server.rs 32.5 KB
Newer Older
1
use crate::{
2
    config::{ConnectionMode, HistoryBackend, RouterConfig, RoutingMode},
3
    core::{LoadMonitor, WorkerManager, WorkerRegistry, WorkerType},
4
    data_connector::{
5
6
7
8
        MemoryConversationItemStorage, MemoryConversationStorage, MemoryResponseStorage,
        NoOpConversationStorage, NoOpResponseStorage, OracleConversationItemStorage,
        OracleConversationStorage, OracleResponseStorage, SharedConversationStorage,
        SharedResponseStorage,
9
    },
10
11
    logging::{self, LoggingConfig},
    metrics::{self, PrometheusConfig},
12
    middleware::{self, AuthConfig, QueuedRequest, TokenBucket},
13
14
15
16
    policies::PolicyRegistry,
    protocols::{
        spec::{
            ChatCompletionRequest, CompletionRequest, EmbeddingRequest, GenerateRequest,
17
            RerankRequest, ResponsesGetParams, ResponsesRequest, V1RerankReqInput,
18
19
20
        },
        worker_spec::{WorkerApiResponse, WorkerConfigRequest, WorkerErrorResponse},
    },
21
    reasoning_parser::ReasoningParserFactory,
22
    routers::{router_manager::RouterManager, RouterTrait},
23
24
    service_discovery::{start_service_discovery, ServiceDiscoveryConfig},
    tokenizer::{factory as tokenizer_factory, traits::Tokenizer},
25
    tool_parser::ToolParserFactory,
26
};
27
use axum::{
28
    extract::{Path, Query, Request, State},
29
30
    http::StatusCode,
    response::{IntoResponse, Response},
31
    routing::{delete, get, post},
32
    serve, Json, Router,
33
};
34
use reqwest::Client;
35
use serde::Deserialize;
36
use serde_json::{json, Value};
37
38
39
40
41
42
use std::{
    sync::atomic::{AtomicBool, Ordering},
    sync::Arc,
    time::Duration,
};
use tokio::{net::TcpListener, signal, spawn};
43
use tracing::{error, info, warn, Level};
44

45
46
//

47
#[derive(Clone)]
48
pub struct AppContext {
49
    pub client: Client,
50
    pub router_config: RouterConfig,
51
    pub rate_limiter: Arc<TokenBucket>,
52
    pub tokenizer: Option<Arc<dyn Tokenizer>>,
53
    pub reasoning_parser_factory: Option<ReasoningParserFactory>,
54
    pub tool_parser_factory: Option<ToolParserFactory>,
55
56
57
    pub worker_registry: Arc<WorkerRegistry>,
    pub policy_registry: Arc<PolicyRegistry>,
    pub router_manager: Option<Arc<RouterManager>>,
58
    pub response_storage: SharedResponseStorage,
59
    pub conversation_storage: SharedConversationStorage,
60
    pub conversation_item_storage: crate::data_connector::SharedConversationItemStorage,
61
    pub load_monitor: Option<Arc<LoadMonitor>>,
62
63
    pub configured_reasoning_parser: Option<String>,
    pub configured_tool_parser: Option<String>,
64
65
}

66
impl AppContext {
67
68
69
70
    pub fn new(
        router_config: RouterConfig,
        client: Client,
        max_concurrent_requests: usize,
71
        rate_limit_tokens_per_second: Option<usize>,
72
    ) -> Result<Self, String> {
73
74
        let rate_limit_tokens = rate_limit_tokens_per_second.unwrap_or(max_concurrent_requests);
        let rate_limiter = Arc::new(TokenBucket::new(max_concurrent_requests, rate_limit_tokens));
75

76
        let (tokenizer, reasoning_parser_factory, tool_parser_factory) =
77
            if router_config.connection_mode == ConnectionMode::Grpc {
78
79
80
81
82
83
84
85
86
87
88
                let tokenizer_path = router_config
                    .tokenizer_path
                    .clone()
                    .or_else(|| router_config.model_path.clone())
                    .ok_or_else(|| {
                        "gRPC mode requires either --tokenizer-path or --model-path to be specified"
                            .to_string()
                    })?;

                let tokenizer = Some(
                    tokenizer_factory::create_tokenizer(&tokenizer_path)
89
                        .map_err(|e| format!("Failed to create tokenizer: {e}"))?,
90
                );
91
                let reasoning_parser_factory = Some(ReasoningParserFactory::new());
92
                let tool_parser_factory = Some(ToolParserFactory::new());
93

