feat(routing): task classifier + default rules + CI test fixes — M4-004/005 #316

Merged
jason.woltje merged 4 commits from feat/m4-classifier-seeds into main 2026-03-23 00:26:50 +00:00
16 changed files with 3983 additions and 42 deletions
Showing only changes of commit aba7764043 - Show all commits

View File

@@ -2,3 +2,4 @@ export { OllamaAdapter } from './ollama.adapter.js';
export { AnthropicAdapter } from './anthropic.adapter.js';
export { OpenAIAdapter } from './openai.adapter.js';
export { OpenRouterAdapter } from './openrouter.adapter.js';
export { ZaiAdapter } from './zai.adapter.js';

View File

@@ -0,0 +1,187 @@
import { Logger } from '@nestjs/common';
import OpenAI from 'openai';
import type {
CompletionEvent,
CompletionParams,
IProviderAdapter,
ModelInfo,
ProviderHealth,
} from '@mosaic/types';
import { getModelCapability } from '../model-capabilities.js';
/**
* Default Z.ai API base URL.
* Z.ai (BigModel / Zhipu AI) exposes an OpenAI-compatible API at this endpoint.
* Can be overridden via the ZAI_BASE_URL environment variable.
*/
const DEFAULT_ZAI_BASE_URL = 'https://open.bigmodel.cn/api/paas/v4';
/**
* GLM-5 model identifier on the Z.ai platform.
*/
const GLM5_MODEL_ID = 'glm-5';
/**
* Z.ai (Zhipu AI / BigModel) provider adapter.
*
* Z.ai exposes an OpenAI-compatible REST API. This adapter uses the `openai`
* SDK with a custom base URL and the ZAI_API_KEY environment variable.
*
* Configuration:
* ZAI_API_KEY — required; Z.ai API key
* ZAI_BASE_URL — optional; override the default API base URL
*/
export class ZaiAdapter implements IProviderAdapter {
readonly name = 'zai';
private readonly logger = new Logger(ZaiAdapter.name);
private client: OpenAI | null = null;
private registeredModels: ModelInfo[] = [];
async register(): Promise<void> {
const apiKey = process.env['ZAI_API_KEY'];
if (!apiKey) {
this.logger.debug('Skipping Z.ai provider registration: ZAI_API_KEY not set');
return;
}
const baseURL = process.env['ZAI_BASE_URL'] ?? DEFAULT_ZAI_BASE_URL;
this.client = new OpenAI({ apiKey, baseURL });
this.registeredModels = this.buildModelList();
this.logger.log(`Z.ai provider registered with ${this.registeredModels.length} model(s)`);
}
listModels(): ModelInfo[] {
return this.registeredModels;
}
async healthCheck(): Promise<ProviderHealth> {
const apiKey = process.env['ZAI_API_KEY'];
if (!apiKey) {
return {
status: 'down',
lastChecked: new Date().toISOString(),
error: 'ZAI_API_KEY not configured',
};
}
const baseURL = process.env['ZAI_BASE_URL'] ?? DEFAULT_ZAI_BASE_URL;
const start = Date.now();
try {
const res = await fetch(`${baseURL}/models`, {
method: 'GET',
headers: {
Authorization: `Bearer ${apiKey}`,
Accept: 'application/json',
},
signal: AbortSignal.timeout(5000),
});
const latencyMs = Date.now() - start;
if (!res.ok) {
return {
status: 'degraded',
latencyMs,
lastChecked: new Date().toISOString(),
error: `HTTP ${res.status}`,
};
}
return { status: 'healthy', latencyMs, lastChecked: new Date().toISOString() };
} catch (err) {
const latencyMs = Date.now() - start;
const error = err instanceof Error ? err.message : String(err);
return { status: 'down', latencyMs, lastChecked: new Date().toISOString(), error };
}
}
/**
* Stream a completion through Z.ai's OpenAI-compatible API.
*/
async *createCompletion(params: CompletionParams): AsyncIterable<CompletionEvent> {
if (!this.client) {
throw new Error('ZaiAdapter is not initialized. Ensure ZAI_API_KEY is set.');
}
const stream = await this.client.chat.completions.create({
model: params.model,
messages: params.messages.map((m) => ({ role: m.role, content: m.content })),
temperature: params.temperature,
max_tokens: params.maxTokens,
stream: true,
});
let inputTokens = 0;
let outputTokens = 0;
for await (const chunk of stream) {
const choice = chunk.choices[0];
if (!choice) continue;
const delta = choice.delta;
if (delta.content) {
yield { type: 'text_delta', content: delta.content };
}
if (choice.finish_reason === 'stop') {
const usage = (chunk as { usage?: { prompt_tokens?: number; completion_tokens?: number } })
.usage;
if (usage) {
inputTokens = usage.prompt_tokens ?? 0;
outputTokens = usage.completion_tokens ?? 0;
}
}
}
yield {
type: 'done',
usage: { inputTokens, outputTokens },
};
}
// ---------------------------------------------------------------------------
// Private helpers
// ---------------------------------------------------------------------------
private buildModelList(): ModelInfo[] {
const capability = getModelCapability(GLM5_MODEL_ID);
if (!capability) {
this.logger.warn(`Model capability entry not found for '${GLM5_MODEL_ID}'; using defaults`);
return [
{
id: GLM5_MODEL_ID,
provider: 'zai',
name: 'GLM-5',
reasoning: false,
contextWindow: 128000,
maxTokens: 8192,
inputTypes: ['text'],
cost: { input: 0, output: 0, cacheRead: 0, cacheWrite: 0 },
},
];
}
return [
{
id: capability.id,
provider: 'zai',
name: capability.displayName,
reasoning: capability.capabilities.reasoning,
contextWindow: capability.contextWindow,
maxTokens: capability.maxOutputTokens,
inputTypes: capability.capabilities.vision ? ['text', 'image'] : ['text'],
cost: {
input: capability.costPer1kInput ?? 0,
output: capability.costPer1kOutput ?? 0,
cacheRead: 0,
cacheWrite: 0,
},
},
];
}
}

