molecule-core/workspace-server/internal/handlers/transcript_test.go
Hongming Wang 479a027e4b chore: open-source restructure — rename dirs, remove internal files, scrub secrets
Renames:
- platform/ → workspace-server/ (Go module path stays as "platform" for
  external dep compat — will update after plugin module republish)
- workspace-template/ → workspace/

Removed (moved to separate repos or deleted):
- PLAN.md — internal roadmap (move to private project board)
- HANDOFF.md, AGENTS.md — one-time internal session docs
- .claude/ — gitignored entirely (local agent config)
- infra/cloudflare-worker/ → Molecule-AI/molecule-tenant-proxy
- org-templates/molecule-dev/ → standalone template repo
- .mcp-eval/ → molecule-mcp-server repo
- test-results/ — ephemeral, gitignored

Security scrubbing:
- Cloudflare account/zone/KV IDs → placeholders
- Real EC2 IPs → <EC2_IP> in all docs
- CF token prefix, Neon project ID, Fly app names → redacted
- Langfuse dev credentials → parameterized
- Personal runner username/machine name → generic

Community files:
- CONTRIBUTING.md — build, test, branch conventions
- CODE_OF_CONDUCT.md — Contributor Covenant 2.1

All Dockerfiles, CI workflows, docker-compose, railway.toml, render.yaml,
README, CLAUDE.md updated for new directory names.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-04-18 00:24:44 -07:00

345 lines
12 KiB
Go

package handlers
import (
"database/sql"
"encoding/json"
"net/http"
"net/http/httptest"
"net/url"
"testing"
"github.com/DATA-DOG/go-sqlmock"
"github.com/gin-gonic/gin"
)
// urlParse is a tiny wrapper so table-driven tests can keep their lines short.
func urlParse(s string) (*url.URL, error) { return url.Parse(s) }
// expectWorkspaceURLLookup programs the sqlmock to answer the SELECT that
// TranscriptHandler.Get issues for `agent_card->>'url'`. Tests call this
// instead of inserting real rows (we use sqlmock — there's no DB).
//
// Returns the workspace ID as the handler's :id path param.
func expectWorkspaceURLLookup(mock sqlmock.Sqlmock, agentURL string) string {
id := "11111111-2222-3333-4444-555555555555"
mock.ExpectQuery("SELECT agent_card->>'url' FROM workspaces WHERE id = \\$1").
WithArgs(id).
WillReturnRows(sqlmock.NewRows([]string{"url"}).AddRow(agentURL))
return id
}
// ==================== GET /workspaces/:id/transcript ====================
func TestTranscript_WorkspaceNotFound(t *testing.T) {
mock := setupTestDB(t)
setupTestRedis(t)
h := NewTranscriptHandler()
mock.ExpectQuery("SELECT agent_card->>'url' FROM workspaces WHERE id = \\$1").
WithArgs("00000000-0000-0000-0000-000000000000").