94
                (tokenizer, reasoning_parser_factory, tool_parser_factory)
95
96
97
98
            } else {
                (None, None, None)
            };

99
        let worker_registry = Arc::new(WorkerRegistry::new());
100
        let policy_registry = Arc::new(PolicyRegistry::new(router_config.policy.clone()));
101

102
        let router_manager = None;
103

104
105
106
107
108
109
110
111
112
113
114
115
        let (response_storage, conversation_storage): (
            SharedResponseStorage,
            SharedConversationStorage,
        ) = match router_config.history_backend {
            HistoryBackend::Memory => (
                Arc::new(MemoryResponseStorage::new()),
                Arc::new(MemoryConversationStorage::new()),
            ),
            HistoryBackend::None => (
                Arc::new(NoOpResponseStorage::new()),
                Arc::new(NoOpConversationStorage::new()),
            ),
116
117
118
119
120
            HistoryBackend::Oracle => {
                let oracle_cfg = router_config.oracle.clone().ok_or_else(|| {
                    "oracle configuration is required when history_backend=oracle".to_string()
                })?;

121
122
123
124
125
                let response_storage =
                    OracleResponseStorage::new(oracle_cfg.clone()).map_err(|err| {
                        format!("failed to initialize Oracle response storage: {err}")
                    })?;

126
127
                let conversation_storage = OracleConversationStorage::new(oracle_cfg.clone())
                    .map_err(|err| {
128
129
                        format!("failed to initialize Oracle conversation storage: {err}")
                    })?;
130

131
                (Arc::new(response_storage), Arc::new(conversation_storage))
132
            }
133
134
        };

135
136
137
138
139
140
141
142
143
144
145
146
147
148
        // Conversation items storage (memory-backed for now)
        let conversation_item_storage: crate::data_connector::SharedConversationItemStorage =
            match router_config.history_backend {
                HistoryBackend::Oracle => {
                    let oracle_cfg = router_config.oracle.clone().ok_or_else(|| {
                        "oracle configuration is required when history_backend=oracle".to_string()
                    })?;
                    Arc::new(OracleConversationItemStorage::new(oracle_cfg).map_err(|e| {
                        format!("failed to initialize Oracle conversation item storage: {e}")
                    })?)
                }
                _ => Arc::new(MemoryConversationItemStorage::new()),
            };

149
150
151
152
153
154
155
        let load_monitor = Some(Arc::new(LoadMonitor::new(
            worker_registry.clone(),
            policy_registry.clone(),
            client.clone(),
            router_config.worker_startup_check_interval_secs,
        )));

156
157
158
        let configured_reasoning_parser = router_config.reasoning_parser.clone();
        let configured_tool_parser = router_config.tool_call_parser.clone();

159
        Ok(Self {
160
            client,
161
            router_config,
162
            rate_limiter,
163
164
            tokenizer,
            reasoning_parser_factory,
165
            tool_parser_factory,
166
167
168
            worker_registry,
            policy_registry,
            router_manager,
169
            response_storage,
170
            conversation_storage,
171
            conversation_item_storage,
172
            load_monitor,
173
174
            configured_reasoning_parser,
            configured_tool_parser,
175
        })
176
177
178
    }
}

179
180
181
182
#[derive(Clone)]
pub struct AppState {
    pub router: Arc<dyn RouterTrait>,
    pub context: Arc<AppContext>,
183
    pub concurrency_queue_tx: Option<tokio::sync::mpsc::Sender<QueuedRequest>>,
184
    pub router_manager: Option<Arc<RouterManager>>,
185
186
}

187
188
async fn sink_handler() -> Response {
    StatusCode::NOT_FOUND.into_response()
189
190
}

191
192
async fn liveness() -> Response {
    (StatusCode::OK, "OK").into_response()
193
194
}

