mirror of
https://github.com/memohai/Memoh.git
synced 2026-04-25 07:00:48 +09:00
8d5c38f0e5
* refactor: unify providers and models tables
- Rename `llm_providers` → `providers`, `llm_provider_oauth_tokens` → `provider_oauth_tokens`
- Remove `tts_providers` and `tts_models` tables; speech models now live in the unified `models` table with `type = 'speech'`
- Replace top-level `api_key`/`base_url` columns with a JSONB `config` field on `providers`
- Rename `llm_provider_id` → `provider_id` across all references
- Add `edge-speech` client type and `conf/providers/edge.yaml` default provider
- Create new read-only speech endpoints (`/speech-providers`, `/speech-models`) backed by filtered views of the unified tables
- Remove old TTS CRUD handlers; simplify speech page to read-only + test
- Update registry loader to skip malformed YAML files instead of failing entirely
- Fix YAML quoting for model names containing colons in openrouter.yaml
- Regenerate sqlc, swagger, and TypeScript SDK
* fix: exclude speech providers from providers list endpoint
ListProviders now filters out client_type matching '%-speech' so Edge
and future speech providers no longer appear on the Providers page.
ListSpeechProviders uses the same pattern match instead of hard-coding
'edge-speech'.
* fix: use explicit client_type list instead of LIKE pattern
Replace '%-speech' pattern with explicit IN ('edge-speech') for both
ListProviders (exclusion) and ListSpeechProviders (inclusion). New
speech client types must be added to both queries.
* fix: use EXECUTE for dynamic SQL in migrations referencing old schema
PL/pgSQL pre-validates column/table references in static SQL statements
inside DO blocks before evaluating IF/RETURN guards. This caused
migrations 0010-0061 to fail on fresh databases where the canonical
schema uses `providers`/`provider_id` instead of `llm_providers`/
`llm_provider_id`.
Wrap all SQL that references potentially non-existent old schema objects
(llm_providers, llm_provider_id, tts_providers, tts_models, etc.) in
EXECUTE strings so they are only parsed at runtime when actually reached.
* fix: revert canonical schema to use llm_providers for migration compatibility
The CI migrations workflow (up → down → up) failed because 0061 down
renames `providers` back to `llm_providers`, but 0001 down only dropped
`providers` — leaving `llm_providers` as a remnant. On the second
migrate up, 0010 found the stale `llm_providers` and tried to reference
`models.llm_provider_id` which no longer existed.
Revert 0001 canonical schema to use original names (llm_providers,
tts_providers, tts_models) so incremental migrations work naturally and
0061 handles the final rename. Remove EXECUTE wrappers and unnecessary
guards from migrations that now always operate on llm_providers.
* fix: icons
* fix: sync canonical schema with 0061 migration to fix sqlc column mismatch
0001_init.up.sql still used old names (llm_providers, llm_provider_id)
and included dropped tts_providers/tts_models tables. sqlc could not
parse the PL/pgSQL EXECUTE in migration 0061, so generated code retained
stale columns (input_modalities, supports_reasoning) causing runtime
"column does not exist" errors when adding models.
- Update 0001_init.up.sql to current schema (providers, provider_id,
no tts tables, add provider_oauth_tokens)
- Use ALTER TABLE IF EXISTS in 0010/0041/0042 for backward compat
- Regenerate sqlc
* fix: guard all legacy migrations against fresh schema for CI compat
On fresh databases, 0001_init.up.sql creates providers/provider_id
(not llm_providers/llm_provider_id). Migrations 0013, 0041, 0046, 0047
referenced the old names without guards, causing CI migration failures.
- 0013: check llm_provider_id column exists before adding old constraint
- 0041: check llm_providers table exists before backfill/constraint DDL
- 0046: wrap CREATE TABLE in DO block with llm_providers existence check
- 0047: use ALTER TABLE IF EXISTS + DO block guard
403 lines
11 KiB
Go
403 lines
11 KiB
Go
package providers
|
|
|
|
import (
|
|
"context"
|
|
"encoding/json"
|
|
"fmt"
|
|
"io"
|
|
"log/slog"
|
|
"net/http"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/jackc/pgx/v5/pgtype"
|
|
openaicodex "github.com/memohai/twilight-ai/provider/openai/codex"
|
|
sdk "github.com/memohai/twilight-ai/sdk"
|
|
|
|
"github.com/memohai/memoh/internal/db"
|
|
"github.com/memohai/memoh/internal/db/sqlc"
|
|
"github.com/memohai/memoh/internal/models"
|
|
)
|
|
|
|
// Service handles provider operations.
|
|
type Service struct {
|
|
queries *sqlc.Queries
|
|
logger *slog.Logger
|
|
httpClient *http.Client
|
|
callbackURL string
|
|
}
|
|
|
|
// NewService creates a new provider service.
