Merge pull request #321 from stakeswky/feat/model-failover-auth-rotation

feat(providers): model failover chain + API key rotation
This commit is contained in:
Chummy 2026-02-16 22:27:32 +08:00 committed by GitHub
commit 0995c57776
No known key found for this signature in database
GPG key ID: B5690EEEBB952194
3 changed files with 476 additions and 104 deletions

View file

@ -635,6 +635,14 @@ pub struct ReliabilityConfig {
/// Fallback provider chain (e.g. `["anthropic", "openai"]`). /// Fallback provider chain (e.g. `["anthropic", "openai"]`).
#[serde(default)] #[serde(default)]
pub fallback_providers: Vec<String>, pub fallback_providers: Vec<String>,
/// Additional API keys for round-robin rotation on rate-limit (429) errors.
/// The primary `api_key` is always tried first; these are extras.
#[serde(default)]
pub api_keys: Vec<String>,
/// Per-model fallback chains. When a model fails, try these alternatives in order.
/// Example: `{ "claude-opus-4-20250514" = ["claude-sonnet-4-20250514", "gpt-4o"] }`
#[serde(default)]
pub model_fallbacks: std::collections::HashMap<String, Vec<String>>,
/// Initial backoff for channel/daemon restarts. /// Initial backoff for channel/daemon restarts.
#[serde(default = "default_channel_backoff_secs")] #[serde(default = "default_channel_backoff_secs")]
pub channel_initial_backoff_secs: u64, pub channel_initial_backoff_secs: u64,
@ -679,6 +687,8 @@ impl Default for ReliabilityConfig {
provider_retries: default_provider_retries(), provider_retries: default_provider_retries(),
provider_backoff_ms: default_provider_backoff_ms(), provider_backoff_ms: default_provider_backoff_ms(),
fallback_providers: Vec::new(), fallback_providers: Vec::new(),
api_keys: Vec::new(),
model_fallbacks: std::collections::HashMap::new(),
channel_initial_backoff_secs: default_channel_backoff_secs(), channel_initial_backoff_secs: default_channel_backoff_secs(),
channel_max_backoff_secs: default_channel_backoff_max_secs(), channel_max_backoff_secs: default_channel_backoff_max_secs(),
scheduler_poll_secs: default_scheduler_poll_secs(), scheduler_poll_secs: default_scheduler_poll_secs(),

View file

@ -338,11 +338,15 @@ pub fn create_resilient_provider(
} }
} }
Ok(Box::new(ReliableProvider::new( let reliable = ReliableProvider::new(
providers, providers,
reliability.provider_retries, reliability.provider_retries,
reliability.provider_backoff_ms, reliability.provider_backoff_ms,
))) )
.with_api_keys(reliability.api_keys.clone())
.with_model_fallbacks(reliability.model_fallbacks.clone());
Ok(Box::new(reliable))
} }
/// Create a RouterProvider if model routes are configured, otherwise return a /// Create a RouterProvider if model routes are configured, otherwise return a
@ -704,6 +708,8 @@ mod tests {
"openai".into(), "openai".into(),
"openai".into(), "openai".into(),
], ],
api_keys: Vec::new(),
model_fallbacks: std::collections::HashMap::new(),
channel_initial_backoff_secs: 2, channel_initial_backoff_secs: 2,
channel_max_backoff_secs: 60, channel_max_backoff_secs: 60,
scheduler_poll_secs: 15, scheduler_poll_secs: 15,

View file

@ -1,21 +1,18 @@
use super::traits::{ChatMessage, ChatResponse}; use super::traits::{ChatMessage, ChatResponse};
use super::Provider; use super::Provider;
use async_trait::async_trait; use async_trait::async_trait;
use std::collections::HashMap;
use std::sync::atomic::{AtomicUsize, Ordering};
use std::time::Duration; use std::time::Duration;
/// Check if an error is non-retryable (client errors that won't resolve with retries). /// Check if an error is non-retryable (client errors that won't resolve with retries).
