Compare commits
5 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
|
eb4d1c02f4
|
|||
|
c428990900
|
|||
|
03b9cc70b9
|
|||
|
3fa0eb832c
|
|||
|
83f66e1061
|
Generated
+37
@@ -2869,6 +2869,15 @@ dependencies = [
|
|||||||
"serde",
|
"serde",
|
||||||
]
|
]
|
||||||
|
|
||||||
|
[[package]]
|
||||||
|
name = "is-docker"
|
||||||
|
version = "0.2.0"
|
||||||
|
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||||
|
checksum = "928bae27f42bc99b60d9ac7334e3a21d10ad8f1835a4e12ec3ec0464765ed1b3"
|
||||||
|
dependencies = [
|
||||||
|
"once_cell",
|
||||||
|
]
|
||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
name = "is-macro"
|
name = "is-macro"
|
||||||
version = "0.3.7"
|
version = "0.3.7"
|
||||||
@@ -2892,6 +2901,16 @@ dependencies = [
|
|||||||
"windows-sys 0.61.2",
|
"windows-sys 0.61.2",
|
||||||
]
|
]
|
||||||
|
|
||||||
|
[[package]]
|
||||||
|
name = "is-wsl"
|
||||||
|
version = "0.4.0"
|
||||||
|
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||||
|
checksum = "173609498df190136aa7dea1a91db051746d339e18476eed5ca40521f02d7aa5"
|
||||||
|
dependencies = [
|
||||||
|
"is-docker",
|
||||||
|
"once_cell",
|
||||||
|
]
|
||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
name = "is_executable"
|
name = "is_executable"
|
||||||
version = "1.0.5"
|
version = "1.0.5"
|
||||||
@@ -3193,6 +3212,7 @@ dependencies = [
|
|||||||
"log4rs",
|
"log4rs",
|
||||||
"nu-ansi-term",
|
"nu-ansi-term",
|
||||||
"num_cpus",
|
"num_cpus",
|
||||||
|
"open",
|
||||||
"os_info",
|
"os_info",
|
||||||
"parking_lot",
|
"parking_lot",
|
||||||
"path-absolutize",
|
"path-absolutize",
|
||||||
@@ -3869,6 +3889,17 @@ version = "0.3.1"
|
|||||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||||
checksum = "c08d65885ee38876c4f86fa503fb49d7b507c2b62552df7c70b2fce627e06381"
|
checksum = "c08d65885ee38876c4f86fa503fb49d7b507c2b62552df7c70b2fce627e06381"
|
||||||
|
|
||||||
|
[[package]]
|
||||||
|
name = "open"
|
||||||
|
version = "5.3.3"
|
||||||
|
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||||
|
checksum = "43bb73a7fa3799b198970490a51174027ba0d4ec504b03cd08caf513d40024bc"
|
||||||
|
dependencies = [
|
||||||
|
"is-wsl",
|
||||||
|
"libc",
|
||||||
|
"pathdiff",
|
||||||
|
]
|
||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
name = "openssl"
|
name = "openssl"
|
||||||
version = "0.10.75"
|
version = "0.10.75"
|
||||||
@@ -4039,6 +4070,12 @@ dependencies = [
|
|||||||
"once_cell",
|
"once_cell",
|
||||||
]
|
]
|
||||||
|
|
||||||
|
[[package]]
|
||||||
|
name = "pathdiff"
|
||||||
|
version = "0.2.3"
|
||||||
|
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||||
|
checksum = "df94ce210e5bc13cb6651479fa48d14f601d9858cfe0467f43ae157023b938d3"
|
||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
name = "pem"
|
name = "pem"
|
||||||
version = "3.0.6"
|
version = "3.0.6"
|
||||||
|
|||||||
+2
-1
@@ -96,6 +96,8 @@ colored = "3.0.0"
|
|||||||
clap_complete = { version = "4.5.58", features = ["unstable-dynamic"] }
|
clap_complete = { version = "4.5.58", features = ["unstable-dynamic"] }
|
||||||
gman = "0.3.0"
|
gman = "0.3.0"
|
||||||
clap_complete_nushell = "4.5.9"
|
clap_complete_nushell = "4.5.9"
|
||||||
|
open = "5"
|
||||||
|
rand = "0.9.0"
|
||||||
|
|
||||||
[dependencies.reqwest]
|
[dependencies.reqwest]
|
||||||
version = "0.12.0"
|
version = "0.12.0"
|
||||||
@@ -126,7 +128,6 @@ arboard = { version = "3.3.0", default-features = false }
|
|||||||
|
|
||||||
[dev-dependencies]
|
[dev-dependencies]
|
||||||
pretty_assertions = "1.4.0"
|
pretty_assertions = "1.4.0"
|
||||||
rand = "0.9.0"
|
|
||||||
|
|
||||||
[[bin]]
|
[[bin]]
|
||||||
name = "loki"
|
name = "loki"
|
||||||
|
|||||||
@@ -39,6 +39,7 @@ Coming from [AIChat](https://github.com/sigoden/aichat)? Follow the [migration g
|
|||||||
* [Todo System](./docs/TODO-SYSTEM.md): Built-in task tracking for improved agent reliability with smaller models.
|
* [Todo System](./docs/TODO-SYSTEM.md): Built-in task tracking for improved agent reliability with smaller models.
|
||||||
* [Environment Variables](./docs/ENVIRONMENT-VARIABLES.md): Override and customize your Loki configuration at runtime with environment variables.
|
* [Environment Variables](./docs/ENVIRONMENT-VARIABLES.md): Override and customize your Loki configuration at runtime with environment variables.
|
||||||
* [Client Configurations](./docs/clients/CLIENTS.md): Configuration instructions for various LLM providers.
|
* [Client Configurations](./docs/clients/CLIENTS.md): Configuration instructions for various LLM providers.
|
||||||
|
* [Authentication (API Key & OAuth)](./docs/clients/CLIENTS.md#authentication): Authenticate with API keys or OAuth for subscription-based access.
|
||||||
* [Patching API Requests](./docs/clients/PATCHES.md): Learn how to patch API requests for advanced customization.
|
* [Patching API Requests](./docs/clients/PATCHES.md): Learn how to patch API requests for advanced customization.
|
||||||
* [Custom Themes](./docs/THEMES.md): Change the look and feel of Loki to your preferences with custom themes.
|
* [Custom Themes](./docs/THEMES.md): Change the look and feel of Loki to your preferences with custom themes.
|
||||||
* [History](#history): A history of how Loki came to be.
|
* [History](#history): A history of how Loki came to be.
|
||||||
@@ -150,6 +151,26 @@ guide you through the process when you first attempt to access the vault. So, to
|
|||||||
loki --list-secrets
|
loki --list-secrets
|
||||||
```
|
```
|
||||||
|
|
||||||
|
### Authentication
|
||||||
|
Each client in your configuration needs authentication (with a few exceptions; e.g. ollama). Most clients use an API key
|
||||||
|
(set via `api_key` in the config or through the [vault](./docs/VAULT.md)). For providers that support OAuth (e.g. Claude Pro/Max
|
||||||
|
subscribers), you can authenticate with your existing subscription instead:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
# In your config.yaml
|
||||||
|
clients:
|
||||||
|
- type: claude
|
||||||
|
name: my-claude-oauth
|
||||||
|
auth: oauth # Indicate you want to authenticate with OAuth instead of an API key
|
||||||
|
```
|
||||||
|
|
||||||
|
```sh
|
||||||
|
loki --authenticate my-claude-oauth
|
||||||
|
# Or via the REPL: .authenticate
|
||||||
|
```
|
||||||
|
|
||||||
|
For full details, see the [authentication documentation](./docs/clients/CLIENTS.md#authentication).
