Compare commits

..

1 Commits

Author SHA1 Message Date
Alexander Whitestone
2b7b12baf9 feat: MCP server — expose hermes tools to fleet peers (#803)
Some checks are pending
Contributor Attribution Check / check-attribution (pull_request) Waiting to run
Docker Build and Publish / build-and-push (pull_request) Waiting to run
Supply Chain Audit / Scan PR for supply chain risks (pull_request) Waiting to run
Tests / test (pull_request) Waiting to run
Tests / e2e (pull_request) Waiting to run
Resolves #803. Standalone MCP server that exposes safe hermes
tools to other fleet agents.

scripts/mcp_server.py:
- Exposes: terminal, file_read, file_search, web_search, session_search
- Blocks: approval, delegate, memory, config, cron, send_message
- Terminal uses approval.py dangerous command detection
- Auth via Bearer token (MCP_AUTH_KEY)
- HTTP endpoints: GET /mcp/tools, POST /mcp/tools/call, GET /health

Usage:
  python scripts/mcp_server.py --port 8081 --auth-key SECRET
  curl http://localhost:8081/mcp/tools
  curl -X POST http://localhost:8081/mcp/tools/call -d {"name":"file_read","arguments":{"path":"README.md"}}
2026-04-16 01:10:00 -04:00
3 changed files with 265 additions and 340 deletions

View File

@@ -1,234 +0,0 @@
"""
gemma4_tool_normalizer.py — Normalize Gemma 4 tool call output quirks.
Gemma 4 (and some Ollama models) emit tool calls in formats that differ
from the OpenAI standard:
1. Extra whitespace around JSON arguments
2. Parallel tool calls split across separate assistant messages
3. Streaming chunks with split JSON
This module normalizes these into standard OpenAI tool_calls format.
Usage:
from agent.gemma4_tool_normalizer import normalize_tool_calls, normalize_messages_tool_calls
# Normalize a single tool call dict
normalized = normalize_tool_calls(raw_tool_calls)
# Normalize an entire conversation (merges split messages)
messages = normalize_messages_tool_calls(messages)
"""
import json
import re
import logging
from typing import List, Dict, Any, Optional
logger = logging.getLogger(__name__)
def normalize_tool_call_args(args_str: str) -> str:
"""Normalize tool call arguments string.
Handles Gemma 4 quirks:
- Extra whitespace/newlines around JSON
- Trailing commas
- Single-quoted strings (convert to double)
"""
if not args_str or not isinstance(args_str, str):
return args_str
# Strip leading/trailing whitespace
args_str = args_str.strip()
# Remove leading/trailing newlines and excessive whitespace
args_str = re.sub(r'^\s*\n+\s*', '', args_str)
args_str = re.sub(r'\n+\s*$', '', args_str)
# Remove trailing commas before closing braces/brackets
args_str = re.sub(r',\s*([}\]])', r'\1', args_str)
# Convert single-quoted values to double-quoted (Gemma 4 quirk)
# Only do this if the string doesn't parse as valid JSON
try:
json.loads(args_str)
return args_str # Already valid
except json.JSONDecodeError:
pass
# Try fixing single quotes
fixed = re.sub(r"(?<!\\')'([^']*?)(?<!\\')'", r'"\1"', args_str)
try:
json.loads(fixed)
return fixed
except json.JSONDecodeError:
pass
# Try wrapping in braces if it looks like key-value pairs without braces
if ':' in args_str and not args_str.startswith('{'):
wrapped = '{' + args_str + '}'
try:
json.loads(wrapped)
return wrapped
except json.JSONDecodeError:
pass
return args_str
def normalize_tool_call(tc: dict) -> dict:
"""Normalize a single tool call dict."""
if not isinstance(tc, dict):
return tc
tc = tc.copy()
# Normalize function.arguments
fn = tc.get("function")
if isinstance(fn, dict):
fn = fn.copy()
args = fn.get("arguments")
if isinstance(args, str):
