Module: Legion::LLM::Call::Providers
- Extended by:
- Legion::Logging::Helper
- Defined in:
- lib/legion/llm/call/providers.rb
Constant Summary collapse
- SAAS_PROVIDERS =
%i[bedrock anthropic openai gemini azure].freeze
Class Method Summary collapse
- .apply_credential_to_config(provider, config, creds) ⇒ Object
- .apply_credential_to_rubyllm(provider, creds, config) ⇒ Object
- .apply_provider_config(provider, config) ⇒ Object
- .attempt_provider_call(provider, model) ⇒ Object
- .auto_enable_from_resolved_credentials ⇒ Object
- .auto_register_providers ⇒ Object
- .broker_has_credential?(provider) ⇒ Boolean
- .collect_credential_candidates(provider, config) ⇒ Object
- .configure_anthropic(config) ⇒ Object
- .configure_azure(config) ⇒ Object
- .configure_bedrock(config) ⇒ Object
- .configure_gemini(config) ⇒ Object
- .configure_ollama(config) ⇒ Object
- .configure_openai(config) ⇒ Object
- .configure_providers ⇒ Object
- .credential_available_for?(provider, config) ⇒ Boolean
- .env_present?(key) ⇒ Boolean
- .inject_anthropic_cache_control!(opts, provider) ⇒ Object
- .ollama_running?(config) ⇒ Boolean
- .probe_provider_credentials(provider, model, config) ⇒ Object
- .probe_via_chat(provider, model) ⇒ Object
- .probe_via_model_list(provider, target_model) ⇒ Object
- .recover_openai_with_codex ⇒ Object
- .recover_with_alternative_credentials ⇒ Object
- .resolve_broker_aws_credentials ⇒ Object
- .resolve_broker_credential(provider_name) ⇒ Object
- .resolve_llm_secrets ⇒ Object
- .setup ⇒ Object
- .try_register_native_provider(name, ext_const, runner_const) {|klass| ... } ⇒ Object
- .usable_setting?(value) ⇒ Boolean
- .verify_providers ⇒ Object
Class Method Details
.apply_credential_to_config(provider, config, creds) ⇒ Object
329 330 331 332 333 334 335 336 337 338 |
# File 'lib/legion/llm/call/providers.rb', line 329 def apply_credential_to_config(provider, config, creds) case provider when :bedrock config[:bearer_token] = creds[:bearer_token] if creds[:bearer_token] config[:api_key] = creds[:api_key] if creds[:api_key] config[:secret_key] = creds[:secret_key] if creds[:secret_key] when :anthropic, :openai, :gemini config[:api_key] = creds[:api_key] end end |
.apply_credential_to_rubyllm(provider, creds, config) ⇒ Object
303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 |
# File 'lib/legion/llm/call/providers.rb', line 303 def apply_credential_to_rubyllm(provider, creds, config) case provider when :bedrock region = config[:region] || 'us-east-2' if creds[:bearer_token] require 'legion/llm/call/bedrock_auth' RubyLLM.configure do |c| c.bedrock_bearer_token = creds[:bearer_token] c.bedrock_region = region end else RubyLLM.configure do |c| c.bedrock_api_key = creds[:api_key] c.bedrock_secret_key = creds[:secret_key] c.bedrock_region = region end end when :anthropic RubyLLM.configure { |c| c.anthropic_api_key = creds[:api_key] } when :openai RubyLLM.configure { |c| c.openai_api_key = creds[:api_key] } when :gemini RubyLLM.configure { |c| c.gemini_api_key = creds[:api_key] } end end |
.apply_provider_config(provider, config) ⇒ Object
109 110 111 112 113 114 115 116 117 118 119 120 |
# File 'lib/legion/llm/call/providers.rb', line 109 def apply_provider_config(provider, config) case provider when :bedrock then configure_bedrock(config) when :anthropic then configure_anthropic(config) when :openai then configure_openai(config) when :gemini then configure_gemini(config) when :azure then configure_azure(config) when :ollama then configure_ollama(config) else log.warn "[llm][providers] unknown provider=#{provider}" end end |
.attempt_provider_call(provider, model) ⇒ Object
