mirror of
https://github.com/memohai/Memoh.git
synced 2026-04-27 07:16:19 +09:00
8d5c38f0e5
* refactor: unify providers and models tables
- Rename `llm_providers` → `providers`, `llm_provider_oauth_tokens` → `provider_oauth_tokens`
- Remove `tts_providers` and `tts_models` tables; speech models now live in the unified `models` table with `type = 'speech'`
- Replace top-level `api_key`/`base_url` columns with a JSONB `config` field on `providers`
- Rename `llm_provider_id` → `provider_id` across all references
- Add `edge-speech` client type and `conf/providers/edge.yaml` default provider
- Create new read-only speech endpoints (`/speech-providers`, `/speech-models`) backed by filtered views of the unified tables
- Remove old TTS CRUD handlers; simplify speech page to read-only + test
- Update registry loader to skip malformed YAML files instead of failing entirely
- Fix YAML quoting for model names containing colons in openrouter.yaml
- Regenerate sqlc, swagger, and TypeScript SDK
* fix: exclude speech providers from providers list endpoint
ListProviders now filters out client_type matching '%-speech' so Edge
and future speech providers no longer appear on the Providers page.
ListSpeechProviders uses the same pattern match instead of hard-coding
'edge-speech'.
* fix: use explicit client_type list instead of LIKE pattern
Replace '%-speech' pattern with explicit IN ('edge-speech') for both
ListProviders (exclusion) and ListSpeechProviders (inclusion). New
speech client types must be added to both queries.
* fix: use EXECUTE for dynamic SQL in migrations referencing old schema
PL/pgSQL pre-validates column/table references in static SQL statements
inside DO blocks before evaluating IF/RETURN guards. This caused
migrations 0010-0061 to fail on fresh databases where the canonical
schema uses `providers`/`provider_id` instead of `llm_providers`/
`llm_provider_id`.
Wrap all SQL that references potentially non-existent old schema objects
(llm_providers, llm_provider_id, tts_providers, tts_models, etc.) in
EXECUTE strings so they are only parsed at runtime when actually reached.
* fix: revert canonical schema to use llm_providers for migration compatibility
The CI migrations workflow (up → down → up) failed because 0061 down
renames `providers` back to `llm_providers`, but 0001 down only dropped
`providers` — leaving `llm_providers` as a remnant. On the second
migrate up, 0010 found the stale `llm_providers` and tried to reference
`models.llm_provider_id` which no longer existed.
Revert 0001 canonical schema to use original names (llm_providers,
tts_providers, tts_models) so incremental migrations work naturally and
0061 handles the final rename. Remove EXECUTE wrappers and unnecessary
guards from migrations that now always operate on llm_providers.
* fix: icons
* fix: sync canonical schema with 0061 migration to fix sqlc column mismatch
0001_init.up.sql still used old names (llm_providers, llm_provider_id)
and included dropped tts_providers/tts_models tables. sqlc could not
parse the PL/pgSQL EXECUTE in migration 0061, so generated code retained
stale columns (input_modalities, supports_reasoning) causing runtime
"column does not exist" errors when adding models.
- Update 0001_init.up.sql to current schema (providers, provider_id,
no tts tables, add provider_oauth_tokens)
- Use ALTER TABLE IF EXISTS in 0010/0041/0042 for backward compat
- Regenerate sqlc
* fix: guard all legacy migrations against fresh schema for CI compat
On fresh databases, 0001_init.up.sql creates providers/provider_id
(not llm_providers/llm_provider_id). Migrations 0013, 0041, 0046, 0047
referenced the old names without guards, causing CI migration failures.
