molecule-core/workspace-server/internal/handlers/channels.go
Hongming Wang d8026347e5 chore: open-source restructure — rename dirs, remove internal files, scrub secrets
Renames:
- platform/ → workspace-server/ (Go module path stays as "platform" for
  external dep compat — will update after plugin module republish)
- workspace-template/ → workspace/

Removed (moved to separate repos or deleted):
- PLAN.md — internal roadmap (move to private project board)
- HANDOFF.md, AGENTS.md — one-time internal session docs
- .claude/ — gitignored entirely (local agent config)
- infra/cloudflare-worker/ → Molecule-AI/molecule-tenant-proxy
- org-templates/molecule-dev/ → standalone template repo
- .mcp-eval/ → molecule-mcp-server repo
- test-results/ — ephemeral, gitignored

Security scrubbing:
- Cloudflare account/zone/KV IDs → placeholders
- Real EC2 IPs → <EC2_IP> in all docs
- CF token prefix, Neon project ID, Fly app names → redacted
- Langfuse dev credentials → parameterized
- Personal runner username/machine name → generic

Community files:
- CONTRIBUTING.md — build, test, branch conventions
- CODE_OF_CONDUCT.md — Contributor Covenant 2.1

All Dockerfiles, CI workflows, docker-compose, railway.toml, render.yaml,
README, CLAUDE.md updated for new directory names.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-04-18 00:24:44 -07:00

624 lines
21 KiB
Go

package handlers
import (
"bytes"
"context"
"crypto/ed25519"
"crypto/subtle"
"database/sql"
"encoding/hex"
"encoding/json"
"io"
"log"
"net/http"
"os"
"regexp"
"strings"
"github.com/gin-gonic/gin"
"github.com/Molecule-AI/molecule-monorepo/platform/internal/channels"
"github.com/Molecule-AI/molecule-monorepo/platform/internal/db"
)
// ChannelHandler manages workspace social channel integrations.
type ChannelHandler struct {
manager *channels.Manager
}
// NewChannelHandler creates a channel handler with the given manager.
func NewChannelHandler(manager *channels.Manager) *ChannelHandler {
return &ChannelHandler{manager: manager}
}
// ListAdapters returns all available channel adapter types.
func (h *ChannelHandler) ListAdapters(c *gin.Context) {
c.JSON(http.StatusOK, channels.ListAdapters())
}
// List returns all channels for a workspace.
func (h *ChannelHandler) List(c *gin.Context) {
workspaceID := c.Param("id")
ctx := c.Request.Context()
rows, err := db.DB.QueryContext(ctx, `
SELECT id, workspace_id, channel_type, channel_config, enabled, allowed_users,
last_message_at, message_count, created_at, updated_at
FROM workspace_channels WHERE workspace_id = $1
ORDER BY created_at
`, workspaceID)
if err != nil {
c.JSON(http.StatusInternalServerError, gin.H{"error": "query failed"})
return
}
defer rows.Close()
result := make([]map[string]interface{}, 0)
for rows.Next() {
var id, wsID, chType string
var configJSON, allowedJSON []byte
var enabled bool
var lastMsg sql.NullTime
var msgCount int
var createdAt, updatedAt sql.NullTime
if err := rows.Scan(&id, &wsID, &chType, &configJSON, &enabled, &allowedJSON, &lastMsg, &msgCount, &createdAt, &updatedAt); err != nil {
continue
}
var config map[string]interface{}
json.Unmarshal(configJSON, &config)
// #319: decrypt sensitive fields first so the mask operates on
// plaintext (first-4 / last-4 of the real token, not the ciphertext
// prefix). Decrypt errors are logged but non-fatal — List must keep
// returning the rest of the channel even if one field is corrupt.