340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 |
# File 'lib/legion/llm/call/providers.rb', line 340 def attempt_provider_call(provider, model) start_time = Time.now result = probe_via_model_list(provider, model) elapsed = ((Time.now - start_time) * 1000).round case result when :auth_error log.warn "[llm][providers] health_check auth_failed provider=#{provider}" false when :model_missing log.warn "[llm][providers] health_check model_missing provider=#{provider} model=#{model} — provider ok, model unavailable" false else log.info "[llm][providers] health_check ok provider=#{provider} model=#{model} elapsed_ms=#{elapsed}" true end rescue StandardError => e log.warn "[llm][providers] health_check failed provider=#{provider} error=#{e.class}" handle_exception(e, level: :debug, operation: 'llm.providers.attempt_provider_call', provider: provider, model: model) false end |
.auto_enable_from_resolved_credentials ⇒ Object
47 48 49 50 51 52 53 54 55 56 57 58 59 60 |
# File 'lib/legion/llm/call/providers.rb', line 47 def auto_enable_from_resolved_credentials log.debug '[llm][providers] auto_enable_from_resolved_credentials.enter' Legion::LLM.settings[:providers].each do |provider, config| next if config[:enabled] has_creds = credential_available_for?(provider, config) has_creds ||= broker_has_credential?(provider) unless has_creds next unless has_creds config[:enabled] = true log.info "[llm][providers] auto-enabled provider=#{provider} reason=credentials_found" end end |
.auto_register_providers ⇒ Object
411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 |
# File 'lib/legion/llm/call/providers.rb', line 411 def auto_register_providers log.debug '[llm][providers] auto_register_providers.enter' try_register_native_provider(:claude, 'Legion::Extensions::Claude', 'Legion::Extensions::Claude::Runners::Messages') do |klass| Call::Registry.register(:claude, klass) Call::Registry.register(:anthropic, klass) end try_register_native_provider(:bedrock, 'Legion::Extensions::Bedrock', 'Legion::Extensions::Bedrock::Runners::Converse') do |klass| Call::Registry.register(:bedrock, klass) end try_register_native_provider(:openai, 'Legion::Extensions::Openai', 'Legion::Extensions::Openai::Runners::Chat') do |klass| Call::Registry.register(:openai, klass) end try_register_native_provider(:gemini, 'Legion::Extensions::Gemini', 'Legion::Extensions::Gemini::Runners::Generate') do |klass| Call::Registry.register(:gemini, klass) end registered = Call::Registry.available if registered.any? log.info "[llm][providers] native registry registered=#{registered.join(', ')}" else log.debug '[llm][providers] no native lex-* providers registered (ruby_llm mode)' end rescue StandardError => e handle_exception(e, level: :warn, operation: 'llm.providers.auto_register') end |
.broker_has_credential?(provider) ⇒ Boolean
476 477 478 479 480 481 482 483 484 485 486 487 488 489 |
# File 'lib/legion/llm/call/providers.rb', line 476 def broker_has_credential?(provider) return false unless defined?(Legion::Identity::Broker) case provider when :bedrock renewer = Legion::Identity::Broker.renewer_for(:aws) renewer&.provider.respond_to?(:current_credentials) && !renewer.provider.current_credentials.nil? else !Legion::Identity::Broker.token_for(provider).nil? end rescue StandardError => e handle_exception(e, level: :debug, operation: 'llm.providers.broker_credential_available', provider: provider) false end |
.collect_credential_candidates(provider, config) ⇒ Object
265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 |