View File

@@ -1,6 +1,7 @@
import { Global, Module } from '@nestjs/common';
import { AgentService } from './agent.service.js';
import { ProviderService } from './provider.service.js';
import { ProviderCredentialsService } from './provider-credentials.service.js';
import { RoutingService } from './routing.service.js';
import { SkillLoaderService } from './skill-loader.service.js';
import { ProvidersController } from './providers.controller.js';
@@ -14,8 +15,20 @@ import { GCModule } from '../gc/gc.module.js';
@Global()
@Module({
imports: [CoordModule, McpClientModule, SkillsModule, GCModule],
providers: [ProviderService, RoutingService, SkillLoaderService, AgentService],
providers: [
ProviderService,
ProviderCredentialsService,
RoutingService,
SkillLoaderService,
AgentService,
],
controllers: [ProvidersController, SessionsController, AgentConfigsController],
exports: [AgentService, ProviderService, RoutingService, SkillLoaderService],
exports: [
AgentService,
ProviderService,
ProviderCredentialsService,
RoutingService,
SkillLoaderService,
],
})
export class AgentModule {}

View File

@@ -0,0 +1,23 @@
/** DTO for storing a provider credential. */
export interface StoreCredentialDto {
/** Provider identifier (e.g., 'anthropic', 'openai', 'openrouter', 'zai') */
provider: string;
/** Credential type */
type: 'api_key' | 'oauth_token';
/** Plain-text credential value — will be encrypted before storage */
value: string;
/** Optional extra config (e.g., base URL overrides) */
metadata?: Record<string, unknown>;
}
/** DTO returned in list/existence responses — never contains decrypted values. */
export interface ProviderCredentialSummaryDto {
provider: string;
credentialType: 'api_key' | 'oauth_token';
/** Whether a credential is stored for this provider */
exists: boolean;
expiresAt?: string | null;
metadata?: Record<string, unknown> | null;
createdAt: string;
updatedAt: string;
}

View File

@@ -0,0 +1,175 @@
import { Inject, Injectable, Logger } from '@nestjs/common';
import { createCipheriv, createDecipheriv, createHash, randomBytes } from 'node:crypto';
import type { Db } from '@mosaic/db';
import { providerCredentials, eq, and } from '@mosaic/db';
import { DB } from '../database/database.module.js';
import type { ProviderCredentialSummaryDto } from './provider-credentials.dto.js';
const ALGORITHM = 'aes-256-gcm';
const IV_LENGTH = 12; // 96-bit IV for GCM
const TAG_LENGTH = 16; // 128-bit auth tag
/**
* Derive a 32-byte AES-256 key from BETTER_AUTH_SECRET using SHA-256.
* The secret is assumed to be set in the environment.
*/
function deriveEncryptionKey(): Buffer {
const secret = process.env['BETTER_AUTH_SECRET'];
if (!secret) {
throw new Error('BETTER_AUTH_SECRET is not set — cannot derive encryption key');
}
return createHash('sha256').update(secret).digest();
}
/**
* Encrypt a plain-text value using AES-256-GCM.
* Output format: base64(iv + authTag + ciphertext)
*/
function encrypt(plaintext: string): string {
const key = deriveEncryptionKey();
const iv = randomBytes(IV_LENGTH);
const cipher = createCipheriv(ALGORITHM, key, iv);
const encrypted = Buffer.concat([cipher.update(plaintext, 'utf8'), cipher.final()]);
const authTag = cipher.getAuthTag();
// Combine iv (12) + authTag (16) + ciphertext and base64-encode
const combined = Buffer.concat([iv, authTag, encrypted]);
return combined.toString('base64');
}
/**
* Decrypt a value encrypted by `encrypt()`.
* Throws on authentication failure (tampered data).
*/
function decrypt(encoded: string): string {
const key = deriveEncryptionKey();
const combined = Buffer.from(encoded, 'base64');
const iv = combined.subarray(0, IV_LENGTH);
const authTag = combined.subarray(IV_LENGTH, IV_LENGTH + TAG_LENGTH);
const ciphertext = combined.subarray(IV_LENGTH + TAG_LENGTH);
const decipher = createDecipheriv(ALGORITHM, key, iv);
decipher.setAuthTag(authTag);
const decrypted = Buffer.concat([decipher.update(ciphertext), decipher.final()]);
return decrypted.toString('utf8');
}
@Injectable()
export class ProviderCredentialsService {
private readonly logger = new Logger(ProviderCredentialsService.name);
constructor(@Inject(DB) private readonly db: Db) {}
/**
* Encrypt and store (or update) a credential for the given user + provider.
* Uses an upsert pattern: one row per (userId, provider).
*/
async store(
userId: string,
provider: string,
type: 'api_key' | 'oauth_token',
value: string,
metadata?: Record<string, unknown>,
): Promise<void> {
const encryptedValue = encrypt(value);
await this.db
.insert(providerCredentials)
.values({
userId,
provider,
credentialType: type,
encryptedValue,
metadata: metadata ?? null,
})
.onConflictDoUpdate({
target: [providerCredentials.userId, providerCredentials.provider],
set: {
credentialType: type,
encryptedValue,
metadata: metadata ?? null,
updatedAt: new Date(),
},
});
this.logger.log(`Credential stored for user=${userId} provider=${provider}`);
}
/**
* Decrypt and return the plain-text credential value for the given user + provider.
* Returns null if no credential is stored.
*/
async retrieve(userId: string, provider: string): Promise<string | null> {
const rows = await this.db
.select()
.from(providerCredentials)
.where(
and(eq(providerCredentials.userId, userId), eq(providerCredentials.provider, provider)),
)
.limit(1);
if (rows.length === 0) return null;
const row = rows[0]!;
// Skip expired OAuth tokens
if (row.expiresAt && row.expiresAt < new Date()) {
this.logger.warn(`Credential for user=${userId} provider=${provider} has expired`);
return null;
}
try {
return decrypt(row.encryptedValue);
} catch (err) {
this.logger.error(
`Failed to decrypt credential for user=${userId} provider=${provider}`,
err instanceof Error ? err.message : String(err),
);
return null;
}
}
/**
* Delete the stored credential for the given user + provider.
*/
async remove(userId: string, provider: string): Promise<void> {
await this.db
.delete(providerCredentials)
.where(
and(eq(providerCredentials.userId, userId), eq(providerCredentials.provider, provider)),
);
this.logger.log(`Credential removed for user=${userId} provider=${provider}`);
}
/**
* List all providers for which the user has stored credentials.
* Never returns decrypted values.
*/
async listProviders(userId: string): Promise<ProviderCredentialSummaryDto[]> {
const rows = await this.db
.select({
provider: providerCredentials.provider,
credentialType: providerCredentials.credentialType,
expiresAt: providerCredentials.expiresAt,
metadata: providerCredentials.metadata,
createdAt: providerCredentials.createdAt,
updatedAt: providerCredentials.updatedAt,
})
.from(providerCredentials)
.where(eq(providerCredentials.userId, userId));
return rows.map((row) => ({
provider: row.provider,
credentialType: row.credentialType,
exists: true,
expiresAt: row.expiresAt?.toISOString() ?? null,
metadata: row.metadata as Record<string, unknown> | null,
createdAt: row.createdAt.toISOString(),
updatedAt: row.updatedAt.toISOString(),
}));
}
}

