Files
keyhunter/.planning/phases/03-tier-3-9-providers/03-03-PLAN.md
2026-04-05 14:39:54 +03:00

394 lines
10 KiB
Markdown

---
phase: 03-tier-3-9-providers
plan: 03
type: execute
wave: 1
depends_on: []
files_modified:
- providers/openrouter.yaml
- providers/litellm.yaml
- providers/cloudflare-ai.yaml
- providers/vercel-ai.yaml
- providers/portkey.yaml
- providers/helicone.yaml
- providers/martian.yaml
- providers/kong.yaml
- providers/bricksai.yaml
- providers/aether.yaml
- providers/notdiamond.yaml
- pkg/providers/definitions/openrouter.yaml
- pkg/providers/definitions/litellm.yaml
- pkg/providers/definitions/cloudflare-ai.yaml
- pkg/providers/definitions/vercel-ai.yaml
- pkg/providers/definitions/portkey.yaml
- pkg/providers/definitions/helicone.yaml
- pkg/providers/definitions/martian.yaml
- pkg/providers/definitions/kong.yaml
- pkg/providers/definitions/bricksai.yaml
- pkg/providers/definitions/aether.yaml
- pkg/providers/definitions/notdiamond.yaml
autonomous: true
requirements: [PROV-05]
must_haves:
truths:
- "11 Tier 5 infrastructure/gateway provider YAMLs load"
- "OpenRouter sk-or- and Helicone sk-helicone- prefixes use high-confidence regex"
- "Gateway providers have strong keyword anchors to their SDK envs"
artifacts:
- path: "providers/openrouter.yaml"
provides: "OpenRouter sk-or- prefix pattern"
contains: "sk-or-"
- path: "providers/helicone.yaml"
provides: "Helicone sk-helicone- prefix pattern"
contains: "helicone"
- path: "providers/litellm.yaml"
provides: "LiteLLM proxy keyword detection"
contains: "litellm"
key_links:
- from: "provider keywords[]"
to: "Registry Aho-Corasick automaton"
via: "NewRegistry()"
pattern: "keywords"
---
<objective>
Create 11 Tier 5 Infrastructure/Gateway provider YAMLs — LLM routers, proxies, and observability gateways (OpenRouter, LiteLLM, Cloudflare AI, Vercel AI, Portkey, Helicone, Martian, Kong, BricksAI, Aether, Not Diamond).
Purpose: Satisfy PROV-05 (11 Tier 5 Infrastructure/Gateway providers). Several of these have documented key prefixes (sk-or-, sk-helicone-) that support high-confidence detection.
Output: 22 YAML files.
Addresses PROV-05.
</objective>
<execution_context>
@$HOME/.claude/get-shit-done/workflows/execute-plan.md
@$HOME/.claude/get-shit-done/templates/summary.md
</execution_context>
<context>
@.planning/ROADMAP.md
@.planning/phases/03-tier-3-9-providers/03-CONTEXT.md
@pkg/providers/schema.go
@providers/groq.yaml
<interfaces>
Schema per pkg/providers/schema.go. No category field. Dual-location required. RE2 regex only.
Keyword-only detection for providers without documented key formats.