# File 'lib/legion/llm/call/providers.rb', line 265 def collect_credential_candidates(provider, config) case provider when :bedrock candidates = [] resolved_bearer = Call::ClaudeConfigLoader.resolve_setting_reference(config[:bearer_token]) bearer_env = ENV.fetch('AWS_BEARER_TOKEN_BEDROCK', nil) claude_bearer = Call::ClaudeConfigLoader.bedrock_bearer_token candidates += [resolved_bearer, bearer_env, claude_bearer].compact.uniq.map { |t| { bearer_token: t } } api_key = Call::ClaudeConfigLoader.resolve_setting_reference(config[:api_key]) secret = Call::ClaudeConfigLoader.resolve_setting_reference(config[:secret_key]) candidates << { api_key: api_key, secret_key: secret } if api_key && secret candidates when :anthropic [ Call::ClaudeConfigLoader.resolve_setting_reference(config[:api_key]), ENV.fetch('ANTHROPIC_API_KEY', nil) ].compact.uniq.map { |k| { api_key: k } } when :openai keys = [ Call::ClaudeConfigLoader.resolve_setting_reference(config[:api_key]), ENV.fetch('OPENAI_API_KEY', nil), ENV.fetch('CODEX_API_KEY', nil), Call::CodexConfigLoader.read_token ].compact.uniq keys.map { |k| { api_key: k } } when :gemini [ Call::ClaudeConfigLoader.resolve_setting_reference(config[:api_key]), ENV.fetch('GEMINI_API_KEY', nil) ].compact.uniq.map { |k| { api_key: k } } else [] end rescue StandardError => e handle_exception(e, level: :debug, operation: 'llm.providers.collect_credential_candidates', provider: provider) [] end |
.configure_anthropic(config) ⇒ Object
158 159 160 161 162 163 164 165 166 167 168 169 |
# File 'lib/legion/llm/call/providers.rb', line 158 def configure_anthropic(config) api_key = resolve_broker_credential(:anthropic) || Call::ClaudeConfigLoader.resolve_setting_reference(config[:api_key]) || ENV.fetch('ANTHROPIC_API_KEY', nil) return unless api_key RubyLLM.configure do |c| c.anthropic_api_key = api_key c.anthropic_api_base = config[:base_url] if config[:base_url] end log.info "[llm][providers] configured anthropic base_url=#{config[:base_url].inspect}" end |
.configure_azure(config) ⇒ Object
196 197 198 199 200 201 202 203 204 205 206 207 208 |
# File 'lib/legion/llm/call/providers.rb', line 196 def configure_azure(config) api_base = config[:api_base] api_key = resolve_broker_credential(:azure) || config[:api_key] auth_token = config[:auth_token] return unless api_base && (api_key || auth_token) RubyLLM.configure do |c| c.azure_api_base = api_base c.azure_api_key = api_key if api_key c.azure_ai_auth_token = auth_token if auth_token end log.info "[llm][providers] configured azure api_base=#{api_base}" end |
.configure_bedrock(config) ⇒ Object
122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 |
# File 'lib/legion/llm/call/providers.rb', line 122 def configure_bedrock(config) has_sigv4 = usable_setting?(config[:api_key]) && usable_setting?(config[:secret_key]) has_bearer = Call::ClaudeConfigLoader.resolve_setting_reference(config[:bearer_token]) config[:bearer_token] = has_bearer if has_bearer unless has_sigv4 || has_bearer broker_creds = resolve_broker_aws_credentials if broker_creds has_sigv4 = true config = config.merge( api_key: broker_creds.access_key_id, secret_key: broker_creds.secret_access_key, session_token: (broker_creds.session_token if broker_creds.respond_to?(:session_token)) ) end end return unless has_sigv4 || has_bearer require 'legion/llm/call/bedrock_auth' if has_bearer RubyLLM.configure do |c| if has_bearer c.bedrock_bearer_token = config[:bearer_token] else c.bedrock_api_key = config[:api_key] c.bedrock_secret_key = config[:secret_key] c.bedrock_session_token = config[:session_token] if config[:session_token] end c.bedrock_region = config[:region] || 'us-east-2' end auth_mode = has_bearer ? 'bearer token' : 'SigV4' log.info "[llm][providers] configured bedrock region=#{config[:region]} auth=#{auth_mode}" end |
.configure_gemini(config) ⇒ Object