|
||||||
|
|
||||||
### Tab-Completions
|
### Tab-Completions
|
||||||
You can also enable tab completions to make using Loki easier. To do so, add the following to your shell profile:
|
You can also enable tab completions to make using Loki easier. To do so, add the following to your shell profile:
|
||||||
```shell
|
```shell
|
||||||
|
|||||||
@@ -210,6 +210,8 @@ clients:
|
|||||||
- type: claude
|
- type: claude
|
||||||
api_base: https://api.anthropic.com/v1 # Optional
|
api_base: https://api.anthropic.com/v1 # Optional
|
||||||
api_key: '{{ANTHROPIC_API_KEY}}' # You can either hard-code or inject secrets from the Loki vault
|
api_key: '{{ANTHROPIC_API_KEY}}' # You can either hard-code or inject secrets from the Loki vault
|
||||||
|
auth: null # When set to 'oauth', Loki will use OAuth instead of an API key
|
||||||
|
# Authenticate with `loki --authenticate` or `.authenticate` in the REPL
|
||||||
|
|
||||||
# See https://docs.mistral.ai/
|
# See https://docs.mistral.ai/
|
||||||
- type: openai-compatible
|
- type: openai-compatible
|
||||||
|
|||||||
@@ -23,6 +23,7 @@ You can enter the REPL by simply typing `loki` without any follow-up flags or ar
|
|||||||
- [`.edit` - Modify configuration files](#edit---modify-configuration-files)
|
- [`.edit` - Modify configuration files](#edit---modify-configuration-files)
|
||||||
- [`.delete` - Delete configurations from Loki](#delete---delete-configurations-from-loki)
|
- [`.delete` - Delete configurations from Loki](#delete---delete-configurations-from-loki)
|
||||||
- [`.info` - Display information about the current mode](#info---display-information-about-the-current-mode)
|
- [`.info` - Display information about the current mode](#info---display-information-about-the-current-mode)
|
||||||
|
- [`.authenticate` - Authenticate the current model client via OAuth](#authenticate---authenticate-the-current-model-client-via-oauth)
|
||||||
- [`.exit` - Exit an agent/role/session/rag or the Loki REPL itself](#exit---exit-an-agentrolesessionrag-or-the-loki-repl-itself)
|
- [`.exit` - Exit an agent/role/session/rag or the Loki REPL itself](#exit---exit-an-agentrolesessionrag-or-the-loki-repl-itself)
|
||||||
- [`.help` - Show the help guide](#help---show-the-help-guide)
|
- [`.help` - Show the help guide](#help---show-the-help-guide)
|
||||||
<!--toc:end-->
|
<!--toc:end-->
|
||||||
@@ -237,6 +238,11 @@ The following entities are supported:
|
|||||||
| `.info agent` | Display information about the active agent |
|
| `.info agent` | Display information about the active agent |
|
||||||
| `.info rag` | Display information about the active RAG |
|
| `.info rag` | Display information about the active RAG |
|
||||||
|
|
||||||
|
### `.authenticate` - Authenticate the current model client via OAuth
|
||||||
|
The `.authenticate` command will start the OAuth flow for the current model client if
|
||||||
|
* The client supports OAuth (See the [clients documentation](./clients/CLIENTS.md#providers-that-support-oauth) for supported clients)
|
||||||
|
* The client is configured in your Loki configuration to use OAuth via the `auth: oauth` property
|
||||||
|
|
||||||
### `.exit` - Exit an agent/role/session/rag or the Loki REPL itself
|
### `.exit` - Exit an agent/role/session/rag or the Loki REPL itself
|
||||||
The `.exit` command is used to move between modes in the Loki REPL.
|
The `.exit` command is used to move between modes in the Loki REPL.
|
||||||
|
|
||||||
|
|||||||
+77
-6
@@ -14,6 +14,7 @@ loki --info | grep 'config_file' | awk '{print $2}'
|
|||||||
<!--toc:start-->
|
<!--toc:start-->
|
||||||
- [Supported Clients](#supported-clients)
|
- [Supported Clients](#supported-clients)
|
||||||
- [Client Configuration](#client-configuration)
|
- [Client Configuration](#client-configuration)
|
||||||
|
- [Authentication](#authentication)
|
||||||
- [Extra Settings](#extra-settings)
|
- [Extra Settings](#extra-settings)
|
||||||
<!--toc:end-->
|
<!--toc:end-->
|
||||||
|
|
||||||
@@ -51,12 +52,13 @@ clients:
|
|||||||
The client metadata uniquely identifies the client in Loki so you can reference it across your configurations. The
|
The client metadata uniquely identifies the client in Loki so you can reference it across your configurations. The
|
||||||
available settings are listed below:
|
available settings are listed below:
|
||||||
|
|
||||||
| Setting | Description |
|
| Setting | Description |
|
||||||
|----------|-----------------------------------------------------------------------------------------------|
|
|----------|------------------------------------------------------------------------------------------------------------|
|
||||||
| `name` | The name of the client (e.g. `openai`, `gemini`, etc.) |
|
| `name` | The name of the client (e.g. `openai`, `gemini`, etc.) |
|
||||||
| `models` | See the [model settings](#model-settings) documentation below |
|
| `auth` | Authentication method: `oauth` for OAuth, or omit to use `api_key` (see [Authentication](#authentication)) |
|
||||||
| `patch` | See the [client patch configuration](./PATCHES.md#client-configuration-patches) documentation |
|
| `models` | See the [model settings](#model-settings) documentation below |
|
||||||
| `extra` | See the [extra settings](#extra-settings) documentation below |
|
| `patch` | See the [client patch configuration](./PATCHES.md#client-configuration-patches) documentation |
|
||||||
|
| `extra` | See the [extra settings](#extra-settings) documentation below |
|
||||||
|
|
||||||
Be sure to also check provider-specific configurations for any extra fields that are added for authentication purposes.
|
Be sure to also check provider-specific configurations for any extra fields that are added for authentication purposes.
|
||||||
|
|
||||||
@@ -83,6 +85,75 @@ The `models` array lists the available models from the model client. Each one ha
|
|||||||
| `default_chunk_size` | | `embedding` | The default chunk size to use with the given model |
|
| `default_chunk_size` | | `embedding` | The default chunk size to use with the given model |
|
||||||
| `max_batch_size` | | `embedding` | The maximum batch size that the given embedding model supports |
|
| `max_batch_size` | | `embedding` | The maximum batch size that the given embedding model supports |
|
||||||
|
|
||||||
|
## Authentication
|
||||||
|
|
||||||
|
Loki clients support two authentication methods: **API keys** and **OAuth**. Each client entry in your configuration
|
||||||
|
must use one or the other.
|
||||||
|
|
||||||
|
### API Key Authentication
|
||||||
|
|
||||||
|
Most clients authenticate using an API key. Simply set the `api_key` field directly or inject it from the
|
||||||
|
[Loki vault](../VAULT.md):
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
clients:
|
||||||
|
- type: claude
|
||||||
|
api_key: '{{ANTHROPIC_API_KEY}}'
|
||||||
|
```
|
||||||
|
|
||||||
|
API keys can also be provided via environment variables named `{CLIENT_NAME}_API_KEY` (e.g. `OPENAI_API_KEY`,
|
||||||
|
`GEMINI_API_KEY`). See the [environment variables documentation](../ENVIRONMENT-VARIABLES.md#client-related-variables)
|
||||||
|
for details.
|
||||||
|
|
||||||
|
### OAuth Authentication
|
||||||
|
|
||||||
|
For [providers that support OAuth](#providers-that-support-oauth), you can authenticate using your existing subscription instead of an API key. This uses
|
||||||
|
the OAuth 2.0 PKCE flow.
|
||||||
|
|
||||||
|
**Step 1: Configure the client**
|
||||||
|
|
||||||
|
Add a client entry with `auth: oauth` and no `api_key`:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
clients:
|
||||||
|
- type: claude
|
||||||
|
name: my-claude-oauth
|
||||||
|
auth: oauth
|
||||||
|
```
|
||||||
|
|
||||||
|
**Step 2: Authenticate**
|
||||||
|
|
||||||
|
Run the `--authenticate` flag with the client name:
|
||||||
|
|
||||||
|
```sh
|
||||||
|
loki --authenticate my-claude-oauth
|
||||||
|
```
|
||||||
|
|
||||||
|
Or if you have only one OAuth-configured client, you can omit the name:
|
||||||
|
|
||||||
|
```sh
|
||||||
|
loki --authenticate
|
||||||
|
```
|
||||||
|
|
||||||
|
Alternatively, you can use the REPL command `.authenticate`.
|
||||||
|
|
||||||
|
This opens your browser for the OAuth authorization flow. After authorizing, paste the authorization code back into
|
||||||
|
the terminal. Loki stores the tokens in `~/.cache/loki/oauth` and automatically refreshes them when they expire.
|
||||||
|
|
||||||
|
**Step 3: Use normally**
|
||||||
|
|
||||||
|
Once authenticated, the client works like any other. Loki uses the stored OAuth tokens automatically:
|
||||||
|
|
||||||
|
```sh
|
||||||
|
loki -m my-claude-oauth:claude-sonnet-4-20250514 "Hello!"
|
||||||
|
```
|
||||||
|
|
||||||
|
> **Note:** You can have multiple clients for the same provider. For example: you can have one with an API key and
|
||||||
|
> another with OAuth. Use the `name` field to distinguish them.
