本文暂时显示英文原文,中文翻译正在进行中。翻译完成后将自动更新。
原文链接:English Version
Gateway Internals
The messaging gateway is the long-running process that connects Hermes to 14+ external messaging platforms through a unified architecture.
Key Files
| File | Purpose |
|---|---|
gateway/run.py | GatewayRunner — main loop, slash commands, message dispatch (~7,500 lines) |
gateway/session.py | SessionStore — conversation persistence and session key construction |
gateway/delivery.py | Outbound message delivery to target platforms/channels |
gateway/pairing.py | DM pairing flow for user authorization |
gateway/channel_directory.py | Maps chat IDs to human-readable names for cron delivery |
gateway/hooks.py | Hook discovery, loading, and lifecycle event dispatch |
gateway/mirror.py | Cross-session message mirroring for send_message |
gateway/status.py | Token lock management for profile-scoped gateway instances |
gateway/builtin_hooks/ | Always-registered hooks (e.g., BOOT.md system prompt hook) |
gateway/platforms/ | Platform adapters (one per messaging platform) |
Architecture Overview
┌─────────────────────────────────────────────────┐
│ GatewayRunner │
│ │
│ ┌──────────┐ ┌──────────┐ ┌──────────┐ │
│ │ Telegram │ │ Discord │ │ Slack │ ... │
│ │ Adapter │ │ Adapter │ │ Adapter │ │
│ └─────┬─────┘ └─────┬────┘ └─────┬────┘ │
│ │ │ │ │
│ └──────────────┼──────────────┘ │
│ ▼ │
│ _handle_message() │
│ │ │
│ ┌────────────┼────────────┐ │
│ ▼ ▼ ▼ │
│ Slash command AIAgent Queue/BG │
│ dispatch creation sessions │
│ │ │
│ ▼ │
│ SessionStore │
│ (SQLite persistence) │
└─────────────────────────────────────────────────┘
Message Flow
When a message arrives from any platform:
- Platform adapter receives raw event, normalizes it into a
MessageEvent - Base adapter checks active session guard:
- If agent is running for this session → queue message, set interrupt event
- If
/approve,/deny,/stop→ bypass guard (dispatched inline)
- GatewayRunner._handle_message() receives the event:
- Resolve session key via
_session_key_for_source()(format:agent:main:{platform}:{chat_type}:{chat_id}) - Check authorization (see Authorization below)
- Check if it's a slash command → dispatch to command handler
- Check if agent is already running → intercept commands like
/stop,/status - Otherwise → create
AIAgentinstance and run conversation
- Resolve session key via
- Response is sent back through the platform adapter
Session Key Format
Session keys encode the full routing context:
agent:main:{platform}:{chat_type}:{chat_id}
For example: agent:main:telegram:private:123456789
Thread-aware platforms (Telegram forum topics, Discord threads, Slack threads) may include thread IDs in the chat_id portion. Never construct session keys manually — always use build_session_key() from gateway/session.py.
Two-Level Message Guard
When an agent is actively running, incoming messages pass through two sequential guards:
-
Level 1 — Base adapter (
gateway/platforms/base.py): Checks_active_sessions. If the session is active, queues the message in_pending_messagesand sets an interrupt event. This catches messages before they reach the gateway runner. -
Level 2 — Gateway runner (
gateway/run.py): Checks_running_agents. Intercepts specific commands (/stop,/new,/queue,/status,/approve,/deny) and routes them appropriately. Everything else triggersrunning_agent.interrupt().
Commands that must reach the runner while the agent is blocked (like /approve) are dispatched inline via await self._message_handler(event) — they bypass the background task system to avoid race conditions.
Authorization
The gateway uses a multi-layer authorization check, evaluated in order:
- Per-platform allow-all flag (e.g.,
TELEGRAM_ALLOW_ALL_USERS) — if set, all users on that platform are authorized - Platform allowlist (e.g.,
TELEGRAM_ALLOWED_USERS) — comma-separated user IDs - DM pairing — authenticated users can pair new users via a pairing code
- Global allow-all (
GATEWAY_ALLOW_ALL_USERS) — if set, all users across all platforms are authorized - Default: deny — unauthorized users are rejected
DM Pairing Flow
Admin: /pair
Gateway: "Pairing code: ABC123. Share with the user."
New user: ABC123
Gateway: "Paired! You're now authorized."
Pairing state is persisted in gateway/pairing.py and survives restarts.
Slash Command Dispatch
All slash commands in the gateway flow through the same resolution pipeline:
resolve_command()fromhermes_cli/commands.pymaps input to canonical name (handles aliases, prefix matching)- The canonical name is checked against
GATEWAY_KNOWN_COMMANDS - Handler in
_handle_message()dispatches based on canonical name - Some commands are gated on config (
gateway_config_gateonCommandDef)
Running-Agent Guard
Commands that must NOT execute while the agent is processing are rejected early:
if _quick_key in self._running_agents:
if canonical == "model":
return "⏳ Agent is running — wait for it to finish or /stop first."