185 186 187 188 189 190 191 192 193 194 |
# File 'lib/legion/llm/call/providers.rb', line 185 def configure_gemini(config) api_key = resolve_broker_credential(:gemini) || config[:api_key] return unless api_key RubyLLM.configure do |c| c.gemini_api_key = api_key c.gemini_api_base = config[:base_url] if config[:base_url] end log.info "[llm][providers] configured gemini base_url=#{config[:base_url].inspect}" end |
.configure_ollama(config) ⇒ Object
210 211 212 213 214 215 |
# File 'lib/legion/llm/call/providers.rb', line 210 def configure_ollama(config) RubyLLM.configure do |c| c.ollama_api_base = config[:base_url] if config[:base_url] end log.info "[llm][providers] configured ollama base_url=#{config[:base_url].inspect}" end |
.configure_openai(config) ⇒ Object
171 172 173 174 175 176 177 178 179 180 181 182 183 |
# File 'lib/legion/llm/call/providers.rb', line 171 def configure_openai(config) api_key = resolve_broker_credential(:openai) || Call::ClaudeConfigLoader.resolve_setting_reference(config[:api_key]) || ENV.fetch('OPENAI_API_KEY', nil) || ENV.fetch('CODEX_API_KEY', nil) return unless api_key RubyLLM.configure do |c| c.openai_api_key = api_key c.openai_api_base = config[:base_url] if config[:base_url] end log.info "[llm][providers] configured openai base_url=#{config[:base_url].inspect}" end |
.configure_providers ⇒ Object
35 36 37 38 39 40 41 42 43 44 45 |
# File 'lib/legion/llm/call/providers.rb', line 35 def configure_providers log.debug '[llm][providers] configure_providers.enter' auto_enable_from_resolved_credentials Legion::LLM.settings[:providers].each do |provider, config| next unless config[:enabled] log.debug "[llm][providers] configure_providers applying provider=#{provider}" apply_provider_config(provider, config) end log.debug '[llm][providers] configure_providers.exit' end |
.credential_available_for?(provider, config) ⇒ Boolean
62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 |
# File 'lib/legion/llm/call/providers.rb', line 62 def credential_available_for?(provider, config) case provider when :bedrock usable_setting?(config[:bearer_token]) || env_present?('AWS_BEARER_TOKEN_BEDROCK') || (usable_setting?(config[:api_key]) && usable_setting?(config[:secret_key])) when :anthropic usable_setting?(config[:api_key]) || env_present?('ANTHROPIC_API_KEY') when :openai usable_setting?(config[:api_key]) || env_present?('OPENAI_API_KEY') || env_present?('CODEX_API_KEY') || !Call::CodexConfigLoader.read_token.nil? when :azure config[:api_base] && (usable_setting?(config[:api_key]) || usable_setting?(config[:auth_token])) when :ollama ollama_running?(config) else usable_setting?(config[:api_key]) end rescue StandardError => e handle_exception(e, level: :debug, operation: 'llm.providers.credential_available_for', provider: provider) false end |
.env_present?(key) ⇒ Boolean
91 92 93 |
# File 'lib/legion/llm/call/providers.rb', line 91 def env_present?(key) ENV.fetch(key, nil).to_s.strip != '' end |
.inject_anthropic_cache_control!(opts, provider) ⇒ Object
437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 |
# File 'lib/legion/llm/call/providers.rb', line 437 def inject_anthropic_cache_control!(opts, provider) resolved_provider = (provider || Legion::LLM.settings[:default_provider])&.to_sym return unless resolved_provider == :anthropic caching_settings = Legion::LLM.settings[:prompt_caching] || {} return unless caching_settings[:enabled] != false min_tokens = caching_settings[:min_tokens] || 1024 instructions = opts[:instructions] return unless instructions.is_a?(String) && instructions.length > min_tokens log.debug "[llm][providers] inject_anthropic_cache_control provider=#{resolved_provider} length=#{instructions.length}" opts[:instructions] = { content: instructions, cache_control: { type: 'ephemeral' } } end |
.ollama_running?(config) ⇒ Boolean