View File

@@ -1,4 +1,11 @@
import { Injectable, Logger, type OnModuleDestroy, type OnModuleInit } from '@nestjs/common';
import {
Inject,
Injectable,
Logger,
Optional,
type OnModuleDestroy,
type OnModuleInit,
} from '@nestjs/common';
import { ModelRegistry, AuthStorage } from '@mariozechner/pi-coding-agent';
import { getModel, type Model, type Api } from '@mariozechner/pi-ai';
import type {
@@ -13,8 +20,10 @@ import {
OllamaAdapter,
OpenAIAdapter,
OpenRouterAdapter,
ZaiAdapter,
} from './adapters/index.js';
import type { TestConnectionResultDto } from './provider.dto.js';
import { ProviderCredentialsService } from './provider-credentials.service.js';
/** Default health check interval in seconds */
const DEFAULT_HEALTH_INTERVAL_SECS = 60;
@@ -22,11 +31,25 @@ const DEFAULT_HEALTH_INTERVAL_SECS = 60;
/** DI injection token for the provider adapter array. */
export const PROVIDER_ADAPTERS = Symbol('PROVIDER_ADAPTERS');
/** Environment variable names for well-known providers */
const PROVIDER_ENV_KEYS: Record<string, string> = {
anthropic: 'ANTHROPIC_API_KEY',
openai: 'OPENAI_API_KEY',
openrouter: 'OPENROUTER_API_KEY',
zai: 'ZAI_API_KEY',
};
@Injectable()
export class ProviderService implements OnModuleInit, OnModuleDestroy {
private readonly logger = new Logger(ProviderService.name);
private registry!: ModelRegistry;
constructor(
@Optional()
@Inject(ProviderCredentialsService)
private readonly credentialsService: ProviderCredentialsService | null,
) {}
/**
* Adapters registered with this service.
* Built-in adapters (Ollama) are always present; additional adapters can be
@@ -52,14 +75,13 @@ export class ProviderService implements OnModuleInit, OnModuleDestroy {
new AnthropicAdapter(this.registry),
new OpenAIAdapter(this.registry),
new OpenRouterAdapter(),
new ZaiAdapter(),
];
// Run all adapter registrations first (Ollama, Anthropic, and any future adapters)
// Run all adapter registrations first (Ollama, Anthropic, OpenAI, OpenRouter, Z.ai)
await this.registerAll();
// Register API-key providers directly (Z.ai, custom)
// OpenAI now has a dedicated adapter (M3-003).
this.registerZaiProvider();
// Register API-key providers directly (custom)
this.registerCustomProviders();
const available = this.registry.getAvailable();
@@ -340,30 +362,9 @@ export class ProviderService implements OnModuleInit, OnModuleDestroy {
}
// ---------------------------------------------------------------------------
// Private helpers — direct registry registration for providers without adapters yet
// (Z.ai will move to an adapter in M3-005)
// Private helpers
// ---------------------------------------------------------------------------
private registerZaiProvider(): void {
const apiKey = process.env['ZAI_API_KEY'];
if (!apiKey) {
this.logger.debug('Skipping Z.ai provider registration: ZAI_API_KEY not set');
return;
}
const models = ['glm-4.5', 'glm-4.5-air', 'glm-4.5-flash'].map((id) =>
this.cloneBuiltInModel('zai', id),
);
this.registry.registerProvider('zai', {
apiKey,
baseUrl: 'https://open.bigmodel.cn/api/paas/v4',
models,
});
this.logger.log('Z.ai provider registered with 3 models');
}
private registerCustomProviders(): void {
const customJson = process.env['MOSAIC_CUSTOM_PROVIDERS'];
if (!customJson) return;
@@ -378,6 +379,29 @@ export class ProviderService implements OnModuleInit, OnModuleDestroy {
}
}
/**
* Resolve an API key for a provider, scoped to a specific user.
* User-stored credentials take precedence over environment variables.
* Returns null if no key is available from either source.
*/
async resolveApiKey(userId: string, provider: string): Promise<string | null> {
if (this.credentialsService) {
const userKey = await this.credentialsService.retrieve(userId, provider);
if (userKey) {
this.logger.debug(`Using user-scoped credential for user=${userId} provider=${provider}`);
return userKey;
}
}
// Fall back to environment variable
const envVar = PROVIDER_ENV_KEYS[provider];
const envKey = envVar ? (process.env[envVar] ?? null) : null;
if (envKey) {
this.logger.debug(`Using env-var credential for provider=${provider}`);
}
return envKey;
}
private cloneBuiltInModel(
provider: string,
modelId: string,

