package main import ( "context" "fmt" "log" "os" "strings" "time" "github.com/memohai/memoh/internal/chat" "github.com/memohai/memoh/internal/config" ctr "github.com/memohai/memoh/internal/containerd" "github.com/memohai/memoh/internal/db" dbsqlc "github.com/memohai/memoh/internal/db/sqlc" "github.com/memohai/memoh/internal/embeddings" "github.com/memohai/memoh/internal/handlers" "github.com/memohai/memoh/internal/history" "github.com/memohai/memoh/internal/mcp" "github.com/memohai/memoh/internal/memory" "github.com/memohai/memoh/internal/models" "github.com/memohai/memoh/internal/providers" "github.com/memohai/memoh/internal/schedule" "github.com/memohai/memoh/internal/settings" "github.com/memohai/memoh/internal/server" "github.com/jackc/pgx/v5/pgtype" "golang.org/x/crypto/bcrypt" ) func main() { ctx := context.Background() cfgPath := os.Getenv("CONFIG_PATH") cfg, err := config.Load(cfgPath) if err != nil { log.Fatalf("load config: %v", err) } if strings.TrimSpace(cfg.Auth.JWTSecret) == "" { log.Fatalf("jwt secret is required") } jwtExpiresIn, err := time.ParseDuration(cfg.Auth.JWTExpiresIn) if err != nil { log.Fatalf("invalid jwt expires in: %v", err) } addr := cfg.Server.Addr if value := os.Getenv("HTTP_ADDR"); value != "" { addr = value } socketPath := cfg.Containerd.SocketPath if value := os.Getenv("CONTAINERD_SOCKET"); value != "" { socketPath = value } factory := ctr.DefaultClientFactory{SocketPath: socketPath} client, err := factory.New(ctx) if err != nil { log.Fatalf("connect containerd: %v", err) } defer client.Close() service := ctr.NewDefaultService(client, cfg.Containerd.Namespace) manager := mcp.NewManager(service, cfg.MCP) pingHandler := handlers.NewPingHandler() containerdHandler := handlers.NewContainerdHandler(service, cfg.MCP, cfg.Containerd.Namespace) conn, err := db.Open(ctx, cfg.Postgres) if err != nil { log.Fatalf("db connect: %v", err) } defer conn.Close() manager.WithDB(conn) queries := dbsqlc.New(conn) modelsService := models.NewService(queries) if err := ensureAdminUser(ctx, queries, cfg); err != nil { log.Fatalf("ensure admin user: %v", err) } authHandler := handlers.NewAuthHandler(conn, cfg.Auth.JWTSecret, jwtExpiresIn) // Initialize chat resolver after memory service is configured. var chatResolver *chat.Resolver // Create LLM client for memory operations (deferred model/provider selection). var llmClient memory.LLM = &lazyLLMClient{ modelsService: modelsService, queries: queries, timeout: 30 * time.Second, } resolver := embeddings.NewResolver(modelsService, queries, 10*time.Second) vectors, textModel, multimodalModel, hasModels, err := embeddings.CollectEmbeddingVectors(ctx, modelsService) if err != nil { log.Fatalf("embedding models: %v", err) } var memoryService *memory.Service var memoryHandler *handlers.MemoryHandler if !hasModels { log.Println("WARNING: No embedding models configured. Memory service will not be available.") log.Println("You can add embedding models via the /models API endpoint.") memoryHandler = handlers.NewMemoryHandler(nil) } else { if textModel.ModelID == "" { log.Println("WARNING: No text embedding model configured. Text embedding features will be limited.") } if multimodalModel.ModelID == "" { log.Println("WARNING: No multimodal embedding model configured. Multimodal embedding features will be limited.") } var textEmbedder embeddings.Embedder var store *memory.QdrantStore if textModel.ModelID != "" && textModel.Dimensions > 0 { textEmbedder = &embeddings.ResolverTextEmbedder{ Resolver: resolver, ModelID: textModel.ModelID, Dims: textModel.Dimensions, } if len(vectors) > 0 { store, err = memory.NewQdrantStoreWithVectors( cfg.Qdrant.BaseURL, cfg.Qdrant.APIKey, cfg.Qdrant.Collection, vectors, time.Duration(cfg.Qdrant.TimeoutSeconds)*time.Second, ) if err != nil { log.Fatalf("qdrant named vectors init: %v", err) } } else { store, err = memory.NewQdrantStore( cfg.Qdrant.BaseURL, cfg.Qdrant.APIKey, cfg.Qdrant.Collection, textModel.Dimensions, time.Duration(cfg.Qdrant.TimeoutSeconds)*time.Second, ) if err != nil { log.Fatalf("qdrant