mirror of
https://github.com/memohai/Memoh.git
synced 2026-04-27 07:16:19 +09:00
6acdd191c7
commit bcdb026ae43e4f95d0b2c4f9bd440a2df9d6b514 Author: Ran <16112591+chen-ran@users.noreply.github.com> Date: Thu Feb 12 17:10:32 2026 +0800 chore: update DEVELOPMENT.md commit30281742efMerge:ca5c6a15b05f13Author: BBQ <bbq@BBQdeMacBook-Air.local> Date: Thu Feb 12 15:49:17 2026 +0800 merge(github/main): integrate fx dependency injection framework Merge upstream fx refactor and adapt all services to use go.uber.org/fx for dependency injection. Resolve conflicts in main.go, server.go, and service constructors while preserving our domain model changes. - Fix telegram adapter panic on shutdown (double close channel) - Fix feishu adapter processing messages after stop - Increase directory lookup timeout from 2s to 5s commitca5c6a1866Author: BBQ <bbq@BBQdeMacBook-Air.local> Date: Thu Feb 12 15:33:09 2026 +0800 refactor(core): restructure conversation, channel and message domains - Rename chat module to conversation with flow-based architecture - Move channelidentities into channel/identities subpackage - Add channel/route for routing logic - Add message service with event hub - Add MCP providers: container, directory, schedule - Refactor Feishu/Telegram adapters with directory and stream support - Add platform management page and channel badges in web UI - Update database schema for conversations, messages and channel routes - Add @memoh/shared package for cross-package type definitions commit75e2ef0467Merge:d99ba3801cb6c8Author: BBQ <bbq@BBQdeMacBook-Air.local> Date: Thu Feb 12 14:45:49 2026 +0800 merge(github): merge github/main, resolve index.ts URL conflict Keep our defensive absolute-URL check in createAuthFetcher. commitd99ba38b7dMerge:860e20f35ce7d1Author: BBQ <bbq@BBQdeMacBook-Air.local> Date: Thu Feb 12 05:20:18 2026 +0800 merge(github): merge github/main, keep our code and docs/spec commit860e20fe70Author: BBQ <bbq@BBQdeMacBook-Air.local> Date: Wed Feb 11 22:13:27 2026 +0800 docs(docs): add concepts and style guides for VitePress site - Add concepts: identity-and-binding, index (en/zh) - Add style: terminology (en/zh) - Update index and zh/index - Update .vitepress/config.ts commita75fdb8040Author: BBQ <bbq@BBQdeMacBook-Air.local> Date: Wed Feb 11 17:37:16 2026 +0800 refactor(mcp): standardize unified tool gateway on go-sdk Split business executors from federation sources and migrate unified tool/federation transports to the official go-sdk for stricter MCP compliance and safer session lifecycle handling. Add targeted regression tests for accept compatibility, initialization retries, pending cleanup, and include updated swagger artifacts. commit02b33c8e85Author: BBQ <bbq@BBQdeMacBook-Air.local> Date: Wed Feb 11 15:42:21 2026 +0800 refactor(core): finalize user-centric identity and policy cleanup Unify auth and chat identity semantics around user_id, enforce personal-bot owner-only authorization, and remove legacy compatibility branches in integration tests. commit06e8619a37Author: BBQ <bbq@BBQdeMacBook-Air.local> Date: Wed Feb 11 14:47:03 2026 +0800 refactor(core): migrate channel identity and binding across app Align channel identity and bind flow across backend and app-facing layers, including generated swagger artifacts and package lock updates while excluding docs content changes.
189 lines
5.1 KiB
Go
189 lines
5.1 KiB
Go
package handlers
|
|
|
|
import (
|
|
"context"
|
|
"net/http"
|
|
"net/http/httptest"
|
|
"testing"
|
|
|
|
mcpgw "github.com/memohai/memoh/internal/mcp"
|
|
sdkmcp "github.com/modelcontextprotocol/go-sdk/mcp"
|
|
)
|
|
|
|
type testToolInput struct {
|
|
Query string `json:"query"`
|
|
}
|
|
|
|
type testToolOutput struct {
|
|
Echo string `json:"echo"`
|
|
}
|
|
|
|
func newTestMCPServer() *sdkmcp.Server {
|
|
server := sdkmcp.NewServer(&sdkmcp.Implementation{
|
|
Name: "test-federation-server",
|
|
Version: "v1",
|
|
}, nil)
|
|
sdkmcp.AddTool(server, &sdkmcp.Tool{
|
|
Name: "echo",
|
|
Description: "Echo query",
|
|
}, func(ctx context.Context, request *sdkmcp.CallToolRequest, input testToolInput) (*sdkmcp.CallToolResult, testToolOutput, error) {
|
|
return nil, testToolOutput{Echo: input.Query}, nil
|
|
})
|
|
return server
|
|
}
|
|
|
|
func withAuthHeader(next http.Handler, token string) http.Handler {
|
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
if r.Header.Get("Authorization") != token {
|
|
http.Error(w, "unauthorized", http.StatusUnauthorized)