Bypass commands (/stop, /new, /approve, /deny, /queue, /status) have special handling.
Config Sources
The gateway reads configuration from multiple sources:
| Source | What it provides |
|---|---|
~/.hermes/.env | API keys, bot tokens, platform credentials |
~/.hermes/config.yaml | Model settings, tool configuration, display options |
| Environment variables | Override any of the above |
Unlike the CLI (which uses load_cli_config() with hardcoded defaults), the gateway reads config.yaml directly via YAML loader. This means config keys that exist in the CLI's defaults dict but not in the user's config file may behave differently between CLI and gateway.
Platform Adapters
Each messaging platform has an adapter in gateway/platforms/:
gateway/platforms/
├── base.py # BaseAdapter — shared logic for all platforms
├── telegram.py # Telegram Bot API (long polling or webhook)
├── discord.py # Discord bot via discord.py
├── slack.py # Slack Socket Mode
├── whatsapp.py # WhatsApp Business Cloud API
├── signal.py # Signal via signal-cli REST API
├── matrix.py # Matrix via matrix-nio (optional E2EE)
├── mattermost.py # Mattermost WebSocket API
├── email.py # Email via IMAP/SMTP
├── sms.py # SMS via Twilio
├── dingtalk.py # DingTalk WebSocket
├── feishu.py # Feishu/Lark WebSocket or webhook
├── wecom.py # WeCom (WeChat Work) callback
├── webhook.py # Inbound/outbound webhook adapter
├── api_server.py # REST API server adapter
└── homeassistant.py # Home Assistant conversation integration
Adapters implement a common interface:
connect()/disconnect()— lifecycle managementsend_message()— outbound message deliveryon_message()— inbound message normalization →MessageEvent
Token Locks
Adapters that connect with unique credentials call acquire_scoped_lock() in connect() and release_scoped_lock() in disconnect(). This prevents two profiles from using the same bot token simultaneously.
Delivery Path
Outgoing deliveries (gateway/delivery.py) handle:
- Direct reply — send response back to the originating chat
- Home channel delivery — route cron job outputs and background results to a configured home channel
- Explicit target delivery —
send_messagetool specifyingtelegram:-1001234567890 - Cross-platform delivery — deliver to a different platform than the originating message
Cron job deliveries are NOT mirrored into gateway session history — they live in their own cron session only. This is a deliberate design choice to avoid message alternation violations.
Hooks
Gateway hooks are Python modules that respond to lifecycle events:
Gateway Hook Events
| Event | When fired |
|---|---|
gateway:startup | Gateway process starts |
session:start | New conversation session begins |
session:end | Session completes or times out |
session:reset | User resets session with /new |
agent:start | Agent begins processing a message |
agent:step | Agent completes one tool-calling iteration |
agent:end | Agent finishes and returns response |
command:* | Any slash command is executed |
Hooks are discovered from gateway/builtin_hooks/ (always active) and ~/.hermes/hooks/ (user-installed). Each hook is a directory with a HOOK.yaml manifest and handler.py.
Memory Provider Integration
When a memory provider plugin (e.g., Honcho) is enabled:
- Gateway creates an
AIAgentper message with the session ID - The
MemoryManagerinitializes the provider with the session context - Provider tools (e.g.,
honcho_profile,viking_search) are routed through:
AIAgent._invoke_tool()
→ self._memory_manager.handle_tool_call(name, args)
→ provider.handle_tool_call(name, args)
- On session end/reset,
on_session_end()fires for cleanup and final data flush
Memory Flush Lifecycle
When a session is reset, resumed, or expires:
- Built-in memories are flushed to disk
- Memory provider's
on_session_end()hook fires - A temporary
AIAgentruns a memory-only conversation turn - Context is then discarded or archived
Background Maintenance
The gateway runs periodic maintenance alongside message handling:
- Cron ticking — checks job schedules and fires due jobs
- Session expiry — cleans up abandoned sessions after timeout
- Memory flush — proactively flushes memory before session expiry
- Cache refresh — refreshes model lists and provider status
Process Management
The gateway runs as a long-lived process, managed via:
hermes gateway start/hermes gateway stop— manual controlsystemctl(Linux) orlaunchctl(macOS) — service management- PID file at
~/.hermes/gateway.pid— profile-scoped process tracking
Profile-scoped vs global: start_gateway() uses profile-scoped PID files. hermes gateway stop stops only the current profile's gateway. hermes gateway stop --all uses global ps aux scanning to kill all gateway processes (used during updates).