195
async fn readiness(State(state): State<Arc<AppState>>) -> Response {
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
    let workers = state.context.worker_registry.get_all();
    let healthy_workers: Vec<_> = workers.iter().filter(|w| w.is_healthy()).collect();

    let is_ready = if state.context.router_config.enable_igw {
        !healthy_workers.is_empty()
    } else {
        match &state.context.router_config.mode {
            RoutingMode::PrefillDecode { .. } => {
                let has_prefill = healthy_workers
                    .iter()
                    .any(|w| matches!(w.worker_type(), WorkerType::Prefill { .. }));
                let has_decode = healthy_workers
                    .iter()
                    .any(|w| matches!(w.worker_type(), WorkerType::Decode));
                has_prefill && has_decode
            }
            RoutingMode::Regular { .. } => !healthy_workers.is_empty(),
            RoutingMode::OpenAI { .. } => !healthy_workers.is_empty(),
        }
    };

    if is_ready {
        (
            StatusCode::OK,
            Json(json!({
                "status": "ready",
                "healthy_workers": healthy_workers.len(),
                "total_workers": workers.len()
            })),
        )
            .into_response()
    } else {
        (
            StatusCode::SERVICE_UNAVAILABLE,
            Json(json!({
                "status": "not ready",
                "reason": "insufficient healthy workers"
            })),
        )
            .into_response()
    }
237
238
}

239
240
async fn health(_state: State<Arc<AppState>>) -> Response {
    liveness().await
241
242
}

243
async fn health_generate(State(state): State<Arc<AppState>>, req: Request) -> Response {
244
    state.router.health_generate(req).await
245
246
}

247
async fn get_server_info(State(state): State<Arc<AppState>>, req: Request) -> Response {
248
    state.router.get_server_info(req).await
249
250
}

251
async fn v1_models(State(state): State<Arc<AppState>>, req: Request) -> Response {
252
    state.router.get_models(req).await
253
254
}

255
async fn get_model_info(State(state): State<Arc<AppState>>, req: Request) -> Response {
256
    state.router.get_model_info(req).await
257
}
258

259
async fn generate(
260
261
262
263
    State(state): State<Arc<AppState>>,
    headers: http::HeaderMap,
    Json(body): Json<GenerateRequest>,
) -> Response {
264
265
266
267
    state
        .router
        .route_generate(Some(&headers), &body, None)
        .await
268
269
270
}

async fn v1_chat_completions(
271
272
273
274
    State(state): State<Arc<AppState>>,
    headers: http::HeaderMap,
    Json(body): Json<ChatCompletionRequest>,
) -> Response {
275
    state.router.route_chat(Some(&headers), &body, None).await
276
277
278
}

async fn v1_completions(
279
280
281
282
    State(state): State<Arc<AppState>>,
    headers: http::HeaderMap,
    Json(body): Json<CompletionRequest>,
) -> Response {
283
284
285
286
    state
        .router
        .route_completion(Some(&headers), &body, None)
        .await
287
288
}

289
290
291
292
293
async fn rerank(
    State(state): State<Arc<AppState>>,
    headers: http::HeaderMap,
    Json(body): Json<RerankRequest>,
) -> Response {
294
    state.router.route_rerank(Some(&headers), &body, None).await
295
296
297
298
299
300
301
302
303
}

async fn v1_rerank(
    State(state): State<Arc<AppState>>,
    headers: http::HeaderMap,
    Json(body): Json<V1RerankReqInput>,
) -> Response {
    state
        .router
304
        .route_rerank(Some(&headers), &body.into(), None)
305
306
307
        .await
}

308
309
310
311
312
async fn v1_responses(
    State(state): State<Arc<AppState>>,
    headers: http::HeaderMap,
    Json(body): Json<ResponsesRequest>,
) -> Response {
313
314
315
316
    state
        .router
        .route_responses(Some(&headers), &body, None)
        .await
317
318
}

319
320
321
322
323
324
325
326
327
328
329
async fn v1_embeddings(
    State(state): State<Arc<AppState>>,
    headers: http::HeaderMap,
    Json(body): Json<EmbeddingRequest>,
) -> Response {
    state
        .router
        .route_embeddings(Some(&headers), &body, None)
        .await
}