|
|
func NewService(log *slog.Logger, queries *sqlc.Queries, callbackURL string) *Service {
|
|
if log == nil {
|
|
log = slog.Default()
|
|
}
|
|
return &Service{
|
|
queries: queries,
|
|
logger: log.With(slog.String("service", "providers")),
|
|
httpClient: &http.Client{Timeout: providerOAuthHTTPTimeout},
|
|
callbackURL: callbackURL,
|
|
}
|
|
}
|
|
|
|
// Create creates a new provider.
|
|
func (s *Service) Create(ctx context.Context, req CreateRequest) (GetResponse, error) {
|
|
metadataJSON, err := json.Marshal(req.Metadata)
|
|
if err != nil {
|
|
return GetResponse{}, fmt.Errorf("marshal metadata: %w", err)
|
|
}
|
|
|
|
configJSON, err := json.Marshal(req.Config)
|
|
if err != nil {
|
|
return GetResponse{}, fmt.Errorf("marshal config: %w", err)
|
|
}
|
|
|
|
clientType := req.ClientType
|
|
if clientType == "" {
|
|
clientType = string(models.ClientTypeOpenAICompletions)
|
|
}
|
|
|
|
var icon pgtype.Text
|
|
if req.Icon != "" {
|
|
icon = pgtype.Text{String: req.Icon, Valid: true}
|
|
}
|
|
|
|
provider, err := s.queries.CreateProvider(ctx, sqlc.CreateProviderParams{
|
|
Name: req.Name,
|
|
ClientType: clientType,
|
|
Icon: icon,
|
|
Enable: true,
|
|
Config: configJSON,
|
|
Metadata: metadataJSON,
|
|
})
|
|
if err != nil {
|
|
return GetResponse{}, fmt.Errorf("create provider: %w", err)
|
|
}
|
|
|
|
return s.toGetResponse(provider), nil
|
|
}
|
|
|
|
// Get retrieves a provider by ID.
|
|
func (s *Service) Get(ctx context.Context, id string) (GetResponse, error) {
|
|
providerID, err := db.ParseUUID(id)
|
|
if err != nil {
|
|
return GetResponse{}, err
|
|
}
|
|
|
|
provider, err := s.queries.GetProviderByID(ctx, providerID)
|
|
if err != nil {
|
|
return GetResponse{}, fmt.Errorf("get provider: %w", err)
|
|
}
|
|
|
|
return s.toGetResponse(provider), nil
|
|
}
|
|
|
|
// GetByName retrieves a provider by name.
|
|
func (s *Service) GetByName(ctx context.Context, name string) (GetResponse, error) {
|
|
provider, err := s.queries.GetProviderByName(ctx, name)
|
|
if err != nil {
|
|
return GetResponse{}, fmt.Errorf("get provider by name: %w", err)
|
|
}
|
|
|
|
return s.toGetResponse(provider), nil
|
|
}
|
|
|
|
// List retrieves all providers.
|
|
func (s *Service) List(ctx context.Context) ([]GetResponse, error) {
|
|
providers, err := s.queries.ListProviders(ctx)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("list providers: %w", err)
|
|
}
|
|
|
|
results := make([]GetResponse, 0, len(providers))
|
|
for _, p := range providers {
|
|
results = append(results, s.toGetResponse(p))
|
|
}
|
|
return results, nil
|
|
}
|
|
|
|
// Update updates an existing provider.
|
|
func (s *Service) Update(ctx context.Context, id string, req UpdateRequest) (GetResponse, error) {
|
|
providerID, err := db.ParseUUID(id)
|
|
if err != nil {
|
|
return GetResponse{}, err
|
|
}
|
|
|
|
existing, err := s.queries.GetProviderByID(ctx, providerID)
|
|
if err != nil {
|
|
return GetResponse{}, fmt.Errorf("get provider: %w", err)
|
|
}
|
|
|
|
name := existing.Name
|
|
if req.Name != nil {
|
|
name = *req.Name
|
|
}
|
|
|
|
clientType := existing.ClientType
|
|
if req.ClientType != nil {
|
|
clientType = *req.ClientType
|
|
}
|
|
|
|
icon := existing.Icon
|
|
if req.Icon != nil {
|
|
icon = pgtype.Text{String: *req.Icon, Valid: *req.Icon != ""}
|
|
}
|
|
|
|
enable := existing.Enable
|
|
if req.Enable != nil {
|
|
enable = *req.Enable
|
|
}
|
|
|
|
existingConfig := providerConfig(existing.Config)
|
|
if req.Config != nil {
|
|
existingAPIKey := configString(existingConfig, "api_key")
|
|
newAPIKey := configString(req.Config, "api_key")
|
|
if newAPIKey != "" && newAPIKey == maskAPIKey(existingAPIKey) {
|
|
req.Config["api_key"] = existingAPIKey
|
|
}
|
|
existingConfig = req.Config
|
|
}
|
|
configJSON, err := json.Marshal(existingConfig)
|
|
if err != nil {
|
|
return GetResponse{}, fmt.Errorf("marshal config: %w", err)
|
|
}
|
|
|
|
metadataMap := providerMetadata(existing.Metadata)
|
|
if req.Metadata != nil {
|
|
metadataMap = req.Metadata
|
|
}
|
|
metadataJSON, err := json.Marshal(metadataMap)
|
|
if err != nil {
|
|
return GetResponse{}, fmt.Errorf("marshal metadata: %w", err)
|
|
}
|
|
|
|
updated, err := s.queries.UpdateProvider(ctx, sqlc.UpdateProviderParams{
|
|
ID: providerID,
|
|
Name: name,
|
|
ClientType: clientType,
|
|
Icon: icon,
|
|
Enable: enable,
|
|
Config: configJSON,
|
|
Metadata: metadataJSON,
|
|
})
|
|
if err != nil {
|
|
return GetResponse{}, fmt.Errorf("update provider: %w", err)
|
|
}
|
|
|
|
return s.toGetResponse(updated), nil
|
|
}
|
|
|
|
// Delete deletes a provider by ID.