|
||||||
|
|
||||||
|
### Providers That Support OAuth
|
||||||
|
* Claude
|
||||||
|
|
||||||
## Extra Settings
|
## Extra Settings
|
||||||
Loki also lets you customize some extra settings for interacting with APIs:
|
Loki also lets you customize some extra settings for interacting with APIs:
|
||||||
|
|
||||||
|
|||||||
@@ -127,6 +127,9 @@ pub struct Cli {
|
|||||||
/// List all secrets stored in the Loki vault
|
/// List all secrets stored in the Loki vault
|
||||||
#[arg(long, exclusive = true)]
|
#[arg(long, exclusive = true)]
|
||||||
pub list_secrets: bool,
|
pub list_secrets: bool,
|
||||||
|
/// Authenticate with an LLM provider using OAuth (e.g., --authenticate client_name)
|
||||||
|
#[arg(long, exclusive = true, value_name = "CLIENT_NAME")]
|
||||||
|
pub authenticate: Option<Option<String>>,
|
||||||
/// Generate static shell completion scripts
|
/// Generate static shell completion scripts
|
||||||
#[arg(long, value_name = "SHELL", value_enum)]
|
#[arg(long, value_name = "SHELL", value_enum)]
|
||||||
pub completions: Option<ShellCompletion>,
|
pub completions: Option<ShellCompletion>,
|
||||||
|
|||||||
@@ -19,15 +19,15 @@ impl AzureOpenAIClient {
|
|||||||
config_get_fn!(api_base, get_api_base);
|
config_get_fn!(api_base, get_api_base);
|
||||||
config_get_fn!(api_key, get_api_key);
|
config_get_fn!(api_key, get_api_key);
|
||||||
|
|
||||||
pub const PROMPTS: [PromptAction<'static>; 2] = [
|
create_client_config!([
|
||||||
(
|
(
|
||||||
"api_base",
|
"api_base",
|
||||||
"API Base",
|
"API Base",
|
||||||
Some("e.g. https://{RESOURCE}.openai.azure.com"),
|
Some("e.g. https://{RESOURCE}.openai.azure.com"),
|
||||||
false
|
false,
|
||||||
),
|
),
|
||||||
("api_key", "API Key", None, true),
|
("api_key", "API Key", None, true),
|
||||||
];
|
]);
|
||||||
}
|
}
|
||||||
|
|
||||||
impl_client_trait!(
|
impl_client_trait!(
|
||||||
|
|||||||
@@ -32,11 +32,11 @@ impl BedrockClient {
|
|||||||
config_get_fn!(region, get_region);
|
config_get_fn!(region, get_region);
|
||||||
config_get_fn!(session_token, get_session_token);
|
config_get_fn!(session_token, get_session_token);
|
||||||
|
|
||||||
pub const PROMPTS: [PromptAction<'static>; 3] = [
|
create_client_config!([
|
||||||
("access_key_id", "AWS Access Key ID", None, true),
|
("access_key_id", "AWS Access Key ID", None, true),
|
||||||
("secret_access_key", "AWS Secret Access Key", None, true),
|
("secret_access_key", "AWS Secret Access Key", None, true),
|
||||||
("region", "AWS Region", None, false),
|
("region", "AWS Region", None, false),
|
||||||
];
|
]);
|
||||||
|
|
||||||
fn chat_completions_builder(
|
fn chat_completions_builder(
|
||||||
&self,
|
&self,
|
||||||
|
|||||||
+64
-15
@@ -1,9 +1,12 @@
|
|||||||
|
use super::access_token::get_access_token;
|
||||||
|
use super::claude_oauth::ClaudeOAuthProvider;
|
||||||
|
use super::oauth::{self, OAuthProvider};
|
||||||
use super::*;
|
use super::*;
|
||||||
|
|
||||||
use crate::utils::strip_think_tag;
|
use crate::utils::strip_think_tag;
|
||||||
|
|
||||||
use anyhow::{Context, Result, bail};
|
use anyhow::{Context, Result, bail};
|
||||||
use reqwest::RequestBuilder;
|
use reqwest::{Client as ReqwestClient, RequestBuilder};
|
||||||
use serde::Deserialize;
|
use serde::Deserialize;
|
||||||
use serde_json::{Value, json};
|
use serde_json::{Value, json};
|
||||||
|
|
||||||
@@ -14,6 +17,7 @@ pub struct ClaudeConfig {
|
|||||||
pub name: Option<String>,
|
pub name: Option<String>,
|
||||||
pub api_key: Option<String>,
|
pub api_key: Option<String>,
|
||||||
pub api_base: Option<String>,
|
pub api_base: Option<String>,
|
||||||
|
pub auth: Option<String>,
|
||||||
#[serde(default)]
|
#[serde(default)]
|
||||||
pub models: Vec<ModelData>,
|
pub models: Vec<ModelData>,
|
||||||
pub patch: Option<RequestPatch>,
|
pub patch: Option<RequestPatch>,
|
||||||
@@ -24,25 +28,44 @@ impl ClaudeClient {
|
|||||||
config_get_fn!(api_key, get_api_key);
|
config_get_fn!(api_key, get_api_key);
|
||||||
config_get_fn!(api_base, get_api_base);
|
config_get_fn!(api_base, get_api_base);
|
||||||
|
|
||||||
pub const PROMPTS: [PromptAction<'static>; 1] = [("api_key", "API Key", None, true)];
|
create_oauth_supported_client_config!();
|
||||||
}
|
}
|
||||||
|
|
||||||
impl_client_trait!(
|
#[async_trait::async_trait]
|
||||||
ClaudeClient,
|
impl Client for ClaudeClient {
|
||||||
(
|
client_common_fns!();
|
||||||
prepare_chat_completions,
|
|
||||||
claude_chat_completions,
|
|
||||||
claude_chat_completions_streaming
|
|
||||||
),
|
|
||||||
(noop_prepare_embeddings, noop_embeddings),
|
|
||||||
(noop_prepare_rerank, noop_rerank),
|
|
||||||
);
|
|
||||||
|
|
||||||
fn prepare_chat_completions(
|
fn supports_oauth(&self) -> bool {
|
||||||
|
self.config.auth.as_deref() == Some("oauth")
|
||||||
|
}
|
||||||
|
|
||||||
|
async fn chat_completions_inner(
|
||||||
|
&self,
|
||||||
|
client: &ReqwestClient,
|
||||||
|
data: ChatCompletionsData,
|
||||||
|
) -> Result<ChatCompletionsOutput> {
|
||||||
|
let request_data = prepare_chat_completions(self, client, data).await?;
|
||||||
|
let builder = self.request_builder(client, request_data);
|
||||||
|
claude_chat_completions(builder, self.model()).await
|
||||||
|
}
|
||||||
|
|
||||||
|
async fn chat_completions_streaming_inner(
|
||||||
|
&self,
|
||||||
|
client: &ReqwestClient,
|
||||||
|
handler: &mut SseHandler,
|
||||||
|
data: ChatCompletionsData,
|
||||||
|
) -> Result<()> {
|
||||||
|
let request_data = prepare_chat_completions(self, client, data).await?;
|
||||||
|
let builder = self.request_builder(client, request_data);
|
||||||
|
claude_chat_completions_streaming(builder, handler, self.model()).await
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
async fn prepare_chat_completions(
|
||||||
self_: &ClaudeClient,
|
self_: &ClaudeClient,
|
||||||
|
client: &ReqwestClient,
|
||||||
data: ChatCompletionsData,
|
data: ChatCompletionsData,
|
||||||
) -> Result<RequestData> {
|
) -> Result<RequestData> {
|
||||||
let api_key = self_.get_api_key()?;
|
|
||||||
let api_base = self_
|
let api_base = self_
|
||||||
.get_api_base()
|
.get_api_base()
|
||||||
.unwrap_or_else(|_| API_BASE.to_string());
|
.unwrap_or_else(|_| API_BASE.to_string());
|
||||||
@@ -53,7 +76,33 @@ fn prepare_chat_completions(
|
|||||||
let mut request_data = RequestData::new(url, body);
|
let mut request_data = RequestData::new(url, body);
|
||||||
|
|
||||||
request_data.header("anthropic-version", "2023-06-01");
|
request_data.header("anthropic-version", "2023-06-01");
|
||||||
request_data.header("x-api-key", api_key);
|
|
||||||
|
let uses_oauth = self_.config.auth.as_deref() == Some("oauth");
|
||||||
|
|
||||||
|
if uses_oauth {
|
||||||
|
let provider = ClaudeOAuthProvider;
|
||||||
|
let ready = oauth::prepare_oauth_access_token(client, &provider, self_.name()).await?;
|
||||||
|
if !ready {
|
||||||
|
bail!(
|
||||||
|
"OAuth configured but no tokens found for '{}'. Run: loki --authenticate {}",
|
||||||
|
self_.name(),
|
||||||
|
self_.name()
|
||||||
|
);
|
||||||
|
}
|
||||||
|
let token = get_access_token(self_.name())?;
|
||||||
|
request_data.bearer_auth(token);
|
||||||
|
for (key, value) in provider.extra_request_headers() {
|
||||||
|
request_data.header(key, value);
|
||||||
|
}
|
||||||
|