if err := channels.DecryptSensitiveFields(config); err != nil {
log.Printf("Channels: decrypt config on list for channel %s: %v", id, err)
}
// Mask bot_token in list response
if _, ok := config["bot_token"]; ok {
token, _ := config["bot_token"].(string)
if len(token) > 8 {
config["bot_token"] = token[:4] + "..." + token[len(token)-4:]
} else {
config["bot_token"] = "***"
}
}
var allowed []string
json.Unmarshal(allowedJSON, &allowed)
entry := map[string]interface{}{
"id": id,
"workspace_id": wsID,
"channel_type": chType,
"config": config,
"enabled": enabled,
"allowed_users": allowed,
"message_count": msgCount,
"created_at": createdAt.Time,
"updated_at": updatedAt.Time,
}
if lastMsg.Valid {
entry["last_message_at"] = lastMsg.Time
}
result = append(result, entry)
}
c.JSON(http.StatusOK, result)
}
// Create adds a new channel to a workspace.
func (h *ChannelHandler) Create(c *gin.Context) {
workspaceID := c.Param("id")
ctx := c.Request.Context()
var body struct {
ChannelType string `json:"channel_type"`
Config map[string]interface{} `json:"config"`
AllowedUsers []string `json:"allowed_users"`
Enabled *bool `json:"enabled"`
}
if err := c.ShouldBindJSON(&body); err != nil {
c.JSON(http.StatusBadRequest, gin.H{"error": "invalid JSON"})
return
}
if body.ChannelType == "" {
c.JSON(http.StatusBadRequest, gin.H{"error": "channel_type is required"})
return
}
adapter, ok := channels.GetAdapter(body.ChannelType)
if !ok {
c.JSON(http.StatusBadRequest, gin.H{"error": "unsupported channel_type: " + body.ChannelType})
return
}
if err := adapter.ValidateConfig(body.Config); err != nil {
c.JSON(http.StatusBadRequest, gin.H{"error": "invalid config: " + err.Error()})
return
}
// #319: encrypt sensitive fields (bot_token, webhook_secret) before
// persisting so a DB read/backup leak can't recover the credentials.
// Validation above ran against plaintext; storage is ciphertext.
if err := channels.EncryptSensitiveFields(body.Config); err != nil {
log.Printf("Channels: encrypt config failed for workspace %s: %v", workspaceID, err)
c.JSON(http.StatusInternalServerError, gin.H{"error": "encrypt failed"})
return
}
configJSON, _ := json.Marshal(body.Config)
allowedJSON, _ := json.Marshal(body.AllowedUsers)
enabled := true
if body.Enabled != nil {
enabled = *body.Enabled
}
var id string
err := db.DB.QueryRowContext(ctx, `
INSERT INTO workspace_channels (workspace_id, channel_type, channel_config, enabled, allowed_users)
VALUES ($1, $2, $3::jsonb, $4, $5::jsonb)
RETURNING id
`, workspaceID, body.ChannelType, string(configJSON), enabled, string(allowedJSON)).Scan(&id)
if err != nil {
log.Printf("Channels: create failed for workspace %s: %v", workspaceID, err)
c.JSON(http.StatusInternalServerError, gin.H{"error": "failed to create channel"})
return
}
// Hot reload
h.manager.Reload(ctx)
c.JSON(http.StatusCreated, gin.H{
"id": id,
"channel_type": body.ChannelType,
"enabled": enabled,
})
}
// Update modifies a channel's config, allowlist, or enabled state.
func (h *ChannelHandler) Update(c *gin.Context) {
workspaceID := c.Param("id")
channelID := c.Param("channelId")
ctx := c.Request.Context()
var body struct {
Config map[string]interface{} `json:"config"`
AllowedUsers []string `json:"allowed_users"`
Enabled *bool `json:"enabled"`
}
if err := c.ShouldBindJSON(&body); err != nil {
c.JSON(http.StatusBadRequest, gin.H{"error": "invalid JSON"})
return
}
// COALESCE-based update
var configArg, allowedArg interface{}
if body.Config != nil {
// #319: re-encrypt sensitive fields on every config update — the
// PATCH body carries plaintext (client already had them plaintext in
// List response's unmasked path or typed fresh).
