This release represents a comprehensive transformation of the codebase from Codex to LLMX, enhanced with LiteLLM integration to support 100+ LLM providers through a unified API. ## Major Changes ### Phase 1: Repository & Infrastructure Setup - Established new repository structure and branching strategy - Created comprehensive project documentation (CLAUDE.md, LITELLM-SETUP.md) - Set up development environment and tooling configuration ### Phase 2: Rust Workspace Transformation - Renamed all Rust crates from `codex-*` to `llmx-*` (30+ crates) - Updated package names, binary names, and workspace members - Renamed core modules: codex.rs → llmx.rs, codex_delegate.rs → llmx_delegate.rs - Updated all internal references, imports, and type names - Renamed directories: codex-rs/ → llmx-rs/, codex-backend-openapi-models/ → llmx-backend-openapi-models/ - Fixed all Rust compilation errors after mass rename ### Phase 3: LiteLLM Integration - Integrated LiteLLM for multi-provider LLM support (Anthropic, OpenAI, Azure, Google AI, AWS Bedrock, etc.) - Implemented OpenAI-compatible Chat Completions API support - Added model family detection and provider-specific handling - Updated authentication to support LiteLLM API keys - Renamed environment variables: OPENAI_BASE_URL → LLMX_BASE_URL - Added LLMX_API_KEY for unified authentication - Enhanced error handling for Chat Completions API responses - Implemented fallback mechanisms between Responses API and Chat Completions API ### Phase 4: TypeScript/Node.js Components - Renamed npm package: @codex/codex-cli → @valknar/llmx - Updated TypeScript SDK to use new LLMX APIs and endpoints - Fixed all TypeScript compilation and linting errors - Updated SDK tests to support both API backends - Enhanced mock server to handle multiple API formats - Updated build scripts for cross-platform packaging ### Phase 5: Configuration & Documentation - Updated all configuration files to use LLMX naming - Rewrote README and documentation for LLMX branding - Updated config paths: ~/.codex/ → ~/.llmx/ - Added comprehensive LiteLLM setup guide - Updated all user-facing strings and help text - Created release plan and migration documentation ### Phase 6: Testing & Validation - Fixed all Rust tests for new naming scheme - Updated snapshot tests in TUI (36 frame files) - Fixed authentication storage tests - Updated Chat Completions payload and SSE tests - Fixed SDK tests for new API endpoints - Ensured compatibility with Claude Sonnet 4.5 model - Fixed test environment variables (LLMX_API_KEY, LLMX_BASE_URL) ### Phase 7: Build & Release Pipeline - Updated GitHub Actions workflows for LLMX binary names - Fixed rust-release.yml to reference llmx-rs/ instead of codex-rs/ - Updated CI/CD pipelines for new package names - Made Apple code signing optional in release workflow - Enhanced npm packaging resilience for partial platform builds - Added Windows sandbox support to workspace - Updated dotslash configuration for new binary names ### Phase 8: Final Polish - Renamed all assets (.github images, labels, templates) - Updated VSCode and DevContainer configurations - Fixed all clippy warnings and formatting issues - Applied cargo fmt and prettier formatting across codebase - Updated issue templates and pull request templates - Fixed all remaining UI text references ## Technical Details **Breaking Changes:** - Binary name changed from `codex` to `llmx` - Config directory changed from `~/.codex/` to `~/.llmx/` - Environment variables renamed (CODEX_* → LLMX_*) - npm package renamed to `@valknar/llmx` **New Features:** - Support for 100+ LLM providers via LiteLLM - Unified authentication with LLMX_API_KEY - Enhanced model provider detection and handling - Improved error handling and fallback mechanisms **Files Changed:** - 578 files modified across Rust, TypeScript, and documentation - 30+ Rust crates renamed and updated - Complete rebrand of UI, CLI, and documentation - All tests updated and passing **Dependencies:** - Updated Cargo.lock with new package names - Updated npm dependencies in llmx-cli - Enhanced OpenAPI models for LLMX backend This release establishes LLMX as a standalone project with comprehensive LiteLLM integration, maintaining full backward compatibility with existing functionality while opening support for a wide ecosystem of LLM providers. 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <noreply@anthropic.com> Co-Authored-By: Sebastian Krüger <support@pivoine.art>