View File

@@ -1,15 +1,23 @@
import { Body, Controller, Get, Inject, Post, UseGuards } from '@nestjs/common';
import { Body, Controller, Delete, Get, Inject, Param, Post, UseGuards } from '@nestjs/common';
import type { RoutingCriteria } from '@mosaic/types';
import { AuthGuard } from '../auth/auth.guard.js';
import { CurrentUser } from '../auth/current-user.decorator.js';
import { ProviderService } from './provider.service.js';
import { ProviderCredentialsService } from './provider-credentials.service.js';
import { RoutingService } from './routing.service.js';
import type { TestConnectionDto, TestConnectionResultDto } from './provider.dto.js';
import type {
StoreCredentialDto,
ProviderCredentialSummaryDto,
} from './provider-credentials.dto.js';
@Controller('api/providers')
@UseGuards(AuthGuard)
export class ProvidersController {
constructor(
@Inject(ProviderService) private readonly providerService: ProviderService,
@Inject(ProviderCredentialsService)
private readonly credentialsService: ProviderCredentialsService,
@Inject(RoutingService) private readonly routingService: RoutingService,
) {}
@@ -42,4 +50,49 @@ export class ProvidersController {
rank(@Body() criteria: RoutingCriteria) {
return this.routingService.rank(criteria);
}
// ── Credential CRUD ──────────────────────────────────────────────────────
/**
* GET /api/providers/credentials
* List all provider credentials for the authenticated user.
* Returns provider names, types, and metadata — never decrypted values.
*/
@Get('credentials')
listCredentials(@CurrentUser() user: { id: string }): Promise<ProviderCredentialSummaryDto[]> {
return this.credentialsService.listProviders(user.id);
}
/**
* POST /api/providers/credentials
* Store or update a provider credential for the authenticated user.
* The value is encrypted before storage and never returned.
*/
@Post('credentials')
async storeCredential(
@CurrentUser() user: { id: string },
@Body() body: StoreCredentialDto,
): Promise<{ success: boolean; provider: string }> {
await this.credentialsService.store(
user.id,
body.provider,
body.type,
body.value,
body.metadata,
);
return { success: true, provider: body.provider };
}
/**
* DELETE /api/providers/credentials/:provider
* Remove a stored credential for the authenticated user.
*/
@Delete('credentials/:provider')
async removeCredential(
@CurrentUser() user: { id: string },
@Param('provider') provider: string,
): Promise<{ success: boolean; provider: string }> {
await this.credentialsService.remove(user.id, provider);
return { success: true, provider };
}
}

View File

@@ -8,6 +8,8 @@ const COST_TIER_THRESHOLDS: Record<CostTier, { maxInput: number }> = {
cheap: { maxInput: 1 },
standard: { maxInput: 10 },
premium: { maxInput: Infinity },
// local = self-hosted; treat as cheapest tier for cost scoring purposes
local: { maxInput: 0 },
};
@Injectable()

View File

@@ -0,0 +1,151 @@
import { Inject, Injectable, Logger, type OnModuleInit } from '@nestjs/common';
import { routingRules, type Db } from '@mosaic/db';
import { sql } from '@mosaic/db';
import { DB } from '../../database/database.module.js';
/** Shape of a routing condition */
interface RuleCondition {
field: string;
operator: 'eq' | 'includes';
value: string;
}
/** Shape of a routing action */
interface RuleAction {
provider: string;
model: string;
}
/** Seed-time routing rule descriptor */
interface RoutingRuleSeed {
name: string;
priority: number;
conditions: RuleCondition[];
action: RuleAction;
}
export const DEFAULT_ROUTING_RULES: RoutingRuleSeed[] = [
{
name: 'Complex coding → Opus',
priority: 1,
conditions: [
{ field: 'taskType', operator: 'eq', value: 'coding' },
{ field: 'complexity', operator: 'eq', value: 'complex' },
],
action: { provider: 'anthropic', model: 'claude-opus-4-6' },
},
{
name: 'Moderate coding → Sonnet',
priority: 2,
conditions: [
{ field: 'taskType', operator: 'eq', value: 'coding' },
{ field: 'complexity', operator: 'eq', value: 'moderate' },
],
action: { provider: 'anthropic', model: 'claude-sonnet-4-6' },
},
{
name: 'Simple coding → Codex',
priority: 3,
conditions: [
{ field: 'taskType', operator: 'eq', value: 'coding' },
{ field: 'complexity', operator: 'eq', value: 'simple' },
],
action: { provider: 'openai', model: 'codex-gpt-5-4' },
},
{
name: 'Research → Codex',
priority: 4,
conditions: [{ field: 'taskType', operator: 'eq', value: 'research' }],
action: { provider: 'openai', model: 'codex-gpt-5-4' },
},
{
name: 'Summarization → GLM-5',
priority: 5,
conditions: [{ field: 'taskType', operator: 'eq', value: 'summarization' }],
action: { provider: 'zai', model: 'glm-5' },
},
{
name: 'Analysis with reasoning → Opus',
priority: 6,
conditions: [
{ field: 'taskType', operator: 'eq', value: 'analysis' },
{ field: 'requiredCapabilities', operator: 'includes', value: 'reasoning' },
],
action: { provider: 'anthropic', model: 'claude-opus-4-6' },
},
{
name: 'Conversation → Sonnet',
priority: 7,
conditions: [{ field: 'taskType', operator: 'eq', value: 'conversation' }],
action: { provider: 'anthropic', model: 'claude-sonnet-4-6' },
},
{
name: 'Creative → Sonnet',
priority: 8,
conditions: [{ field: 'taskType', operator: 'eq', value: 'creative' }],
action: { provider: 'anthropic', model: 'claude-sonnet-4-6' },
},
{
name: 'Cheap/general → Haiku',
priority: 9,
conditions: [{ field: 'costTier', operator: 'eq', value: 'cheap' }],
action: { provider: 'anthropic', model: 'claude-haiku-4-5' },
},
{
name: 'Fallback → Sonnet',
priority: 10,
conditions: [],
action: { provider: 'anthropic', model: 'claude-sonnet-4-6' },
},
{
name: 'Offline → Ollama',
priority: 99,
conditions: [{ field: 'costTier', operator: 'eq', value: 'local' }],
action: { provider: 'ollama', model: 'llama3.2' },
},
];
@Injectable()
export class DefaultRoutingRulesSeed implements OnModuleInit {
private readonly logger = new Logger(DefaultRoutingRulesSeed.name);
constructor(@Inject(DB) private readonly db: Db) {}
async onModuleInit(): Promise<void> {
await this.seedDefaultRules();
}
/**
* Insert default routing rules into the database if the table is empty.
* Skips seeding if any system-scoped rules already exist.
*/
async seedDefaultRules(): Promise<void> {
const rows = await this.db
.select({ count: sql<number>`count(*)::int` })
.from(routingRules)
.where(sql`scope = 'system'`);
const count = rows[0]?.count ?? 0;
if (count > 0) {
this.logger.debug(
`Skipping default routing rules seed — ${count} system rule(s) already exist`,
);
return;
}
this.logger.log(`Seeding ${DEFAULT_ROUTING_RULES.length} default routing rules`);
await this.db.insert(routingRules).values(
DEFAULT_ROUTING_RULES.map((rule) => ({
name: rule.name,
priority: rule.priority,
scope: 'system' as const,
conditions: rule.conditions as unknown as Record<string, unknown>[],
action: rule.action as unknown as Record<string, unknown>,
enabled: true,
})),
);
this.logger.log('Default routing rules seeded successfully');
}
}

