mirror of
https://github.com/memohai/Memoh.git
synced 2026-04-27 07:16:19 +09:00
6acdd191c7
commit bcdb026ae43e4f95d0b2c4f9bd440a2df9d6b514 Author: Ran <16112591+chen-ran@users.noreply.github.com> Date: Thu Feb 12 17:10:32 2026 +0800 chore: update DEVELOPMENT.md commit30281742efMerge:ca5c6a15b05f13Author: BBQ <bbq@BBQdeMacBook-Air.local> Date: Thu Feb 12 15:49:17 2026 +0800 merge(github/main): integrate fx dependency injection framework Merge upstream fx refactor and adapt all services to use go.uber.org/fx for dependency injection. Resolve conflicts in main.go, server.go, and service constructors while preserving our domain model changes. - Fix telegram adapter panic on shutdown (double close channel) - Fix feishu adapter processing messages after stop - Increase directory lookup timeout from 2s to 5s commitca5c6a1866Author: BBQ <bbq@BBQdeMacBook-Air.local> Date: Thu Feb 12 15:33:09 2026 +0800 refactor(core): restructure conversation, channel and message domains - Rename chat module to conversation with flow-based architecture - Move channelidentities into channel/identities subpackage - Add channel/route for routing logic - Add message service with event hub - Add MCP providers: container, directory, schedule - Refactor Feishu/Telegram adapters with directory and stream support - Add platform management page and channel badges in web UI - Update database schema for conversations, messages and channel routes - Add @memoh/shared package for cross-package type definitions commit75e2ef0467Merge:d99ba3801cb6c8Author: BBQ <bbq@BBQdeMacBook-Air.local> Date: Thu Feb 12 14:45:49 2026 +0800 merge(github): merge github/main, resolve index.ts URL conflict Keep our defensive absolute-URL check in createAuthFetcher. commitd99ba38b7dMerge:860e20f35ce7d1Author: BBQ <bbq@BBQdeMacBook-Air.local> Date: Thu Feb 12 05:20:18 2026 +0800 merge(github): merge github/main, keep our code and docs/spec commit860e20fe70Author: BBQ <bbq@BBQdeMacBook-Air.local> Date: Wed Feb 11 22:13:27 2026 +0800 docs(docs): add concepts and style guides for VitePress site - Add concepts: identity-and-binding, index (en/zh) - Add style: terminology (en/zh) - Update index and zh/index - Update .vitepress/config.ts commita75fdb8040Author: BBQ <bbq@BBQdeMacBook-Air.local> Date: Wed Feb 11 17:37:16 2026 +0800 refactor(mcp): standardize unified tool gateway on go-sdk Split business executors from federation sources and migrate unified tool/federation transports to the official go-sdk for stricter MCP compliance and safer session lifecycle handling. Add targeted regression tests for accept compatibility, initialization retries, pending cleanup, and include updated swagger artifacts. commit02b33c8e85Author: BBQ <bbq@BBQdeMacBook-Air.local> Date: Wed Feb 11 15:42:21 2026 +0800 refactor(core): finalize user-centric identity and policy cleanup Unify auth and chat identity semantics around user_id, enforce personal-bot owner-only authorization, and remove legacy compatibility branches in integration tests. commit06e8619a37Author: BBQ <bbq@BBQdeMacBook-Air.local> Date: Wed Feb 11 14:47:03 2026 +0800 refactor(core): migrate channel identity and binding across app Align channel identity and bind flow across backend and app-facing layers, including generated swagger artifacts and package lock updates while excluding docs content changes.