init: %v", err) } } } memoryService = memory.NewService(llmClient, textEmbedder, store, resolver, textModel.ModelID, multimodalModel.ModelID) memoryHandler = handlers.NewMemoryHandler(memoryService) } chatResolver = chat.NewResolver(modelsService, queries, memoryService, cfg.AgentGateway.BaseURL(), 30*time.Second) embeddingsHandler := handlers.NewEmbeddingsHandler(modelsService, queries) swaggerHandler := handlers.NewSwaggerHandler() chatHandler := handlers.NewChatHandler(chatResolver) // Initialize providers and models handlers providersService := providers.NewService(queries) providersHandler := handlers.NewProvidersHandler(providersService) modelsHandler := handlers.NewModelsHandler(modelsService) settingsService := settings.NewService(queries) settingsHandler := handlers.NewSettingsHandler(settingsService) historyService := history.NewService(queries) historyHandler := handlers.NewHistoryHandler(historyService) scheduleService := schedule.NewService(queries, chatResolver, cfg.Auth.JWTSecret) if err := scheduleService.Bootstrap(ctx); err != nil { log.Fatalf("schedule bootstrap: %v", err) } scheduleHandler := handlers.NewScheduleHandler(scheduleService) srv := server.NewServer(addr, cfg.Auth.JWTSecret, pingHandler, authHandler, memoryHandler, embeddingsHandler, chatHandler, swaggerHandler, providersHandler, modelsHandler, settingsHandler, historyHandler, scheduleHandler, containerdHandler) if err := srv.Start(); err != nil { log.Fatalf("server failed: %v", err) } } func ensureAdminUser(ctx context.Context, queries *dbsqlc.Queries, cfg config.Config) error { if queries == nil { return fmt.Errorf("db queries not configured") } count, err := queries.CountUsers(ctx) if err != nil { return err } if count > 0 { return nil } username := strings.TrimSpace(cfg.Admin.Username) password := strings.TrimSpace(cfg.Admin.Password) email := strings.TrimSpace(cfg.Admin.Email) if username == "" || password == "" { return fmt.Errorf("admin username/password required in config.toml") } if password == "change-your-password-here" { log.Printf("WARNING: admin password uses default placeholder; please update config.toml") } hashed, err := bcrypt.GenerateFromPassword([]byte(password), bcrypt.DefaultCost) if err != nil { return err } emailValue := pgtype.Text{Valid: false} if email != "" { emailValue = pgtype.Text{String: email, Valid: true} } displayName := pgtype.Text{String: username, Valid: true} dataRoot := pgtype.Text{String: cfg.MCP.DataRoot, Valid: cfg.MCP.DataRoot != ""} _, err = queries.CreateUser(ctx, dbsqlc.CreateUserParams{ Username: username, Email: emailValue, PasswordHash: string(hashed), Role: "admin", DisplayName: displayName, AvatarUrl: pgtype.Text{Valid: false}, IsActive: true, DataRoot: dataRoot, }) if err != nil { return err } log.Printf("Admin user created: %s", username) return nil } type lazyLLMClient struct { modelsService *models.Service queries *dbsqlc.Queries timeout time.Duration } func (c *lazyLLMClient) Extract(ctx context.Context, req memory.ExtractRequest) (memory.ExtractResponse, error) { client, err := c.resolve(ctx) if err != nil { return memory.ExtractResponse{}, err } return client.Extract(ctx, req) } func (c *lazyLLMClient) Decide(ctx context.Context, req memory.DecideRequest) (memory.DecideResponse, error) { client, err := c.resolve(ctx) if err != nil { return memory.DecideResponse{}, err } return client.Decide(ctx, req) } func (c *lazyLLMClient) resolve(ctx context.Context) (memory.LLM, error) { if c.modelsService == nil || c.queries == nil { return nil, fmt.Errorf("models service not configured") } memoryModel, memoryProvider, err := models.SelectMemoryModel(ctx, c.modelsService, c.queries) if err != nil { return nil, err } clientType := strings.ToLower(strings.TrimSpace(memoryProvider.ClientType)) if clientType != "openai" && clientType != "openai-compat" { return nil, fmt.Errorf("memory provider client type not supported: %s", memoryProvider.ClientType) } return memory.NewLLMClient(memoryProvider.BaseUrl, memoryProvider.ApiKey, memoryModel.ModelID, c.timeout), nil }