View File

@@ -0,0 +1,118 @@
/**
* Routing engine types — M4-002 (condition types) and M4-003 (action types).
*
* These types are re-exported from `@mosaic/types` for shared use across packages.
*/
// ─── Classification primitives ───────────────────────────────────────────────
/** Category of work the agent is being asked to perform */
export type TaskType =
| 'coding'
| 'research'
| 'summarization'
| 'conversation'
| 'analysis'
| 'creative';
/** Estimated complexity of the task, used to bias toward cheaper or more capable models */
export type Complexity = 'simple' | 'moderate' | 'complex';
/** Primary knowledge domain of the task */
export type Domain = 'frontend' | 'backend' | 'devops' | 'docs' | 'general';
/**
* Cost tier for model selection.
* Extends the existing `CostTier` in `@mosaic/types` with `local` for self-hosted models.
*/
export type CostTier = 'cheap' | 'standard' | 'premium' | 'local';
/** Special model capability required by the task */
export type Capability = 'tools' | 'vision' | 'long-context' | 'reasoning' | 'embedding';
// ─── Condition types ─────────────────────────────────────────────────────────
/**
* A single predicate that must be satisfied for a routing rule to match.
*
* - `eq` — scalar equality: `field === value`
* - `in` — set membership: `value` contains `field`
* - `includes` — array containment: `field` (array) includes `value`
*/
export interface RoutingCondition {
/** The task-classification field to test */
field: 'taskType' | 'complexity' | 'domain' | 'costTier' | 'requiredCapabilities';
/** Comparison operator */
operator: 'eq' | 'in' | 'includes';
/** Expected value or set of values */
value: string | string[];
}
// ─── Action types ────────────────────────────────────────────────────────────
/**
* The routing action to execute when all conditions in a rule are satisfied.
*/
export interface RoutingAction {
/** LLM provider identifier, e.g. `'anthropic'`, `'openai'`, `'ollama'` */
provider: string;
/** Model identifier, e.g. `'claude-opus-4-6'`, `'gpt-4o'` */
model: string;
/** Optional: use a specific pre-configured agent config from the agent registry */
agentConfigId?: string;
/** Optional: override the agent's default system prompt for this route */
systemPromptOverride?: string;
/** Optional: restrict the tool set available to the agent for this route */
toolAllowlist?: string[];
}
// ─── Rule and decision types ─────────────────────────────────────────────────
/**
* Full routing rule as stored in the database and used at runtime.
*/
export interface RoutingRule {
/** UUID primary key */
id: string;
/** Human-readable rule name */
name: string;
/** Lower number = evaluated first; unique per scope */
priority: number;
/** `'system'` rules apply globally; `'user'` rules override for a specific user */
scope: 'system' | 'user';
/** Present only for `'user'`-scoped rules */
userId?: string;
/** All conditions must match for the rule to fire */
conditions: RoutingCondition[];
/** Action to take when all conditions are met */
action: RoutingAction;
/** Whether this rule is active */
enabled: boolean;
}
/**
* Structured representation of what an agent has been asked to do,
* produced by the task classifier and consumed by the routing engine.
*/
export interface TaskClassification {
taskType: TaskType;
complexity: Complexity;
domain: Domain;
requiredCapabilities: Capability[];
}
/**
* Output of the routing engine — which model to use and why.
*/
export interface RoutingDecision {
/** LLM provider identifier */
provider: string;
/** Model identifier */
model: string;
/** Optional agent config to apply */
agentConfigId?: string;
/** Name of the rule that matched, for observability */
ruleName: string;
/** Human-readable explanation of why this rule was selected */
reason: string;
}