if err := channels.EncryptSensitiveFields(body.Config); err != nil {
log.Printf("Channels: encrypt update for workspace %s: %v", workspaceID, err)
c.JSON(http.StatusInternalServerError, gin.H{"error": "encrypt failed"})
return
}
j, _ := json.Marshal(body.Config)
configArg = string(j)
}
if body.AllowedUsers != nil {
j, _ := json.Marshal(body.AllowedUsers)
allowedArg = string(j)
}
result, err := db.DB.ExecContext(ctx, `
UPDATE workspace_channels
SET channel_config = COALESCE($3::jsonb, channel_config),
allowed_users = COALESCE($4::jsonb, allowed_users),
enabled = COALESCE($5, enabled),
updated_at = now()
WHERE id = $1 AND workspace_id = $2
`, channelID, workspaceID, configArg, allowedArg, body.Enabled)
if err != nil {
c.JSON(http.StatusInternalServerError, gin.H{"error": "update failed"})
return
}
if n, _ := result.RowsAffected(); n == 0 {
c.JSON(http.StatusNotFound, gin.H{"error": "channel not found"})
return
}
// Hot reload
h.manager.Reload(ctx)
c.JSON(http.StatusOK, gin.H{"status": "updated"})
}
// Delete removes a channel from a workspace.
func (h *ChannelHandler) Delete(c *gin.Context) {
workspaceID := c.Param("id")
channelID := c.Param("channelId")
ctx := c.Request.Context()
result, err := db.DB.ExecContext(ctx, `
DELETE FROM workspace_channels WHERE id = $1 AND workspace_id = $2
`, channelID, workspaceID)
if err != nil {
c.JSON(http.StatusInternalServerError, gin.H{"error": "delete failed"})
return
}
if n, _ := result.RowsAffected(); n == 0 {
c.JSON(http.StatusNotFound, gin.H{"error": "channel not found"})
return
}
// Hot reload
h.manager.Reload(ctx)
c.JSON(http.StatusOK, gin.H{"status": "deleted"})
}
// Send sends an outbound message from a workspace to its social channel.
func (h *ChannelHandler) Send(c *gin.Context) {
channelID := c.Param("channelId")
ctx := c.Request.Context()
var body struct {
Text string `json:"text"`
}
if err := c.ShouldBindJSON(&body); err != nil || body.Text == "" {
c.JSON(http.StatusBadRequest, gin.H{"error": "text is required"})
return
}
// Per-channel budget enforcement (#368).
// Reads message_count and channel_budget in one query. If channel_budget IS
// NOT NULL and message_count has already reached it, reject with 429.
// DB errors are logged and treated as fail-open (budget not enforced) so a
// transient DB hiccup doesn't silently block outbound messages.
var msgCount int
var budget sql.NullInt64
if err := db.DB.QueryRowContext(ctx,
`SELECT message_count, channel_budget FROM workspace_channels WHERE id = $1`,
channelID,
).Scan(&msgCount, &budget); err != nil && err != sql.ErrNoRows {
log.Printf("Channels: budget check failed for channel %s: %v", channelID, err)
}
if budget.Valid && int64(msgCount) >= budget.Int64 {
c.JSON(http.StatusTooManyRequests, gin.H{"error": "channel budget exceeded"})
return
}
if err := h.manager.SendOutbound(ctx, channelID, body.Text); err != nil {
c.JSON(http.StatusInternalServerError, gin.H{"error": err.Error()})
return
}
c.JSON(http.StatusOK, gin.H{"status": "sent"})
}
// Test sends a test message to verify the channel is working.
func (h *ChannelHandler) Test(c *gin.Context) {
channelID := c.Param("channelId")
ctx := c.Request.Context()
if err := h.manager.SendOutbound(ctx, channelID, "🔔 Molecule AI channel test — connection successful!"); err != nil {
c.JSON(http.StatusInternalServerError, gin.H{"error": err.Error()})
return
}
c.JSON(http.StatusOK, gin.H{"status": "ok", "message": "test message sent"})
}
// matchesChatID returns true if chatID is in the channel's comma-separated chat_id list.
