Files
Memoh/internal/mcp/tool_gateway_service.go
T
BBQ 85251a2905 refactor(core): codebase quality cleanup
- Remove user-level model settings (chat_model_id, memory_model_id,
  embedding_model_id, max_context_load_time, language) from users table
- Merge migration 0002 into 0001, remove compatibility migrations
- Delete dead conversation/resolver.go (1177 lines, only flow/resolver.go used)
- Remove type aliases (Chat=Conversation, types_alias.go)
- Fix SQL: remove AND false stub, fix UpdateChatTitle model_id,
  reset model IDs in DeleteSettings, add preauth expiry filter,
  add ListMessages limit, remove 10 dead queries
- Extract shared handler helpers (RequireChannelIdentityID, AuthorizeBotAccess)
- Rename internal/router to internal/channel/inbound
- Fix identity confusion: remove UserID->ChannelIdentityID fallbacks
- Fix all _ = var patterns with proper error logging
- Fix error propagation: storeMessages, rescheduleJob, botContainerID
- Fix naming: ModelId->ModelID, active->is_active, Duration semantic fix
- Remove dead code: mcpService, ReplyTarget, callMCPServer, sshShellQuote,
  buildSessionMetadata, ChatRequest.Language, TriggerPayload.ChatID
- Fix code quality: errors.Is(), remove goto, CreateHuman deprecated
- Remove Enable model endpoint and user-level settings CLI commands
- Regenerate sqlc, swagger, SDK
2026-02-12 23:50:48 +08:00

170 lines
4.3 KiB
Go

package mcp
import (
"context"
"errors"
"fmt"
"log/slog"
"strings"
"sync"
"time"
)
const (
defaultToolRegistryCacheTTL = 5 * time.Second
)
type cachedToolRegistry struct {
expiresAt time.Time
registry *ToolRegistry
}
// ToolGatewayService federates tools from executors and sources.
type ToolGatewayService struct {
logger *slog.Logger
executors []ToolExecutor
sources []ToolSource
cacheTTL time.Duration
mu sync.Mutex
cache map[string]cachedToolRegistry
}
func NewToolGatewayService(log *slog.Logger, executors []ToolExecutor, sources []ToolSource) *ToolGatewayService {
if log == nil {
log = slog.Default()
}
filteredExecutors := make([]ToolExecutor, 0, len(executors))
for _, executor := range executors {
if executor != nil {
filteredExecutors = append(filteredExecutors, executor)
}
}
filteredSources := make([]ToolSource, 0, len(sources))
for _, source := range sources {
if source != nil {
filteredSources = append(filteredSources, source)
}
}
return &ToolGatewayService{
logger: log.With(slog.String("service", "tool_gateway")),
executors: filteredExecutors,
sources: filteredSources,
cacheTTL: defaultToolRegistryCacheTTL,
cache: map[string]cachedToolRegistry{},
}
}
func (s *ToolGatewayService) InitializeResult() map[string]any {
return map[string]any{
"protocolVersion": "2025-06-18",
"capabilities": map[string]any{
"tools": map[string]any{
"listChanged": false,
},
},
"serverInfo": map[string]any{
"name": "memoh-tools-gateway",
"version": "1.0.0",
},
}
}
func (s *ToolGatewayService) ListTools(ctx context.Context, session ToolSessionContext) ([]ToolDescriptor, error) {
registry, err := s.getRegistry(ctx, session, false)
if err != nil {
return nil, err
}
return registry.List(), nil
}
func (s *ToolGatewayService) CallTool(ctx context.Context, session ToolSessionContext, payload ToolCallPayload) (map[string]any, error) {
toolName := strings.TrimSpace(payload.Name)
if toolName == "" {
return nil, fmt.Errorf("tool name is required")
}
registry, err := s.getRegistry(ctx, session, false)
if err != nil {
return nil, err
}
executor, _, ok := registry.Lookup(toolName)
if !ok {
// Refresh once for dynamic executors/sources.
registry, err = s.getRegistry(ctx, session, true)
if err != nil {
return nil, err
}
executor, _, ok = registry.Lookup(toolName)
if !ok {
return BuildToolErrorResult("tool not found: " + toolName), nil
}
}
arguments := payload.Arguments
if arguments == nil {
arguments = map[string]any{}
}
result, err := executor.CallTool(ctx, session, toolName, arguments)
if err != nil {
if errors.Is(err, ErrToolNotFound) {
return BuildToolErrorResult("tool not found: " + toolName), nil
}
return BuildToolErrorResult(err.Error()), nil
}
if result == nil {
return BuildToolSuccessResult(map[string]any{"ok": true}), nil
}
return result, nil
}
func (s *ToolGatewayService) getRegistry(ctx context.Context, session ToolSessionContext, force bool) (*ToolRegistry, error) {
botID := strings.TrimSpace(session.BotID)
if botID == "" {
return nil, fmt.Errorf("bot id is required")
}
if !force {
s.mu.Lock()
cached, ok := s.cache[botID]
if ok && time.Now().Before(cached.expiresAt) && cached.registry != nil {
s.mu.Unlock()
return cached.registry, nil
}
s.mu.Unlock()
}
registry := NewToolRegistry()
for _, executor := range s.executors {
tools, err := executor.ListTools(ctx, session)
if err != nil {
s.logger.Warn("list tools from executor failed", slog.Any("error", err))
continue
}
for _, tool := range tools {
if err := registry.Register(executor, tool); err != nil {
s.logger.Warn("skip duplicated/invalid tool", slog.String("tool", tool.Name), slog.Any("error", err))
}
}
}
for _, source := range s.sources {
tools, err := source.ListTools(ctx, session)
if err != nil {
s.logger.Warn("list tools from source failed", slog.Any("error", err))
continue
}
for _, tool := range tools {
if err := registry.Register(source, tool); err != nil {
s.logger.Warn("skip duplicated/invalid tool", slog.String("tool", tool.Name), slog.Any("error", err))
}
}
}
s.mu.Lock()
s.cache[botID] = cachedToolRegistry{
expiresAt: time.Now().Add(s.cacheTTL),
registry: registry,
}
s.mu.Unlock()
return registry, nil
}