fn is_non_retryable(err: &anyhow::Error) -> bool { fn is_non_retryable(err: &anyhow::Error) -> bool {
// Check for reqwest status errors (returned by .error_for_status())
if let Some(reqwest_err) = err.downcast_ref::<reqwest::Error>() { if let Some(reqwest_err) = err.downcast_ref::<reqwest::Error>() {
if let Some(status) = reqwest_err.status() { if let Some(status) = reqwest_err.status() {
let code = status.as_u16(); let code = status.as_u16();
// 4xx client errors are non-retryable, except:
// - 429 Too Many Requests (rate limiting, transient)
// - 408 Request Timeout (transient)
return status.is_client_error() && code != 429 && code != 408; return status.is_client_error() && code != 429 && code != 408;
} }
} }
// String fallback: scan for any 4xx status code in error message
let msg = err.to_string(); let msg = err.to_string();
for word in msg.split(|c: char| !c.is_ascii_digit()) { for word in msg.split(|c: char| !c.is_ascii_digit()) {
if let Ok(code) = word.parse::<u16>() { if let Ok(code) = word.parse::<u16>() {
@ -27,11 +24,56 @@ fn is_non_retryable(err: &anyhow::Error) -> bool {
false false
} }
/// Provider wrapper with retry + fallback behavior. /// Check if an error is a rate-limit (429) error.
fn is_rate_limited(err: &anyhow::Error) -> bool {
if let Some(reqwest_err) = err.downcast_ref::<reqwest::Error>() {
if let Some(status) = reqwest_err.status() {
return status.as_u16() == 429;
}
}
let msg = err.to_string();
msg.contains("429")
&& (msg.contains("Too Many") || msg.contains("rate") || msg.contains("limit"))
}
/// Try to extract a Retry-After value (in milliseconds) from an error message.
/// Looks for patterns like `Retry-After: 5` or `retry_after: 2.5` in the error string.
fn parse_retry_after_ms(err: &anyhow::Error) -> Option<u64> {
let msg = err.to_string();
let lower = msg.to_lowercase();
// Look for "retry-after: <number>" or "retry_after: <number>"
for prefix in &[
"retry-after:",
"retry_after:",
"retry-after ",
"retry_after ",
] {
if let Some(pos) = lower.find(prefix) {
let after = &msg[pos + prefix.len()..];
let num_str: String = after
.trim()
.chars()
.take_while(|c| c.is_ascii_digit() || *c == '.')
.collect();
if let Ok(secs) = num_str.parse::<f64>() {
return Some((secs * 1000.0) as u64);
}
}
}
None
}
/// Provider wrapper with retry, fallback, auth rotation, and model failover.
pub struct ReliableProvider { pub struct ReliableProvider {
providers: Vec<(String, Box<dyn Provider>)>, providers: Vec<(String, Box<dyn Provider>)>,
max_retries: u32, max_retries: u32,
base_backoff_ms: u64, base_backoff_ms: u64,
/// Extra API keys for rotation (index tracks round-robin position).
api_keys: Vec<String>,
key_index: AtomicUsize,
/// Per-model fallback chains: model_name → [fallback_model_1, fallback_model_2, ...]
model_fallbacks: HashMap<String, Vec<String>>,
} }
impl ReliableProvider { impl ReliableProvider {
@ -44,6 +86,49 @@ impl ReliableProvider {
providers, providers,
max_retries, max_retries,
base_backoff_ms: base_backoff_ms.max(50), base_backoff_ms: base_backoff_ms.max(50),
api_keys: Vec::new(),
key_index: AtomicUsize::new(0),
model_fallbacks: HashMap::new(),
}
}
/// Set additional API keys for round-robin rotation on rate-limit errors.
pub fn with_api_keys(mut self, keys: Vec<String>) -> Self {
self.api_keys = keys;
self
}
/// Set per-model fallback chains.
pub fn with_model_fallbacks(mut self, fallbacks: HashMap<String, Vec<String>>) -> Self {
self.model_fallbacks = fallbacks;
self
}
/// Build the list of models to try: [original, fallback1, fallback2, ...]
fn model_chain<'a>(&'a self, model: &'a str) -> Vec<&'a str> {
let mut chain = vec![model];
if let Some(fallbacks) = self.model_fallbacks.get(model) {
chain.extend(fallbacks.iter().map(|s| s.as_str()));
}
chain
}
/// Advance to the next API key and return it, or None if no extra keys configured.
fn rotate_key(&self) -> Option<&str> {
if self.api_keys.is_empty() {
return None;
}
let idx = self.key_index.fetch_add(1, Ordering::Relaxed) % self.api_keys.len();
Some(&self.api_keys[idx])
}
/// Compute backoff duration, respecting Retry-After if present.