- 0013: check llm_provider_id column exists before adding old constraint
- 0041: check llm_providers table exists before backfill/constraint DDL
- 0046: wrap CREATE TABLE in DO block with llm_providers existence check
- 0047: use ALTER TABLE IF EXISTS + DO block guard
351 lines
10 KiB
Go
351 lines
10 KiB
Go
package handlers
|
|
|
|
import (
|
|
"errors"
|
|
"fmt"
|
|
"log/slog"
|
|
"net/http"
|
|
"strings"
|
|
|
|
"github.com/labstack/echo/v4"
|
|
|
|
"github.com/memohai/memoh/internal/models"
|
|
"github.com/memohai/memoh/internal/providers"
|
|
)
|
|
|
|
type ProvidersHandler struct {
|
|
service *providers.Service
|
|
modelsService *models.Service
|
|
logger *slog.Logger
|
|
}
|
|
|
|
func NewProvidersHandler(log *slog.Logger, service *providers.Service, modelsService *models.Service) *ProvidersHandler {
|
|
return &ProvidersHandler{
|
|
service: service,
|
|
modelsService: modelsService,
|
|
logger: log.With(slog.String("handler", "providers")),
|
|
}
|
|
}
|
|
|
|
func (h *ProvidersHandler) Register(e *echo.Echo) {
|
|
group := e.Group("/providers")
|
|
group.POST("", h.Create)
|
|
group.GET("", h.List)
|
|
group.GET("/:id", h.Get)
|
|
group.GET("/:id/models", h.ListModelsByProvider)
|
|
group.GET("/name/:name", h.GetByName)
|
|
group.PUT("/:id", h.Update)
|
|
group.DELETE("/:id", h.Delete)
|
|
group.GET("/count", h.Count)
|
|
group.POST("/:id/test", h.Test)
|
|
group.POST("/:id/import-models", h.ImportModels)
|
|
}
|
|
|
|
// Create godoc
|
|
// @Summary Create a new LLM provider
|
|
// @Description Create a new LLM provider configuration
|
|
// @Tags providers
|
|
// @Accept json
|
|
// @Produce json
|
|
// @Param request body providers.CreateRequest true "Provider configuration"
|
|
// @Success 201 {object} providers.GetResponse
|
|
// @Failure 400 {object} ErrorResponse
|
|
// @Failure 500 {object} ErrorResponse
|
|
// @Router /providers [post].
|
|
func (h *ProvidersHandler) Create(c echo.Context) error {
|
|
var req providers.CreateRequest
|
|
if err := c.Bind(&req); err != nil {
|
|
return echo.NewHTTPError(http.StatusBadRequest, err.Error())
|
|
}
|
|
|
|
// Validate required fields
|
|
if req.Name == "" {
|
|
return echo.NewHTTPError(http.StatusBadRequest, "name is required")
|
|
}
|
|
|
|
resp, err := h.service.Create(c.Request().Context(), req)
|
|
if err != nil {
|
|
return echo.NewHTTPError(http.StatusInternalServerError, err.Error())
|
|
}
|
|
|
|
return c.JSON(http.StatusCreated, resp)
|
|
}
|
|
|
|
// List godoc
|
|
// @Summary List all LLM providers
|
|
// @Description Get a list of all configured LLM providers
|
|
// @Tags providers
|
|
// @Accept json
|
|
// @Produce json
|
|
// @Success 200 {array} providers.GetResponse
|
|
// @Failure 500 {object} ErrorResponse
|
|
// @Router /providers [get].
|
|
func (h *ProvidersHandler) List(c echo.Context) error {
|
|
resp, err := h.service.List(c.Request().Context())
|
|
if err != nil {
|
|
return echo.NewHTTPError(http.StatusInternalServerError, err.Error())
|
|
}
|
|
|
|
return c.JSON(http.StatusOK, resp)
|
|
}
|
|
|
|
// Get godoc
|
|
// @Summary Get provider by ID
|
|
// @Description Get a provider configuration by its ID
|
|
// @Tags providers
|
|
// @Accept json
|
|
// @Produce json
|
|
// @Param id path string true "Provider ID (UUID)"
|
|
// @Success 200 {object} providers.GetResponse
|
|
// @Failure 400 {object} ErrorResponse
|
|
// @Failure 404 {object} ErrorResponse
|
|
// @Failure 500 {object} ErrorResponse
|
|
// @Router /providers/{id} [get].
|
|
func (h *ProvidersHandler) Get(c echo.Context) error {
|
|
id := c.Param("id")
|
|
if id == "" {
|
|
return echo.NewHTTPError(http.StatusBadRequest, "id is required")
|
|
}
|
|
|
|
resp, err := h.service.Get(c.Request().Context(), id)
|
|
if err != nil {
|
|
return echo.NewHTTPError(http.StatusNotFound, err.Error())
|
|
}
|
|
|
|
return c.JSON(http.StatusOK, resp)
|
|
}
|
|
|
|
// ListModelsByProvider godoc
|
|
// @Summary List provider models
|
|
// @Description Get models for a provider by id, optionally filtered by type
|
|
// @Tags providers
|
|
// @Param id path string true "Provider ID (UUID)"
|
|
// @Param type query string false "Model type (chat, embedding)"
|
|
// @Success 200 {array} models.GetResponse
|
|
// @Failure 400 {object} ErrorResponse
|
|
// @Failure 404 {object} ErrorResponse
|
|
// @Failure 500 {object} ErrorResponse
|
|
// @Router /providers/{id}/models [get].