</interfaces>
</context>
<tasks>
<task type="auto">
<name>Task 1: OpenRouter, LiteLLM, Cloudflare, Vercel, Portkey, Helicone YAMLs</name>
<files>providers/openrouter.yaml, providers/litellm.yaml, providers/cloudflare-ai.yaml, providers/vercel-ai.yaml, providers/portkey.yaml, providers/helicone.yaml, pkg/providers/definitions/openrouter.yaml, pkg/providers/definitions/litellm.yaml, pkg/providers/definitions/cloudflare-ai.yaml, pkg/providers/definitions/vercel-ai.yaml, pkg/providers/definitions/portkey.yaml, pkg/providers/definitions/helicone.yaml</files>
<read_first>
- pkg/providers/schema.go
</read_first>
<action>
providers/openrouter.yaml:
```yaml
format_version: 1
name: openrouter
display_name: OpenRouter
tier: 5
last_verified: "2026-04-05"
keywords:
- "openrouter"
- "OPENROUTER_API_KEY"
- "openrouter.ai"
- "sk-or-"
patterns:
- regex: 'sk-or-v1-[a-f0-9]{64}'
entropy_min: 4.0
confidence: high
- regex: 'sk-or-[A-Za-z0-9]{40,}'
entropy_min: 4.0
confidence: medium
verify:
method: GET
url: https://openrouter.ai/api/v1/auth/key
headers:
Authorization: "Bearer {KEY}"
valid_status: [200]
invalid_status: [401, 403]
```
providers/litellm.yaml:
```yaml
format_version: 1
name: litellm
display_name: LiteLLM Proxy
tier: 5
last_verified: "2026-04-05"
keywords:
- "litellm"
- "LITELLM_API_KEY"
- "LITELLM_MASTER_KEY"
- "LITELLM_PROXY_API_KEY"
patterns:
- regex: 'sk-[A-Za-z0-9_\-]{20,}'
entropy_min: 4.0
confidence: low
verify:
method: GET
url: ""
headers: {}
valid_status: []
invalid_status: []
```
providers/cloudflare-ai.yaml:
```yaml
format_version: 1
name: cloudflare-ai
display_name: Cloudflare Workers AI
tier: 5
last_verified: "2026-04-05"
keywords:
- "cloudflare"
- "workers-ai"
- "CLOUDFLARE_API_TOKEN"
- "CLOUDFLARE_ACCOUNT_ID"
- "CF_API_TOKEN"
- "api.cloudflare.com"
patterns:
- regex: '[A-Za-z0-9_\-]{40}'
entropy_min: 4.5
confidence: low
verify:
method: GET
url: https://api.cloudflare.com/client/v4/user/tokens/verify
headers:
Authorization: "Bearer {KEY}"
valid_status: [200]
invalid_status: [401, 403]
```
providers/vercel-ai.yaml:
```yaml
format_version: 1
name: vercel-ai
display_name: Vercel AI Gateway
tier: 5
last_verified: "2026-04-05"
keywords:
- "vercel"
- "VERCEL_AI_GATEWAY"
- "AI_GATEWAY_API_KEY"
- "vercel.ai"
- "ai-sdk"
verify:
method: GET
url: ""
headers: {}
valid_status: []
invalid_status: []
```
providers/portkey.yaml:
```yaml
format_version: 1
name: portkey
display_name: Portkey
tier: 5
last_verified: "2026-04-05"
keywords:
- "portkey"
- "PORTKEY_API_KEY"
- "api.portkey.ai"
- "portkey-ai"
verify:
method: GET
url: https://api.portkey.ai/v1/feedback
headers:
x-portkey-api-key: "{KEY}"
valid_status: [200, 400]
invalid_status: [401, 403]
```
providers/helicone.yaml:
```yaml
format_version: 1
name: helicone
display_name: Helicone
tier: 5
last_verified: "2026-04-05"
keywords:
- "helicone"
- "HELICONE_API_KEY"
- "sk-helicone-"
- "api.helicone.ai"
patterns:
- regex: 'sk-helicone-[a-z0-9]{7}-[a-z0-9]{7}-[a-z0-9]{7}-[a-z0-9]{7}'
entropy_min: 3.5
confidence: high
verify:
method: GET
url: https://api.helicone.ai/v1/key/verify
headers:
Authorization: "Bearer {KEY}"
valid_status: [200]
invalid_status: [401, 403]
```
Copy all 6 files verbatim to pkg/providers/definitions/.
</action>
<verify>
<automated>cd /home/salva/Documents/apikey && for f in openrouter litellm cloudflare-ai vercel-ai portkey helicone; do diff providers/$f.yaml pkg/providers/definitions/$f.yaml || exit 1; done && go test ./pkg/providers/... -count=1 && go test ./pkg/engine/... -count=1</automated>
</verify>
<acceptance_criteria>
- All 12 files exist
- `grep -q 'sk-or-v1-' providers/openrouter.yaml`
- `grep -q 'sk-helicone-' providers/helicone.yaml`
- `grep -q 'LITELLM_MASTER_KEY' providers/litellm.yaml`
- `go test ./pkg/providers/... -count=1` passes
- `go test ./pkg/engine/... -count=1` passes
</acceptance_criteria>
<done>6 major gateway providers dual-located.</done>
</task>
<task type="auto">
<name>Task 2: Martian, Kong, BricksAI, Aether, Not Diamond YAMLs</name>
<files>providers/martian.yaml, providers/kong.yaml, providers/bricksai.yaml, providers/aether.yaml, providers/notdiamond.yaml, pkg/providers/definitions/martian.yaml, pkg/providers/definitions/kong.yaml, pkg/providers/definitions/bricksai.yaml, pkg/providers/definitions/aether.yaml, pkg/providers/definitions/notdiamond.yaml</files>
<read_first>
- pkg/providers/schema.go
</read_first>
<action>
All 5 use keyword-only detection (no documented public key formats). Omit patterns field.