fn compute_backoff(&self, base: u64, err: &anyhow::Error) -> u64 {
if let Some(retry_after) = parse_retry_after_ms(err) {
// Use Retry-After but cap at 30s to avoid indefinite waits
retry_after.min(30_000).max(base)
} else {
base
} }
} }
} }
@ -67,60 +152,96 @@ impl Provider for ReliableProvider {
model: &str, model: &str,
temperature: f64, temperature: f64,
) -> anyhow::Result<ChatResponse> { ) -> anyhow::Result<ChatResponse> {
let models = self.model_chain(model);
let mut failures = Vec::new(); let mut failures = Vec::new();
for (provider_name, provider) in &self.providers { for current_model in &models {
let mut backoff_ms = self.base_backoff_ms; for (provider_name, provider) in &self.providers {
let mut backoff_ms = self.base_backoff_ms;
for attempt in 0..=self.max_retries { for attempt in 0..=self.max_retries {
match provider match provider
.chat_with_system(system_prompt, message, model, temperature) .chat_with_system(system_prompt, message, current_model, temperature)
.await .await
{ {
Ok(resp) => { Ok(resp) => {
if attempt > 0 { if attempt > 0 || *current_model != model {
tracing::info!( tracing::info!(
provider = provider_name, provider = provider_name,
attempt, model = *current_model,
"Provider recovered after retries" attempt,
); original_model = model,
"Provider recovered (failover/retry)"
);
}
return Ok(resp);
} }
return Ok(resp); Err(e) => {
} let non_retryable = is_non_retryable(&e);
Err(e) => { let rate_limited = is_rate_limited(&e);
let non_retryable = is_non_retryable(&e);
failures.push(format!(
"{provider_name} attempt {}/{}: {e}",
attempt + 1,
self.max_retries + 1
));
if non_retryable { failures.push(format!(
tracing::warn!( "{provider_name}/{current_model} attempt {}/{}: {e}",
provider = provider_name, attempt + 1,
"Non-retryable error, switching provider" self.max_retries + 1
); ));
break;
}
if attempt < self.max_retries { // On rate-limit, try rotating API key
tracing::warn!( if rate_limited {
provider = provider_name, if let Some(new_key) = self.rotate_key() {
attempt = attempt + 1, tracing::info!(
max_retries = self.max_retries, provider = provider_name,
"Provider call failed, retrying" "Rate limited, rotated API key (key ending ...{})",
); &new_key[new_key.len().saturating_sub(4)..]
tokio::time::sleep(Duration::from_millis(backoff_ms)).await; );
backoff_ms = (backoff_ms.saturating_mul(2)).min(10_000); }
}
if non_retryable {
tracing::warn!(
provider = provider_name,
model = *current_model,
"Non-retryable error, moving on"
);
break;
}
if attempt < self.max_retries {
let wait = self.compute_backoff(backoff_ms, &e);
tracing::warn!(
provider = provider_name,
model = *current_model,
attempt = attempt + 1,
backoff_ms = wait,
"Provider call failed, retrying"
);
tokio::time::sleep(Duration::from_millis(wait)).await;
backoff_ms = (backoff_ms.saturating_mul(2)).min(10_000);
}
} }
} }
} }
tracing::warn!(
provider = provider_name,
model = *current_model,
"Exhausted retries, trying next provider/model"
);
} }
tracing::warn!(provider = provider_name, "Switching to fallback provider"); if *current_model != model {
tracing::warn!(
original_model = model,
fallback_model = *current_model,
"Model fallback exhausted all providers, trying next fallback model"
);
}
} }
anyhow::bail!("All providers failed. Attempts:\n{}", failures.join("\n")) anyhow::bail!(
"All providers/models failed. Attempts:\n{}",
failures.join("\n")
)
} }
async fn chat_with_history( async fn chat_with_history(
@ -129,67 +250,93 @@ impl Provider for ReliableProvider {
model: &str, model: &str,
temperature: f64, temperature: f64,
) -> anyhow::Result<ChatResponse> { ) -> anyhow::Result<ChatResponse> {
let models = self.model_chain(model);