WillReturnError(sql.ErrNoRows)
w := httptest.NewRecorder()
c, _ := gin.CreateTestContext(w)
c.Params = gin.Params{{Key: "id", Value: "00000000-0000-0000-0000-000000000000"}}
c.Request = httptest.NewRequest("GET", "/workspaces/00000000-0000-0000-0000-000000000000/transcript", nil)
h.Get(c)
if w.Code != http.StatusNotFound {
t.Errorf("expected 404, got %d: %s", w.Code, w.Body.String())
}
}
func TestTranscript_ProxyForwardsAndReturnsBody(t *testing.T) {
mock := setupTestDB(t)
setupTestRedis(t)
h := NewTranscriptHandler()
// Spin up a fake "workspace" agent that returns a canned transcript
gotPath := ""
stub := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
gotPath = r.URL.Path
w.Header().Set("Content-Type", "application/json")
_, _ = w.Write([]byte(`{"runtime":"claude-code","supported":true,"lines":[{"type":"user"}],"cursor":1,"more":false}`))
}))
defer stub.Close()
wsID := expectWorkspaceURLLookup(mock,stub.URL)
w := httptest.NewRecorder()
c, _ := gin.CreateTestContext(w)
c.Params = gin.Params{{Key: "id", Value: wsID}}
c.Request = httptest.NewRequest("GET", "/workspaces/"+wsID+"/transcript?since=5&limit=20", nil)
h.Get(c)
if w.Code != http.StatusOK {
t.Fatalf("expected 200, got %d: %s", w.Code, w.Body.String())
}
if gotPath != "/transcript" {
t.Errorf("expected proxy to hit /transcript, got %q", gotPath)
}
var resp map[string]interface{}
if err := json.Unmarshal(w.Body.Bytes(), &resp); err != nil {
t.Fatalf("response not JSON: %v", err)
}
if resp["runtime"] != "claude-code" {
t.Errorf("expected runtime=claude-code, got %v", resp["runtime"])
}
if lines, ok := resp["lines"].([]interface{}); !ok || len(lines) != 1 {
t.Errorf("expected 1 line, got %v", resp["lines"])
}
}
func TestTranscript_ProxyPropagatesAllowlistedQueryParams(t *testing.T) {
mock := setupTestDB(t)
setupTestRedis(t)
h := NewTranscriptHandler()
gotQuery := ""
stub := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
gotQuery = r.URL.RawQuery
w.Write([]byte(`{}`))
}))
defer stub.Close()
wsID := expectWorkspaceURLLookup(mock,stub.URL)
w := httptest.NewRecorder()
c, _ := gin.CreateTestContext(w)
c.Params = gin.Params{{Key: "id", Value: wsID}}
c.Request = httptest.NewRequest("GET", "/workspaces/"+wsID+"/transcript?since=42&limit=7&secret=leak&cmd=rm", nil)
h.Get(c)
// url.Values.Encode() sorts alphabetically — limit before since.
// Crucially: secret + cmd are dropped (not in the allowlist).
if gotQuery != "limit=7&since=42" {
t.Errorf("expected only allowlisted since/limit forwarded, got %q", gotQuery)
}
}
// SSRF regression tests — see issue #272. agent_card->>'url' is attacker-
// writable via /registry/register so validateWorkspaceURL must reject
// link-local / cloud-metadata / non-http(s) targets before the outbound
// HTTP call fires.
func TestTranscript_RejectsCloudMetadataIP(t *testing.T) {
mock := setupTestDB(t)
setupTestRedis(t)
h := NewTranscriptHandler()
wsID := expectWorkspaceURLLookup(mock,"http://169.254.169.254/")
w := httptest.NewRecorder()
c, _ := gin.CreateTestContext(w)
c.Params = gin.Params{{Key: "id", Value: wsID}}
c.Request = httptest.NewRequest("GET", "/workspaces/"+wsID+"/transcript", nil)
h.Get(c)
if w.Code != http.StatusBadRequest {
t.Errorf("expected 400 for IMDS target, got %d: %s", w.Code, w.Body.String())
}
}
func TestTranscript_RejectsNonHTTPScheme(t *testing.T) {
mock := setupTestDB(t)
setupTestRedis(t)
h := NewTranscriptHandler()
wsID := expectWorkspaceURLLookup(mock,"file:///etc/passwd")
w := httptest.NewRecorder()
c, _ := gin.CreateTestContext(w)
c.Params = gin.Params{{Key: "id", Value: wsID}}
