Runtime failures the user can address
API errors, auth failures, resource not found, rate limits
ValueError
Simple cases (auto-wrapped to BlockExecutionError)
Basic validation errors
Raising Exceptions
What NOT to Catch
Don't catch errors that require system admin intervention:
Out of money/credits
Unreachable infrastructure
Database connection failures
Internal server errors from your own services
Let these propagate as unexpected errors so they get proper attention.
Data Models
Use pydantic base models over dict and typeddict where possible. Avoid untyped models for block inputs and outputs as much as possible
File Input
You can use MediaFileType to handle the importing and exporting of files out of the system. Explore how its used through the system before using it in a block schema.
Tips for Effective Block Testing
Provide realistic test_input: Ensure your test input covers typical use cases.
Define appropriate test_output:
For deterministic outputs, use specific expected values.
For non-deterministic outputs or when only the type matters, use Python types (e.g.,
str,int,dict).You can mix specific values and types, e.g.,
("key1", str), ("key2", 42).
Use test_mock for network calls: This prevents tests from failing due to network issues or API changes.
Consider omitting test_mock for blocks without external dependencies: If your block doesn't make network calls or use external resources, you might not need a mock.
Consider edge cases: Include tests for potential error conditions in your
runmethod.Update tests when changing block behavior: If you modify your block, ensure the tests are updated accordingly.
By following these steps, you can create new blocks that extend the functionality of the AutoGPT Agent Server.
Last updated
Was this helpful?