279 lines
7.7 KiB
Go
279 lines
7.7 KiB
Go
package embeddings
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"fmt"
|
|
"log/slog"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/google/uuid"
|
|
"github.com/jackc/pgx/v5"
|
|
"github.com/jackc/pgx/v5/pgtype"
|
|
|
|
"github.com/memohai/memoh/internal/db"
|
|
"github.com/memohai/memoh/internal/db/sqlc"
|
|
"github.com/memohai/memoh/internal/models"
|
|
)
|
|
|
|
const (
|
|
TypeText = "text"
|
|
TypeMultimodal = "multimodal"
|
|
|
|
ProviderOpenAI = "openai"
|
|
ProviderBedrock = "bedrock"
|
|
ProviderDashScope = "dashscope"
|
|
)
|
|
|
|
type Request struct {
|
|
Type string
|
|
Provider string
|
|
Model string
|
|
Dimensions int
|
|
Input Input
|
|
ChannelIdentityID string
|
|
}
|
|
|
|
type Input struct {
|
|
Text string
|
|
ImageURL string
|
|
VideoURL string
|
|
}
|
|
|
|
type Usage struct {
|
|
InputTokens int
|
|
ImageTokens int
|
|
VideoTokens int
|
|
}
|
|
|
|
type Result struct {
|
|
Type string
|
|
Provider string
|
|
Model string
|
|
Dimensions int
|
|
Embedding []float32
|
|
Usage Usage
|
|
}
|
|
|
|
type Resolver struct {
|
|
modelsService *models.Service
|
|
queries *sqlc.Queries
|
|
timeout time.Duration
|
|
logger *slog.Logger
|
|
}
|
|
|
|
func NewResolver(log *slog.Logger, modelsService *models.Service, queries *sqlc.Queries, timeout time.Duration) *Resolver {
|
|
return &Resolver{
|
|
modelsService: modelsService,
|
|
queries: queries,
|
|
timeout: timeout,
|
|
logger: log.With(slog.String("service", "embeddings")),
|
|
}
|
|
}
|
|
|
|
func (r *Resolver) Embed(ctx context.Context, req Request) (Result, error) {
|
|
req.Type = strings.ToLower(strings.TrimSpace(req.Type))
|
|
req.Provider = strings.ToLower(strings.TrimSpace(req.Provider))
|
|
req.Model = strings.TrimSpace(req.Model)
|
|
req.Input.Text = strings.TrimSpace(req.Input.Text)
|
|
req.Input.ImageURL = strings.TrimSpace(req.Input.ImageURL)
|
|
req.Input.VideoURL = strings.TrimSpace(req.Input.VideoURL)
|
|
|
|
if req.Type == "" {
|
|
return Result{}, errors.New("type is required")
|
|
}
|
|
switch req.Type {
|
|
case TypeText:
|
|
if req.Provider != "" && req.Provider != ProviderOpenAI {
|
|
return Result{}, errors.New("invalid provider for text embeddings")
|
|
}
|
|
if req.Input.Text == "" {
|
|
return Result{}, errors.New("text input is required")
|
|
}
|
|
case TypeMultimodal:
|
|
if req.Provider != "" && req.Provider != ProviderBedrock && req.Provider != ProviderDashScope {
|
|
return Result{}, errors.New("invalid provider for multimodal embeddings")
|
|
}
|
|
if req.Input.Text == "" && req.Input.ImageURL == "" && req.Input.VideoURL == "" {
|
|
return Result{}, errors.New("multimodal input is required")
|
|
}
|
|
default:
|
|
return Result{}, errors.New("invalid embeddings type")
|
|
}
|
|
|
|
selected, err := r.selectEmbeddingModel(ctx, req)
|
|
if err != nil {
|
|
return Result{}, err
|
|
}
|
|
provider, err := r.fetchProvider(ctx, selected.LlmProviderID)
|
|
if err != nil {
|
|
return Result{}, err
|
|
}
|
|
|
|
req.Model = selected.ModelID
|
|
req.Dimensions = selected.Dimensions
|
|
req.Provider = strings.ToLower(strings.TrimSpace(provider.ClientType))
|
|
if req.Model == "" {
|
|
return Result{}, errors.New("embedding model id not configured")
|
|
}
|
|
if req.Dimensions <= 0 {
|
|
return Result{}, errors.New("embedding model dimensions not configured")
|
|
}
|
|
|
|
timeout := r.timeout
|
|
if timeout <= 0 {
|
|
timeout = 10 * time.Second
|
|
}
|
|
|
|
switch req.Type {
|
|
case TypeText:
|
|
if req.Provider != ProviderOpenAI {
|
|
return Result{}, errors.New("provider not implemented")
|
|
}
|
|
embedder, err := NewOpenAIEmbedder(r.logger, provider.ApiKey, provider.BaseUrl, req.Model, req.Dimensions, timeout)
|
|
if err != nil {
|
|
return Result{}, err
|
|
}
|
|
vector, err := embedder.Embed(ctx, req.Input.Text)
|
|
if err != nil {
|
|
return Result{}, err
|
|
}
|
|
return Result{
|
|
Type: req.Type,
|
|
Provider: req.Provider,
|
|
Model: req.Model,
|
|
Dimensions: req.Dimensions,
|
|
Embedding: vector,
|
|
}, nil
|
|
case TypeMultimodal:
|
|
if req.Provider == ProviderDashScope {
|
|
if strings.TrimSpace(provider.ApiKey) == "" {
|
|
return Result{}, errors.New("dashscope api key is required")
|
|
}
|
|
dashscope := NewDashScopeEmbedder(r.logger, provider.ApiKey, provider.BaseUrl, req.Model, timeout)
|
|
vector, usage, err := dashscope.Embed(ctx, req.Input.Text, req.Input.ImageURL, req.Input.VideoURL)
|
|
if err != nil {
|
|
return Result{}, err
|
|
}
|
|
return Result{
|
|
Type: req.Type,
|
|
Provider: req.Provider,
|
|
Model: req.Model,
|
|
Dimensions: req.Dimensions,
|
|
Embedding: vector,
|
|
Usage: Usage{
|
|
InputTokens: usage.InputTokens,
|
|
ImageTokens: usage.ImageTokens,
|
|
VideoTokens: usage.Duration,
|
|
},
|
|
}, nil
|
|
}
|
|
return Result{}, errors.New("provider not implemented")
|
|
default:
|
|
return Result{}, errors.New("invalid embeddings type")
|
|
}
|
|
}
|
|
|
|
func (r *Resolver) selectEmbeddingModel(ctx context.Context, req Request) (models.GetResponse, error) {
|
|
if r.modelsService == nil {
|
|
return models.GetResponse{}, errors.New("models service not configured")
|
|
}
|
|
|
|
// If no model specified and no provider specified, try to get per-user embedding model.