fn["arguments"] = normalize_tool_call_args(args)
tc["function"] = fn
# Ensure id exists
if "id" not in tc:
tc["id"] = f"call_{hash(str(tc)) % 10**10:010d}"
return tc
def normalize_tool_calls(tool_calls: List[dict]) -> List[dict]:
"""Normalize a list of tool calls."""
if not tool_calls:
return tool_calls
return [normalize_tool_call(tc) for tc in tool_calls if isinstance(tc, dict)]
def merge_split_tool_calls(messages: List[dict]) -> List[dict]:
"""Merge consecutive assistant messages with tool_calls into one.
Gemma 4 sometimes emits parallel tool calls as separate assistant
messages instead of one message with multiple tool_calls.
"""
if not messages:
return messages
merged = []
pending_tool_calls = []
pending_content = []
for msg in messages:
if not isinstance(msg, dict):
merged.append(msg)
continue
role = msg.get("role")
tool_calls = msg.get("tool_calls")
if role == "assistant" and tool_calls and isinstance(tool_calls, list):
# Accumulate tool calls from split messages
pending_tool_calls.extend(normalize_tool_calls(tool_calls))
content = msg.get("content", "")
if content:
pending_content.append(content)
else:
# Flush accumulated tool calls
if pending_tool_calls:
merged_msg = {
"role": "assistant",
"content": "\n".join(pending_content) if pending_content else "",
"tool_calls": pending_tool_calls,
}
merged.append(merged_msg)
pending_tool_calls = []
pending_content = []
merged.append(msg)
# Flush remaining
if pending_tool_calls:
merged_msg = {
"role": "assistant",
"content": "\n".join(pending_content) if pending_content else "",
"tool_calls": pending_tool_calls,
}
merged.append(merged_msg)
return merged
def normalize_messages_tool_calls(messages: List[dict]) -> List[dict]:
"""Full normalization pipeline for conversation messages.
1. Merge split tool_call messages
2. Normalize individual tool call arguments
"""
messages = merge_split_tool_calls(messages)
messages = _normalize_tool_calls_in_messages(messages)
return messages
def _normalize_tool_calls_in_messages(messages: List[dict]) -> List[dict]:
"""Normalize tool_calls within each message."""
result = []
for msg in messages:
if not isinstance(msg, dict):
result.append(msg)
continue
msg = msg.copy()
tool_calls = msg.get("tool_calls")
if isinstance(tool_calls, list) and tool_calls:
msg["tool_calls"] = normalize_tool_calls(tool_calls)
result.append(msg)
return result
def repair_json_fragment(fragment: str, prefix: str = "") -> Optional[str]:
"""Attempt to repair a JSON fragment from streaming.
Gemma 4 streaming may split JSON across chunks. This attempts to
reassemble valid JSON from fragments.
"""
if not fragment:
return None
candidate = prefix + fragment
# Try direct parse
try:
json.loads(candidate)
return candidate
except json.JSONDecodeError:
pass
# Try closing unclosed braces/brackets
open_braces = candidate.count('{') - candidate.count('}')
open_brackets = candidate.count('[') - candidate.count(']')
if open_braces > 0 or open_brackets > 0:
repaired = candidate + ('}' * open_braces) + (']' * open_brackets)
try:
json.loads(repaired)
return repaired
except json.JSONDecodeError:
pass
# Try removing incomplete trailing key/value
for i in range(len(candidate) - 1, max(0, len(candidate) - 50), -1):
if candidate[i] in (',', ':'):
repaired = candidate[:i]
if repaired.endswith(','):
repaired = repaired[:-1]
open_b = repaired.count('{') - repaired.count('}')
open_br = repaired.count('[') - repaired.count(']')
repaired += ('}' * open_b) + (']' * open_br)
try:
json.loads(repaired)
return repaired
except json.JSONDecodeError:
continue
return None