95 96 97 98 99 100 101 102 103 104 105 106 107 |
# File 'lib/legion/llm/call/providers.rb', line 95 def ollama_running?(config) require 'socket' url = config[:base_url] || 'http://localhost:11434' host_part = url.gsub(%r{^https?://}, '').split(':') addr = host_part[0] port = (host_part[1] || '11434').to_i log.debug "[llm][providers] ollama_running? addr=#{addr} port=#{port}" Socket.tcp(addr, port, connect_timeout: 1).close true rescue StandardError => e handle_exception(e, level: :debug, operation: 'llm.providers.ollama_running', base_url: url) false end |
.probe_provider_credentials(provider, model, config) ⇒ Object
242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 |
# File 'lib/legion/llm/call/providers.rb', line 242 def probe_provider_credentials(provider, model, config) candidates = collect_credential_candidates(provider, config) if candidates.size <= 1 ok = attempt_provider_call(provider, model) config[:enabled] = false unless ok return end working = candidates.find do |creds| apply_credential_to_rubyllm(provider, creds, config) attempt_provider_call(provider, model) end if working apply_credential_to_config(provider, config, working) log.info "[llm][providers] health_check ok provider=#{provider} model=#{model} credential=#{working.keys.join(',')}" else config[:enabled] = false log.warn "[llm][providers] disabled provider=#{provider} reason=all_credentials_failed" end end |
.probe_via_chat(provider, model) ⇒ Object
380 381 382 383 384 385 386 387 |
# File 'lib/legion/llm/call/providers.rb', line 380 def probe_via_chat(provider, model) RubyLLM.chat(model: model, provider: provider).ask('Respond with only the word: pong') :ok rescue RubyLLM::ModelNotFoundError :model_missing rescue RubyLLM::UnauthorizedError, RubyLLM::ForbiddenError :auth_error end |
.probe_via_model_list(provider, target_model) ⇒ Object
362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 |
# File 'lib/legion/llm/call/providers.rb', line 362 def probe_via_model_list(provider, target_model) provider_class = RubyLLM::Provider.providers[provider.to_sym] return probe_via_chat(provider, target_model) unless provider_class models = provider_class.new(RubyLLM.config).list_models model_ids = models.map { |m| m.is_a?(Hash) ? (m[:id] || m['id']).to_s : m.id.to_s } return :ok if target_model.nil? return :ok if model_ids.any? { |id| id.include?(target_model) || target_model.include?(id) } :model_missing rescue RubyLLM::UnauthorizedError, RubyLLM::ForbiddenError :auth_error rescue StandardError => e handle_exception(e, level: :debug, operation: 'llm.providers.probe_via_model_list', provider: provider) probe_via_chat(provider, target_model) end |
.recover_openai_with_codex ⇒ Object
394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 |
# File 'lib/legion/llm/call/providers.rb', line 394 def recover_openai_with_codex openai_config = Legion::LLM.settings.dig(:providers, :openai) return unless openai_config.is_a?(Hash) && !openai_config[:enabled] token = Call::CodexConfigLoader.read_token return unless token log.info '[llm][providers] openai disabled — retrying with codex auth token' openai_config[:api_key] = token configure_openai(openai_config) openai_config[:enabled] = true ok = attempt_provider_call(:openai, openai_config[:default_model]) openai_config[:enabled] = false unless ok rescue StandardError => e handle_exception(e, level: :debug, operation: 'llm.providers.recover_openai_with_codex') end |
.recover_with_alternative_credentials ⇒ Object