} else if let Ok(api_key) = self_.get_api_key() {
|
||||||
|
request_data.header("x-api-key", api_key);
|
||||||
|
} else {
|
||||||
|
bail!(
|
||||||
|
"No authentication configured for '{}'. Set `api_key` or use `auth: oauth` with `loki --authenticate {}`.",
|
||||||
|
self_.name(),
|
||||||
|
self_.name()
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
Ok(request_data)
|
Ok(request_data)
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -0,0 +1,39 @@
|
|||||||
|
use super::oauth::OAuthProvider;
|
||||||
|
|
||||||
|
pub const BETA_HEADER: &str = "oauth-2025-04-20";
|
||||||
|
|
||||||
|
pub struct ClaudeOAuthProvider;
|
||||||
|
|
||||||
|
impl OAuthProvider for ClaudeOAuthProvider {
|
||||||
|
fn provider_name(&self) -> &str {
|
||||||
|
"claude"
|
||||||
|
}
|
||||||
|
|
||||||
|
fn client_id(&self) -> &str {
|
||||||
|
"9d1c250a-e61b-44d9-88ed-5944d1962f5e"
|
||||||
|
}
|
||||||
|
|
||||||
|
fn authorize_url(&self) -> &str {
|
||||||
|
"https://claude.ai/oauth/authorize"
|
||||||
|
}
|
||||||
|
|
||||||
|
fn token_url(&self) -> &str {
|
||||||
|
"https://console.anthropic.com/v1/oauth/token"
|
||||||
|
}
|
||||||
|
|
||||||
|
fn redirect_uri(&self) -> &str {
|
||||||
|
"https://console.anthropic.com/oauth/code/callback"
|
||||||
|
}
|
||||||
|
|
||||||
|
fn scopes(&self) -> &str {
|
||||||
|
"org:create_api_key user:profile user:inference"
|
||||||
|
}
|
||||||
|
|
||||||
|
fn extra_token_headers(&self) -> Vec<(&str, &str)> {
|
||||||
|
vec![("anthropic-beta", BETA_HEADER)]
|
||||||
|
}
|
||||||
|
|
||||||
|
fn extra_request_headers(&self) -> Vec<(&str, &str)> {
|
||||||
|
vec![("anthropic-beta", BETA_HEADER)]
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -24,7 +24,7 @@ impl CohereClient {
|
|||||||
config_get_fn!(api_key, get_api_key);
|
config_get_fn!(api_key, get_api_key);
|
||||||
config_get_fn!(api_base, get_api_base);
|
config_get_fn!(api_base, get_api_base);
|
||||||
|
|
||||||
pub const PROMPTS: [PromptAction<'static>; 1] = [("api_key", "API Key", None, true)];
|
create_client_config!([("api_key", "API Key", None, true)]);
|
||||||
}
|
}
|
||||||
|
|
||||||
impl_client_trait!(
|
impl_client_trait!(
|
||||||
|
|||||||
@@ -47,6 +47,10 @@ pub trait Client: Sync + Send {
|
|||||||
|
|
||||||
fn model(&self) -> &Model;
|
fn model(&self) -> &Model;
|
||||||
|
|
||||||
|
fn supports_oauth(&self) -> bool {
|
||||||
|
false
|
||||||
|
}
|
||||||
|
|
||||||
fn build_client(&self) -> Result<ReqwestClient> {
|
fn build_client(&self) -> Result<ReqwestClient> {
|
||||||
let mut builder = ReqwestClient::builder();
|
let mut builder = ReqwestClient::builder();
|
||||||
let extra = self.extra_config();
|
let extra = self.extra_config();
|
||||||
@@ -489,14 +493,6 @@ pub async fn call_chat_completions_streaming(
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
pub fn noop_prepare_embeddings<T>(_client: &T, _data: &EmbeddingsData) -> Result<RequestData> {
|
|
||||||
bail!("The client doesn't support embeddings api")
|
|
||||||
}
|
|
||||||
|
|
||||||
pub async fn noop_embeddings(_builder: RequestBuilder, _model: &Model) -> Result<EmbeddingsOutput> {
|
|
||||||
bail!("The client doesn't support embeddings api")
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn noop_prepare_rerank<T>(_client: &T, _data: &RerankData) -> Result<RequestData> {
|
pub fn noop_prepare_rerank<T>(_client: &T, _data: &RerankData) -> Result<RequestData> {
|
||||||
bail!("The client doesn't support rerank api")
|
bail!("The client doesn't support rerank api")
|
||||||
}
|
}
|
||||||
@@ -554,7 +550,7 @@ pub fn json_str_from_map<'a>(
|
|||||||
map.get(field_name).and_then(|v| v.as_str())
|
map.get(field_name).and_then(|v| v.as_str())
|
||||||
}
|
}
|
||||||
|
|
||||||
async fn set_client_models_config(client_config: &mut Value, client: &str) -> Result<String> {
|
pub async fn set_client_models_config(client_config: &mut Value, client: &str) -> Result<String> {
|
||||||
if let Some(provider) = ALL_PROVIDER_MODELS.iter().find(|v| v.provider == client) {
|
if let Some(provider) = ALL_PROVIDER_MODELS.iter().find(|v| v.provider == client) {
|
||||||
let models: Vec<String> = provider
|
let models: Vec<String> = provider
|
||||||
.models
|
.models
|
||||||
|
|||||||
@@ -4,7 +4,7 @@ use super::*;
|
|||||||
use anyhow::{Context, Result};
|
use anyhow::{Context, Result};
|
||||||
use reqwest::RequestBuilder;
|
use reqwest::RequestBuilder;
|
||||||
use serde::Deserialize;
|
use serde::Deserialize;
|
||||||
use serde_json::{json, Value};
|
use serde_json::{Value, json};
|
||||||
|
|
||||||
const API_BASE: &str = "https://generativelanguage.googleapis.com/v1beta";
|
const API_BASE: &str = "https://generativelanguage.googleapis.com/v1beta";
|
||||||
|
|
||||||
@@ -23,7 +23,7 @@ impl GeminiClient {
|
|||||||
config_get_fn!(api_key, get_api_key);
|
config_get_fn!(api_key, get_api_key);
|
||||||
config_get_fn!(api_base, get_api_base);
|
config_get_fn!(api_base, get_api_base);
|
||||||
|
|
||||||
pub const PROMPTS: [PromptAction<'static>; 1] = [("api_key", "API Key", None, true)];
|
create_client_config!([("api_key", "API Key", None, true)]);
|
||||||
}
|
}
|
||||||
|
|
||||||
impl_client_trait!(
|
impl_client_trait!(
|
||||||
|
|||||||
+39
-1
@@ -90,7 +90,7 @@ macro_rules! register_client {
|
|||||||
pub async fn create_client_config(client: &str, vault: &$crate::vault::Vault) -> anyhow::Result<(String, serde_json::Value)> {
|
pub async fn create_client_config(client: &str, vault: &$crate::vault::Vault) -> anyhow::Result<(String, serde_json::Value)> {
|
||||||
$(
|
$(
|
||||||
if client == $client::NAME && client != $crate::client::OpenAICompatibleClient::NAME {
|
if client == $client::NAME && client != $crate::client::OpenAICompatibleClient::NAME {
|
||||||
return create_config(&$client::PROMPTS, $client::NAME, vault).await
|
return $client::create_client_config(vault).await
|
||||||
}
|
}
|
||||||
)+
|
)+
|
||||||
if let Some(ret) = create_openai_compatible_client_config(client).await? {
|
if let Some(ret) = create_openai_compatible_client_config(client).await? {
|
||||||
@@ -218,6 +218,44 @@ macro_rules! impl_client_trait {
|
|||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#[macro_export]
|
||||||
|
macro_rules! create_client_config {
|
||||||
|
($prompts:expr) => {
|
||||||
|
pub async fn create_client_config(
|
||||||
|
vault: &$crate::vault::Vault,
|
||||||
|
) -> anyhow::Result<(String, serde_json::Value)> {
|
||||||
|
$crate::client::create_config(&$prompts, Self::NAME, vault).await
|
||||||
|
}
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
|
#[macro_export]
|
||||||
|
macro_rules! create_oauth_supported_client_config {
|
||||||
|
() => {
|
||||||
|
pub async fn create_client_config(vault: &$crate::vault::Vault) -> anyhow::Result<(String, serde_json::Value)> {
|
||||||
|
let mut config = serde_json::json!({ "type": Self::NAME });
|
||||||
|
|
||||||
|
let auth_method = inquire::Select::new(
|
||||||
|
"Authentication method:",
|
||||||
|
vec!["API Key", "OAuth"],
|
||||||
|
)
|
||||||
|
.prompt()?;
|
||||||
|
|
||||||
|
if auth_method == "API Key" {
|
||||||
|
let env_name = format!("{}_API_KEY", Self::NAME).to_ascii_uppercase();
|
||||||
|
vault.add_secret(&env_name)?;
|
||||||
|
config["api_key"] = format!("{{{{{env_name}}}}}").into();
|
||||||
|
} else {
|
||||||
|
config["auth"] = "oauth".into();
