Renames: - platform/ → workspace-server/ (Go module path stays as "platform" for external dep compat — will update after plugin module republish) - workspace-template/ → workspace/ Removed (moved to separate repos or deleted): - PLAN.md — internal roadmap (move to private project board) - HANDOFF.md, AGENTS.md — one-time internal session docs - .claude/ — gitignored entirely (local agent config) - infra/cloudflare-worker/ → Molecule-AI/molecule-tenant-proxy - org-templates/molecule-dev/ → standalone template repo - .mcp-eval/ → molecule-mcp-server repo - test-results/ — ephemeral, gitignored Security scrubbing: - Cloudflare account/zone/KV IDs → placeholders - Real EC2 IPs → <EC2_IP> in all docs - CF token prefix, Neon project ID, Fly app names → redacted - Langfuse dev credentials → parameterized - Personal runner username/machine name → generic Community files: - CONTRIBUTING.md — build, test, branch conventions - CODE_OF_CONDUCT.md — Contributor Covenant 2.1 All Dockerfiles, CI workflows, docker-compose, railway.toml, render.yaml, README, CLAUDE.md updated for new directory names. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
137 lines
3.9 KiB
Go
137 lines
3.9 KiB
Go
package handlers
|
|
|
|
import (
|
|
"fmt"
|
|
"log"
|
|
"net/http"
|
|
"strconv"
|
|
"time"
|
|
|
|
"github.com/Molecule-AI/molecule-monorepo/platform/internal/db"
|
|
"github.com/Molecule-AI/molecule-monorepo/platform/internal/wsauth"
|
|
"github.com/gin-gonic/gin"
|
|
)
|
|
|
|
// TokenHandler exposes user-facing token management for workspaces.
|
|
// Routes: GET/POST/DELETE /workspaces/:id/tokens (behind WorkspaceAuth).
|
|
type TokenHandler struct{}
|
|
|
|
func NewTokenHandler() *TokenHandler {
|
|
return &TokenHandler{}
|
|
}
|
|
|
|
type tokenListItem struct {
|
|
ID string `json:"id"`
|
|
Prefix string `json:"prefix"`
|
|
CreatedAt time.Time `json:"created_at"`
|
|
LastUsed *time.Time `json:"last_used_at"`
|
|
}
|
|
|
|
// List returns non-revoked tokens for the workspace (prefix + metadata only,
|
|
// never the plaintext or hash).
|
|
func (h *TokenHandler) List(c *gin.Context) {
|
|
workspaceID := c.Param("id")
|
|
|
|
limit := 50
|
|
if v := c.Query("limit"); v != "" {
|
|
if n, err := strconv.Atoi(v); err == nil && n > 0 && n <= 200 {
|
|
limit = n
|
|
}
|
|
}
|
|
offset := 0
|
|
if v := c.Query("offset"); v != "" {
|
|
if n, err := strconv.Atoi(v); err == nil && n >= 0 {
|
|
offset = n
|
|
}
|
|
}
|
|
|
|
rows, err := db.DB.QueryContext(c.Request.Context(), `
|
|
SELECT id, prefix, created_at, last_used_at
|
|
FROM workspace_auth_tokens
|
|
WHERE workspace_id = $1 AND revoked_at IS NULL
|
|
ORDER BY created_at DESC
|
|
LIMIT $2 OFFSET $3
|
|
`, workspaceID, limit, offset)
|
|
if err != nil {
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": "failed to list tokens"})
|
|
return
|
|
}
|
|
defer rows.Close()
|
|
|
|
tokens := []tokenListItem{}
|
|
for rows.Next() {
|
|
var t tokenListItem
|
|
if err := rows.Scan(&t.ID, &t.Prefix, &t.CreatedAt, &t.LastUsed); err != nil {
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": "failed to scan token"})
|
|
return
|
|
}
|
|
tokens = append(tokens, t)
|
|
}
|
|
|
|
c.JSON(http.StatusOK, gin.H{
|
|
"tokens": tokens,
|
|
"count": len(tokens),
|
|
})
|
|
}
|
|
|
|
// maxTokensPerWorkspace prevents unbounded token creation. 50 is generous —
|
|
// most workspaces need 1-3 tokens (primary + rotation spare).
|
|
const maxTokensPerWorkspace = 50
|
|
|
|
// Create mints a new token for the workspace. The plaintext is returned
|
|
// exactly once in the response — it cannot be recovered afterwards.
|
|
func (h *TokenHandler) Create(c *gin.Context) {
|
|
workspaceID := c.Param("id")
|
|
|
|
// Rate limit: max active tokens per workspace
|
|
var count int
|
|
db.DB.QueryRowContext(c.Request.Context(),
|
|
`SELECT COUNT(*) FROM workspace_auth_tokens WHERE workspace_id = $1 AND revoked_at IS NULL`,
|
|
workspaceID).Scan(&count)
|
|
if count >= maxTokensPerWorkspace {
|
|
c.JSON(http.StatusTooManyRequests, gin.H{"error": fmt.Sprintf("maximum %d active tokens per workspace", maxTokensPerWorkspace)})
|
|
return
|
|
}
|
|
|
|
token, err := wsauth.IssueToken(c.Request.Context(), db.DB, workspaceID)
|
|
if err != nil {
|
|
log.Printf("tokens: issue failed for %s: %v", workspaceID, err)
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": "failed to create token"})
|
|
return
|
|
}
|
|
|
|
log.Printf("tokens: issued new token for workspace %s", workspaceID)
|
|
|
|
c.JSON(http.StatusCreated, gin.H{
|
|
"auth_token": token,
|
|
"workspace_id": workspaceID,
|
|
"message": "Save this token now — it cannot be retrieved again.",
|
|
})
|
|
}
|
|
|
|
// Revoke invalidates a specific token by ID. The token ID is the database
|
|
// row ID visible from List, not the plaintext token itself.
|
|
func (h *TokenHandler) Revoke(c *gin.Context) {
|
|
workspaceID := c.Param("id")
|
|
tokenID := c.Param("tokenId")
|
|
|
|
result, err := db.DB.ExecContext(c.Request.Context(), `
|
|
UPDATE workspace_auth_tokens
|
|
SET revoked_at = now()
|
|
WHERE id = $1 AND workspace_id = $2 AND revoked_at IS NULL
|
|
`, tokenID, workspaceID)
|
|
if err != nil {
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": "failed to revoke token"})
|
|
return
|
|
}
|
|
|
|
rows, _ := result.RowsAffected()
|
|
if rows == 0 {
|
|
c.JSON(http.StatusNotFound, gin.H{"error": "token not found or already revoked"})
|
|
return
|
|
}
|
|
|
|
log.Printf("tokens: revoked token %s for workspace %s", tokenID, workspaceID)
|
|
c.JSON(http.StatusOK, gin.H{"status": "revoked"})
|
|
}
|