|
|
func (h *ProvidersHandler) ListModelsByProvider(c echo.Context) error {
|
|
if h.modelsService == nil {
|
|
return echo.NewHTTPError(http.StatusInternalServerError, "models service not configured")
|
|
}
|
|
id := c.Param("id")
|
|
if strings.TrimSpace(id) == "" {
|
|
return echo.NewHTTPError(http.StatusBadRequest, "id is required")
|
|
}
|
|
modelType := strings.TrimSpace(c.QueryParam("type"))
|
|
var (
|
|
resp []models.GetResponse
|
|
err error
|
|
)
|
|
if modelType == "" {
|
|
resp, err = h.modelsService.ListByProviderID(c.Request().Context(), id)
|
|
} else {
|
|
resp, err = h.modelsService.ListByProviderIDAndType(c.Request().Context(), id, models.ModelType(modelType))
|
|
}
|
|
if err != nil {
|
|
if strings.Contains(err.Error(), "invalid") {
|
|
return echo.NewHTTPError(http.StatusBadRequest, err.Error())
|
|
}
|
|
return echo.NewHTTPError(http.StatusNotFound, err.Error())
|
|
}
|
|
return c.JSON(http.StatusOK, resp)
|
|
}
|
|
|
|
// GetByName godoc
|
|
// @Summary Get provider by name
|
|
// @Description Get a provider configuration by its name
|
|
// @Tags providers
|
|
// @Accept json
|
|
// @Produce json
|
|
// @Param name path string true "Provider name"
|
|
// @Success 200 {object} providers.GetResponse
|
|
// @Failure 400 {object} ErrorResponse
|
|
// @Failure 404 {object} ErrorResponse
|
|
// @Failure 500 {object} ErrorResponse
|
|
// @Router /providers/name/{name} [get].
|
|
func (h *ProvidersHandler) GetByName(c echo.Context) error {
|
|
name := c.Param("name")
|
|
if name == "" {
|
|
return echo.NewHTTPError(http.StatusBadRequest, "name is required")
|
|
}
|
|
|
|
resp, err := h.service.GetByName(c.Request().Context(), name)
|
|
if err != nil {
|
|
return echo.NewHTTPError(http.StatusNotFound, err.Error())
|
|
}
|
|
|
|
return c.JSON(http.StatusOK, resp)
|
|
}
|
|
|
|
// Update godoc
|
|
// @Summary Update provider
|
|
// @Description Update an existing provider configuration
|
|
// @Tags providers
|
|
// @Accept json
|
|
// @Produce json
|
|
// @Param id path string true "Provider ID (UUID)"
|
|
// @Param request body providers.UpdateRequest true "Updated provider configuration"
|
|
// @Success 200 {object} providers.GetResponse
|
|
// @Failure 400 {object} ErrorResponse
|
|
// @Failure 404 {object} ErrorResponse
|
|
// @Failure 500 {object} ErrorResponse
|
|
// @Router /providers/{id} [put].
|
|
func (h *ProvidersHandler) Update(c echo.Context) error {
|
|
id := c.Param("id")
|
|
if id == "" {
|
|
return echo.NewHTTPError(http.StatusBadRequest, "id is required")
|
|
}
|
|
|
|
var req providers.UpdateRequest
|
|
if err := c.Bind(&req); err != nil {
|
|
return echo.NewHTTPError(http.StatusBadRequest, err.Error())
|
|
}
|
|
|
|
resp, err := h.service.Update(c.Request().Context(), id, req)
|
|
if err != nil {
|
|
return echo.NewHTTPError(http.StatusInternalServerError, err.Error())
|
|
}
|
|
|
|
return c.JSON(http.StatusOK, resp)
|
|
}
|
|
|
|
// Delete godoc
|
|
// @Summary Delete provider
|
|
// @Description Delete a provider configuration
|
|
// @Tags providers
|
|
// @Accept json
|
|
// @Produce json
|
|
// @Param id path string true "Provider ID (UUID)"
|
|
// @Success 204 "No Content"
|
|
// @Failure 400 {object} ErrorResponse
|
|
// @Failure 404 {object} ErrorResponse
|
|
// @Failure 500 {object} ErrorResponse
|
|
// @Router /providers/{id} [delete].
|
|
func (h *ProvidersHandler) Delete(c echo.Context) error {
|
|
id := c.Param("id")
|
|
if id == "" {
|
|
return echo.NewHTTPError(http.StatusBadRequest, "id is required")
|
|
}
|
|
|
|
if err := h.service.Delete(c.Request().Context(), id); err != nil {
|
|
return echo.NewHTTPError(http.StatusInternalServerError, err.Error())
|
|
}
|
|
|
|
return c.NoContent(http.StatusNoContent)
|
|
}
|
|
|
|
// Count godoc
|
|
// @Summary Count providers
|
|
// @Description Get the total count of providers
|
|
// @Tags providers
|
|
// @Accept json
|
|
// @Produce json
|
|
// @Success 200 {object} providers.CountResponse
|
|
// @Failure 500 {object} ErrorResponse
|
|
// @Router /providers/count [get].