|
|
func (s *Service) Delete(ctx context.Context, id string) error {
|
|
providerID, err := db.ParseUUID(id)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := s.queries.DeleteProvider(ctx, providerID); err != nil {
|
|
return fmt.Errorf("delete provider: %w", err)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// Count returns the total count of providers.
|
|
func (s *Service) Count(ctx context.Context) (int64, error) {
|
|
count, err := s.queries.CountProviders(ctx)
|
|
if err != nil {
|
|
return 0, fmt.Errorf("count providers: %w", err)
|
|
}
|
|
return count, nil
|
|
}
|
|
|
|
const probeTimeout = 5 * time.Second
|
|
|
|
// Test probes the provider using the Twilight AI SDK to check
|
|
// reachability and authentication.
|
|
func (s *Service) Test(ctx context.Context, id string) (TestResponse, error) {
|
|
providerID, err := db.ParseUUID(id)
|
|
if err != nil {
|
|
return TestResponse{}, err
|
|
}
|
|
|
|
provider, err := s.queries.GetProviderByID(ctx, providerID)
|
|
if err != nil {
|
|
return TestResponse{}, fmt.Errorf("get provider: %w", err)
|
|
}
|
|
|
|
cfg := providerConfig(provider.Config)
|
|
baseURL := strings.TrimRight(configString(cfg, "base_url"), "/")
|
|
|
|
clientType := models.ClientType(provider.ClientType)
|
|
creds, err := s.ResolveModelCredentials(ctx, provider)
|
|
if err != nil {
|
|
return TestResponse{}, err
|
|
}
|
|
|
|
sdkProvider := models.NewSDKProvider(baseURL, creds.APIKey, creds.CodexAccountID, clientType, probeTimeout, nil)
|
|
|
|
start := time.Now()
|
|
result := sdkProvider.Test(ctx)
|
|
latency := time.Since(start).Milliseconds()
|
|
|
|
return TestResponse{
|
|
Reachable: result.Status != sdk.ProviderStatusUnreachable,
|
|
LatencyMs: latency,
|
|
Message: result.Message,
|
|
}, nil
|
|
}
|
|
|
|
// FetchRemoteModels fetches models from the provider's /v1/models endpoint.