330
331
332
333
async fn v1_responses_get(
    State(state): State<Arc<AppState>>,
    Path(response_id): Path<String>,
    headers: http::HeaderMap,
334
    Query(params): Query<ResponsesGetParams>,
335
336
337
) -> Response {
    state
        .router
338
        .get_response(Some(&headers), &response_id, &params)
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
        .await
}

async fn v1_responses_cancel(
    State(state): State<Arc<AppState>>,
    Path(response_id): Path<String>,
    headers: http::HeaderMap,
) -> Response {
    state
        .router
        .cancel_response(Some(&headers), &response_id)
        .await
}

async fn v1_responses_delete(
    State(state): State<Arc<AppState>>,
    Path(response_id): Path<String>,
    headers: http::HeaderMap,
) -> Response {
    state
        .router
        .delete_response(Some(&headers), &response_id)
        .await
}

async fn v1_responses_list_input_items(
    State(state): State<Arc<AppState>>,
    Path(response_id): Path<String>,
    headers: http::HeaderMap,
) -> Response {
    state
        .router
        .list_response_input_items(Some(&headers), &response_id)
        .await
}

375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
async fn v1_conversations_create(
    State(state): State<Arc<AppState>>,
    headers: http::HeaderMap,
    Json(body): Json<Value>,
) -> Response {
    state
        .router
        .create_conversation(Some(&headers), &body)
        .await
}

async fn v1_conversations_get(
    State(state): State<Arc<AppState>>,
    Path(conversation_id): Path<String>,
    headers: http::HeaderMap,
) -> Response {
    state
        .router
        .get_conversation(Some(&headers), &conversation_id)
        .await
}

async fn v1_conversations_update(
    State(state): State<Arc<AppState>>,
    Path(conversation_id): Path<String>,
    headers: http::HeaderMap,
    Json(body): Json<Value>,
) -> Response {
    state
        .router
        .update_conversation(Some(&headers), &conversation_id, &body)
        .await
}

async fn v1_conversations_delete(
    State(state): State<Arc<AppState>>,
    Path(conversation_id): Path<String>,
    headers: http::HeaderMap,
) -> Response {
    state
        .router
        .delete_conversation(Some(&headers), &conversation_id)
        .await
}

420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
#[derive(Deserialize, Default)]
struct ListItemsQuery {
    limit: Option<usize>,
    order: Option<String>,
    after: Option<String>,
}

async fn v1_conversations_list_items(
    State(state): State<Arc<AppState>>,
    Path(conversation_id): Path<String>,
    Query(ListItemsQuery {
        limit,
        order,
        after,
    }): Query<ListItemsQuery>,
    headers: http::HeaderMap,
) -> Response {
    state
        .router
        .list_conversation_items(Some(&headers), &conversation_id, limit, order, after)
        .await
}

443
#[derive(Deserialize)]
444
struct AddWorkerQuery {
445
    url: String,
446
    api_key: Option<String>,
447
448
}

449
async fn add_worker(
450
    State(state): State<Arc<AppState>>,
451
    Query(AddWorkerQuery { url, api_key }): Query<AddWorkerQuery>,
452
) -> Response {
453
454
455
456
457
458
459
460
461
462
    // Warn if router has API key but worker is being added without one
    if state.context.router_config.api_key.is_some() && api_key.is_none() {
        warn!(
            "Adding worker {} without API key while router has API key configured. \
            Worker will be accessible without authentication. \
            If the worker requires the same API key as the router, please specify it explicitly.",
            url
        );
    }

463
464
465
    let result = WorkerManager::add_worker(&url, &api_key, &state.context).await;

    match result {
466
467
        Ok(message) => (StatusCode::OK, message).into_response(),
        Err(error) => (StatusCode::BAD_REQUEST, error).into_response(),
468
    }
469
470
}

471
async fn list_workers(State(state): State<Arc<AppState>>) -> Response {
472
473
    let worker_list = WorkerManager::get_worker_urls(&state.context.worker_registry);
    Json(json!({ "urls": worker_list })).into_response()
474
475
}

476
async fn remove_worker(
477
    State(state): State<Arc<AppState>>,
478
    Query(AddWorkerQuery { url, .. }): Query<AddWorkerQuery>,
479
) -> Response {
480
481
482
483
484
485
    let result = WorkerManager::remove_worker(&url, &state.context);

    match result {
        Ok(message) => (StatusCode::OK, message).into_response(),
        Err(error) => (StatusCode::BAD_REQUEST, error).into_response(),
    }
486
487
}