|
|
return
|
|
}
|
|
next.ServeHTTP(w, r)
|
|
})
|
|
}
|
|
|
|
func TestFederationGatewayHTTPConnectionViaSDK(t *testing.T) {
|
|
server := newTestMCPServer()
|
|
handler := sdkmcp.NewStreamableHTTPHandler(func(*http.Request) *sdkmcp.Server {
|
|
return server
|
|
}, nil)
|
|
httpServer := httptest.NewServer(withAuthHeader(handler, "Bearer test-token"))
|
|
defer httpServer.Close()
|
|
|
|
gateway := &MCPFederationGateway{
|
|
client: httpServer.Client(),
|
|
}
|
|
connection := mcpgw.Connection{
|
|
Config: map[string]any{
|
|
"url": httpServer.URL,
|
|
"headers": map[string]any{
|
|
"Authorization": "Bearer test-token",
|
|
},
|
|
},
|
|
}
|
|
|
|
tools, err := gateway.ListHTTPConnectionTools(context.Background(), connection)
|
|
if err != nil {
|
|
t.Fatalf("list http tools failed: %v", err)
|
|
}
|
|
if len(tools) != 1 || tools[0].Name != "echo" {
|
|
t.Fatalf("unexpected tool list: %#v", tools)
|
|
}
|
|
|
|
payload, err := gateway.CallHTTPConnectionTool(context.Background(), connection, "echo", map[string]any{
|
|
"query": "hello-http",
|
|
})
|
|
if err != nil {
|
|
t.Fatalf("call http tool failed: %v", err)
|
|
}
|
|
assertEchoResult(t, payload, "hello-http")
|
|
}
|
|
|
|
func TestFederationGatewaySSEConnectionViaSDK(t *testing.T) {
|
|
server := newTestMCPServer()
|
|
handler := sdkmcp.NewSSEHandler(func(*http.Request) *sdkmcp.Server {
|
|
return server
|
|
}, nil)
|
|
httpServer := httptest.NewServer(withAuthHeader(handler, "Bearer test-token"))
|
|
defer httpServer.Close()
|
|
|
|
gateway := &MCPFederationGateway{
|
|
client: httpServer.Client(),
|
|
}
|
|
connection := mcpgw.Connection{
|
|
Config: map[string]any{
|
|
"url": httpServer.URL,
|
|
"headers": map[string]any{
|
|
"Authorization": "Bearer test-token",
|
|
},
|
|
},
|
|
}
|
|
|
|
tools, err := gateway.ListSSEConnectionTools(context.Background(), connection)
|
|
if err != nil {
|
|
t.Fatalf("list sse tools failed: %v", err)
|
|
}
|
|
if len(tools) != 1 || tools[0].Name != "echo" {
|
|
t.Fatalf("unexpected tool list: %#v", tools)
|
|
}
|
|
|
|
payload, err := gateway.CallSSEConnectionTool(context.Background(), connection, "echo", map[string]any{
|
|
"query": "hello-sse",
|
|
})
|
|
if err != nil {
|
|
t.Fatalf("call sse tool failed: %v", err)
|
|
}
|
|
assertEchoResult(t, payload, "hello-sse")
|
|
}
|
|
|
|
func TestResolveSSEEndpointCandidatesCompatibility(t *testing.T) {
|
|
tests := []struct {
|
|
name string
|
|
config map[string]any
|
|
contains string
|
|
firstWant string
|
|
}{
|
|
{
|
|
name: "prefer explicit sse_url",
|
|
config: map[string]any{"sse_url": "http://example.com/custom-sse", "url": "http://example.com/sse"},
|
|
firstWant: "http://example.com/custom-sse",
|
|
contains: "http://example.com/sse",
|
|
},
|
|
{
|
|
name: "fallback to url as endpoint",
|
|
config: map[string]any{"url": "http://example.com/sse"},
|
|
firstWant: "http://example.com/sse",
|
|
contains: "http://example.com/sse",
|
|
},
|
|
{
|
|
name: "derive endpoint from message url",
|
|
config: map[string]any{"message_url": "http://example.com/message"},
|
|
firstWant: "http://example.com/sse",
|
|
contains: "http://example.com/message",
|
|
},
|
|
{
|
|
name: "derive endpoint from url message suffix",
|
|
config: map[string]any{"url": "http://example.com/message"},
|
|
firstWant: "http://example.com/message",
|
|
contains: "http://example.com/sse",
|
|
},
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
got := resolveSSEEndpointCandidates(tt.config)
|
|
if len(got) == 0 {
|
|
t.Fatalf("resolve sse endpoints should not be empty")
|
|
}
|
|
if got[0] != tt.firstWant {
|
|
t.Fatalf("unexpected first endpoint: got=%s want=%s", got[0], tt.firstWant)
|
|
}
|
|
found := false
|
|
for _, item := range got {
|
|
if item == tt.contains {
|
|
found = true
|
|
break
|
|
}
|
|
}
|
|
if !found {
|
|
t.Fatalf("endpoint candidates missing expected value: %s in %#v", tt.contains, got)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func assertEchoResult(t *testing.T, payload map[string]any, expected string) {
|
|
t.Helper()
|
|
result, ok := payload["result"].(map[string]any)
|
|
if !ok {
|
|
t.Fatalf("missing result payload: %#v", payload)
|
|
}
|
|
structured, ok := result["structuredContent"].(map[string]any)
|
|
if !ok {
|
|
t.Fatalf("missing structured content: %#v", result)
|
|
}
|
|
if got := anyToString(structured["echo"]); got != expected {
|
|
t.Fatalf("unexpected echo result: got=%s want=%s", got, expected)
|
|
}
|
|
}
|