Builds on merged PR-1..7 (PR-8 in queue). Pure docs; no code.
What ships:
* docs/memory-plugins/README.md — contract overview, capability
negotiation, deployment models, replacement workflow
* docs/memory-plugins/testing-your-plugin.md — using the contract
test harness to validate wire compatibility, what the harness
DOES NOT cover (capability accuracy, TTL eviction, concurrency)
* docs/memory-plugins/pinecone-example/README.md — worked example
of a Pinecone-backed plugin: capability mapping (only embedding,
no FTS), wire mapping (memory → vector + metadata), production-
hardening checklist
Documentation strategy:
* Lead with what workspace-server takes care of (security perimeter,
redaction, ACL, GLOBAL audit, prompt-injection wrap) so plugin
authors don't reimplement those layers
* Show three deployment models (same machine / separate container /
self-managed) so operators see their topology
* Capability table makes it explicit what each capability gates so
a plugin that supports only one (e.g. semantic search) is still
a useful plugin
* Pinecone example is honest: shows the skeleton, the wire mapping,
and explicitly calls out what's MISSING from the sketch (batch
commits, TTL janitor, circuit breaker, metrics)
|
||
|---|---|---|
| .. | ||
| pinecone-example | ||
| README.md | ||
| testing-your-plugin.md | ||
Writing a Memory Plugin
This document is for operators and ecosystem authors who want to replace the built-in postgres-backed memory plugin (the default implementation that ships with workspace-server) with their own.
The contract was introduced by RFC #2728. The shipped binary is
cmd/memory-plugin-postgres/; reading its source is the fastest way
to see a complete reference implementation.
What the contract is
The plugin is an HTTP server that workspace-server talks to via the
OpenAPI v1 spec at docs/api-protocol/memory-plugin-v1.yaml.
Six endpoints:
| Endpoint | Method | Purpose |
|---|---|---|
/v1/health |
GET | Liveness probe + capability list |
/v1/namespaces/{name} |
PUT | Idempotent upsert |
/v1/namespaces/{name} |
PATCH | Update TTL or metadata |
/v1/namespaces/{name} |
DELETE | Remove namespace and its memories |
/v1/namespaces/{name}/memories |
POST | Write a memory |
/v1/search |
POST | Multi-namespace search |
/v1/memories/{id} |
DELETE | Forget a memory |
The wire types are defined in
workspace-server/internal/memory/contract/contract.go. Run-time
validation is built into the Go bindings via Validate() methods —
your plugin SHOULD perform equivalent validation.
What workspace-server takes care of
You do not implement these in the plugin; workspace-server is the security perimeter:
- Secret redaction (SAFE-T1201). All
contentyou receive is already scrubbed. Don't run additional redaction; it's pointless. - Namespace ACL. workspace-server intersects the caller's readable namespaces against the requested list before sending you the search request. The list you receive is authoritative.
- GLOBAL audit. Org-namespace writes are recorded in
activity_logsserver-side; you don't see them. - Prompt-injection wrap. Org memories returned to agents get a
[MEMORY id=... scope=ORG ns=...]:prefix added at the workspace-server layer. Yourcontentfield is plain text.
What you implement
- Storage of
memory_namespacesandmemory_records(or whatever shape you want — Pinecone vectors, an in-memory map, etc.) - The 7 endpoints above with the request/response shapes the spec defines
/v1/healthreporting your supported capabilities (see below)- Idempotency on namespace upsert (PUT semantics, not POST)
Capability negotiation
Your /v1/health response declares what features you support:
{
"status": "ok",
"version": "1.0.0",
"capabilities": ["embedding", "fts", "ttl", "pin", "propagation"]
}
| Capability | What it gates |
|---|---|
embedding |
Agents may ask for semantic search; you receive embedding: [...] in search bodies |
fts |
Agents may pass a query string; you decide how to match (FTS, ILIKE, regex) |
ttl |
Agents may set expires_at; you must not return expired rows |
pin |
Agents may set pin: true; you should rank pinned rows first |
propagation |
Agents may set propagation: {...}; you must store it as opaque JSON and return it on read |
A capability you DON'T list is fine — workspace-server adapts the MCP
tool surface to match. E.g., a Pinecone-only plugin that lists only
embedding will silently ignore agents' query strings.
Deployment models
Three common shapes:
-
Same machine, different process: workspace-server boots, then
MEMORY_PLUGIN_URL=http://localhost:9100points at your plugin running on a unix socket or localhost port. This is what the built-in postgres plugin does. -
Separate container: deploy your plugin as its own service on the private network. Set
MEMORY_PLUGIN_URLto its DNS name. -
Self-managed: customer-owned plugin running on customer-owned infrastructure, accessed over a tunnel. Same env-var wiring.
Auth is none — the plugin must be reachable only on a private network. workspace-server is the only sanctioned client.
Replacing the built-in plugin
- Apply PR-7's backfill to
copy
agent_memoriesinto your plugin's storage. - Stop workspace-server, point
MEMORY_PLUGIN_URLat your plugin, restart. - Existing data in the postgres plugin's tables is not auto- dropped — that's a deliberate safety property. Operator drops manually after they're confident they don't want to switch back.
If you switch back later, the old postgres tables come back into use (no data loss).
Worked examples
pinecone-example/— full Pinecone-backed plugintesting-your-plugin.md— running the contract test harness against your implementation
When to write one vs. fork the default
Fork the default postgres plugin if:
- You want different SQL (Materialized views? Different vector index?)
- You want extra auth on top
- You want server-side metrics emission
Write a fresh plugin if:
- The storage backend is fundamentally different (vector DB, KV store, in-memory, file-based)
- You're integrating an existing memory service (Letta, Mem0, etc.)
See also
- RFC #2728 — design rationale
cmd/memory-plugin-postgres/— reference implementationdocs/api-protocol/memory-plugin-v1.yaml— full OpenAPI spec