View File

@@ -0,0 +1,366 @@
import { describe, it, expect } from 'vitest';
import { classifyTask } from './task-classifier.js';
// ─── Task Type Detection ──────────────────────────────────────────────────────
describe('classifyTask — taskType', () => {
it('detects coding from "code" keyword', () => {
expect(classifyTask('Can you write some code for me?').taskType).toBe('coding');
});
it('detects coding from "implement" keyword', () => {
expect(classifyTask('Implement a binary search algorithm').taskType).toBe('coding');
});
it('detects coding from "function" keyword', () => {
expect(classifyTask('Write a function that reverses a string').taskType).toBe('coding');
});
it('detects coding from "debug" keyword', () => {
expect(classifyTask('Help me debug this error').taskType).toBe('coding');
});
it('detects coding from "fix" keyword', () => {
expect(classifyTask('fix the broken test').taskType).toBe('coding');
});
it('detects coding from "refactor" keyword', () => {
expect(classifyTask('Please refactor this module').taskType).toBe('coding');
});
it('detects coding from "typescript" keyword', () => {
expect(classifyTask('How do I use generics in TypeScript?').taskType).toBe('coding');
});
it('detects coding from "javascript" keyword', () => {
expect(classifyTask('JavaScript promises explained').taskType).toBe('coding');
});
it('detects coding from "python" keyword', () => {
expect(classifyTask('Write a Python script to parse CSV').taskType).toBe('coding');
});
it('detects coding from "SQL" keyword', () => {
expect(classifyTask('Write a SQL query to join these tables').taskType).toBe('coding');
});
it('detects coding from "API" keyword', () => {
expect(classifyTask('Design an API for user management').taskType).toBe('coding');
});
it('detects coding from "endpoint" keyword', () => {
expect(classifyTask('Add a new endpoint for user profiles').taskType).toBe('coding');
});
it('detects coding from "class" keyword', () => {
expect(classifyTask('Create a class for handling payments').taskType).toBe('coding');
});
it('detects coding from "method" keyword', () => {
expect(classifyTask('Add a method to validate emails').taskType).toBe('coding');
});
it('detects coding from inline backtick code', () => {
expect(classifyTask('What does `Array.prototype.reduce` do?').taskType).toBe('coding');
});
it('detects summarization from "summarize"', () => {
expect(classifyTask('Please summarize this document').taskType).toBe('summarization');
});
it('detects summarization from "summary"', () => {
expect(classifyTask('Give me a summary of the meeting').taskType).toBe('summarization');
});
it('detects summarization from "tldr"', () => {
expect(classifyTask('TLDR this article for me').taskType).toBe('summarization');
});
it('detects summarization from "condense"', () => {
expect(classifyTask('Condense this into 3 bullet points').taskType).toBe('summarization');
});
it('detects summarization from "brief"', () => {
expect(classifyTask('Give me a brief overview of this topic').taskType).toBe('summarization');
});
it('detects creative from "write"', () => {
expect(classifyTask('Write a short story about a dragon').taskType).toBe('creative');
});
it('detects creative from "story"', () => {
expect(classifyTask('Tell me a story about space exploration').taskType).toBe('creative');
});
it('detects creative from "poem"', () => {
expect(classifyTask('Write a poem about autumn').taskType).toBe('creative');
});
it('detects creative from "generate"', () => {
expect(classifyTask('Generate some creative marketing copy').taskType).toBe('creative');
});
it('detects creative from "create content"', () => {
expect(classifyTask('Help me create content for my website').taskType).toBe('creative');
});
it('detects creative from "blog post"', () => {
expect(classifyTask('Write a blog post about TypeScript').taskType).toBe('creative');
});
it('detects analysis from "analyze"', () => {
expect(classifyTask('Analyze the performance of this system').taskType).toBe('analysis');
});
it('detects analysis from "review"', () => {
expect(classifyTask('Please review my pull request changes').taskType).toBe('analysis');
});
it('detects analysis from "evaluate"', () => {
expect(classifyTask('Evaluate the pros and cons of this approach').taskType).toBe('analysis');
});
it('detects analysis from "assess"', () => {
expect(classifyTask('Assess the security risks here').taskType).toBe('analysis');
});
it('detects analysis from "audit"', () => {
expect(classifyTask('Audit this codebase for vulnerabilities').taskType).toBe('analysis');
});
it('detects research from "research"', () => {
expect(classifyTask('Research the best state management libraries').taskType).toBe('research');
});
it('detects research from "find"', () => {
expect(classifyTask('Find all open issues in our backlog').taskType).toBe('research');
});
it('detects research from "search"', () => {
expect(classifyTask('Search for papers on transformer architectures').taskType).toBe(
'research',
);
});
it('detects research from "what is"', () => {
expect(classifyTask('What is the difference between REST and GraphQL?').taskType).toBe(
'research',
);
});
it('detects research from "explain"', () => {
expect(classifyTask('Explain how OAuth2 works').taskType).toBe('research');
});
it('detects research from "how does"', () => {
expect(classifyTask('How does garbage collection work in V8?').taskType).toBe('research');
});
it('detects research from "compare"', () => {
expect(classifyTask('Compare Postgres and MySQL for this use case').taskType).toBe('research');
});
it('falls back to conversation with no strong signal', () => {
expect(classifyTask('Hello, how are you?').taskType).toBe('conversation');
});
it('falls back to conversation for generic greetings', () => {
expect(classifyTask('Good morning!').taskType).toBe('conversation');
});
// Priority: coding wins over research when both keywords present
it('coding takes priority over research', () => {
expect(classifyTask('find a code example for sorting').taskType).toBe('coding');
});
// Priority: summarization wins over creative
it('summarization takes priority over creative', () => {
expect(classifyTask('write a summary of this article').taskType).toBe('summarization');
});
});
// ─── Complexity Estimation ────────────────────────────────────────────────────
describe('classifyTask — complexity', () => {
it('classifies short message as simple', () => {
expect(classifyTask('Fix typo').complexity).toBe('simple');
});
it('classifies single question as simple', () => {
expect(classifyTask('What is a closure?').complexity).toBe('simple');
});
it('classifies message > 500 chars as complex', () => {
const long = 'a'.repeat(501);
expect(classifyTask(long).complexity).toBe('complex');
});
it('classifies message with "architecture" keyword as complex', () => {
expect(
classifyTask('Can you help me think through the architecture of this system?').complexity,
).toBe('complex');
});
it('classifies message with "design" keyword as complex', () => {
expect(classifyTask('Design a data model for this feature').complexity).toBe('complex');
});
it('classifies message with "complex" keyword as complex', () => {
expect(classifyTask('This is a complex problem involving multiple services').complexity).toBe(
'complex',
);
});
it('classifies message with "system" keyword as complex', () => {
expect(classifyTask('Explain the whole system behavior').complexity).toBe('complex');
});
it('classifies message with multiple code blocks as complex', () => {
const msg = '```\nconst a = 1;\n```\n\nAlso look at\n\n```\nconst b = 2;\n```';
expect(classifyTask(msg).complexity).toBe('complex');
});
it('classifies moderate-length message as moderate', () => {
const msg =
'Please help me implement a small utility function that parses query strings. It should handle arrays and nested objects properly.';
expect(classifyTask(msg).complexity).toBe('moderate');
});
});
// ─── Domain Detection ─────────────────────────────────────────────────────────
describe('classifyTask — domain', () => {
it('detects frontend from "react"', () => {
expect(classifyTask('How do I use React hooks?').domain).toBe('frontend');
});
it('detects frontend from "css"', () => {
expect(classifyTask('Fix the CSS layout issue').domain).toBe('frontend');
});
it('detects frontend from "html"', () => {
expect(classifyTask('Add an HTML form element').domain).toBe('frontend');
});
it('detects frontend from "component"', () => {
expect(classifyTask('Create a reusable component').domain).toBe('frontend');
});
it('detects frontend from "UI"', () => {
expect(classifyTask('Update the UI spacing').domain).toBe('frontend');
});
it('detects frontend from "tailwind"', () => {
expect(classifyTask('Style this button with Tailwind').domain).toBe('frontend');
});
it('detects frontend from "next.js"', () => {
expect(classifyTask('Configure Next.js routing').domain).toBe('frontend');
});
it('detects backend from "server"', () => {
expect(classifyTask('Set up the server to handle requests').domain).toBe('backend');
});
it('detects backend from "database"', () => {
expect(classifyTask('Optimize this database query').domain).toBe('backend');
});
it('detects backend from "endpoint"', () => {
expect(classifyTask('Add an endpoint for authentication').domain).toBe('backend');
});
it('detects backend from "nest"', () => {
expect(classifyTask('Add a NestJS guard for this route').domain).toBe('backend');
});
it('detects backend from "express"', () => {
expect(classifyTask('Middleware in Express explained').domain).toBe('backend');
});
it('detects devops from "docker"', () => {
expect(classifyTask('Write a Dockerfile for this app').domain).toBe('devops');
});
it('detects devops from "deploy"', () => {
expect(classifyTask('Deploy this service to production').domain).toBe('devops');
});
it('detects devops from "pipeline"', () => {
expect(classifyTask('Set up a CI pipeline').domain).toBe('devops');
});
it('detects devops from "kubernetes"', () => {
expect(classifyTask('Configure a Kubernetes deployment').domain).toBe('devops');
});
it('detects docs from "documentation"', () => {
expect(classifyTask('Write documentation for this module').domain).toBe('docs');
});
it('detects docs from "readme"', () => {
expect(classifyTask('Update the README').domain).toBe('docs');
});
it('detects docs from "guide"', () => {
expect(classifyTask('Create a user guide for this feature').domain).toBe('docs');
});
it('falls back to general domain', () => {
expect(classifyTask('What time is it?').domain).toBe('general');
});
// devops takes priority over backend when both match
it('devops takes priority over backend (both keywords)', () => {
expect(classifyTask('Deploy the API server using Docker').domain).toBe('devops');
});
// docs takes priority over frontend when both match
it('docs takes priority over frontend (both keywords)', () => {
expect(classifyTask('Write documentation for React components').domain).toBe('docs');
});
});
// ─── Combined Classification ──────────────────────────────────────────────────
describe('classifyTask — combined', () => {
it('returns full classification object', () => {
const result = classifyTask('Fix the bug?');
expect(result).toHaveProperty('taskType');
expect(result).toHaveProperty('complexity');
expect(result).toHaveProperty('domain');
});
it('classifies complex TypeScript architecture request', () => {
const msg =
'Design the architecture for a multi-tenant TypeScript system using NestJS with proper database isolation and role-based access control. The system needs to support multiple organizations each with their own data namespace.';
const result = classifyTask(msg);
expect(result.taskType).toBe('coding');
expect(result.complexity).toBe('complex');
expect(result.domain).toBe('backend');
});
it('classifies simple frontend question', () => {
const result = classifyTask('How do I center a div in CSS?');
expect(result.taskType).toBe('research');
expect(result.domain).toBe('frontend');
});
it('classifies a DevOps pipeline task as complex', () => {
const msg =
'Design a complete CI/CD pipeline architecture using Docker and Kubernetes with blue-green deployments and automatic rollback capabilities for a complex microservices system.';
const result = classifyTask(msg);
expect(result.domain).toBe('devops');
expect(result.complexity).toBe('complex');
});
it('classifies summarization task correctly', () => {
const result = classifyTask('Summarize the key points from this document');
expect(result.taskType).toBe('summarization');
});
it('classifies creative writing task correctly', () => {
const result = classifyTask('Write a poem about the ocean');
expect(result.taskType).toBe('creative');
});
});