265
scripts/mcp_server.py Executable file
View File

@@ -0,0 +1,265 @@
#!/usr/bin/env python3
"""Hermes MCP Server — expose hermes-agent tools to fleet peers.
Runs as a standalone MCP server that other agents can connect to
and invoke hermes tools remotely.
Safe tools exposed:
- terminal (safe commands only)
- file_read, file_search
- web_search, web_extract
- session_search
NOT exposed (internal tools):
- approval, delegate, memory, config
Usage:
python -m tools.mcp_server --port 8081
hermes mcp-server --port 8081
python scripts/mcp_server.py --port 8081 --auth-key SECRET
"""
from __future__ import annotations
import argparse
import asyncio
import json
import logging
import os
import sys
import time
from pathlib import Path
from typing import Any, Dict, List, Optional
logger = logging.getLogger(__name__)
# Tools safe to expose to other agents
SAFE_TOOLS = {
"terminal": {
"name": "terminal",
"description": "Execute safe shell commands. Dangerous commands are blocked.",
"parameters": {
"type": "object",
"properties": {
"command": {"type": "string", "description": "Shell command to execute"},
},
"required": ["command"],
},
},
"file_read": {
"name": "file_read",
"description": "Read the contents of a file.",
"parameters": {
"type": "object",
"properties": {
"path": {"type": "string", "description": "File path to read"},
"offset": {"type": "integer", "description": "Start line", "default": 1},
"limit": {"type": "integer", "description": "Max lines", "default": 200},
},
"required": ["path"],
},
},
"file_search": {
"name": "file_search",
"description": "Search file contents using regex.",
"parameters": {
"type": "object",
"properties": {
"pattern": {"type": "string", "description": "Regex pattern"},
"path": {"type": "string", "description": "Directory to search", "default": "."},
},
"required": ["pattern"],
},
},
"web_search": {
"name": "web_search",
"description": "Search the web for information.",
"parameters": {
"type": "object",
"properties": {
"query": {"type": "string", "description": "Search query"},
},
"required": ["query"],
},
},
"session_search": {
"name": "session_search",
"description": "Search past conversation sessions.",
"parameters": {
"type": "object",
"properties": {
"query": {"type": "string", "description": "Search query"},
"limit": {"type": "integer", "description": "Max results", "default": 3},
},
"required": ["query"],
},
},
}
# Tools explicitly blocked
BLOCKED_TOOLS = {
"approval", "delegate", "memory", "config", "skill_install",
"mcp_tool", "cronjob", "tts", "send_message",
}
class MCPServer:
"""Simple MCP-compatible server for exposing hermes tools."""
def __init__(self, host: str = "127.0.0.1", port: int = 8081,
auth_key: Optional[str] = None):
self._host = host
self._port = port
self._auth_key = auth_key or os.getenv("MCP_AUTH_KEY", "")
async def handle_tools_list(self, request: dict) -> dict:
"""Return available tools."""
tools = list(SAFE_TOOLS.values())
return {"tools": tools}
async def handle_tools_call(self, request: dict) -> dict:
"""Execute a tool call."""
tool_name = request.get("name", "")
arguments = request.get("arguments", {})
if tool_name in BLOCKED_TOOLS:
return {"error": f"Tool '{tool_name}' is not exposed via MCP"}
if tool_name not in SAFE_TOOLS:
return {"error": f"Unknown tool: {tool_name}"}
try:
result = await self._execute_tool(tool_name, arguments)
return {"content": [{"type": "text", "text": str(result)}]}
except Exception as e:
return {"error": str(e)}
async def _execute_tool(self, tool_name: str, arguments: dict) -> str:
"""Execute a tool and return result."""
if tool_name == "terminal":
import subprocess
cmd = arguments.get("command", "")
# Block dangerous commands
from tools.approval import detect_dangerous_command
is_dangerous, _, desc = detect_dangerous_command(cmd)
if is_dangerous:
return f"BLOCKED: Dangerous command detected ({desc}). This tool only executes safe commands."
result = subprocess.run(cmd, shell=True, capture_output=True, text=True, timeout=30)
return result.stdout or result.stderr or "(no output)"
elif tool_name == "file_read":
path = arguments.get("path", "")
offset = arguments.get("offset", 1)
limit = arguments.get("limit", 200)
with open(path) as f:
lines = f.readlines()
return "".join(lines[offset-1:offset-1+limit])
elif tool_name == "file_search":
import re
pattern = arguments.get("pattern", "")
path = arguments.get("path", ".")
results = []
for p in Path(path).rglob("*.py"):
try:
content = p.read_text()
for i, line in enumerate(content.split("\n"), 1):
if re.search(pattern, line, re.IGNORECASE):
results.append(f"{p}:{i}: {line.strip()}")
if len(results) >= 20:
break
except Exception:
continue
if len(results) >= 20:
break
return "\n".join(results) or "No matches found"
elif tool_name == "web_search":
try:
from tools.web_tools import web_search
return web_search(arguments.get("query", ""))
except ImportError:
return "Web search not available"
elif tool_name == "session_search":
try:
from tools.session_search_tool import session_search
return session_search(
query=arguments.get("query", ""),
limit=arguments.get("limit", 3),
)
except ImportError:
return "Session search not available"
return f"Tool {tool_name} not implemented"
async def start_http(self):
"""Start HTTP server for MCP endpoints."""
try:
from aiohttp import web
except ImportError:
logger.error("aiohttp required: pip install aiohttp")
return
app = web.Application()
async def handle_tools_list_route(request):
if self._auth_key:
auth = request.headers.get("Authorization", "")
if auth != f"Bearer {self._auth_key}":
return web.json_response({"error": "Unauthorized"}, status=401)
result = await self.handle_tools_list({})
return web.json_response(result)
async def handle_tools_call_route(request):
if self._auth_key:
auth = request.headers.get("Authorization", "")
if auth != f"Bearer {self._auth_key}":
return web.json_response({"error": "Unauthorized"}, status=401)
body = await request.json()
result = await self.handle_tools_call(body)
return web.json_response(result)
async def handle_health(request):
return web.json_response({"status": "ok", "tools": len(SAFE_TOOLS)})
app.router.add_get("/mcp/tools", handle_tools_list_route)
app.router.add_post("/mcp/tools/call", handle_tools_call_route)
app.router.add_get("/health", handle_health)
runner = web.AppRunner(app)
await runner.setup()
site = web.TCPSite(runner, self._host, self._port)
await site.start()
logger.info("MCP server on http://%s:%s", self._host, self._port)
logger.info("Tools: %s", ", ".join(SAFE_TOOLS.keys()))
if self._auth_key:
logger.info("Auth: Bearer token required")
else:
logger.warning("Auth: No MCP_AUTH_KEY set — server is open")
try:
await asyncio.Event().wait()
except asyncio.CancelledError:
pass
finally:
await runner.cleanup()
def main():
parser = argparse.ArgumentParser(description="Hermes MCP Server")
parser.add_argument("--host", default="127.0.0.1")
parser.add_argument("--port", type=int, default=8081)
parser.add_argument("--auth-key", default=None, help="Bearer token for auth")
args = parser.parse_args()
logging.basicConfig(level=logging.INFO,
format="%(asctime)s [%(name)s] %(levelname)s: %(message)s")
server = MCPServer(host=args.host, port=args.port, auth_key=args.auth_key)
print(f"Starting MCP server on http://{args.host}:{args.port}")
print(f"Exposed tools: {', '.join(SAFE_TOOLS.keys())}")
asyncio.run(server.start_http())
if __name__ == "__main__":
main()

