Renames: - platform/ → workspace-server/ (Go module path stays as "platform" for external dep compat — will update after plugin module republish) - workspace-template/ → workspace/ Removed (moved to separate repos or deleted): - PLAN.md — internal roadmap (move to private project board) - HANDOFF.md, AGENTS.md — one-time internal session docs - .claude/ — gitignored entirely (local agent config) - infra/cloudflare-worker/ → Molecule-AI/molecule-tenant-proxy - org-templates/molecule-dev/ → standalone template repo - .mcp-eval/ → molecule-mcp-server repo - test-results/ — ephemeral, gitignored Security scrubbing: - Cloudflare account/zone/KV IDs → placeholders - Real EC2 IPs → <EC2_IP> in all docs - CF token prefix, Neon project ID, Fly app names → redacted - Langfuse dev credentials → parameterized - Personal runner username/machine name → generic Community files: - CONTRIBUTING.md — build, test, branch conventions - CODE_OF_CONDUCT.md — Contributor Covenant 2.1 All Dockerfiles, CI workflows, docker-compose, railway.toml, render.yaml, README, CLAUDE.md updated for new directory names. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
146 lines
4.2 KiB
Go
146 lines
4.2 KiB
Go
package bundle
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"strings"
|
|
|
|
"github.com/Molecule-AI/molecule-monorepo/platform/internal/db"
|
|
"github.com/Molecule-AI/molecule-monorepo/platform/internal/events"
|
|
"github.com/Molecule-AI/molecule-monorepo/platform/internal/provisioner"
|
|
"github.com/google/uuid"
|
|
)
|
|
|
|
// ImportResult tracks the outcome of importing a bundle tree.
|
|
type ImportResult struct {
|
|
WorkspaceID string `json:"workspace_id"`
|
|
Name string `json:"name"`
|
|
Status string `json:"status"` // "provisioning" or "failed"
|
|
Error string `json:"error,omitempty"`
|
|
Children []ImportResult `json:"children,omitempty"`
|
|
}
|
|
|
|
// Import provisions a workspace tree from a Bundle.
|
|
// It creates workspace records, writes config files to a temp dir, and triggers the provisioner.
|
|
func Import(
|
|
ctx context.Context,
|
|
b *Bundle,
|
|
parentID *string,
|
|
broadcaster *events.Broadcaster,
|
|
prov *provisioner.Provisioner,
|
|
platformURL string,
|
|
) ImportResult {
|
|
// Generate fresh workspace ID
|
|
wsID := uuid.New().String()
|
|
|
|
result := ImportResult{
|
|
WorkspaceID: wsID,
|
|
Name: b.Name,
|
|
Status: "provisioning",
|
|
}
|
|
|
|
// Create workspace record
|
|
_, err := db.DB.ExecContext(ctx, `
|
|
INSERT INTO workspaces (id, name, role, tier, status, parent_id, source_bundle_id)
|
|
VALUES ($1, $2, $3, $4, 'provisioning', $5, $6)
|
|
`, wsID, b.Name, nilIfEmpty(b.Description), b.Tier, parentID, b.ID)
|
|
if err != nil {
|
|
result.Status = "failed"
|
|
result.Error = fmt.Sprintf("failed to create workspace record: %v", err)
|
|
return result
|
|
}
|
|
|
|
broadcaster.RecordAndBroadcast(ctx, "WORKSPACE_PROVISIONING", wsID, map[string]interface{}{
|
|
"name": b.Name,
|
|
"tier": b.Tier,
|
|
"source_bundle_id": b.ID,
|
|
})
|
|
|
|
// Build config files in memory for the provisioner
|
|
configFiles := buildBundleConfigFiles(b)
|
|
|
|
// Extract runtime from config.yaml in the bundle
|
|
bundleRuntime := "langgraph"
|
|
if configYaml, ok := b.Prompts["config.yaml"]; ok {
|
|
for _, line := range strings.Split(configYaml, "\n") {
|
|
line = strings.TrimSpace(line)
|
|
if strings.HasPrefix(line, "runtime:") {
|
|
bundleRuntime = strings.TrimSpace(strings.TrimPrefix(line, "runtime:"))
|
|
break
|
|
}
|
|
}
|
|
}
|
|
// Store runtime in DB
|
|
db.DB.ExecContext(ctx, `UPDATE workspaces SET runtime = $1 WHERE id = $2`, bundleRuntime, wsID)
|
|
|
|
// Provision the container if provisioner is available
|
|
if prov != nil {
|
|
cfg := provisioner.WorkspaceConfig{
|
|
WorkspaceID: wsID,
|
|
ConfigFiles: configFiles,
|
|
Tier: b.Tier,
|
|
Runtime: bundleRuntime,
|
|
EnvVars: map[string]string{},
|
|
PlatformURL: platformURL,
|
|
// PluginsPath set by caller if available
|
|
}
|
|
go func() {
|
|
provCtx, cancel := context.WithTimeout(context.Background(), provisioner.ProvisionTimeout)
|
|
defer cancel()
|
|
url, err := prov.Start(provCtx, cfg)
|
|
if err != nil {
|
|
markFailed(provCtx, wsID, broadcaster, err)
|
|
} else if url != "" {
|
|
db.DB.ExecContext(provCtx, `UPDATE workspaces SET url = $1 WHERE id = $2`, url, wsID)
|
|
}
|
|
}()
|
|
}
|
|
|
|
// Recursively import sub-workspaces
|
|
for _, sub := range b.SubWorkspaces {
|
|
childResult := Import(ctx, &sub, &wsID, broadcaster, prov, platformURL)
|
|
result.Children = append(result.Children, childResult)
|
|
}
|
|
|
|
return result
|
|
}
|
|
|
|
// buildBundleConfigFiles builds a map of config files from a bundle for writing into a container volume.
|
|
func buildBundleConfigFiles(b *Bundle) map[string][]byte {
|
|
files := make(map[string][]byte)
|
|
|
|
// Write system-prompt.md
|
|
if b.SystemPrompt != "" {
|
|
files["system-prompt.md"] = []byte(b.SystemPrompt)
|
|
}
|
|
|
|
// Write config.yaml from prompts if present
|
|
if configYaml, ok := b.Prompts["config.yaml"]; ok {
|
|
files["config.yaml"] = []byte(configYaml)
|
|
}
|
|
|
|
// Write skills
|
|
for _, skill := range b.Skills {
|
|
for relPath, content := range skill.Files {
|
|
files[fmt.Sprintf("skills/%s/%s", skill.ID, relPath)] = []byte(content)
|
|
}
|
|
}
|
|
|
|
return files
|
|
}
|
|
|
|
func markFailed(ctx context.Context, wsID string, broadcaster *events.Broadcaster, err error) {
|
|
db.DB.ExecContext(ctx,
|
|
`UPDATE workspaces SET status = 'failed', updated_at = now() WHERE id = $1`, wsID)
|
|
broadcaster.RecordAndBroadcast(ctx, "WORKSPACE_PROVISION_FAILED", wsID, map[string]interface{}{
|
|
"error": err.Error(),
|
|
})
|
|
}
|
|
|
|
func nilIfEmpty(s string) interface{} {
|
|
if s == "" {
|
|
return nil
|
|
}
|
|
return s
|
|
}
|