// Exact match — avoids the substring-match bug of SQL LIKE.
func matchesChatID(config map[string]interface{}, chatID string) bool {
raw, _ := config["chat_id"].(string)
if raw == "" {
return false
}
for _, s := range strings.Split(raw, ",") {
if strings.TrimSpace(s) == chatID {
return true
}
}
return false
}
// Discover auto-detects chats/groups a bot has been added to by calling the platform API.
// User flow: enter bot token → add bot to groups → send a message → click Detect → select groups.
func (h *ChannelHandler) Discover(c *gin.Context) {
var body struct {
ChannelType string `json:"channel_type"`
BotToken string `json:"bot_token"`
WorkspaceID string `json:"workspace_id"`
}
if err := c.ShouldBindJSON(&body); err != nil || body.BotToken == "" {
c.JSON(http.StatusBadRequest, gin.H{"error": "bot_token is required"})
return
}
// #329: workspace_id is required so PausePollersForToken can scope the
// decryption lookup to the caller's tenant. Legacy clients that omit
// the field still work — they just won't be able to pause a previously-
// saved poller sharing the same token, which fails loudly at Telegram
// with a 409 Conflict rather than silently decrypting every tenant's
// token.
if body.WorkspaceID == "" {
c.JSON(http.StatusBadRequest, gin.H{"error": "workspace_id is required"})
return
}
adapter, ok := channels.GetAdapter(body.ChannelType)
if !ok {
c.JSON(http.StatusBadRequest, gin.H{"error": "unsupported channel_type"})
return
}
// Only Telegram supports discovery currently
tg, ok := adapter.(*channels.TelegramAdapter)
if !ok {
c.JSON(http.StatusBadRequest, gin.H{"error": "discovery not supported for " + body.ChannelType})
return
}
// Pause any active poller in THIS workspace using this bot token to
// avoid Telegram's "only one getUpdates at a time" 409 Conflict.
// #329: scoped to workspace_id so we never decrypt other tenants' tokens.
resumeFn := h.manager.PausePollersForToken(body.WorkspaceID, body.BotToken)
defer resumeFn()
result, err := tg.DiscoverChats(c.Request.Context(), body.BotToken)
if err != nil {
// Map known errors to user-friendly messages
msg := err.Error()
userMsg := "Failed to connect to Telegram. Check your bot token and try again."
if strings.Contains(msg, "invalid bot token") || strings.Contains(msg, "Unauthorized") || strings.Contains(msg, "Not Found") {
userMsg = "Invalid bot token. Check the token from @BotFather and try again."
} else if strings.Contains(msg, "Conflict") || strings.Contains(msg, "terminated by other") {
userMsg = "This bot is already connected to another channel. Disconnect the existing channel first, or wait 30 seconds and retry."
} else if strings.Contains(msg, "no route to host") || strings.Contains(msg, "i/o timeout") {
userMsg = "Cannot reach Telegram API. Check your network connection and try again."
}
log.Printf("Channels: discover error: %v", err)
c.JSON(http.StatusBadRequest, gin.H{"error": userMsg})
return
}
hint := "For groups: add bot and send a message. For DMs: send /start to the bot. Then retry."
var warning string
if !result.CanReadAllGroupMessages {
warning = "⚠️ Group privacy mode is ON for this bot — it only sees commands and @mentions in groups. " +
"To let it see all group messages: open @BotFather → /mybots → " + result.BotUsername +
" → Bot Settings → Group Privacy → Turn off, then re-add the bot to the group."
}
c.JSON(http.StatusOK, gin.H{
"bot_username": result.BotUsername,
"chats": result.Chats,
"can_read_all_group_messages": result.CanReadAllGroupMessages,
"privacy_warning": warning,
"hint": hint,
})
}
// Webhook handles incoming webhooks from any social platform.
func (h *ChannelHandler) Webhook(c *gin.Context) {
channelType := c.Param("type")
ctx := c.Request.Context()
adapter, ok := channels.GetAdapter(channelType)
if !ok {
c.JSON(http.StatusNotFound, gin.H{"error": "unknown channel type"})
return
}
// Discord: verify Ed25519 signature BEFORE the body is consumed by ParseWebhook.
