Spaces:
Sleeping
title: Medilang Tech Backend
emoji: 🩺
colorFrom: blue
colorTo: green
sdk: docker
pinned: false
license: mit
Carehelp (medicare-backend)
A FastAPI backend providing AI-powered medical assistance tailored for Cameroon, with multilingual support, conversation history, moderation for emergencies, and AI backends via Hugging Face Inference (default) or local providers (Ollama, LM Studio). OpenAI is no longer required.
Quick start
- Requirements
- Python 3.11+
- Create a .env file (see variables below)
Install pip install -r requirements.txt
Run uvicorn main:app --reload
Environment variables (.env)
- APP_NAME=Carehelp
- ENVIRONMENT=development
- PORT=8000
- CORS_ALLOW_ORIGINS=*
- JWT_SECRET=change_this_secret
- JWT_ALGORITHM=HS256
- ACCESS_TOKEN_EXPIRE_MINUTES=43200
- AI_PROVIDER=hf # hf | ollama | lmstudio (default: hf)
Hugging Face
- HF_API_TOKEN= # required for private models or higher rate limits
- HF_TEXT_MODEL=meta-llama/Meta-Llama-3-8B-Instruct
- HF_ASR_MODEL=distil-whisper/distil-large-v3
- HF_VISION_CAPTION_MODEL=Salesforce/blip-image-captioning-large
Local: Ollama
- OLLAMA_BASE_URL=http://localhost:11434
- OLLAMA_MODEL=llama3.1:8b
- OLLAMA_VISION_MODEL=llava:latest
Local: LM Studio (OpenAI-compatible)
- LMSTUDIO_BASE_URL=http://localhost:1234/v1
- LMSTUDIO_MODEL=local-model
- PATIENT_DATA_PATH=../patient_records.json
- HF_TRANSLATION_MODEL=facebook/nllb-200-distilled-600M
Supabase (recommended)
- SUPABASE_URL=https://your-project-ref.supabase.co
- SUPABASE_ANON_KEY=eyJhbGciOi...
- SUPABASE_SERVICE_ROLE_KEY=eyJhbGciOi... # keep secret; server-side only
- SUPABASE_DB_PASSWORD=your-postgres-password # from Project Settings → Database → Connection
Database setup on Supabase (step-by-step)
Create your Supabase project
- Go to
https://supabase.com→ New Project. - Set a strong database password (you will use it as SUPABASE_DB_PASSWORD).
- Wait for the project to be provisioned.
- Go to
Configure environment variables
- In Supabase: Project Settings → API, copy
Project URLandanonandservice_rolekeys. - In your backend
.env, set SUPABASE_URL, SUPABASE_ANON_KEY, SUPABASE_SERVICE_ROLE_KEY, SUPABASE_DB_PASSWORD (see above).
- In Supabase: Project Settings → API, copy
Full SQL schema and secure RLS policies
- Open Supabase SQL Editor and run this script. It uses Supabase Auth users and keeps a separate
usersprofile table keyed byauth.users.id(UUID):
- Open Supabase SQL Editor and run this script. It uses Supabase Auth users and keeps a separate
-- Enable UUID extension if not enabled
create extension if not exists "uuid-ossp";
-- Profiles table linked to Supabase Auth users
create table if not exists public.users (
id uuid primary key references auth.users(id) on delete cascade,
email text unique,
preferred_language text default 'fr',
created_at timestamptz default now()
);
-- Conversations table
create table if not exists public.conversations (
id bigint generated always as identity primary key,
user_id uuid references public.users(id) on delete set null,
started_at timestamptz default now(),
context text default ''
);
-- Messages table
create table if not exists public.messages (
id bigint generated always as identity primary key,
conversation_id bigint references public.conversations(id) on delete cascade,
message_type text default 'text',
content text not null,
role text default 'user',
timestamp timestamptz default now()
);
create index if not exists idx_messages_conversation_id on public.messages(conversation_id);
-- Row Level Security
alter table public.users enable row level security;
alter table public.conversations enable row level security;
alter table public.messages enable row level security;
-- Helper function to check if the auth user matches profile id
create or replace function public.is_me(profile_id uuid)
returns boolean language sql stable as $$
select auth.uid() = profile_id
$$;
-- Users policies: each user can see and update own profile
create policy "users_select_own" on public.users for select
using (is_me(id));
create policy "users_insert_self" on public.users for insert
with check (is_me(id));
create policy "users_update_own" on public.users for update
using (is_me(id)) with check (is_me(id));
-- Conversations policies: owner-only access
create policy "conversations_owner_select" on public.conversations for select
using (is_me(user_id));
create policy "conversations_owner_insert" on public.conversations for insert
with check (is_me(user_id));
create policy "conversations_owner_update" on public.conversations for update
using (is_me(user_id)) with check (is_me(user_id));
create policy "conversations_owner_delete" on public.conversations for delete
using (is_me(user_id));
-- Messages policies: access restricted by parent conversation ownership
create policy "messages_owner_select" on public.messages for select
using (exists (select 1 from public.conversations c where c.id = messages.conversation_id and is_me(c.user_id)));
create policy "messages_owner_insert" on public.messages for insert
with check (exists (select 1 from public.conversations c where c.id = conversation_id and is_me(c.user_id)));
create policy "messages_owner_update" on public.messages for update
using (exists (select 1 from public.conversations c where c.id = messages.conversation_id and is_me(c.user_id)))
with check (exists (select 1 from public.conversations c where c.id = conversation_id and is_me(c.user_id)));
create policy "messages_owner_delete" on public.messages for delete
using (exists (select 1 from public.conversations c where c.id = messages.conversation_id and is_me(c.user_id)));
-- Optional: service role bypass via RPC or using the service key (server-side)
-- Keep service key server-side only.