|
|
if req.Model == "" && req.Provider == "" && strings.TrimSpace(req.ChannelIdentityID) != "" {
|
|
modelID, err := r.loadChannelIdentityEmbeddingModelID(ctx, req.ChannelIdentityID)
|
|
if err != nil {
|
|
return models.GetResponse{}, err
|
|
}
|
|
if modelID != "" {
|
|
selected, err := r.modelsService.GetByModelID(ctx, modelID)
|
|
if err != nil {
|
|
return models.GetResponse{}, fmt.Errorf("settings embedding model not found: %w", err)
|
|
}
|
|
if selected.Type != models.ModelTypeEmbedding {
|
|
return models.GetResponse{}, errors.New("settings embedding model is not an embedding model")
|
|
}
|
|
if req.Type == TypeMultimodal && !selected.IsMultimodal {
|
|
return models.GetResponse{}, errors.New("settings embedding model does not support multimodal")
|
|
}
|
|
if req.Type == TypeText && selected.IsMultimodal {
|
|
return models.GetResponse{}, errors.New("settings embedding model does not support text embeddings")
|
|
}
|
|
return selected, nil
|
|
}
|
|
}
|
|
|
|
var candidates []models.GetResponse
|
|
var err error
|
|
if req.Provider != "" {
|
|
candidates, err = r.modelsService.ListByClientType(ctx, models.ClientType(req.Provider))
|
|
} else {
|
|
candidates, err = r.modelsService.ListByType(ctx, models.ModelTypeEmbedding)
|
|
}
|
|
if err != nil {
|
|
return models.GetResponse{}, err
|
|
}
|
|
|
|
filtered := make([]models.GetResponse, 0, len(candidates))
|
|
for _, model := range candidates {
|
|
if model.Type != models.ModelTypeEmbedding {
|
|
continue
|
|
}
|
|
if req.Type == TypeMultimodal && !model.IsMultimodal {
|
|
continue
|
|
}
|
|
if req.Type == TypeText && model.IsMultimodal {
|
|
continue
|
|
}
|
|
filtered = append(filtered, model)
|
|
}
|
|
if len(filtered) == 0 {
|
|
return models.GetResponse{}, errors.New("no embedding models available")
|
|
}
|
|
if req.Model != "" {
|
|
for _, model := range filtered {
|
|
if model.ModelID == req.Model {
|
|
return model, nil
|
|
}
|
|
}
|
|
return models.GetResponse{}, errors.New("embedding model not found")
|
|
}
|
|
return filtered[0], nil
|
|
}
|
|
|
|
func (r *Resolver) fetchProvider(ctx context.Context, providerID string) (sqlc.LlmProvider, error) {
|
|
if r.queries == nil {
|
|
return sqlc.LlmProvider{}, errors.New("llm provider queries not configured")
|
|
}
|
|
if strings.TrimSpace(providerID) == "" {
|
|
return sqlc.LlmProvider{}, errors.New("llm provider id missing")
|
|
}
|
|
parsed, err := uuid.Parse(providerID)
|
|
if err != nil {
|
|
return sqlc.LlmProvider{}, err
|
|
}
|
|
pgID := pgtype.UUID{Valid: true}
|
|
copy(pgID.Bytes[:], parsed[:])
|
|
return r.queries.GetLlmProviderByID(ctx, pgID)
|
|
}
|
|
|
|
func (r *Resolver) loadChannelIdentityEmbeddingModelID(ctx context.Context, channelIdentityID string) (string, error) {
|
|
if r.queries == nil {
|
|
return "", nil
|
|
}
|
|
pgChannelIdentityID, err := db.ParseUUID(channelIdentityID)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
row, err := r.queries.GetSettingsByUserID(ctx, pgChannelIdentityID)
|
|
if err != nil {
|
|
if errors.Is(err, pgx.ErrNoRows) {
|
|
return "", nil
|
|
}
|
|
return "", err
|
|
}
|
|
return strings.TrimSpace(row.EmbeddingModelID.String), nil
|
|
}
|
|
|