// The app_public_key is the Discord application's public key (not a secret —
// it's a PUBLIC key and therefore stored in plaintext in channel_config).
// We look it up from the DB (first enabled Discord channel with the field set)
// and fall back to the DISCORD_APP_PUBLIC_KEY env var for self-hosted setups
// that prefer global configuration. Fail closed: no key configured → 401.
// verifyDiscordSignature restores r.Body after reading so ParseWebhook below
// can still read the payload.
if channelType == "discord" {
pubKey := discordPublicKey(ctx)
if pubKey == "" || !verifyDiscordSignature(c.Request, pubKey) {
c.JSON(http.StatusUnauthorized, gin.H{"error": "invalid signature"})
return
}
}
// For webhooks, we need to find the channel by type and match by chat_id in the message
// Parse the webhook first to get the chat_id
msg, err := adapter.ParseWebhook(c, nil)
if err != nil {
c.JSON(http.StatusBadRequest, gin.H{"error": "parse error: " + err.Error()})
return
}
if msg == nil {
c.JSON(http.StatusOK, gin.H{"status": "ignored"}) // Non-message update
return
}
// [slug] routing: if the message starts with [word], extract it as
// a target agent slug and match against the channel config's username
// field (lowercased). This lets humans type "[backend] what's #800?"
// in a shared channel and route to a specific agent.
targetSlug := ""
routedText := msg.Text
validSlugRe := regexp.MustCompile(`^[a-zA-Z0-9 _-]+$`)
if len(msg.Text) > 2 && msg.Text[0] == '[' {
if idx := strings.Index(msg.Text, "]"); idx > 1 && idx < 40 {
candidate := strings.ToLower(strings.TrimSpace(msg.Text[1:idx]))
if validSlugRe.MatchString(candidate) {
targetSlug = candidate
routedText = strings.TrimSpace(msg.Text[idx+1:])
if routedText == "" {
routedText = msg.Text
}
}
}
}
// Look up channels by type and find one whose chat_id list contains msg.ChatID.
rows, err := db.DB.QueryContext(ctx, `
SELECT id, workspace_id, channel_type, channel_config, enabled, allowed_users
FROM workspace_channels
WHERE channel_type = $1 AND enabled = true
`, channelType)
if err != nil {
c.JSON(http.StatusInternalServerError, gin.H{"error": "channel lookup failed"})
return
}
defer rows.Close()
var ch channels.ChannelRow
var candidates []channels.ChannelRow
found := false
for rows.Next() {
var row channels.ChannelRow
var configJSON, allowedJSON []byte
if err := rows.Scan(&row.ID, &row.WorkspaceID, &row.ChannelType, &configJSON, &row.Enabled, &allowedJSON); err != nil {
continue
}
json.Unmarshal(configJSON, &row.Config)
json.Unmarshal(allowedJSON, &row.AllowedUsers)
if err := channels.DecryptSensitiveFields(row.Config); err != nil {
log.Printf("Channels: decrypt webhook row %s: %v", row.ID, err)
continue
}
if expectedSecret, _ := row.Config["webhook_secret"].(string); expectedSecret != "" {
receivedSecret := c.GetHeader("X-Telegram-Bot-Api-Secret-Token")
if subtle.ConstantTimeCompare([]byte(receivedSecret), []byte(expectedSecret)) != 1 {
continue
}
}
if matchesChatID(row.Config, msg.ChatID) {
candidates = append(candidates, row)
}
}
if targetSlug != "" {
// [slug] routing — match against config username (lowercased)
for _, row := range candidates {
username, _ := row.Config["username"].(string)
usernameLC := strings.ToLower(username)
// Match: [backend] → "Backend Engineer", [pm] → "PM", [dev lead] → "Dev Lead"
if usernameLC == targetSlug ||
strings.HasPrefix(strings.ReplaceAll(usernameLC, " ", "-"), targetSlug) ||