c.Request = httptest.NewRequest("GET", "/workspaces/"+wsID+"/transcript", nil)
h.Get(c)
if w.Code != http.StatusBadRequest {
t.Errorf("expected 400 for file:// scheme, got %d: %s", w.Code, w.Body.String())
}
}
func TestTranscript_RejectsMetadataHostname(t *testing.T) {
mock := setupTestDB(t)
setupTestRedis(t)
h := NewTranscriptHandler()
wsID := expectWorkspaceURLLookup(mock,"http://metadata.google.internal/computeMetadata/v1/")
w := httptest.NewRecorder()
c, _ := gin.CreateTestContext(w)
c.Params = gin.Params{{Key: "id", Value: wsID}}
c.Request = httptest.NewRequest("GET", "/workspaces/"+wsID+"/transcript", nil)
h.Get(c)
if w.Code != http.StatusBadRequest {
t.Errorf("expected 400 for metadata hostname, got %d: %s", w.Code, w.Body.String())
}
}
func TestTranscript_RejectsLinkLocalIPv6(t *testing.T) {
mock := setupTestDB(t)
setupTestRedis(t)
h := NewTranscriptHandler()
wsID := expectWorkspaceURLLookup(mock,"http://[fe80::1]/")
w := httptest.NewRecorder()
c, _ := gin.CreateTestContext(w)
c.Params = gin.Params{{Key: "id", Value: wsID}}
c.Request = httptest.NewRequest("GET", "/workspaces/"+wsID+"/transcript", nil)
h.Get(c)
if w.Code != http.StatusBadRequest {
t.Errorf("expected 400 for link-local IPv6, got %d: %s", w.Code, w.Body.String())
}
}
// validateWorkspaceURL unit tests — pure function, no DB/Redis needed.
func TestValidateWorkspaceURL(t *testing.T) {
cases := []struct {
name string
raw string
wantErr bool
}{
{"http localhost allowed (dev)", "http://127.0.0.1:8000", false},
{"https public allowed", "https://agent.example.com", false},
{"docker internal allowed", "http://host.docker.internal:8000", false},
{"IMDS IP rejected", "http://169.254.169.254", true},
{"GCP metadata hostname rejected", "http://metadata.google.internal", true},
{"Azure metadata rejected", "http://metadata.azure.com", true},
{"file scheme rejected", "file:///etc/passwd", true},
{"gopher rejected", "gopher://internal:70/", true},
{"IPv6 link-local rejected", "http://[fe80::1]", true},
{"IPv4 link-local multicast rejected", "http://224.0.0.1", true},
}
for _, tc := range cases {
t.Run(tc.name, func(t *testing.T) {
u, parseErr := urlParse(tc.raw)
if parseErr != nil && !tc.wantErr {
t.Fatalf("parse error: %v", parseErr)
}
if parseErr != nil {
return // unparseable URLs are rejected upstream; not this function's job
}
err := validateWorkspaceURL(u)
if tc.wantErr && err == nil {
t.Errorf("expected error for %q, got nil", tc.raw)
}
if !tc.wantErr && err != nil {
t.Errorf("expected OK for %q, got %v", tc.raw, err)
}
})
}
}
func TestTranscript_UnreachableWorkspaceReturns502(t *testing.T) {
mock := setupTestDB(t)
setupTestRedis(t)
h := NewTranscriptHandler()
wsID := expectWorkspaceURLLookup(mock,"http://127.0.0.1:1") // refused
w := httptest.NewRecorder()
c, _ := gin.CreateTestContext(w)
c.Params = gin.Params{{Key: "id", Value: wsID}}
c.Request = httptest.NewRequest("GET", "/workspaces/"+wsID+"/transcript", nil)
h.Get(c)
if w.Code != http.StatusBadGateway {
t.Errorf("expected 502, got %d: %s", w.Code, w.Body.String())
}
}
// TestTranscript_ForwardsAuthHeader is a regression guard for the fix where
// TranscriptHandler.Get was not forwarding the Authorization header to the
// workspace's /transcript endpoint (QA finding 2026-04-16).
//
// The workspace's /transcript endpoint (secured by #287/#328) requires a valid
// `Authorization: Bearer <token>` header — it fails-closed when the header
// is absent. The platform's WorkspaceAuth middleware validates the token before
// the handler runs; forwarding it to the workspace is correct and safe.