View File

@@ -0,0 +1,17 @@
CREATE TABLE "routing_rules" (
"id" uuid PRIMARY KEY DEFAULT gen_random_uuid() NOT NULL,
"name" text NOT NULL,
"priority" integer NOT NULL,
"scope" text DEFAULT 'system' NOT NULL,
"user_id" text,
"conditions" jsonb NOT NULL,
"action" jsonb NOT NULL,
"enabled" boolean DEFAULT true NOT NULL,
"created_at" timestamp with time zone DEFAULT now() NOT NULL,
"updated_at" timestamp with time zone DEFAULT now() NOT NULL
);
--> statement-breakpoint
ALTER TABLE "routing_rules" ADD CONSTRAINT "routing_rules_user_id_users_id_fk" FOREIGN KEY ("user_id") REFERENCES "public"."users"("id") ON DELETE cascade ON UPDATE no action;--> statement-breakpoint
CREATE INDEX "routing_rules_scope_priority_idx" ON "routing_rules" USING btree ("scope","priority");--> statement-breakpoint
CREATE INDEX "routing_rules_user_id_idx" ON "routing_rules" USING btree ("user_id");--> statement-breakpoint
CREATE INDEX "routing_rules_enabled_idx" ON "routing_rules" USING btree ("enabled");

File diff suppressed because it is too large Load Diff

View File

@@ -29,6 +29,13 @@
"when": 1773887085247,
"tag": "0003_p8003_perf_indexes",
"breakpoints": true
},
{
"idx": 4,
"version": "7",
"when": 1774224004898,
"tag": "0004_bumpy_miracleman",
"breakpoints": true
}
]
}