389 390 391 392 |
# File 'lib/legion/llm/call/providers.rb', line 389 def recover_with_alternative_credentials log.debug '[llm][providers] recover_with_alternative_credentials.enter' recover_openai_with_codex end |
.resolve_broker_aws_credentials ⇒ Object
464 465 466 467 468 469 470 471 472 473 474 |
# File 'lib/legion/llm/call/providers.rb', line 464 def resolve_broker_aws_credentials return nil unless defined?(Legion::Identity::Broker) renewer = Legion::Identity::Broker.renewer_for(:aws) return renewer.provider.current_credentials if renewer&.provider.respond_to?(:current_credentials) nil rescue StandardError => e handle_exception(e, level: :debug, operation: 'llm.providers.broker_resolve.aws') nil end |
.resolve_broker_credential(provider_name) ⇒ Object
455 456 457 458 459 460 461 462 |
# File 'lib/legion/llm/call/providers.rb', line 455 def resolve_broker_credential(provider_name) return nil unless defined?(Legion::Identity::Broker) Legion::Identity::Broker.token_for(provider_name) rescue StandardError => e handle_exception(e, level: :debug, operation: "llm.providers.broker_resolve.#{provider_name}") nil end |
.resolve_llm_secrets ⇒ Object
25 26 27 28 29 30 31 32 33 |
# File 'lib/legion/llm/call/providers.rb', line 25 def resolve_llm_secrets log.debug '[llm][providers] resolve_llm_secrets.enter' return unless defined?(Legion::Settings::Resolver) Legion::Settings::Resolver.resolve_secrets!(Legion::LLM.settings) log.debug '[llm][providers] resolve_llm_secrets.exit' rescue StandardError => e handle_exception(e, level: :warn, operation: 'llm.providers.resolve_llm_secrets') end |
.setup ⇒ Object
13 14 15 16 17 18 19 20 21 22 23 |
# File 'lib/legion/llm/call/providers.rb', line 13 def setup log.debug '[llm][providers] setup.enter' resolve_llm_secrets configure_providers verify_providers auto_register_providers log.debug '[llm][providers] setup.exit' rescue StandardError => e handle_exception(e, level: :error, operation: 'llm.providers.setup') raise end |
.try_register_native_provider(name, ext_const, runner_const) {|klass| ... } ⇒ Object
491 492 493 494 495 496 497 498 |
# File 'lib/legion/llm/call/providers.rb', line 491 def try_register_native_provider(name, ext_const, runner_const) log.debug "[llm][providers] try_register_native_provider name=#{name} ext=#{ext_const}" return unless Object.const_defined?(ext_const, false) && Object.const_defined?(runner_const, false) klass = Object.const_get(runner_const) yield klass log.debug "[llm][providers] registered native provider name=#{name}" end |
.usable_setting?(value) ⇒ Boolean
87 88 89 |
# File 'lib/legion/llm/call/providers.rb', line 87 def usable_setting?(value) !Call::ClaudeConfigLoader.resolve_setting_reference(value).nil? end |
.verify_providers ⇒ Object
219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 |
# File 'lib/legion/llm/call/providers.rb', line 219 def verify_providers log.debug '[llm][providers] verify_providers.enter' Legion::LLM.settings[:providers].each do |provider, config| next unless config[:enabled] next unless SAAS_PROVIDERS.include?(provider) model = config[:default_model] next unless model probe_provider_credentials(provider, model, config) end recover_with_alternative_credentials enabled = Legion::LLM.settings[:providers].select { |_, c| c.is_a?(Hash) && c[:enabled] } if enabled.empty? log.error '[llm][providers] no providers available — all failed health checks or disabled' else names = enabled.map { |name, c| "#{name}/#{c[:default_model] || 'auto'}" } log.info "[llm][providers] available providers=#{names.join(', ')}" end end |