Skip to main content
Glama
googleapis

MCP Toolbox for Databases

by googleapis
neo4jexecutecypher.go6.58 kB
// Copyright 2025 Google LLC // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. package neo4jexecutecypher import ( "context" "fmt" "github.com/goccy/go-yaml" "github.com/googleapis/genai-toolbox/internal/sources" "github.com/googleapis/genai-toolbox/internal/tools" "github.com/googleapis/genai-toolbox/internal/tools/neo4j/neo4jexecutecypher/classifier" "github.com/googleapis/genai-toolbox/internal/tools/neo4j/neo4jschema/helpers" "github.com/googleapis/genai-toolbox/internal/util/parameters" "github.com/neo4j/neo4j-go-driver/v5/neo4j" ) const kind string = "neo4j-execute-cypher" func init() { if !tools.Register(kind, newConfig) { panic(fmt.Sprintf("tool kind %q already registered", kind)) } } func newConfig(ctx context.Context, name string, decoder *yaml.Decoder) (tools.ToolConfig, error) { actual := Config{Name: name} if err := decoder.DecodeContext(ctx, &actual); err != nil { return nil, err } return actual, nil } type compatibleSource interface { Neo4jDriver() neo4j.DriverWithContext Neo4jDatabase() string } type Config struct { Name string `yaml:"name" validate:"required"` Kind string `yaml:"kind" validate:"required"` Source string `yaml:"source" validate:"required"` Description string `yaml:"description" validate:"required"` ReadOnly bool `yaml:"readOnly"` AuthRequired []string `yaml:"authRequired"` } // validate interface var _ tools.ToolConfig = Config{} func (cfg Config) ToolConfigKind() string { return kind } func (cfg Config) Initialize(srcs map[string]sources.Source) (tools.Tool, error) { cypherParameter := parameters.NewStringParameter("cypher", "The cypher to execute.") dryRunParameter := parameters.NewBooleanParameterWithDefault( "dry_run", false, "If set to true, the query will be validated and information about the execution "+ "will be returned without running the query. Defaults to false.", ) params := parameters.Parameters{cypherParameter, dryRunParameter} mcpManifest := tools.GetMcpManifest(cfg.Name, cfg.Description, cfg.AuthRequired, params, nil) // finish tool setup t := Tool{ Config: cfg, Parameters: params, classifier: classifier.NewQueryClassifier(), manifest: tools.Manifest{Description: cfg.Description, Parameters: params.Manifest(), AuthRequired: cfg.AuthRequired}, mcpManifest: mcpManifest, } return t, nil } // validate interface var _ tools.Tool = Tool{} type Tool struct { Config Parameters parameters.Parameters `yaml:"parameters"` classifier *classifier.QueryClassifier manifest tools.Manifest mcpManifest tools.McpManifest } func (t Tool) Invoke(ctx context.Context, resourceMgr tools.SourceProvider, params parameters.ParamValues, accessToken tools.AccessToken) (any, error) { source, err := tools.GetCompatibleSource[compatibleSource](resourceMgr, t.Source, t.Name, t.Kind) if err != nil { return nil, err } paramsMap := params.AsMap() cypherStr, ok := paramsMap["cypher"].(string) if !ok { return nil, fmt.Errorf("unable to cast cypher parameter %s", paramsMap["cypher"]) } if cypherStr == "" { return nil, fmt.Errorf("parameter 'cypher' must be a non-empty string") } dryRun, ok := paramsMap["dry_run"].(bool) if !ok { return nil, fmt.Errorf("unable to cast dry_run parameter %s", paramsMap["dry_run"]) } // validate the cypher query before executing cf := t.classifier.Classify(cypherStr) if cf.Error != nil { return nil, cf.Error } if cf.Type == classifier.WriteQuery && t.ReadOnly { return nil, fmt.Errorf("this tool is read-only and cannot execute write queries") } if dryRun { // Add EXPLAIN to the beginning of the query to validate it without executing cypherStr = "EXPLAIN " + cypherStr } config := neo4j.ExecuteQueryWithDatabase(source.Neo4jDatabase()) results, err := neo4j.ExecuteQuery(ctx, source.Neo4jDriver(), cypherStr, nil, neo4j.EagerResultTransformer, config) if err != nil { return nil, fmt.Errorf("unable to execute query: %w", err) } // If dry run, return the summary information only if dryRun { summary := results.Summary plan := summary.Plan() execPlan := map[string]any{ "queryType": cf.Type.String(), "statementType": summary.StatementType(), "operator": plan.Operator(), "arguments": plan.Arguments(), "identifiers": plan.Identifiers(), "childrenCount": len(plan.Children()), } if len(plan.Children()) > 0 { execPlan["children"] = addPlanChildren(plan) } return []map[string]any{execPlan}, nil } var out []any keys := results.Keys records := results.Records for _, record := range records { vMap := make(map[string]any) for col, value := range record.Values { vMap[keys[col]] = helpers.ConvertValue(value) } out = append(out, vMap) } return out, nil } func (t Tool) ParseParams(data map[string]any, claimsMap map[string]map[string]any) (parameters.ParamValues, error) { return parameters.ParseParams(t.Parameters, data, claimsMap) } func (t Tool) Manifest() tools.Manifest { return t.manifest } func (t Tool) McpManifest() tools.McpManifest { return t.mcpManifest } func (t Tool) Authorized(verifiedAuthServices []string) bool { return tools.IsAuthorized(t.AuthRequired, verifiedAuthServices) } func (t Tool) RequiresClientAuthorization(resourceMgr tools.SourceProvider) (bool, error) { return false, nil } // Recursive function to add plan children func addPlanChildren(p neo4j.Plan) []map[string]any { var children []map[string]any for _, child := range p.Children() { childMap := map[string]any{ "operator": child.Operator(), "arguments": child.Arguments(), "identifiers": child.Identifiers(), "children_count": len(child.Children()), } if len(child.Children()) > 0 { childMap["children"] = addPlanChildren(child) } children = append(children, childMap) } return children } func (t Tool) ToConfig() tools.ToolConfig { return t.Config } func (t Tool) GetAuthTokenHeaderName(resourceMgr tools.SourceProvider) (string, error) { return "Authorization", nil }

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/googleapis/genai-toolbox'

If you have feedback or need assistance with the MCP directory API, please join our Discord server