- Enable Row Level Security (RLS) and basic policies
- For a quick start, you can keep RLS disabled while developing.
- Recommended (secure): enable RLS and add policies to restrict access to each user's data.
- Example policies (adjust to your auth model):
-- WARNING: Example only. Adjust for your auth model.
alter table public.users enable row level security;
alter table public.conversations enable row level security;
alter table public.messages enable row level security;
-- If you use Supabase Auth, link auth.uid() to users.id via a mapping table or store auth.uid in users table.
-- For now, allow all for development:
create policy "allow all users read" on public.users for select using (true);
create policy "allow all users read" on public.conversations for select using (true);
create policy "allow all users read" on public.messages for select using (true);
create policy "allow all users insert" on public.users for insert with check (true);
create policy "allow all users insert" on public.conversations for insert with check (true);
create policy "allow all users insert" on public.messages for insert with check (true);
- Install the Supabase Python client in your backend
pip install supabase
- Initialize the Supabase client in your backend
- Create a helper, for example
app/utils/supabase_client.py:
- Create a helper, for example
from supabase import create_client, Client
import os
SUPABASE_URL = os.getenv("SUPABASE_URL")
SUPABASE_ANON_KEY = os.getenv("SUPABASE_ANON_KEY")
def get_supabase_client() -> Client:
if not SUPABASE_URL or not SUPABASE_ANON_KEY:
raise RuntimeError("Supabase credentials are not configured")
return create_client(SUPABASE_URL, SUPABASE_ANON_KEY)
- Replace 501 stubs with Supabase queries
- Users: use Supabase Auth for registration/login; store profile in
public.userskeyed by auth.user.id. - Conversations: insert into
conversations, then insert messages intomessages. - Example (create conversation and add first message):
- Users: use Supabase Auth for registration/login; store profile in
from app.utils.supabase_client import get_supabase_client
sb = get_supabase_client()
# Create conversation
conv = sb.table("conversations").insert({"user_id": user_id, "context": ""}).execute()
conv_id = conv.data[0]["id"]
# Add a message
sb.table("messages").insert({
"conversation_id": conv_id,
"content": user_text,
"role": "user",
"message_type": "text",
}).execute()
# Fetch last N messages
history = (
sb.table("messages")
.select("role, content")
.eq("conversation_id", conv_id)
.order("timestamp", desc=True)
.limit(10)
.execute()
).data
Authentication
- Using Supabase Auth: the backend now uses
sign_in_with_passwordand returns the Supabase access token. - Protect endpoints by sending the
Authorization: Bearer <access_token>header. RLS policies enforce per-user data access.
- Using Supabase Auth: the backend now uses
Environment and deployment
- Set SUPABASE_* variables in your production environment.
- Ensure outbound access to
your-project-ref.supabase.cois allowed from your server. - Do not expose
SERVICE_ROLEto the browser or mobile apps; keep it server-side only.
Security
- Use strong JWT secrets and rotate periodically.
- Do not store raw medical data without consent. The example schema stores message content; consider encrypting sensitive fields at rest.
API
- Auth: register /api/users/register, login /api/users/login (currently 501 until Supabase integration)
- Chat: /api/chat (currently 501 until Supabase integration)
- Transcribe: /api/transcribe
- Analyze image: /api/analyze-image
- Translate: /api/translate
- Health: /health
- Single gateway endpoint: POST /gateway with body {"action": "chat|transcribe|analyze-image|translate", "payload": { ... }}
Docker
docker build -t carehelp-backend . docker run -p 8000:8000 --env-file .env carehelp-backend
Providers and local setup
Hugging Face (default)
- Set
AI_PROVIDER=hfandHF_API_TOKENif needed. - Models used:
- Text:
HF_TEXT_MODEL(default: Meta-Llama 3 8B Instruct) - ASR:
HF_ASR_MODEL(default: Distil-Whisper large v3) - Vision caption:
HF_VISION_CAPTION_MODEL(BLIP captioning)
- Text:
- Set
Ollama (local)
- Install: https://ollama.com
- Start server:
ollama serve(defaulthttp://localhost:11434) - Pull models:
ollama pull llama3.1:8bandollama pull llava:latest - Set
.env:AI_PROVIDER=ollama, optionally customizeOLLAMA_*vars.
LM Studio (local)
- Install: https://lmstudio.ai
- Start the server (OpenAI-compatible) and note its base URL (default
http://localhost:1234/v1). - Set
.env:AI_PROVIDER=lmstudio,LMSTUDIO_BASE_URL=...,LMSTUDIO_MODEL=<model name in LM Studio>.
Deploy
- Render/Heroku: deploy container or repo, set environment variables, and expose port 8000. Ensure DATABASE_URL and OPENAI_API_KEY are configured.
- AWS (ECS/Fargate or EC2): use the Dockerfile, attach secrets, and security groups to allow DB egress.
Notes
- Responses include a medical disclaimer and emergency triage to redirect urgent cases.
- RAG: primary context is
clinical_summaries.csv(configurable viaCAMEROON_DATA_CSV); falls back topatient_records.jsonif CSV is missing. - Tests patch OpenAI clients in
app/ai_services.py, and are kept compatible; runtime uses HF/Ollama/LM Studio based onAI_PROVIDER.