243 lines
9.4 KiB
Rust
243 lines
9.4 KiB
Rust
use async_trait::async_trait;
|
|
use llmx_protocol::models::ShellToolCallParams;
|
|
use std::sync::Arc;
|
|
|
|
use crate::apply_patch;
|
|
use crate::apply_patch::InternalApplyPatchInvocation;
|
|
use crate::apply_patch::convert_apply_patch_to_protocol;
|
|
use crate::exec::ExecParams;
|
|
use crate::exec_env::create_env;
|
|
use crate::function_tool::FunctionCallError;
|
|
use crate::llmx::TurnContext;
|
|
use crate::tools::context::ToolInvocation;
|
|
use crate::tools::context::ToolOutput;
|
|
use crate::tools::context::ToolPayload;
|
|
use crate::tools::events::ToolEmitter;
|
|
use crate::tools::events::ToolEventCtx;
|
|
use crate::tools::orchestrator::ToolOrchestrator;
|
|
use crate::tools::registry::ToolHandler;
|
|
use crate::tools::registry::ToolKind;
|
|
use crate::tools::runtimes::apply_patch::ApplyPatchRequest;
|
|
use crate::tools::runtimes::apply_patch::ApplyPatchRuntime;
|
|
use crate::tools::runtimes::shell::ShellRequest;
|
|
use crate::tools::runtimes::shell::ShellRuntime;
|
|
use crate::tools::sandboxing::ToolCtx;
|
|
|
|
pub struct ShellHandler;
|
|
|
|
impl ShellHandler {
|
|
fn to_exec_params(params: ShellToolCallParams, turn_context: &TurnContext) -> ExecParams {
|
|
ExecParams {
|
|
command: params.command,
|
|
cwd: turn_context.resolve_path(params.workdir.clone()),
|
|
timeout_ms: params.timeout_ms,
|
|
env: create_env(&turn_context.shell_environment_policy),
|
|
with_escalated_permissions: params.with_escalated_permissions,
|
|
justification: params.justification,
|
|
arg0: None,
|
|
}
|
|
}
|
|
}
|
|
|
|
#[async_trait]
|
|
impl ToolHandler for ShellHandler {
|
|
fn kind(&self) -> ToolKind {
|
|
ToolKind::Function
|
|
}
|
|
|
|
fn matches_kind(&self, payload: &ToolPayload) -> bool {
|
|
matches!(
|
|
payload,
|
|
ToolPayload::Function { .. } | ToolPayload::LocalShell { .. }
|
|
)
|
|
}
|
|
|
|
async fn handle(&self, invocation: ToolInvocation) -> Result<ToolOutput, FunctionCallError> {
|
|
let ToolInvocation {
|
|
session,
|
|
turn,
|
|
tracker,
|
|
call_id,
|
|
tool_name,
|
|
payload,
|
|
} = invocation;
|
|
|
|
match payload {
|
|
ToolPayload::Function { arguments } => {
|
|
let params: ShellToolCallParams =
|
|
serde_json::from_str(&arguments).map_err(|e| {
|
|
FunctionCallError::RespondToModel(format!(
|
|
"failed to parse function arguments: {e:?}"
|
|
))
|
|
})?;
|
|
let exec_params = Self::to_exec_params(params, turn.as_ref());
|
|
Self::run_exec_like(
|
|
tool_name.as_str(),
|
|
exec_params,
|
|
session,
|
|
turn,
|
|
tracker,
|
|
call_id,
|
|
false,
|
|
)
|
|
.await
|
|
}
|
|
ToolPayload::LocalShell { params } => {
|
|
let exec_params = Self::to_exec_params(params, turn.as_ref());
|
|
Self::run_exec_like(
|
|
tool_name.as_str(),
|
|
exec_params,
|
|
session,
|
|
turn,
|
|
tracker,
|
|
call_id,
|
|
true,
|
|
)
|
|
.await
|
|
}
|
|
_ => Err(FunctionCallError::RespondToModel(format!(
|
|
"unsupported payload for shell handler: {tool_name}"
|
|
))),
|
|
}
|
|
}
|
|
}
|
|
|
|
impl ShellHandler {
|
|
async fn run_exec_like(
|
|
tool_name: &str,
|
|
exec_params: ExecParams,
|
|
session: Arc<crate::llmx::Session>,
|
|
turn: Arc<TurnContext>,
|
|
tracker: crate::tools::context::SharedTurnDiffTracker,
|
|
call_id: String,
|
|
is_user_shell_command: bool,
|
|
) -> Result<ToolOutput, FunctionCallError> {
|
|
// Approval policy guard for explicit escalation in non-OnRequest modes.
|
|
if exec_params.with_escalated_permissions.unwrap_or(false)
|
|
&& !matches!(
|
|
turn.approval_policy,
|
|
llmx_protocol::protocol::AskForApproval::OnRequest
|
|
)
|
|
{
|
|
return Err(FunctionCallError::RespondToModel(format!(
|
|
"approval policy is {policy:?}; reject command — you should not ask for escalated permissions if the approval policy is {policy:?}",
|
|
policy = turn.approval_policy
|
|
)));
|
|
}
|
|
|
|
// Intercept apply_patch if present.