strings.HasPrefix(strings.ReplaceAll(usernameLC, " ", ""), targetSlug) {
ch = row
found = true
msg.Text = routedText // Strip the [slug] prefix before routing
break
}
}
if !found {
// No match for slug — respond with available agents
var names []string
for _, row := range candidates {
if u, _ := row.Config["username"].(string); u != "" {
names = append(names, "["+strings.ToLower(strings.ReplaceAll(u, " ", "-"))+"]")
}
}
c.JSON(http.StatusOK, gin.H{
"status": "unknown_agent",
"requested_slug": targetSlug,
"available_slugs": names,
})
return
}
} else if len(candidates) > 0 {
// No [slug] prefix — route to first matching channel (backward compat)
ch = candidates[0]
found = true
}
if !found {
c.JSON(http.StatusOK, gin.H{"status": "no_channel"})
return
}
// Process asynchronously — don't block the webhook response
go func() {
bgCtx := context.Background()
if err := h.manager.HandleInbound(bgCtx, ch, msg); err != nil {
log.Printf("Channels: async HandleInbound error for workspace %s: %v", ch.WorkspaceID[:12], err)
}
}()
c.JSON(http.StatusOK, gin.H{"status": "accepted"})
}
// discordPublicKey returns the Ed25519 public key to use for Discord request
// signature verification. It queries the DB for the first enabled Discord
// channel whose config contains a non-empty app_public_key (stored in
// plaintext — it is a PUBLIC key and is not in the sensitiveFields list),
// then falls back to the DISCORD_APP_PUBLIC_KEY environment variable.
//
// Returns "" when no key is configured, which causes the caller to reject
// the incoming request with 401 (fail-closed behaviour).
func discordPublicKey(ctx context.Context) string {
var pubKey string
row := db.DB.QueryRowContext(ctx, `
SELECT COALESCE(channel_config->>'app_public_key', '')
FROM workspace_channels
WHERE channel_type = 'discord' AND enabled = true
AND channel_config->>'app_public_key' IS NOT NULL
AND channel_config->>'app_public_key' != ''
LIMIT 1
`)
_ = row.Scan(&pubKey)
if pubKey != "" {
return pubKey
}
return os.Getenv("DISCORD_APP_PUBLIC_KEY")
}
// verifyDiscordSignature verifies a Discord Interactions request using the
// Ed25519 signature scheme described in Discord's Interactions documentation.
// Discord signs the concatenation of the X-Signature-Timestamp header and the
// raw request body with the application's private key; we verify with the
// public key stored in channel_config or DISCORD_APP_PUBLIC_KEY.
//
// The function reads r.Body in full and then replaces it with a bytes.Reader
// over the same bytes so that subsequent callers (adapter.ParseWebhook) can
// still read the body.
//
// Returns false when any required header is missing, when pubKeyHex cannot
// be hex-decoded to a 32-byte Ed25519 public key, when the signature header
// cannot be decoded, or when the Ed25519 verification itself fails.
func verifyDiscordSignature(r *http.Request, pubKeyHex string) bool {
sig := r.Header.Get("X-Signature-Ed25519")
ts := r.Header.Get("X-Signature-Timestamp")
if sig == "" || ts == "" || pubKeyHex == "" {
return false
}
pubKeyBytes, err := hex.DecodeString(pubKeyHex)
if err != nil || len(pubKeyBytes) != ed25519.PublicKeySize {
return false
}
body, err := io.ReadAll(r.Body)
if err != nil {
return false
}
// Restore body so adapter.ParseWebhook can read it.
r.Body = io.NopCloser(bytes.NewReader(body))
sigBytes, err := hex.DecodeString(sig)
if err != nil {
return false
}
msg := append([]byte(ts), body...)
return ed25519.Verify(pubKeyBytes, msg, sigBytes)
}