488
async fn flush_cache(State(state): State<Arc<AppState>>, _req: Request) -> Response {
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
    match WorkerManager::flush_cache_all(&state.context.worker_registry, &state.context.client)
        .await
    {
        Ok(result) => {
            if result.failed.is_empty() {
                (
                    StatusCode::OK,
                    Json(json!({
                        "status": "success",
                        "message": result.message,
                        "workers_flushed": result.successful.len(),
                        "total_http_workers": result.http_workers,
                        "total_workers": result.total_workers
                    })),
                )
                    .into_response()
            } else {
                (
                    StatusCode::PARTIAL_CONTENT,
                    Json(json!({
                        "status": "partial_success",
                        "message": result.message,
                        "successful": result.successful,
                        "failed": result.failed.into_iter().map(|(url, err)| json!({
                            "worker": url,
                            "error": err
                        })).collect::<Vec<_>>(),
                        "total_http_workers": result.http_workers,
                        "total_workers": result.total_workers
                    })),
                )
                    .into_response()
            }
        }
        Err(e) => {
            error!("Failed to flush cache: {}", e);
            (
                StatusCode::INTERNAL_SERVER_ERROR,
                Json(json!({
                    "status": "error",
                    "message": format!("Failed to flush cache: {}", e)
                })),
            )
                .into_response()
        }
    }
535
536
}

537
async fn get_loads(State(state): State<Arc<AppState>>, _req: Request) -> Response {
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
    let result =
        WorkerManager::get_all_worker_loads(&state.context.worker_registry, &state.context.client)
            .await;

    let loads: Vec<Value> = result
        .loads
        .iter()
        .map(|info| {
            json!({
                "worker": &info.worker,
                "load": info.load
            })
        })
        .collect();

    (
        StatusCode::OK,
        Json(json!({
            "workers": loads
        })),
    )
        .into_response()
560
561
}

562
563
564
565
async fn create_worker(
    State(state): State<Arc<AppState>>,
    Json(config): Json<WorkerConfigRequest>,
) -> Response {
566
567
568
569
570
571
572
573
574
575
    // Warn if router has API key but worker is being added without one
    if state.context.router_config.api_key.is_some() && config.api_key.is_none() {
        warn!(
            "Adding worker {} without API key while router has API key configured. \
            Worker will be accessible without authentication. \
            If the worker requires the same API key as the router, please specify it explicitly.",
            config.url
        );
    }

576
577
578
579
580
581
582
583
584
585
    let result = WorkerManager::add_worker_from_config(&config, &state.context).await;

    match result {
        Ok(message) => {
            let response = WorkerApiResponse {
                success: true,
                message,
                worker: None,
            };
            (StatusCode::OK, Json(response)).into_response()
586
        }
587
588
589
590
591
592
        Err(error) => {
            let error_response = WorkerErrorResponse {
                error,
                code: "ADD_WORKER_FAILED".to_string(),
            };
            (StatusCode::BAD_REQUEST, Json(error_response)).into_response()
593
594
595
596
597
        }
    }
}

async fn list_workers_rest(State(state): State<Arc<AppState>>) -> Response {
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
    let workers = state.context.worker_registry.get_all();
    let response = serde_json::json!({
        "workers": workers.iter().map(|worker| {
            let mut worker_info = serde_json::json!({
                "url": worker.url(),
                "model_id": worker.model_id(),
                "worker_type": match worker.worker_type() {
                    WorkerType::Regular => "regular",
                    WorkerType::Prefill { .. } => "prefill",
                    WorkerType::Decode => "decode",
                },
                "is_healthy": worker.is_healthy(),
                "load": worker.load(),
                "connection_mode": format!("{:?}", worker.connection_mode()),
                "priority": worker.priority(),
                "cost": worker.cost(),
            });

            if let WorkerType::Prefill { bootstrap_port } = worker.worker_type() {
                worker_info["bootstrap_port"] = serde_json::json!(bootstrap_port);
618
            }
619
620
621
622
623
624
625
626
627
628
629

            worker_info
        }).collect::<Vec<_>>(),
        "total": workers.len(),
        "stats": {
            "prefill_count": state.context.worker_registry.get_prefill_workers().len(),
            "decode_count": state.context.worker_registry.get_decode_workers().len(),
            "regular_count": state.context.worker_registry.get_by_type(&WorkerType::Regular).len(),
        }
    });
    Json(response).into_response()
630
631
}