|
|
func (s *Service) FetchRemoteModels(ctx context.Context, id string) ([]RemoteModel, error) {
|
|
providerID, err := db.ParseUUID(id)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
provider, err := s.queries.GetProviderByID(ctx, providerID)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("get provider: %w", err)
|
|
}
|
|
if supportsOAuth(provider) {
|
|
catalog := openaicodex.Catalog()
|
|
remoteModels := make([]RemoteModel, 0, len(catalog))
|
|
for _, model := range catalog {
|
|
compatibilities := make([]string, 0, 2)
|
|
if model.SupportsToolCall {
|
|
compatibilities = append(compatibilities, models.CompatToolCall)
|
|
}
|
|
if model.SupportsReasoning {
|
|
compatibilities = append(compatibilities, models.CompatReasoning)
|
|
}
|
|
remoteModels = append(remoteModels, RemoteModel{
|
|
ID: model.ID,
|
|
Name: model.DisplayName,
|
|
Object: "model",
|
|
OwnedBy: "openai-codex",
|
|
Type: "chat",
|
|
Compatibilities: compatibilities,
|
|
ReasoningEfforts: append([]string(nil), model.ReasoningEfforts...),
|
|
})
|
|
}
|
|
return remoteModels, nil
|
|
}
|
|
|
|
cfg := providerConfig(provider.Config)
|
|
baseURL := strings.TrimRight(configString(cfg, "base_url"), "/")
|
|
apiKey := configString(cfg, "api_key")
|
|
modelsURL := fmt.Sprintf("%s/models", baseURL)
|
|
|
|
ctx, cancel := context.WithTimeout(ctx, probeTimeout)
|
|
defer cancel()
|
|
|
|
req, err := http.NewRequestWithContext(ctx, http.MethodGet, modelsURL, nil)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("create request: %w", err)
|
|
}
|
|
|
|
if apiKey != "" && !supportsOAuth(provider) {
|
|
req.Header.Set("Authorization", fmt.Sprintf("Bearer %s", apiKey))
|
|
}
|
|
|
|
resp, err := http.DefaultClient.Do(req) //nolint:gosec // G704: URL is from operator-configured provider base URL
|
|
if err != nil {
|
|
return nil, fmt.Errorf("execute request: %w", err)
|
|
}
|
|
defer func() { _ = resp.Body.Close() }()
|
|
|
|
if resp.StatusCode != http.StatusOK {
|
|
body, _ := io.ReadAll(resp.Body)
|
|
return nil, fmt.Errorf("unexpected status code: %d, body: %s", resp.StatusCode, string(body))
|
|
}
|
|
|
|
var fetchResp FetchModelsResponse
|
|
if err := json.NewDecoder(resp.Body).Decode(&fetchResp); err != nil {
|
|
return nil, fmt.Errorf("decode response: %w", err)
|
|
}
|
|
|
|
return fetchResp.Data, nil
|
|
}
|
|
|
|
// toGetResponse converts a database provider to a response.
|
|
func (s *Service) toGetResponse(provider sqlc.Provider) GetResponse {
|
|
var metadata map[string]any
|
|
if len(provider.Metadata) > 0 {
|
|
if err := json.Unmarshal(provider.Metadata, &metadata); err != nil {
|
|
if s.logger != nil {
|
|
s.logger.Warn("provider metadata unmarshal failed", slog.String("id", provider.ID.String()), slog.Any("error", err))
|
|
}
|
|
}
|
|
}
|
|
|
|
cfg := providerConfig(provider.Config)
|
|
maskedCfg := maskConfigAPIKey(cfg)
|
|
|
|
var icon string
|
|
if provider.Icon.Valid {
|
|
icon = provider.Icon.String
|
|
}
|
|
|
|
return GetResponse{
|
|
ID: provider.ID.String(),
|
|
Name: provider.Name,
|
|
ClientType: provider.ClientType,
|
|
Icon: icon,
|
|
Enable: provider.Enable,
|
|
Config: maskedCfg,
|
|
Metadata: metadata,
|
|
CreatedAt: provider.CreatedAt.Time,
|
|
UpdatedAt: provider.UpdatedAt.Time,
|
|
}
|
|
}
|
|
|
|
// providerConfig parses the provider config JSONB.
|
|
func providerConfig(raw []byte) map[string]any {
|
|
if len(raw) == 0 {
|
|
return map[string]any{}
|
|
}
|
|
var cfg map[string]any
|
|
if err := json.Unmarshal(raw, &cfg); err != nil {
|
|
return map[string]any{}
|
|
}
|
|
if cfg == nil {
|
|
return map[string]any{}
|
|
}
|
|
return cfg
|
|
}
|
|
|
|
// configString extracts a string from the config map.
|
|
func configString(cfg map[string]any, key string) string {
|
|
if cfg == nil {
|
|
return ""
|
|
}
|
|
v, _ := cfg[key].(string)
|
|
return v
|
|
}
|
|
|
|
// ProviderConfigString is a public helper for extracting a string from the config JSONB.
|
|
func ProviderConfigString(provider sqlc.Provider, key string) string {
|
|
return configString(providerConfig(provider.Config), key)
|
|
}
|
|
|
|
// maskConfigAPIKey returns a copy of config with api_key masked.
|
|
func maskConfigAPIKey(cfg map[string]any) map[string]any {
|
|
result := make(map[string]any, len(cfg))
|
|
for k, v := range cfg {
|
|
result[k] = v
|
|
}
|
|
if apiKey, _ := result["api_key"].(string); apiKey != "" {
|
|
result["api_key"] = maskAPIKey(apiKey)
|
|
}
|
|
return result
|
|
}
|
|
|
|
// maskAPIKey masks an API key for security.
|
|
func maskAPIKey(apiKey string) string {
|
|
if apiKey == "" {
|
|
return ""
|
|
}
|
|
if len(apiKey) <= 8 {
|
|
return strings.Repeat("*", len(apiKey))
|
|
}
|
|
return apiKey[:8] + strings.Repeat("*", len(apiKey)-8)
|
|
}
|