|
|
func (h *ProvidersHandler) Count(c echo.Context) error {
|
|
count, err := h.service.Count(c.Request().Context())
|
|
if err != nil {
|
|
return echo.NewHTTPError(http.StatusInternalServerError, err.Error())
|
|
}
|
|
|
|
return c.JSON(http.StatusOK, providers.CountResponse{Count: count})
|
|
}
|
|
|
|
// Test godoc
|
|
// @Summary Test provider connectivity
|
|
// @Description Probe a provider's base URL to check reachability, supported client types, and embedding support
|
|
// @Tags providers
|
|
// @Accept json
|
|
// @Produce json
|
|
// @Param id path string true "Provider ID (UUID)"
|
|
// @Success 200 {object} providers.TestResponse
|
|
// @Failure 400 {object} ErrorResponse
|
|
// @Failure 404 {object} ErrorResponse
|
|
// @Failure 500 {object} ErrorResponse
|
|
// @Router /providers/{id}/test [post].
|
|
func (h *ProvidersHandler) Test(c echo.Context) error {
|
|
id := c.Param("id")
|
|
if id == "" {
|
|
return echo.NewHTTPError(http.StatusBadRequest, "id is required")
|
|
}
|
|
|
|
resp, err := h.service.Test(c.Request().Context(), id)
|
|
if err != nil {
|
|
if strings.Contains(err.Error(), "invalid") {
|
|
return echo.NewHTTPError(http.StatusBadRequest, err.Error())
|
|
}
|
|
return echo.NewHTTPError(http.StatusNotFound, err.Error())
|
|
}
|
|
|
|
return c.JSON(http.StatusOK, resp)
|
|
}
|
|
|
|
// ImportModels godoc
|
|
// @Summary Import models from provider
|
|
// @Description Fetch models from provider's /v1/models endpoint and import them
|
|
// @Tags providers
|
|
// @Accept json
|
|
// @Produce json
|
|
// @Param id path string true "Provider ID (UUID)"
|
|
// @Success 200 {object} providers.ImportModelsResponse
|
|
// @Failure 400 {object} ErrorResponse
|
|
// @Failure 404 {object} ErrorResponse
|
|
// @Failure 500 {object} ErrorResponse
|
|
// @Router /providers/{id}/import-models [post].
|
|
func (h *ProvidersHandler) ImportModels(c echo.Context) error {
|
|
id := c.Param("id")
|
|
if id == "" {
|
|
return echo.NewHTTPError(http.StatusBadRequest, "id is required")
|
|
}
|
|
|
|
remoteModels, err := h.service.FetchRemoteModels(c.Request().Context(), id)
|
|
if err != nil {
|
|
return echo.NewHTTPError(http.StatusInternalServerError, fmt.Sprintf("fetch remote models: %v", err))
|
|
}
|
|
|
|
resp := providers.ImportModelsResponse{
|
|
Models: make([]string, 0),
|
|
}
|
|
|
|
for _, m := range remoteModels {
|
|
modelType := models.ModelTypeChat
|
|
if strings.TrimSpace(m.Type) == string(models.ModelTypeEmbedding) {
|
|
modelType = models.ModelTypeEmbedding
|
|
}
|
|
compatibilities := m.Compatibilities
|
|
if len(compatibilities) == 0 {
|
|
compatibilities = []string{models.CompatVision, models.CompatToolCall, models.CompatReasoning}
|
|
}
|
|
name := strings.TrimSpace(m.Name)
|
|
if name == "" {
|
|
name = m.ID
|
|
}
|
|
_, err := h.modelsService.Create(c.Request().Context(), models.AddRequest{
|
|
ModelID: m.ID,
|
|
Name: name,
|
|
ProviderID: id,
|
|
Type: modelType,
|
|
Config: models.ModelConfig{
|
|
Compatibilities: compatibilities,
|
|
ReasoningEfforts: m.ReasoningEfforts,
|
|
},
|
|
})
|
|
if err != nil {
|
|
if errors.Is(err, models.ErrModelIDAlreadyExists) {
|
|
resp.Skipped++
|
|
continue
|
|
}
|
|
h.logger.Warn("failed to import model", slog.String("model_id", m.ID), slog.Any("error", err))
|
|
continue
|
|
}
|
|
|
|
resp.Created++
|
|
resp.Models = append(resp.Models, m.ID)
|
|
}
|
|
|
|
return c.JSON(http.StatusOK, resp)
|
|
}
|