View File

@@ -1,106 +0,0 @@
"""Tests for Gemma 4 tool call normalizer."""
import json
import pytest
from agent.gemma4_tool_normalizer import (
normalize_tool_call_args,
normalize_tool_call,
normalize_tool_calls,
merge_split_tool_calls,
normalize_messages_tool_calls,
repair_json_fragment,
)
class TestNormalizeArgs:
def test_strips_whitespace(self):
result = normalize_tool_call_args(' \n {"path": "/tmp"} \n ')
assert json.loads(result) == {"path": "/tmp"}
def test_removes_trailing_comma(self):
result = normalize_tool_call_args('{"path": "/tmp",}')
assert json.loads(result) == {"path": "/tmp"}
def test_fixes_single_quotes(self):
result = normalize_tool_call_args("{'path': '/tmp'}")
parsed = json.loads(result)
assert parsed["path"] == "/tmp"
def test_wraps_bare_kv_pairs(self):
result = normalize_tool_call_args('"path": "/tmp", "mode": "read"')
parsed = json.loads(result)
assert parsed["path"] == "/tmp"
def test_valid_json_unchanged(self):
original = '{"command": "ls -la"}'
result = normalize_tool_call_args(original)
assert result == original
def test_empty_string(self):
assert normalize_tool_call_args("") == ""
def test_none_passthrough(self):
assert normalize_tool_call_args(None) is None
class TestNormalizeToolCall:
def test_normalizes_args(self):
tc = {
"id": "call_123",
"function": {"name": "execute_code", "arguments": ' {"code": "print(1)"} '}
}
result = normalize_tool_call(tc)
assert json.loads(result["function"]["arguments"]) == {"code": "print(1)"}
def test_adds_missing_id(self):
tc = {"function": {"name": "terminal", "arguments": '{"command":"ls"}'}}
result = normalize_tool_call(tc)
assert "id" in result
assert result["id"].startswith("call_")
class TestMergeSplitToolCalls:
def test_merges_consecutive_assistant_messages(self):
messages = [
{"role": "assistant", "content": "", "tool_calls": [{"id": "1", "function": {"name": "read_file", "arguments": '{"path":"a.py"}'}}]},
{"role": "assistant", "content": "", "tool_calls": [{"id": "2", "function": {"name": "read_file", "arguments": '{"path":"b.py"}'}}]},
{"role": "tool", "content": "file a content", "tool_call_id": "1"},
]
result = merge_split_tool_calls(messages)
# First message should have both tool calls merged
assert len(result[0]["tool_calls"]) == 2
assert len(result) == 2 # merged assistant + tool response
def test_non_consecutive_not_merged(self):
messages = [
{"role": "assistant", "content": "", "tool_calls": [{"id": "1", "function": {"name": "x", "arguments": "{}"}}]},
{"role": "tool", "content": "result", "tool_call_id": "1"},
{"role": "assistant", "content": "", "tool_calls": [{"id": "2", "function": {"name": "y", "arguments": "{}"}}]},
]
result = merge_split_tool_calls(messages)
assert len(result) == 3 # no merging across tool response
class TestRepairJson:
def test_repair_unclosed_brace(self):
result = repair_json_fragment('{"path": "/tmp"')
assert result is not None
assert json.loads(result) == {"path": "/tmp"}
def test_repair_unclosed_array(self):
result = repair_json_fragment('[1, 2, 3')
assert result is not None
assert json.loads(result) == [1, 2, 3]
def test_repair_trailing_key(self):
result = repair_json_fragment('{"a": 1, "b"')
assert result is not None
assert json.loads(result) == {"a": 1}
def test_valid_json_returned_unchanged(self):
original = '{"x": 1}'
assert repair_json_fragment(original) == original
def test_empty_returns_none(self):
assert repair_json_fragment("") is None