632
async fn get_worker(State(state): State<Arc<AppState>>, Path(url): Path<String>) -> Response {
633
634
635
636
637
638
639
640
    let workers = WorkerManager::get_worker_urls(&state.context.worker_registry);
    if workers.contains(&url) {
        Json(json!({
            "url": url,
            "model_id": "unknown",
            "is_healthy": true
        }))
        .into_response()
641
    } else {
642
643
644
645
646
        let error = WorkerErrorResponse {
            error: format!("Worker {url} not found"),
            code: "WORKER_NOT_FOUND".to_string(),
        };
        (StatusCode::NOT_FOUND, Json(error)).into_response()
647
648
649
    }
}

650
async fn delete_worker(State(state): State<Arc<AppState>>, Path(url): Path<String>) -> Response {
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
    let result = WorkerManager::remove_worker(&url, &state.context);

    match result {
        Ok(message) => {
            let response = WorkerApiResponse {
                success: true,
                message,
                worker: None,
            };
            (StatusCode::OK, Json(response)).into_response()
        }
        Err(error) => {
            let error_response = WorkerErrorResponse {
                error,
                code: "REMOVE_WORKER_FAILED".to_string(),
            };
            (StatusCode::BAD_REQUEST, Json(error_response)).into_response()
668
669
670
671
        }
    }
}

672
673
674
pub struct ServerConfig {
    pub host: String,
    pub port: u16,
675
    pub router_config: RouterConfig,
676
    pub max_payload_size: usize,
677
    pub log_dir: Option<String>,
678
    pub log_level: Option<String>,
679
    pub service_discovery_config: Option<ServiceDiscoveryConfig>,
680
    pub prometheus_config: Option<PrometheusConfig>,
681
    pub request_timeout_secs: u64,
682
    pub request_id_headers: Option<Vec<String>>,
683
684
}

685
686
pub fn build_app(
    app_state: Arc<AppState>,
687
    auth_config: AuthConfig,
688
689
690
691
692
693
694
    max_payload_size: usize,
    request_id_headers: Vec<String>,
    cors_allowed_origins: Vec<String>,
) -> Router {
    let protected_routes = Router::new()
        .route("/generate", post(generate))
        .route("/v1/chat/completions", post(v1_chat_completions))
695
        .route("/v1/completions", post(v1_completions))
696
697
        .route("/rerank", post(rerank))
        .route("/v1/rerank", post(v1_rerank))
698
        .route("/v1/responses", post(v1_responses))
699
        .route("/v1/embeddings", post(v1_embeddings))
700
701
702
703
704
705
706
707
708
709
        .route("/v1/responses/{response_id}", get(v1_responses_get))
        .route(
            "/v1/responses/{response_id}/cancel",
            post(v1_responses_cancel),
        )
        .route("/v1/responses/{response_id}", delete(v1_responses_delete))
        .route(
            "/v1/responses/{response_id}/input",
            get(v1_responses_list_input_items),
        )
710
711
712
713
714
715
716
        .route("/v1/conversations", post(v1_conversations_create))
        .route(
            "/v1/conversations/{conversation_id}",
            get(v1_conversations_get)
                .post(v1_conversations_update)
                .delete(v1_conversations_delete),
        )
717
718
719
720
        .route(
            "/v1/conversations/{conversation_id}/items",
            get(v1_conversations_list_items),
        )
721
722
        .route_layer(axum::middleware::from_fn_with_state(
            app_state.clone(),
723
            middleware::concurrency_limit_middleware,
724
725
726
727
        ))
        .route_layer(axum::middleware::from_fn_with_state(
            auth_config.clone(),
            middleware::auth_middleware,
728
        ));
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743

    let public_routes = Router::new()
        .route("/liveness", get(liveness))
        .route("/readiness", get(readiness))
        .route("/health", get(health))
        .route("/health_generate", get(health_generate))
        .route("/v1/models", get(v1_models))
        .route("/get_model_info", get(get_model_info))
        .route("/get_server_info", get(get_server_info));

    let admin_routes = Router::new()
        .route("/add_worker", post(add_worker))
        .route("/remove_worker", post(remove_worker))
        .route("/list_workers", get(list_workers))
        .route("/flush_cache", post(flush_cache))
744
745
746
747
748
        .route("/get_loads", get(get_loads))
        .route_layer(axum::middleware::from_fn_with_state(
            auth_config.clone(),
            middleware::auth_middleware,
        ));
749

750
751
752
753
    let worker_routes = Router::new()
        .route("/workers", post(create_worker))
        .route("/workers", get(list_workers_rest))
        .route("/workers/{url}", get(get_worker))
754
755
756
757
758
        .route("/workers/{url}", delete(delete_worker))
        .route_layer(axum::middleware::from_fn_with_state(
            auth_config.clone(),
            middleware::auth_middleware,
        ));
759