providers/martian.yaml:
```yaml
format_version: 1
name: martian
display_name: Martian (Model Router)
tier: 5
last_verified: "2026-04-05"
keywords:
- "withmartian"
- "MARTIAN_API_KEY"
- "withmartian.com"
- "martian-router"
verify:
method: GET
url: ""
headers: {}
valid_status: []
invalid_status: []
```
providers/kong.yaml:
```yaml
format_version: 1
name: kong
display_name: Kong AI Gateway
tier: 5
last_verified: "2026-04-05"
keywords:
- "kong"
- "KONG_API_KEY"
- "kong-ai-gateway"
- "konghq.com"
- "ai-proxy"
verify:
method: GET
url: ""
headers: {}
valid_status: []
invalid_status: []
```
providers/bricksai.yaml:
```yaml
format_version: 1
name: bricksai
display_name: BricksAI
tier: 5
last_verified: "2026-04-05"
keywords:
- "bricksai"
- "BRICKS_API_KEY"
- "trybricks.ai"
- "bricksllm"
verify:
method: GET
url: ""
headers: {}
valid_status: []
invalid_status: []
```
providers/aether.yaml:
```yaml
format_version: 1
name: aether
display_name: Aether AI
tier: 5
last_verified: "2026-04-05"
keywords:
- "aether"
- "AETHER_API_KEY"
- "aether.ai"
- "aetherplatform"
verify:
method: GET
url: ""
headers: {}
valid_status: []
invalid_status: []
```
providers/notdiamond.yaml:
```yaml
format_version: 1
name: notdiamond
display_name: Not Diamond
tier: 5
last_verified: "2026-04-05"
keywords:
- "notdiamond"
- "NOTDIAMOND_API_KEY"
- "not-diamond"
- "notdiamond.ai"
verify:
method: GET
url: ""
headers: {}
valid_status: []
invalid_status: []
```
Copy all 5 files verbatim to pkg/providers/definitions/.
</action>
<verify>
<automated>cd /home/salva/Documents/apikey && for f in martian kong bricksai aether notdiamond; do diff providers/$f.yaml pkg/providers/definitions/$f.yaml || exit 1; done && go test ./pkg/providers/... -count=1 && go test ./pkg/engine/... -count=1 && test "$(grep -l 'tier: 5' providers/*.yaml | wc -l)" = "11"</automated>
</verify>
<acceptance_criteria>
- All 10 files exist
- `grep -q 'withmartian' providers/martian.yaml`
- `grep -q 'konghq.com' providers/kong.yaml`
- All 5 omit patterns field: `grep -L 'patterns:' providers/{martian,kong,bricksai,aether,notdiamond}.yaml` returns all 5
- Total Tier 5 count = 11: `grep -l 'tier: 5' providers/*.yaml | wc -l` → 11
- `go test ./pkg/providers/... -count=1` passes
</acceptance_criteria>
<done>All 11 Tier 5 gateway providers dual-located. PROV-05 satisfied.</done>
</task>
</tasks>
<verification>
`grep -l 'tier: 5' providers/*.yaml | wc -l` returns 11.
</verification>
<success_criteria>
- 11 Tier 5 gateway providers created
- Documented prefixes use tight high-confidence regex (openrouter, helicone)
- Undocumented providers use keyword-only detection
- No engine test regressions
</success_criteria>
<output>
After completion, create `.planning/phases/03-tier-3-9-providers/03-03-SUMMARY.md`
</output>