|
||||||
|
}
|
||||||
|
|
||||||
|
let model = $crate::client::set_client_models_config(&mut config, Self::NAME).await?;
|
||||||
|
let clients = json!(vec![config]);
|
||||||
|
Ok((model, clients))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
#[macro_export]
|
#[macro_export]
|
||||||
macro_rules! config_get_fn {
|
macro_rules! config_get_fn {
|
||||||
($field_name:ident, $fn_name:ident) => {
|
($field_name:ident, $fn_name:ident) => {
|
||||||
|
|||||||
@@ -1,6 +1,8 @@
|
|||||||
mod access_token;
|
mod access_token;
|
||||||
|
mod claude_oauth;
|
||||||
mod common;
|
mod common;
|
||||||
mod message;
|
mod message;
|
||||||
|
pub mod oauth;
|
||||||
#[macro_use]
|
#[macro_use]
|
||||||
mod macros;
|
mod macros;
|
||||||
mod model;
|
mod model;
|
||||||
|
|||||||
@@ -0,0 +1,279 @@
|
|||||||
|
use super::ClientConfig;
|
||||||
|
use super::access_token::{is_valid_access_token, set_access_token};
|
||||||
|
use crate::config::Config;
|
||||||
|
use anyhow::{Result, bail};
|
||||||
|
use base64::Engine;
|
||||||
|
use base64::engine::general_purpose::URL_SAFE_NO_PAD;
|
||||||
|
use chrono::Utc;
|
||||||
|
use inquire::Text;
|
||||||
|
use reqwest::Client as ReqwestClient;
|
||||||
|
use serde::{Deserialize, Serialize};
|
||||||
|
use serde_json::{Value, json};
|
||||||
|
use sha2::{Digest, Sha256};
|
||||||
|
use std::fs;
|
||||||
|
use uuid::Uuid;
|
||||||
|
|
||||||
|
pub trait OAuthProvider: Send + Sync {
|
||||||
|
fn provider_name(&self) -> &str;
|
||||||
|
fn client_id(&self) -> &str;
|
||||||
|
fn authorize_url(&self) -> &str;
|
||||||
|
fn token_url(&self) -> &str;
|
||||||
|
fn redirect_uri(&self) -> &str;
|
||||||
|
fn scopes(&self) -> &str;
|
||||||
|
|
||||||
|
fn extra_token_headers(&self) -> Vec<(&str, &str)> {
|
||||||
|
vec![]
|
||||||
|
}
|
||||||
|
|
||||||
|
fn extra_request_headers(&self) -> Vec<(&str, &str)> {
|
||||||
|
vec![]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
#[derive(Debug, Clone, Serialize, Deserialize)]
|
||||||
|
pub struct OAuthTokens {
|
||||||
|
pub access_token: String,
|
||||||
|
pub refresh_token: String,
|
||||||
|
pub expires_at: i64,
|
||||||
|
}
|
||||||
|
|
||||||
|
pub async fn run_oauth_flow(provider: &impl OAuthProvider, client_name: &str) -> Result<()> {
|
||||||
|
let random_bytes: [u8; 32] = rand::random::<[u8; 32]>();
|
||||||
|
let code_verifier = URL_SAFE_NO_PAD.encode(random_bytes);
|
||||||
|
|
||||||
|
let mut hasher = Sha256::new();
|
||||||
|
hasher.update(code_verifier.as_bytes());
|
||||||
|
let code_challenge = URL_SAFE_NO_PAD.encode(hasher.finalize());
|
||||||
|
|
||||||
|
let state = Uuid::new_v4().to_string();
|
||||||
|
|
||||||
|
let encoded_scopes = urlencoding::encode(provider.scopes());
|
||||||
|
let encoded_redirect = urlencoding::encode(provider.redirect_uri());
|
||||||
|
|
||||||
|
let authorize_url = format!(
|
||||||
|
"{}?code=true&client_id={}&response_type=code&scope={}&redirect_uri={}&code_challenge={}&code_challenge_method=S256&state={}",
|
||||||
|
provider.authorize_url(),
|
||||||
|
provider.client_id(),
|
||||||
|
encoded_scopes,
|
||||||
|
encoded_redirect,
|
||||||
|
code_challenge,
|
||||||
|
state
|
||||||
|
);
|
||||||
|
|
||||||
|
println!(
|
||||||
|
"\nOpen this URL to authenticate with {} (client '{}'):\n",
|
||||||
|
provider.provider_name(),
|
||||||
|
client_name
|
||||||
|
);
|
||||||
|
println!(" {authorize_url}\n");
|
||||||
|
|
||||||
|
let _ = open::that(&authorize_url);
|
||||||
|
|
||||||
|
let input = Text::new("Paste the authorization code:").prompt()?;
|
||||||
|
|
||||||
|
let parts: Vec<&str> = input.splitn(2, '#').collect();
|
||||||
|
if parts.len() != 2 {
|
||||||
|
bail!("Invalid authorization code format. Expected format: <code>#<state>");
|
||||||
|
}
|
||||||
|
let code = parts[0];
|
||||||
|
let returned_state = parts[1];
|
||||||
|
|
||||||
|
if returned_state != state {
|
||||||
|
bail!(
|
||||||
|
"OAuth state mismatch: expected '{state}', got '{returned_state}'. \
|
||||||
|
This may indicate a CSRF attack or a stale authorization attempt."
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
let client = ReqwestClient::new();
|
||||||
|
let mut request = client.post(provider.token_url()).json(&json!({
|
||||||
|
"grant_type": "authorization_code",
|
||||||
|
"client_id": provider.client_id(),
|
||||||
|
"code": code,
|
||||||
|
"code_verifier": code_verifier,
|
||||||
|
"redirect_uri": provider.redirect_uri(),
|
||||||
|
"state": state,
|
||||||
|
}));
|
||||||
|
|
||||||
|
for (key, value) in provider.extra_token_headers() {
|
||||||
|
request = request.header(key, value);
|
||||||
|
}
|
||||||
|
|
||||||
|
let response: Value = request.send().await?.json().await?;
|
||||||
|
|
||||||
|
let access_token = response["access_token"]
|
||||||
|
.as_str()
|
||||||
|
.ok_or_else(|| anyhow::anyhow!("Missing access_token in response: {response}"))?
|
||||||
|
.to_string();
|
||||||
|
let refresh_token = response["refresh_token"]
|
||||||
|
.as_str()
|
||||||
|
.ok_or_else(|| anyhow::anyhow!("Missing refresh_token in response: {response}"))?
|
||||||
|
.to_string();
|
||||||
|
let expires_in = response["expires_in"]
|
||||||
|
.as_i64()
|
||||||
|
.ok_or_else(|| anyhow::anyhow!("Missing expires_in in response: {response}"))?;
|
||||||
|
|
||||||
|
let expires_at = Utc::now().timestamp() + expires_in;
|
||||||
|
|
||||||
|
let tokens = OAuthTokens {
|
||||||
|
access_token,
|
||||||
|
refresh_token,
|
||||||
|
expires_at,
|
||||||
|
};
|
||||||
|
|
||||||
|
save_oauth_tokens(client_name, &tokens)?;
|
||||||
|
|
||||||
|
println!(
|
||||||
|
"Successfully authenticated client '{}' with {} via OAuth. Tokens saved.",
|
||||||
|
client_name,
|
||||||
|
provider.provider_name()
|
||||||
|
);
|
||||||
|
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
|
||||||
|
pub fn load_oauth_tokens(client_name: &str) -> Option<OAuthTokens> {
|
||||||
|
let path = Config::token_file(client_name);
|
||||||
|
let content = fs::read_to_string(path).ok()?;
|
||||||
|
serde_json::from_str(&content).ok()
|
||||||
|
}
|
||||||
|
|
||||||
|
fn save_oauth_tokens(client_name: &str, tokens: &OAuthTokens) -> Result<()> {
|
||||||
|
let path = Config::token_file(client_name);
|
||||||
|
if let Some(parent) = path.parent() {
|
||||||
|
fs::create_dir_all(parent)?;
|
||||||
|
}
|
||||||
|
let json = serde_json::to_string_pretty(tokens)?;
|
||||||
|
fs::write(path, json)?;
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
|
||||||
|
pub async fn refresh_oauth_token(
|
||||||
|
client: &ReqwestClient,
|
||||||
|
provider: &dyn OAuthProvider,
|
||||||
|
client_name: &str,
|
||||||
|
tokens: &OAuthTokens,
|
||||||
|
) -> Result<OAuthTokens> {
|
||||||
|
let mut request = client.post(provider.token_url()).json(&json!({
|
||||||
|
"grant_type": "refresh_token",
|
||||||
|
"client_id": provider.client_id(),
|
||||||
|
"refresh_token": tokens.refresh_token,
|
||||||
|
}));
|
||||||
|
|
||||||
|
for (key, value) in provider.extra_token_headers() {
|
||||||
|
request = request.header(key, value);
|
||||||
|
}
|
||||||
|
|
||||||
|
let response: Value = request.send().await?.json().await?;
|
||||||
|
|
||||||
|
let access_token = response["access_token"]
|
||||||
|
.as_str()
|
||||||
|
.ok_or_else(|| anyhow::anyhow!("Missing access_token in refresh response: {response}"))?