View File

@@ -479,6 +479,66 @@ export const skills = pgTable(
(t) => [index('skills_enabled_idx').on(t.enabled)],
);
// ─── Routing Rules ──────────────────────────────────────────────────────────
export const routingRules = pgTable(
'routing_rules',
{
id: uuid('id').primaryKey().defaultRandom(),
/** Human-readable rule name */
name: text('name').notNull(),
/** Lower number = higher priority; unique per scope */
priority: integer('priority').notNull(),
/** 'system' rules apply globally; 'user' rules are scoped to a specific user */
scope: text('scope', { enum: ['system', 'user'] })
.notNull()
.default('system'),
/** Null for system-scoped rules; FK to users.id for user-scoped rules */
userId: text('user_id').references(() => users.id, { onDelete: 'cascade' }),
/** Array of condition objects that must all match for the rule to fire */
conditions: jsonb('conditions').notNull().$type<Record<string, unknown>[]>(),
/** Routing action to take when all conditions are satisfied */
action: jsonb('action').notNull().$type<Record<string, unknown>>(),
/** Whether this rule is active */
enabled: boolean('enabled').notNull().default(true),
createdAt: timestamp('created_at', { withTimezone: true }).notNull().defaultNow(),
updatedAt: timestamp('updated_at', { withTimezone: true }).notNull().defaultNow(),
},
(t) => [
// Lookup by scope + priority for ordered rule evaluation
index('routing_rules_scope_priority_idx').on(t.scope, t.priority),
// User-scoped rules lookup
index('routing_rules_user_id_idx').on(t.userId),
// Filter enabled rules efficiently
index('routing_rules_enabled_idx').on(t.enabled),
],
);
// ─── Provider Credentials ────────────────────────────────────────────────────
export const providerCredentials = pgTable(
'provider_credentials',
{
id: uuid('id').primaryKey().defaultRandom(),
userId: text('user_id')
.notNull()
.references(() => users.id, { onDelete: 'cascade' }),
provider: text('provider').notNull(),
credentialType: text('credential_type', { enum: ['api_key', 'oauth_token'] }).notNull(),
encryptedValue: text('encrypted_value').notNull(),
refreshToken: text('refresh_token'),
expiresAt: timestamp('expires_at', { withTimezone: true }),
metadata: jsonb('metadata'),
createdAt: timestamp('created_at', { withTimezone: true }).notNull().defaultNow(),
updatedAt: timestamp('updated_at', { withTimezone: true }).notNull().defaultNow(),
},
(t) => [
// Unique constraint: one credential entry per user per provider
uniqueIndex('provider_credentials_user_provider_idx').on(t.userId, t.provider),
index('provider_credentials_user_id_idx').on(t.userId),
],
);
// ─── Summarization Jobs ─────────────────────────────────────────────────────
export const summarizationJobs = pgTable(

View File

@@ -1,10 +1,15 @@
/** Cost tier for model selection */
export type CostTier = 'cheap' | 'standard' | 'premium';
// ─── Legacy simple-routing types (kept for backward compatibility) ────────────
/** Task type hint for routing */
export type TaskType = 'chat' | 'coding' | 'analysis' | 'summarization' | 'general';
/** Result of a simple scoring-based routing decision */
export interface RoutingResult {
provider: string;
modelId: string;
modelName: string;
score: number;
reasoning: string;
}
/** Routing criteria for model selection */
/** Routing criteria for score-based model selection */
export interface RoutingCriteria {
taskType?: TaskType;
costTier?: CostTier;
@@ -15,11 +20,115 @@ export interface RoutingCriteria {
preferredModel?: string;
}
/** Result of a routing decision */
export interface RoutingResult {
provider: string;
modelId: string;
modelName: string;
score: number;
reasoning: string;
// ─── Classification primitives (M4-002) ──────────────────────────────────────
/** Category of work the agent is being asked to perform */
export type TaskType =
| 'chat'
| 'coding'
| 'research'
| 'summarization'
| 'conversation'
| 'analysis'
| 'creative'
| 'general';
/** Estimated complexity of the task, used to bias toward cheaper or more capable models */
export type Complexity = 'simple' | 'moderate' | 'complex';
/** Primary knowledge domain of the task */
export type Domain = 'frontend' | 'backend' | 'devops' | 'docs' | 'general';
/**
* Cost tier for model selection.
* `local` targets self-hosted/on-premises models.
*/
export type CostTier = 'cheap' | 'standard' | 'premium' | 'local';
/** Special model capability required by the task */
export type Capability = 'tools' | 'vision' | 'long-context' | 'reasoning' | 'embedding';
// ─── Condition types (M4-002) ─────────────────────────────────────────────────
/**
* A single predicate that must be satisfied for a routing rule to match.
*
* - `eq` — scalar equality: `field === value`
* - `in` — set membership: `value` (array) contains `field`
* - `includes` — array containment: `field` (array) includes `value`
*/
export interface RoutingCondition {
/** The task-classification field to test */
field: 'taskType' | 'complexity' | 'domain' | 'costTier' | 'requiredCapabilities';
/** Comparison operator */
operator: 'eq' | 'in' | 'includes';
/** Expected value or set of values */
value: string | string[];
}
// ─── Action types (M4-003) ────────────────────────────────────────────────────
/**
* The routing action to execute when all conditions in a rule are satisfied.
*/
export interface RoutingAction {
/** LLM provider identifier, e.g. `'anthropic'`, `'openai'`, `'ollama'` */
provider: string;
/** Model identifier, e.g. `'claude-opus-4-6'`, `'gpt-4o'` */
model: string;
/** Optional: use a specific pre-configured agent config from the agent registry */
agentConfigId?: string;
/** Optional: override the agent's default system prompt for this route */
systemPromptOverride?: string;
/** Optional: restrict the tool set available to the agent for this route */
toolAllowlist?: string[];
}
/**
* Full routing rule as stored in the database and used at runtime.
*/
export interface RoutingRule {
/** UUID primary key */
id: string;
/** Human-readable rule name */
name: string;
/** Lower number = evaluated first; unique per scope */
priority: number;
/** `'system'` rules apply globally; `'user'` rules override for a specific user */
scope: 'system' | 'user';
/** Present only for `'user'`-scoped rules */
userId?: string;
/** All conditions must match for the rule to fire */
conditions: RoutingCondition[];
/** Action to take when all conditions are met */
action: RoutingAction;
/** Whether this rule is active */
enabled: boolean;
}
/**
* Structured representation of what an agent has been asked to do,
* produced by the task classifier and consumed by the routing engine.
*/
export interface TaskClassification {
taskType: TaskType;
complexity: Complexity;
domain: Domain;
requiredCapabilities: Capability[];
}
/**
* Output of the routing engine — which model to use and why.
*/
export interface RoutingDecision {
/** LLM provider identifier */
provider: string;
/** Model identifier */
model: string;
/** Optional agent config to apply */
agentConfigId?: string;
/** Name of the rule that matched, for observability */
ruleName: string;
/** Human-readable explanation of why this rule was selected */
reason: string;
}