let mut failures = Vec::new(); let mut failures = Vec::new();
for (provider_name, provider) in &self.providers { for current_model in &models {
let mut backoff_ms = self.base_backoff_ms; for (provider_name, provider) in &self.providers {
let mut backoff_ms = self.base_backoff_ms;
for attempt in 0..=self.max_retries { for attempt in 0..=self.max_retries {
match provider match provider
.chat_with_history(messages, model, temperature) .chat_with_history(messages, current_model, temperature)
.await .await
{ {
Ok(resp) => { Ok(resp) => {
if attempt > 0 { if attempt > 0 || *current_model != model {
tracing::info!( tracing::info!(
provider = provider_name, provider = provider_name,
attempt, model = *current_model,
"Provider recovered after retries" attempt,
); original_model = model,
"Provider recovered (failover/retry)"
);
}
return Ok(resp);
} }
return Ok(resp); Err(e) => {
} let non_retryable = is_non_retryable(&e);
Err(e) => { let rate_limited = is_rate_limited(&e);
let non_retryable = is_non_retryable(&e);
failures.push(format!(
"{provider_name} attempt {}/{}: {e}",
attempt + 1,
self.max_retries + 1
));
if non_retryable { failures.push(format!(
tracing::warn!( "{provider_name}/{current_model} attempt {}/{}: {e}",
provider = provider_name, attempt + 1,
"Non-retryable error, switching provider" self.max_retries + 1
); ));
break;
}
if attempt < self.max_retries { if rate_limited {
tracing::warn!( if let Some(new_key) = self.rotate_key() {
provider = provider_name, tracing::info!(
attempt = attempt + 1, provider = provider_name,
max_retries = self.max_retries, "Rate limited, rotated API key (key ending ...{})",
"Provider call failed, retrying" &new_key[new_key.len().saturating_sub(4)..]
); );
tokio::time::sleep(Duration::from_millis(backoff_ms)).await; }
backoff_ms = (backoff_ms.saturating_mul(2)).min(10_000); }
if non_retryable {
tracing::warn!(
provider = provider_name,
model = *current_model,
"Non-retryable error, moving on"
);
break;
}
if attempt < self.max_retries {
let wait = self.compute_backoff(backoff_ms, &e);
tracing::warn!(
provider = provider_name,
model = *current_model,
attempt = attempt + 1,
backoff_ms = wait,
"Provider call failed, retrying"
);
tokio::time::sleep(Duration::from_millis(wait)).await;
backoff_ms = (backoff_ms.saturating_mul(2)).min(10_000);
}
} }
} }
} }
}
tracing::warn!(provider = provider_name, "Switching to fallback provider"); tracing::warn!(
provider = provider_name,
model = *current_model,
"Exhausted retries, trying next provider/model"
);
}
} }
anyhow::bail!("All providers failed. Attempts:\n{}", failures.join("\n")) anyhow::bail!(
"All providers/models failed. Attempts:\n{}",
failures.join("\n")
)
} }
} }
#[cfg(test)] #[cfg(test)]
mod tests { mod tests {
use super::*; use super::*;
use std::sync::atomic::{AtomicUsize, Ordering};
use std::sync::Arc; use std::sync::Arc;
struct MockProvider { struct MockProvider {
@ -229,6 +376,34 @@ mod tests {
} }
} }
/// Mock that records which model was used for each call.
struct ModelAwareMock {
calls: Arc<AtomicUsize>,
models_seen: std::sync::Mutex<Vec<String>>,
fail_models: Vec<&'static str>,
response: &'static str,
}
#[async_trait]
impl Provider for ModelAwareMock {
async fn chat_with_system(
&self,
_system_prompt: Option<&str>,
_message: &str,
model: &str,
_temperature: f64,
) -> anyhow::Result<ChatResponse> {
self.calls.fetch_add(1, Ordering::SeqCst);
self.models_seen.lock().unwrap().push(model.to_string());
if self.fail_models.contains(&model) {
anyhow::bail!("500 model {} unavailable", model);
}
Ok(ChatResponse::with_text(self.response))
}
}
// ── Existing tests (preserved) ──
#[tokio::test] #[tokio::test]