|
||||||
|
.to_string();
|
||||||
|
let refresh_token = response["refresh_token"]
|
||||||
|
.as_str()
|
||||||
|
.ok_or_else(|| anyhow::anyhow!("Missing refresh_token in refresh response: {response}"))?
|
||||||
|
.to_string();
|
||||||
|
let expires_in = response["expires_in"]
|
||||||
|
.as_i64()
|
||||||
|
.ok_or_else(|| anyhow::anyhow!("Missing expires_in in refresh response: {response}"))?;
|
||||||
|
|
||||||
|
let expires_at = Utc::now().timestamp() + expires_in;
|
||||||
|
|
||||||
|
let new_tokens = OAuthTokens {
|
||||||
|
access_token,
|
||||||
|
refresh_token,
|
||||||
|
expires_at,
|
||||||
|
};
|
||||||
|
|
||||||
|
save_oauth_tokens(client_name, &new_tokens)?;
|
||||||
|
|
||||||
|
Ok(new_tokens)
|
||||||
|
}
|
||||||
|
|
||||||
|
pub async fn prepare_oauth_access_token(
|
||||||
|
client: &ReqwestClient,
|
||||||
|
provider: &impl OAuthProvider,
|
||||||
|
client_name: &str,
|
||||||
|
) -> Result<bool> {
|
||||||
|
if is_valid_access_token(client_name) {
|
||||||
|
return Ok(true);
|
||||||
|
}
|
||||||
|
|
||||||
|
let tokens = match load_oauth_tokens(client_name) {
|
||||||
|
Some(t) => t,
|
||||||
|
None => return Ok(false),
|
||||||
|
};
|
||||||
|
|
||||||
|
let tokens = if Utc::now().timestamp() >= tokens.expires_at {
|
||||||
|
refresh_oauth_token(client, provider, client_name, &tokens).await?
|
||||||
|
} else {
|
||||||
|
tokens
|
||||||
|
};
|
||||||
|
|
||||||
|
set_access_token(client_name, tokens.access_token.clone(), tokens.expires_at);
|
||||||
|
|
||||||
|
Ok(true)
|
||||||
|
}
|
||||||
|
|
||||||
|
pub fn get_oauth_provider(provider_type: &str) -> Option<impl OAuthProvider> {
|
||||||
|
match provider_type {
|
||||||
|
"claude" => Some(super::claude_oauth::ClaudeOAuthProvider),
|
||||||
|
_ => None,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
pub fn resolve_provider_type(client_name: &str, clients: &[ClientConfig]) -> Option<&'static str> {
|
||||||
|
for client_config in clients {
|
||||||
|
let (config_name, provider_type, auth) = client_config_info(client_config);
|
||||||
|
if config_name == client_name {
|
||||||
|
if auth == Some("oauth") && get_oauth_provider(provider_type).is_some() {
|
||||||
|
return Some(provider_type);
|
||||||
|
}
|
||||||
|
return None;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
None
|
||||||
|
}
|
||||||
|
|
||||||
|
pub fn list_oauth_capable_clients(clients: &[ClientConfig]) -> Vec<String> {
|
||||||
|
clients
|
||||||
|
.iter()
|
||||||
|
.filter_map(|client_config| {
|
||||||
|
let (name, provider_type, auth) = client_config_info(client_config);
|
||||||
|
if auth == Some("oauth") && get_oauth_provider(provider_type).is_some() {
|
||||||
|
Some(name.to_string())
|
||||||
|
} else {
|
||||||
|
None
|
||||||
|
}
|
||||||
|
})
|
||||||
|
.collect()
|
||||||
|
}
|
||||||
|
|
||||||
|
fn client_config_info(client_config: &ClientConfig) -> (&str, &'static str, Option<&str>) {
|
||||||
|
match client_config {
|
||||||
|
ClientConfig::ClaudeConfig(c) => (
|
||||||
|
c.name.as_deref().unwrap_or("claude"),
|
||||||
|
"claude",
|
||||||
|
c.auth.as_deref(),
|
||||||
|
),
|
||||||
|
ClientConfig::OpenAIConfig(c) => (c.name.as_deref().unwrap_or("openai"), "openai", None),
|
||||||
|
ClientConfig::OpenAICompatibleConfig(c) => (
|
||||||
|
c.name.as_deref().unwrap_or("openai-compatible"),
|
||||||
|
"openai-compatible",
|
||||||
|
None,
|
||||||
|
),
|
||||||
|
ClientConfig::GeminiConfig(c) => (c.name.as_deref().unwrap_or("gemini"), "gemini", None),
|
||||||
|
ClientConfig::CohereConfig(c) => (c.name.as_deref().unwrap_or("cohere"), "cohere", None),
|
||||||
|
ClientConfig::AzureOpenAIConfig(c) => (
|
||||||
|
c.name.as_deref().unwrap_or("azure-openai"),
|
||||||
|
"azure-openai",
|
||||||
|
None,
|
||||||
|
),
|
||||||
|
ClientConfig::VertexAIConfig(c) => {
|
||||||
|
(c.name.as_deref().unwrap_or("vertexai"), "vertexai", None)
|
||||||
|
}
|
||||||
|
ClientConfig::BedrockConfig(c) => (c.name.as_deref().unwrap_or("bedrock"), "bedrock", None),
|
||||||
|
ClientConfig::Unknown => ("unknown", "unknown", None),
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -2,10 +2,10 @@ use super::*;
|
|||||||
|
|
||||||
use crate::utils::strip_think_tag;
|
use crate::utils::strip_think_tag;
|
||||||
|
|
||||||
use anyhow::{bail, Context, Result};
|
use anyhow::{Context, Result, bail};
|
||||||
use reqwest::RequestBuilder;
|
use reqwest::RequestBuilder;
|
||||||
use serde::Deserialize;
|
use serde::Deserialize;
|
||||||
use serde_json::{json, Value};
|
use serde_json::{Value, json};
|
||||||
|
|
||||||
const API_BASE: &str = "https://api.openai.com/v1";
|
const API_BASE: &str = "https://api.openai.com/v1";
|
||||||
|
|
||||||
@@ -25,7 +25,7 @@ impl OpenAIClient {
|
|||||||
config_get_fn!(api_key, get_api_key);
|
config_get_fn!(api_key, get_api_key);
|
||||||
config_get_fn!(api_base, get_api_base);
|
config_get_fn!(api_base, get_api_base);
|
||||||
|
|
||||||
pub const PROMPTS: [PromptAction<'static>; 1] = [("api_key", "API Key", None, true)];
|
create_client_config!([("api_key", "API Key", None, true)]);
|
||||||
}
|
}
|
||||||
|
|
||||||
impl_client_trait!(
|
impl_client_trait!(
|
||||||
@@ -114,7 +114,9 @@ pub async fn openai_chat_completions_streaming(
|
|||||||
function_arguments = String::from("{}");
|
function_arguments = String::from("{}");
|
||||||
}
|
}
|
||||||
let arguments: Value = function_arguments.parse().with_context(|| {
|
let arguments: Value = function_arguments.parse().with_context(|| {
|
||||||
format!("Tool call '{function_name}' has non-JSON arguments '{function_arguments}'")
|
format!(
|
||||||
|
"Tool call '{function_name}' has non-JSON arguments '{function_arguments}'"
|
||||||
|
)
|
||||||
})?;
|
})?;
|
||||||
handler.tool_call(ToolCall::new(
|
handler.tool_call(ToolCall::new(
|
||||||
function_name.clone(),
|
function_name.clone(),
|
||||||
|
|||||||
@@ -21,7 +21,7 @@ impl OpenAICompatibleClient {
|
|||||||
config_get_fn!(api_base, get_api_base);
|
config_get_fn!(api_base, get_api_base);
|
||||||
config_get_fn!(api_key, get_api_key);
|
config_get_fn!(api_key, get_api_key);
|
||||||
|
|
||||||
pub const PROMPTS: [PromptAction<'static>; 0] = [];
|
create_client_config!([]);
|
||||||
}
|
}
|
||||||
|
|
||||||
impl_client_trait!(
|
impl_client_trait!(
|
||||||
|
|||||||
+24
-16
@@ -3,11 +3,11 @@ use super::claude::*;
|
|||||||
use super::openai::*;
|
use super::openai::*;
|
||||||
use super::*;
|
use super::*;
|
||||||
|
|
||||||
use anyhow::{anyhow, bail, Context, Result};
|
use anyhow::{Context, Result, anyhow, bail};
|
||||||
use chrono::{Duration, Utc};
|
use chrono::{Duration, Utc};
|
||||||
use reqwest::{Client as ReqwestClient, RequestBuilder};
|
use reqwest::{Client as ReqwestClient, RequestBuilder};
|
||||||
use serde::Deserialize;
|
use serde::Deserialize;
|
||||||
use serde_json::{json, Value};
|
use serde_json::{Value, json};
|
||||||
use std::{path::PathBuf, str::FromStr};
|
use std::{path::PathBuf, str::FromStr};
|
||||||
|
|
||||||
#[derive(Debug, Clone, Deserialize, Default)]
|
#[derive(Debug, Clone, Deserialize, Default)]
|
||||||
@@ -26,10 +26,10 @@ impl VertexAIClient {