760
761
762
763
    Router::new()
        .merge(protected_routes)
        .merge(public_routes)
        .merge(admin_routes)
764
        .merge(worker_routes)
765
        .layer(axum::extract::DefaultBodyLimit::max(max_payload_size))
766
767
768
        .layer(tower_http::limit::RequestBodyLimitLayer::new(
            max_payload_size,
        ))
769
770
        .layer(middleware::create_logging_layer())
        .layer(middleware::RequestIdLayer::new(request_id_headers))
771
772
773
774
775
776
        .layer(create_cors_layer(cors_allowed_origins))
        .fallback(sink_handler)
        .with_state(app_state)
}

pub async fn startup(config: ServerConfig) -> Result<(), Box<dyn std::error::Error>> {
777
778
779
780
    static LOGGING_INITIALIZED: AtomicBool = AtomicBool::new(false);

    let _log_guard = if !LOGGING_INITIALIZED.swap(true, Ordering::SeqCst) {
        Some(logging::init_logging(LoggingConfig {
781
782
783
784
785
786
            level: config
                .log_level
                .as_deref()
                .and_then(|s| match s.to_uppercase().parse::<Level>() {
                    Ok(l) => Some(l),
                    Err(_) => {
787
                        warn!("Invalid log level string: '{s}'. Defaulting to INFO.");
788
789
790
791
                        None
                    }
                })
                .unwrap_or(Level::INFO),
792
793
794
795
796
797
798
799
800
            json_format: false,
            log_dir: config.log_dir.clone(),
            colorize: true,
            log_file_name: "sgl-router".to_string(),
            log_targets: None,
        }))
    } else {
        None
    };
801

802
803
    if let Some(prometheus_config) = &config.prometheus_config {
        metrics::start_prometheus(prometheus_config.clone());
804
805
    }

806
    info!(
807
808
809
810
811
        "Starting router on {}:{} | mode: {:?} | policy: {:?} | max_payload: {}MB",
        config.host,
        config.port,
        config.router_config.mode,
        config.router_config.policy,
812
813
814
        config.max_payload_size / (1024 * 1024)
    );

815
    let client = Client::builder()
816
        .pool_idle_timeout(Some(Duration::from_secs(50)))
817
        .pool_max_idle_per_host(500)
818
        .timeout(Duration::from_secs(config.request_timeout_secs))
819
        .connect_timeout(Duration::from_secs(10))
820
        .tcp_nodelay(true)
821
        .tcp_keepalive(Some(Duration::from_secs(30)))
822
823
824
        .build()
        .expect("Failed to create HTTP client");

825
    let app_context = AppContext::new(
826
827
828
        config.router_config.clone(),
        client.clone(),
        config.router_config.max_concurrent_requests,
829
        config.router_config.rate_limit_tokens_per_second,
830
831
832
833
    )?;

    let app_context = Arc::new(app_context);

834
835
836
837
    info!(
        "Initializing workers for routing mode: {:?}",
        config.router_config.mode
    );
838
    WorkerManager::initialize_workers(
839
840
841
842
843
844
        &config.router_config,
        &app_context.worker_registry,
        Some(&app_context.policy_registry),
    )
    .await
    .map_err(|e| format!("Failed to initialize workers: {}", e))?;
845
846
847
848
849
850
851

    let worker_stats = app_context.worker_registry.stats();
    info!(
        "Workers initialized: {} total, {} healthy",
        worker_stats.total_workers, worker_stats.healthy_workers
    );

852
853
    let router_manager = RouterManager::from_config(&config, &app_context).await?;
    let router: Arc<dyn RouterTrait> = router_manager.clone();
854
855
856
857
858
859
860
861

    let _health_checker = app_context
        .worker_registry
        .start_health_checker(config.router_config.health_check.check_interval_secs);
    info!(
        "Started health checker for workers with {}s interval",
        config.router_config.health_check.check_interval_secs
    );
862

863
864
865
866
867
    if let Some(ref load_monitor) = app_context.load_monitor {
        load_monitor.start().await;
        info!("Started LoadMonitor for PowerOfTwo policies");
    }