async fn succeeds_without_retry() { async fn succeeds_without_retry() {
let calls = Arc::new(AtomicUsize::new(0)); let calls = Arc::new(AtomicUsize::new(0));
@ -341,31 +516,23 @@ mod tests {
.await .await
.expect_err("all providers should fail"); .expect_err("all providers should fail");
let msg = err.to_string(); let msg = err.to_string();
assert!(msg.contains("All providers failed")); assert!(msg.contains("All providers/models failed"));
assert!(msg.contains("p1 attempt 1/1")); assert!(msg.contains("p1"));
assert!(msg.contains("p2 attempt 1/1")); assert!(msg.contains("p2"));
} }
#[test] #[test]
fn non_retryable_detects_common_patterns() { fn non_retryable_detects_common_patterns() {
// Non-retryable 4xx errors
assert!(is_non_retryable(&anyhow::anyhow!("400 Bad Request"))); assert!(is_non_retryable(&anyhow::anyhow!("400 Bad Request")));
assert!(is_non_retryable(&anyhow::anyhow!("401 Unauthorized"))); assert!(is_non_retryable(&anyhow::anyhow!("401 Unauthorized")));
assert!(is_non_retryable(&anyhow::anyhow!("403 Forbidden"))); assert!(is_non_retryable(&anyhow::anyhow!("403 Forbidden")));
assert!(is_non_retryable(&anyhow::anyhow!("404 Not Found"))); assert!(is_non_retryable(&anyhow::anyhow!("404 Not Found")));
assert!(is_non_retryable(&anyhow::anyhow!(
"API error with 400 Bad Request"
)));
// Retryable: 429 Too Many Requests
assert!(!is_non_retryable(&anyhow::anyhow!("429 Too Many Requests"))); assert!(!is_non_retryable(&anyhow::anyhow!("429 Too Many Requests")));
// Retryable: 408 Request Timeout
assert!(!is_non_retryable(&anyhow::anyhow!("408 Request Timeout"))); assert!(!is_non_retryable(&anyhow::anyhow!("408 Request Timeout")));
// Retryable: 5xx server errors
assert!(!is_non_retryable(&anyhow::anyhow!( assert!(!is_non_retryable(&anyhow::anyhow!(
"500 Internal Server Error" "500 Internal Server Error"
))); )));
assert!(!is_non_retryable(&anyhow::anyhow!("502 Bad Gateway"))); assert!(!is_non_retryable(&anyhow::anyhow!("502 Bad Gateway")));
// Retryable: transient errors
assert!(!is_non_retryable(&anyhow::anyhow!("timeout"))); assert!(!is_non_retryable(&anyhow::anyhow!("timeout")));
assert!(!is_non_retryable(&anyhow::anyhow!("connection reset"))); assert!(!is_non_retryable(&anyhow::anyhow!("connection reset")));
} }
@ -396,7 +563,7 @@ mod tests {
}), }),
), ),
], ],
3, // 3 retries allowed, but should skip them 3,
1, 1,
); );
@ -472,4 +639,193 @@ mod tests {
assert_eq!(primary_calls.load(Ordering::SeqCst), 2); assert_eq!(primary_calls.load(Ordering::SeqCst), 2);
assert_eq!(fallback_calls.load(Ordering::SeqCst), 1); assert_eq!(fallback_calls.load(Ordering::SeqCst), 1);
} }
// ── New tests: model failover ──
#[tokio::test]
async fn model_failover_tries_fallback_model() {
let calls = Arc::new(AtomicUsize::new(0));
let mock = Arc::new(ModelAwareMock {
calls: Arc::clone(&calls),
models_seen: std::sync::Mutex::new(Vec::new()),
fail_models: vec!["claude-opus"],
response: "ok from sonnet",
});
let mut fallbacks = HashMap::new();
fallbacks.insert("claude-opus".to_string(), vec!["claude-sonnet".to_string()]);
let provider = ReliableProvider::new(
vec![(
"anthropic".into(),
Box::new(mock.clone()) as Box<dyn Provider>,
)],
0, // no retries — force immediate model failover
1,
)
.with_model_fallbacks(fallbacks);
let result = provider.chat("hello", "claude-opus", 0.0).await.unwrap();
assert_eq!(result.text_or_empty(), "ok from sonnet");
let seen = mock.models_seen.lock().unwrap();
assert_eq!(seen.len(), 2);
assert_eq!(seen[0], "claude-opus");
assert_eq!(seen[1], "claude-sonnet");
}
#[tokio::test]
async fn model_failover_all_models_fail() {
let calls = Arc::new(AtomicUsize::new(0));
let mock = Arc::new(ModelAwareMock {