|
|||||||
config_get_fn!(project_id, get_project_id);
|
config_get_fn!(project_id, get_project_id);
|
||||||
config_get_fn!(location, get_location);
|
config_get_fn!(location, get_location);
|
||||||
|
|
||||||
pub const PROMPTS: [PromptAction<'static>; 2] = [
|
create_client_config!([
|
||||||
("project_id", "Project ID", None, false),
|
("project_id", "Project ID", None, false),
|
||||||
("location", "Location", None, false),
|
("location", "Location", None, false),
|
||||||
];
|
]);
|
||||||
}
|
}
|
||||||
|
|
||||||
#[async_trait::async_trait]
|
#[async_trait::async_trait]
|
||||||
@@ -99,9 +99,13 @@ fn prepare_chat_completions(
|
|||||||
let access_token = get_access_token(self_.name())?;
|
let access_token = get_access_token(self_.name())?;
|
||||||
|
|
||||||
let base_url = if location == "global" {
|
let base_url = if location == "global" {
|
||||||
format!("https://aiplatform.googleapis.com/v1/projects/{project_id}/locations/global/publishers")
|
format!(
|
||||||
|
"https://aiplatform.googleapis.com/v1/projects/{project_id}/locations/global/publishers"
|
||||||
|
)
|
||||||
} else {
|
} else {
|
||||||
format!("https://{location}-aiplatform.googleapis.com/v1/projects/{project_id}/locations/{location}/publishers")
|
format!(
|
||||||
|
"https://{location}-aiplatform.googleapis.com/v1/projects/{project_id}/locations/{location}/publishers"
|
||||||
|
)
|
||||||
};
|
};
|
||||||
|
|
||||||
let model_name = self_.model.real_name();
|
let model_name = self_.model.real_name();
|
||||||
@@ -158,9 +162,13 @@ fn prepare_embeddings(self_: &VertexAIClient, data: &EmbeddingsData) -> Result<R
|
|||||||
let access_token = get_access_token(self_.name())?;
|
let access_token = get_access_token(self_.name())?;
|
||||||
|
|
||||||
let base_url = if location == "global" {
|
let base_url = if location == "global" {
|
||||||
format!("https://aiplatform.googleapis.com/v1/projects/{project_id}/locations/global/publishers")
|
format!(
|
||||||
|
"https://aiplatform.googleapis.com/v1/projects/{project_id}/locations/global/publishers"
|
||||||
|
)
|
||||||
} else {
|
} else {
|
||||||
format!("https://{location}-aiplatform.googleapis.com/v1/projects/{project_id}/locations/{location}/publishers")
|
format!(
|
||||||
|
"https://{location}-aiplatform.googleapis.com/v1/projects/{project_id}/locations/{location}/publishers"
|
||||||
|
)
|
||||||
};
|
};
|
||||||
let url = format!(
|
let url = format!(
|
||||||
"{base_url}/google/models/{}:predict",
|
"{base_url}/google/models/{}:predict",
|
||||||
@@ -220,12 +228,12 @@ pub async fn gemini_chat_completions_streaming(
|
|||||||
part["functionCall"]["args"].as_object(),
|
part["functionCall"]["args"].as_object(),
|
||||||
) {
|
) {
|
||||||
let thought_signature = part["thoughtSignature"]
|
let thought_signature = part["thoughtSignature"]
|
||||||
.as_str()
|
.as_str()
|
||||||
.or_else(|| part["thought_signature"].as_str())
|
.or_else(|| part["thought_signature"].as_str())
|
||||||
.map(|s| s.to_string());
|
.map(|s| s.to_string());
|
||||||
handler.tool_call(
|
handler.tool_call(
|
||||||
ToolCall::new(name.to_string(), json!(args), None)
|
ToolCall::new(name.to_string(), json!(args), None)
|
||||||
.with_thought_signature(thought_signature),
|
.with_thought_signature(thought_signature),
|
||||||
)?;
|
)?;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -288,12 +296,12 @@ fn gemini_extract_chat_completions_text(data: &Value) -> Result<ChatCompletionsO
|
|||||||
part["functionCall"]["args"].as_object(),
|
part["functionCall"]["args"].as_object(),
|
||||||
) {
|
) {
|
||||||
let thought_signature = part["thoughtSignature"]
|
let thought_signature = part["thoughtSignature"]
|
||||||
.as_str()
|
.as_str()
|
||||||
.or_else(|| part["thought_signature"].as_str())
|
.or_else(|| part["thought_signature"].as_str())
|
||||||
.map(|s| s.to_string());
|
.map(|s| s.to_string());
|
||||||
tool_calls.push(
|
tool_calls.push(
|
||||||
ToolCall::new(name.to_string(), json!(args), None)
|
ToolCall::new(name.to_string(), json!(args), None)
|
||||||
.with_thought_signature(thought_signature),
|
.with_thought_signature(thought_signature),
|
||||||
);
|
);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -428,6 +428,14 @@ impl Config {
|
|||||||
base_dir.join(env!("CARGO_CRATE_NAME"))
|
base_dir.join(env!("CARGO_CRATE_NAME"))
|
||||||
}
|
}
|
||||||
|
|
||||||
|
pub fn oauth_tokens_path() -> PathBuf {
|
||||||
|
Self::cache_path().join("oauth")
|
||||||
|
}
|
||||||
|
|
||||||
|
pub fn token_file(client_name: &str) -> PathBuf {
|
||||||
|
Self::oauth_tokens_path().join(format!("{client_name}_oauth_tokens.json"))
|
||||||
|
}
|
||||||
|
|
||||||
pub fn log_path() -> PathBuf {
|
pub fn log_path() -> PathBuf {
|
||||||
Config::cache_path().join(format!("{}.log", env!("CARGO_CRATE_NAME")))
|
Config::cache_path().join(format!("{}.log", env!("CARGO_CRATE_NAME")))
|
||||||
}
|
}
|
||||||
|
|||||||
+42
-3
@@ -16,7 +16,7 @@ mod vault;
|
|||||||
extern crate log;
|
extern crate log;
|
||||||
|
|
||||||
use crate::client::{
|
use crate::client::{
|
||||||
ModelType, call_chat_completions, call_chat_completions_streaming, list_models,
|
ModelType, call_chat_completions, call_chat_completions_streaming, list_models, oauth,
|
||||||
};
|
};
|
||||||
use crate::config::{
|
use crate::config::{
|
||||||
Agent, CODE_ROLE, Config, EXPLAIN_SHELL_ROLE, GlobalConfig, Input, SHELL_ROLE,
|
Agent, CODE_ROLE, Config, EXPLAIN_SHELL_ROLE, GlobalConfig, Input, SHELL_ROLE,
|
||||||
@@ -29,15 +29,17 @@ use crate::utils::*;
|
|||||||
|
|
||||||
use crate::cli::Cli;
|
use crate::cli::Cli;
|
||||||
use crate::vault::Vault;
|
use crate::vault::Vault;
|
||||||
use anyhow::{Result, bail};
|
use anyhow::{Result, anyhow, bail};
|
||||||
use clap::{CommandFactory, Parser};
|
use clap::{CommandFactory, Parser};
|
||||||
use clap_complete::CompleteEnv;
|
use clap_complete::CompleteEnv;
|
||||||
use inquire::Text;
|
use client::ClientConfig;
|
||||||
|
use inquire::{Select, Text};
|
||||||
use log::LevelFilter;
|
use log::LevelFilter;
|
||||||
use log4rs::append::console::ConsoleAppender;
|
use log4rs::append::console::ConsoleAppender;
|
||||||
use log4rs::append::file::FileAppender;
|
use log4rs::append::file::FileAppender;
|
||||||
use log4rs::config::{Appender, Logger, Root};
|
use log4rs::config::{Appender, Logger, Root};
|
||||||
use log4rs::encode::pattern::PatternEncoder;
|
use log4rs::encode::pattern::PatternEncoder;
|
||||||
|
use oauth::OAuthProvider;
|
||||||
use parking_lot::RwLock;
|
use parking_lot::RwLock;
|
||||||
use std::path::PathBuf;
|
use std::path::PathBuf;
|
||||||
use std::{env, mem, process, sync::Arc};
|
use std::{env, mem, process, sync::Arc};
|
||||||
@@ -81,6 +83,13 @@ async fn main() -> Result<()> {
|
|||||||
|
|
||||||
let log_path = setup_logger()?;
|
let log_path = setup_logger()?;
|
||||||
|
|
||||||
|
if let Some(client_arg) = &cli.authenticate {
|
||||||
|
let config = Config::init_bare()?;
|
||||||
|
let (client_name, provider) = resolve_oauth_client(client_arg.as_deref(), &config.clients)?;
|
||||||
|
oauth::run_oauth_flow(&provider, &client_name).await?;