//
// Fix applied: after constructing the outbound request, the handler now calls
// req.Header.Set("Authorization", c.GetHeader("Authorization"))
// This test verifies the fix and acts as a regression guard.
func TestTranscript_ForwardsAuthHeader(t *testing.T) {
mock := setupTestDB(t)
setupTestRedis(t)
h := NewTranscriptHandler()
const testToken = "Bearer test-workspace-token-abc123"
var receivedAuth string
stub := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
receivedAuth = r.Header.Get("Authorization")
// Simulate the workspace's #328 fail-closed behaviour: reject missing auth.
if receivedAuth == "" {
w.WriteHeader(http.StatusUnauthorized)
_, _ = w.Write([]byte(`{"error":"unauthorized"}`))
return
}
w.Header().Set("Content-Type", "application/json")
_, _ = w.Write([]byte(`{"runtime":"claude-code","supported":true,"lines":[],"cursor":0,"more":false}`))
}))
defer stub.Close()
wsID := expectWorkspaceURLLookup(mock, stub.URL)
w := httptest.NewRecorder()
c, _ := gin.CreateTestContext(w)
c.Params = gin.Params{{Key: "id", Value: wsID}}
// Simulate a request that has already passed WorkspaceAuth middleware —
// the bearer token is present and valid on the incoming request.
req := httptest.NewRequest("GET", "/workspaces/"+wsID+"/transcript", nil)
req.Header.Set("Authorization", testToken)
c.Request = req
h.Get(c)
// The proxy must forward the bearer token so the workspace accepts the call.
if receivedAuth == "" {
t.Error("TranscriptHandler did not forward Authorization header — workspace would return 401")
}
if receivedAuth != testToken {
t.Errorf("Authorization header mismatch: forwarded %q, want %q", receivedAuth, testToken)
}
if w.Code == http.StatusUnauthorized {
t.Errorf("workspace returned 401: transcript proxy did not authenticate; auth forwarded: %q", receivedAuth)
}
if w.Code != http.StatusOK {
t.Errorf("expected 200, got %d: %s", w.Code, w.Body.String())
}
}
// TestTranscript_NoAuthHeader_PassesThrough verifies that a request with no
// Authorization header (e.g. unauthenticated local-dev call that somehow
// bypassed WorkspaceAuth) results in no Authorization header on the upstream
// request. The workspace will return 401 in this case, which the proxy
// faithfully relays — no silent upgrade of privilege.
func TestTranscript_NoAuthHeader_PassesThrough(t *testing.T) {
mock := setupTestDB(t)
setupTestRedis(t)
h := NewTranscriptHandler()
var receivedAuth string
stub := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
receivedAuth = r.Header.Get("Authorization")
if receivedAuth == "" {
w.WriteHeader(http.StatusUnauthorized)
_, _ = w.Write([]byte(`{"error":"unauthorized"}`))
return
}
w.Header().Set("Content-Type", "application/json")
_, _ = w.Write([]byte(`{"runtime":"claude-code","supported":true,"lines":[]}`))
}))
defer stub.Close()
wsID := expectWorkspaceURLLookup(mock, stub.URL)
w := httptest.NewRecorder()
c, _ := gin.CreateTestContext(w)
c.Params = gin.Params{{Key: "id", Value: wsID}}
// No Authorization header on the request.
c.Request = httptest.NewRequest("GET", "/workspaces/"+wsID+"/transcript", nil)
h.Get(c)
// Without a token the workspace returns 401; the proxy must relay it faithfully.
if receivedAuth != "" {
t.Errorf("expected no Authorization forwarded to workspace, got %q", receivedAuth)
}
if w.Code != http.StatusUnauthorized {
t.Errorf("expected proxy to relay workspace 401, got %d: %s", w.Code, w.Body.String())
}
}