calls: Arc::clone(&calls),
models_seen: std::sync::Mutex::new(Vec::new()),
fail_models: vec!["model-a", "model-b", "model-c"],
response: "never",
});
let mut fallbacks = HashMap::new();
fallbacks.insert(
"model-a".to_string(),
vec!["model-b".to_string(), "model-c".to_string()],
);
let provider = ReliableProvider::new(
vec![("p1".into(), Box::new(mock.clone()) as Box<dyn Provider>)],
0,
1,
)
.with_model_fallbacks(fallbacks);
let err = provider
.chat("hello", "model-a", 0.0)
.await
.expect_err("all models should fail");
assert!(err.to_string().contains("All providers/models failed"));
let seen = mock.models_seen.lock().unwrap();
assert_eq!(seen.len(), 3);
}
#[tokio::test]
async fn no_model_fallbacks_behaves_like_before() {
let calls = Arc::new(AtomicUsize::new(0));
let provider = ReliableProvider::new(
vec![(
"primary".into(),
Box::new(MockProvider {
calls: Arc::clone(&calls),
fail_until_attempt: 0,
response: "ok",
error: "boom",
}),
)],
2,
1,
);
// No model_fallbacks set — should work exactly as before
let result = provider.chat("hello", "test", 0.0).await.unwrap();
assert_eq!(result.text_or_empty(), "ok");
assert_eq!(calls.load(Ordering::SeqCst), 1);
}
// ── New tests: auth rotation ──
#[tokio::test]
async fn auth_rotation_cycles_keys() {
let provider = ReliableProvider::new(
vec![(
"p".into(),
Box::new(MockProvider {
calls: Arc::new(AtomicUsize::new(0)),
fail_until_attempt: 0,
response: "ok",
error: "",
}),
)],
0,
1,
)
.with_api_keys(vec!["key-a".into(), "key-b".into(), "key-c".into()]);
// Rotate 5 times, verify round-robin
let keys: Vec<&str> = (0..5).map(|_| provider.rotate_key().unwrap()).collect();
assert_eq!(keys, vec!["key-a", "key-b", "key-c", "key-a", "key-b"]);
}
#[tokio::test]
async fn auth_rotation_returns_none_when_empty() {
let provider = ReliableProvider::new(vec![], 0, 1);
assert!(provider.rotate_key().is_none());
}
// ── New tests: Retry-After parsing ──
#[test]
fn parse_retry_after_integer() {
let err = anyhow::anyhow!("429 Too Many Requests, Retry-After: 5");
assert_eq!(parse_retry_after_ms(&err), Some(5000));
}
#[test]
fn parse_retry_after_float() {
let err = anyhow::anyhow!("Rate limited. retry_after: 2.5 seconds");
assert_eq!(parse_retry_after_ms(&err), Some(2500));
}
#[test]
fn parse_retry_after_missing() {
let err = anyhow::anyhow!("500 Internal Server Error");
assert_eq!(parse_retry_after_ms(&err), None);
}
#[test]
fn rate_limited_detection() {
assert!(is_rate_limited(&anyhow::anyhow!("429 Too Many Requests")));
assert!(is_rate_limited(&anyhow::anyhow!(
"HTTP 429 rate limit exceeded"
)));
assert!(!is_rate_limited(&anyhow::anyhow!("401 Unauthorized")));
assert!(!is_rate_limited(&anyhow::anyhow!(
"500 Internal Server Error"
)));
}
#[test]
fn compute_backoff_uses_retry_after() {
let provider = ReliableProvider::new(vec![], 0, 500);
let err = anyhow::anyhow!("429 Retry-After: 3");
assert_eq!(provider.compute_backoff(500, &err), 3000);
}
#[test]
fn compute_backoff_caps_at_30s() {
let provider = ReliableProvider::new(vec![], 0, 500);
let err = anyhow::anyhow!("429 Retry-After: 120");
assert_eq!(provider.compute_backoff(500, &err), 30_000);
}
#[test]
fn compute_backoff_falls_back_to_base() {
let provider = ReliableProvider::new(vec![], 0, 500);
let err = anyhow::anyhow!("500 Server Error");
assert_eq!(provider.compute_backoff(500, &err), 500);
}
// ── Arc<ModelAwareMock> Provider impl for test ──
#[async_trait]
impl Provider for Arc<ModelAwareMock> {
async fn chat_with_system(
&self,
system_prompt: Option<&str>,
message: &str,
model: &str,
temperature: f64,
) -> anyhow::Result<ChatResponse> {
self.as_ref()
.chat_with_system(system_prompt, message, model, temperature)
.await
}
}
} }