|
||||||
|
return Ok(());
|
||||||
|
}
|
||||||
|
|
||||||
if vault_flags {
|
if vault_flags {
|
||||||
return Vault::handle_vault_flags(cli, Config::init_bare()?);
|
return Vault::handle_vault_flags(cli, Config::init_bare()?);
|
||||||
}
|
}
|
||||||
@@ -504,3 +513,33 @@ fn init_console_logger(
|
|||||||
.build(Root::builder().appender("console").build(root_log_level))
|
.build(Root::builder().appender("console").build(root_log_level))
|
||||||
.unwrap()
|
.unwrap()
|
||||||
}
|
}
|
||||||
|
|
||||||
|
fn resolve_oauth_client(
|
||||||
|
explicit: Option<&str>,
|
||||||
|
clients: &[ClientConfig],
|
||||||
|
) -> Result<(String, impl OAuthProvider)> {
|
||||||
|
if let Some(name) = explicit {
|
||||||
|
let provider_type = oauth::resolve_provider_type(name, clients)
|
||||||
|
.ok_or_else(|| anyhow!("Client '{name}' not found or doesn't support OAuth"))?;
|
||||||
|
let provider = oauth::get_oauth_provider(provider_type).unwrap();
|
||||||
|
return Ok((name.to_string(), provider));
|
||||||
|
}
|
||||||
|
|
||||||
|
let candidates = oauth::list_oauth_capable_clients(clients);
|
||||||
|
match candidates.len() {
|
||||||
|
0 => bail!("No OAuth-capable clients configured."),
|
||||||
|
1 => {
|
||||||
|
let name = &candidates[0];
|
||||||
|
let provider_type = oauth::resolve_provider_type(name, clients).unwrap();
|
||||||
|
let provider = oauth::get_oauth_provider(provider_type).unwrap();
|
||||||
|
Ok((name.clone(), provider))
|
||||||
|
}
|
||||||
|
_ => {
|
||||||
|
let choice =
|
||||||
|
Select::new("Select a client to authenticate:", candidates.clone()).prompt()?;
|
||||||
|
let provider_type = oauth::resolve_provider_type(&choice, clients).unwrap();
|
||||||
|
let provider = oauth::get_oauth_provider(provider_type).unwrap();
|
||||||
|
Ok((choice, provider))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|||||||
+20
-2
@@ -6,7 +6,7 @@ use self::completer::ReplCompleter;
|
|||||||
use self::highlighter::ReplHighlighter;
|
use self::highlighter::ReplHighlighter;
|
||||||
use self::prompt::ReplPrompt;
|
use self::prompt::ReplPrompt;
|
||||||
|
|
||||||
use crate::client::{call_chat_completions, call_chat_completions_streaming};
|
use crate::client::{call_chat_completions, call_chat_completions_streaming, init_client, oauth};
|
||||||
use crate::config::{
|
use crate::config::{
|
||||||
AgentVariables, AssertState, Config, GlobalConfig, Input, LastMessage, StateFlags,
|
AgentVariables, AssertState, Config, GlobalConfig, Input, LastMessage, StateFlags,
|
||||||
macro_execute,
|
macro_execute,
|
||||||
@@ -17,6 +17,7 @@ use crate::utils::{
|
|||||||
};
|
};
|
||||||
|
|
||||||
use crate::mcp::McpRegistry;
|
use crate::mcp::McpRegistry;
|
||||||
|
use crate::resolve_oauth_client;
|
||||||
use anyhow::{Context, Result, bail};
|
use anyhow::{Context, Result, bail};
|
||||||
use crossterm::cursor::SetCursorStyle;
|
use crossterm::cursor::SetCursorStyle;
|
||||||
use fancy_regex::Regex;
|
use fancy_regex::Regex;
|
||||||
@@ -32,10 +33,15 @@ use std::{env, mem, process};
|
|||||||
|
|
||||||
const MENU_NAME: &str = "completion_menu";
|
const MENU_NAME: &str = "completion_menu";
|
||||||
|
|
||||||
static REPL_COMMANDS: LazyLock<[ReplCommand; 37]> = LazyLock::new(|| {
|
static REPL_COMMANDS: LazyLock<[ReplCommand; 38]> = LazyLock::new(|| {
|
||||||
[
|
[
|
||||||
ReplCommand::new(".help", "Show this help guide", AssertState::pass()),
|
ReplCommand::new(".help", "Show this help guide", AssertState::pass()),
|
||||||
ReplCommand::new(".info", "Show system info", AssertState::pass()),
|
ReplCommand::new(".info", "Show system info", AssertState::pass()),
|
||||||
|
ReplCommand::new(
|
||||||
|
".authenticate",
|
||||||
|
"Authenticate the current model client via OAuth (if configured)",
|
||||||
|
AssertState::pass(),
|
||||||
|
),
|
||||||
ReplCommand::new(
|
ReplCommand::new(
|
||||||
".edit config",
|
".edit config",
|
||||||
"Modify configuration file",
|
"Modify configuration file",
|
||||||
@@ -421,6 +427,18 @@ pub async fn run_repl_command(
|
|||||||
}
|
}
|
||||||
None => println!("Usage: .model <name>"),
|
None => println!("Usage: .model <name>"),
|
||||||
},
|
},
|
||||||
|
".authenticate" => {
|
||||||
|
let client = init_client(config, None)?;
|
||||||
|
if !client.supports_oauth() {
|
||||||
|
bail!(
|
||||||
|
"Client '{}' doesn't either support OAuth or isn't configured to use it (i.e. uses an API key instead)",
|
||||||
|
client.name()
|
||||||
|
);
|
||||||
|
}
|
||||||
|
let clients = config.read().clients.clone();
|
||||||
|
let (client_name, provider) = resolve_oauth_client(Some(client.name()), &clients)?;
|
||||||
|
oauth::run_oauth_flow(&provider, &client_name).await?;
|
||||||
|
}
|
||||||
".prompt" => match args {
|
".prompt" => match args {
|
||||||
Some(text) => {
|
Some(text) => {
|
||||||
config.write().use_prompt(text)?;
|
config.write().use_prompt(text)?;
|
||||||
|
|||||||
+22
-11
@@ -6,7 +6,6 @@ use gman::providers::local::LocalProvider;
|
|||||||
use indoc::formatdoc;
|
use indoc::formatdoc;
|
||||||
use inquire::validator::Validation;
|
use inquire::validator::Validation;
|
||||||
use inquire::{Confirm, Password, PasswordDisplayMode, Text, min_length, required};
|
use inquire::{Confirm, Password, PasswordDisplayMode, Text, min_length, required};
|
||||||
use std::borrow::Cow;
|
|
||||||
use std::path::PathBuf;
|
use std::path::PathBuf;
|
||||||
|
|
||||||
pub fn ensure_password_file_initialized(local_provider: &mut LocalProvider) -> Result<()> {
|
pub fn ensure_password_file_initialized(local_provider: &mut LocalProvider) -> Result<()> {
|
||||||
@@ -166,18 +165,30 @@ pub fn create_vault_password_file(vault: &mut Vault) -> Result<()> {
|
|||||||
Ok(())
|
Ok(())
|
||||||
}
|
}
|
||||||
|
|
||||||
pub fn interpolate_secrets<'a>(content: &'a str, vault: &Vault) -> (Cow<'a, str>, Vec<String>) {
|
pub fn interpolate_secrets(content: &str, vault: &Vault) -> (String, Vec<String>) {
|
||||||
let mut missing_secrets = vec![];
|
let mut missing_secrets = vec![];
|
||||||
let parsed_content = SECRET_RE.replace_all(content, |caps: &fancy_regex::Captures<'_>| {
|
let parsed_content: String = content
|
||||||
let secret = vault.get_secret(caps[1].trim(), false);
|
.lines()
|
||||||
match secret {
|
.map(|line| {
|
||||||
Ok(s) => s,
|
if line.trim_start().starts_with('#') {
|
||||||
Err(_) => {
|
return line.to_string();
|
||||||
missing_secrets.push(caps[1].to_string());
|
|
||||||
"".to_string()
|
|
||||||
}
|
}
|
||||||
}
|
|
||||||
});
|
SECRET_RE
|
||||||
|
.replace_all(line, |caps: &fancy_regex::Captures<'_>| {
|
||||||
|
let secret = vault.get_secret(caps[1].trim(), false);
|
||||||
|
match secret {
|
||||||
|
Ok(s) => s,
|
||||||
|
Err(_) => {
|
||||||
|
missing_secrets.push(caps[1].to_string());
|
||||||
|
"".to_string()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
})
|
||||||
|
.to_string()
|
||||||
|
})
|
||||||
|
.collect::<Vec<_>>()
|
||||||
|
.join("\n");
|
||||||
|
|
||||||
(parsed_content, missing_secrets)
|
(parsed_content, missing_secrets)
|
||||||
}
|
}
|
||||||
|
|||||||
Reference in New Issue
Block a user