868
    let (limiter, processor) = middleware::ConcurrencyLimiter::new(
869
870
871
872
873
874
        app_context.rate_limiter.clone(),
        config.router_config.queue_size,
        Duration::from_secs(config.router_config.queue_timeout_secs),
    );

    if let Some(processor) = processor {
875
        spawn(processor.run());
876
877
878
879
880
881
        info!(
            "Started request queue with size: {}, timeout: {}s",
            config.router_config.queue_size, config.router_config.queue_timeout_secs
        );
    }

882
    let app_state = Arc::new(AppState {
883
        router,
884
        context: app_context.clone(),
885
        concurrency_queue_tx: limiter.queue_tx.clone(),
886
        router_manager: Some(router_manager),
887
    });
888
889
    if let Some(service_discovery_config) = config.service_discovery_config {
        if service_discovery_config.enabled {
890
891
            let app_context_arc = Arc::clone(&app_state.context);
            match start_service_discovery(service_discovery_config, app_context_arc).await {
892
                Ok(handle) => {
893
                    info!("Service discovery started");
894
895
896
897
898
899
900
                    spawn(async move {
                        if let Err(e) = handle.await {
                            error!("Service discovery task failed: {:?}", e);
                        }
                    });
                }
                Err(e) => {
901
                    error!("Failed to start service discovery: {e}");
902
903
904
905
906
907
                    warn!("Continuing without service discovery");
                }
            }
        }
    }

908
    info!(
909
        "Router ready | workers: {:?}",
910
        WorkerManager::get_worker_urls(&app_state.context.worker_registry)
911
    );
912

913
914
915
916
917
918
919
920
921
    let request_id_headers = config.request_id_headers.clone().unwrap_or_else(|| {
        vec![
            "x-request-id".to_string(),
            "x-correlation-id".to_string(),
            "x-trace-id".to_string(),
            "request-id".to_string(),
        ]
    });

922
923
924
925
    let auth_config = AuthConfig {
        api_key: config.router_config.api_key.clone(),
    };

926
927
    let app = build_app(
        app_state,
928
        auth_config,
929
930
931
932
        config.max_payload_size,
        request_id_headers,
        config.router_config.cors_allowed_origins.clone(),
    );
933

934
935
936
937
938
939
    // TcpListener::bind accepts &str and handles IPv4/IPv6 via ToSocketAddrs
    let bind_addr = format!("{}:{}", config.host, config.port);
    info!("Starting server on {}", bind_addr);
    let listener = TcpListener::bind(&bind_addr)
        .await
        .map_err(|e| format!("Failed to bind to {}: {}", bind_addr, e))?;
940
    serve(listener, app)
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
        .with_graceful_shutdown(shutdown_signal())
        .await
        .map_err(|e| Box::new(e) as Box<dyn std::error::Error>)?;

    Ok(())
}

async fn shutdown_signal() {
    let ctrl_c = async {
        signal::ctrl_c()
            .await
            .expect("failed to install Ctrl+C handler");
    };

    #[cfg(unix)]
    let terminate = async {
        signal::unix::signal(signal::unix::SignalKind::terminate())
            .expect("failed to install signal handler")
            .recv()
            .await;
    };

    #[cfg(not(unix))]
    let terminate = std::future::pending::<()>();

    tokio::select! {
        _ = ctrl_c => {
            info!("Received Ctrl+C, starting graceful shutdown");
        },
        _ = terminate => {
            info!("Received terminate signal, starting graceful shutdown");
        },
    }
}

fn create_cors_layer(allowed_origins: Vec<String>) -> tower_http::cors::CorsLayer {
    use tower_http::cors::Any;

    let cors = if allowed_origins.is_empty() {
        tower_http::cors::CorsLayer::new()
            .allow_origin(Any)
            .allow_methods(Any)
            .allow_headers(Any)
            .expose_headers(Any)
    } else {
        let origins: Vec<http::HeaderValue> = allowed_origins
            .into_iter()
            .filter_map(|origin| origin.parse().ok())
            .collect();

        tower_http::cors::CorsLayer::new()
            .allow_origin(origins)
            .allow_methods([http::Method::GET, http::Method::POST, http::Method::OPTIONS])
            .allow_headers([http::header::CONTENT_TYPE, http::header::AUTHORIZATION])
            .expose_headers([http::header::HeaderName::from_static("x-request-id")])
    };

    cors.max_age(Duration::from_secs(3600))
999
}