|
|
match llmx_apply_patch::maybe_parse_apply_patch_verified(
|
|
&exec_params.command,
|
|
&exec_params.cwd,
|
|
) {
|
|
llmx_apply_patch::MaybeApplyPatchVerified::Body(changes) => {
|
|
match apply_patch::apply_patch(session.as_ref(), turn.as_ref(), &call_id, changes)
|
|
.await
|
|
{
|
|
InternalApplyPatchInvocation::Output(item) => {
|
|
// Programmatic apply_patch path; return its result.
|
|
let content = item?;
|
|
return Ok(ToolOutput::Function {
|
|
content,
|
|
content_items: None,
|
|
success: Some(true),
|
|
});
|
|
}
|
|
InternalApplyPatchInvocation::DelegateToExec(apply) => {
|
|
let emitter = ToolEmitter::apply_patch(
|
|
convert_apply_patch_to_protocol(&apply.action),
|
|
!apply.user_explicitly_approved_this_action,
|
|
);
|
|
let event_ctx = ToolEventCtx::new(
|
|
session.as_ref(),
|
|
turn.as_ref(),
|
|
&call_id,
|
|
Some(&tracker),
|
|
);
|
|
emitter.begin(event_ctx).await;
|
|
|
|
let req = ApplyPatchRequest {
|
|
patch: apply.action.patch.clone(),
|
|
cwd: apply.action.cwd.clone(),
|
|
timeout_ms: exec_params.timeout_ms,
|
|
user_explicitly_approved: apply.user_explicitly_approved_this_action,
|
|
llmx_exe: turn.llmx_linux_sandbox_exe.clone(),
|
|
};
|
|
let mut orchestrator = ToolOrchestrator::new();
|
|
let mut runtime = ApplyPatchRuntime::new();
|
|
let tool_ctx = ToolCtx {
|
|
session: session.as_ref(),
|
|
turn: turn.as_ref(),
|
|
call_id: call_id.clone(),
|
|
tool_name: tool_name.to_string(),
|
|
};
|
|
let out = orchestrator
|
|
.run(&mut runtime, &req, &tool_ctx, &turn, turn.approval_policy)
|
|
.await;
|
|
let event_ctx = ToolEventCtx::new(
|
|
session.as_ref(),
|
|
turn.as_ref(),
|
|
&call_id,
|
|
Some(&tracker),
|
|
);
|
|
let content = emitter.finish(event_ctx, out).await?;
|
|
return Ok(ToolOutput::Function {
|
|
content,
|
|
content_items: None,
|
|
success: Some(true),
|
|
});
|
|
}
|
|
}
|
|
}
|
|
llmx_apply_patch::MaybeApplyPatchVerified::CorrectnessError(parse_error) => {
|
|
return Err(FunctionCallError::RespondToModel(format!(
|
|
"apply_patch verification failed: {parse_error}"
|
|
)));
|
|
}
|
|
llmx_apply_patch::MaybeApplyPatchVerified::ShellParseError(error) => {
|
|
tracing::trace!("Failed to parse shell command, {error:?}");
|
|
// Fall through to regular shell execution.
|
|
}
|
|
llmx_apply_patch::MaybeApplyPatchVerified::NotApplyPatch => {
|
|
// Fall through to regular shell execution.
|
|
}
|
|
}
|
|
|
|
// Regular shell execution path.
|
|
let emitter = ToolEmitter::shell(
|
|
exec_params.command.clone(),
|
|
exec_params.cwd.clone(),
|
|
is_user_shell_command,
|
|
);
|
|
let event_ctx = ToolEventCtx::new(session.as_ref(), turn.as_ref(), &call_id, None);
|
|
emitter.begin(event_ctx).await;
|
|
|
|
let req = ShellRequest {
|
|
command: exec_params.command.clone(),
|
|
cwd: exec_params.cwd.clone(),
|
|
timeout_ms: exec_params.timeout_ms,
|
|
env: exec_params.env.clone(),
|
|
with_escalated_permissions: exec_params.with_escalated_permissions,
|
|
justification: exec_params.justification.clone(),
|
|
};
|
|
let mut orchestrator = ToolOrchestrator::new();
|
|
let mut runtime = ShellRuntime::new();
|
|
let tool_ctx = ToolCtx {
|
|
session: session.as_ref(),
|
|
turn: turn.as_ref(),
|
|
call_id: call_id.clone(),
|
|
tool_name: tool_name.to_string(),
|
|
};
|
|
let out = orchestrator
|
|
.run(&mut runtime, &req, &tool_ctx, &turn, turn.approval_policy)
|
|
.await;
|
|
let event_ctx = ToolEventCtx::new(session.as_ref(), turn.as_ref(), &call_id, None);
|
|
let content = emitter.finish(event_ctx, out).await?;
|
|
Ok(ToolOutput::Function {
|
|
content,
|
|
content_items: None,
|
|
success: Some(true),
|
|
})
|
|
}
|
|
}
|