feat(matrix-bridge-dagi): harden mixed rooms with safe defaults and ops visibility (M2.2)

Guard rails (mixed_routing.py):
  - MAX_AGENTS_PER_MIXED_ROOM (default 5): fail-fast at parse time
  - MAX_SLASH_LEN (default 32): reject garbage/injection slash tokens
  - Unified rejection reasons: unknown_agent, slash_too_long, no_mapping
  - REASON_REJECTED_* constants (separate from success REASON_*)

Ingress (ingress.py):
  - per-room-agent concurrency semaphore (MIXED_CONCURRENCY_CAP, default 1)
  - active_lock_count property for /health + prometheus
  - UNKNOWN_AGENT_BEHAVIOR: "ignore" (silent) | "reply_error" (inform user)
  - on_routed(agent_id, reason) callback for routing metrics
  - on_route_rejected(room_id, reason) callback for rejection metrics
  - matrix.route.rejected audit event on every rejection

Config + main:
  - max_agents_per_mixed_room, max_slash_len, unknown_agent_behavior, mixed_concurrency_cap
  - matrix_bridge_routed_total{agent_id, reason} counter
  - matrix_bridge_route_rejected_total{room_id, reason} counter
  - matrix_bridge_active_room_agent_locks gauge
  - /health: mixed_guard_rails section + total_agents_in_mixed_rooms
  - docker-compose: all 4 new guard rail env vars

Runbook: section 9 — mixed room debug guide (6 acceptance tests, routing metrics, session isolation, lock hang, config guard)

Tests: 108 pass (94 → 108, +14 new tests for guard rails + callbacks + concurrency)
Made-with: Cursor
This commit is contained in:
Apple
2026-03-05 01:41:20 -08:00
parent a85a11984b
commit d40b1e87c6
8 changed files with 576 additions and 21 deletions

View File

@@ -60,6 +60,16 @@ services:
# "!roomX:server=helion;!roomY:server=druid"
- BRIDGE_MIXED_DEFAULTS=${BRIDGE_MIXED_DEFAULTS:-}
# ── M2.2: Mixed room guard rails ────────────────────────────────────
# Fail-fast if any room defines more agents than this
- MAX_AGENTS_PER_MIXED_ROOM=${MAX_AGENTS_PER_MIXED_ROOM:-5}
# Reject slash commands longer than this (anti-garbage / injection guard)
- MAX_SLASH_LEN=${MAX_SLASH_LEN:-32}
# What to do when unknown /slash is used: "ignore" (silent) | "reply_error" (inform user)
- UNKNOWN_AGENT_BEHAVIOR=${UNKNOWN_AGENT_BEHAVIOR:-ignore}
# Max concurrent Router invocations per (room, agent) pair; 0 = unlimited
- MIXED_CONCURRENCY_CAP=${MIXED_CONCURRENCY_CAP:-1}
healthcheck:
test:
- "CMD"

View File

@@ -2,7 +2,7 @@
**Сервіс:** `matrix-bridge-dagi` | **Нода:** NODA1 | **Порт:** 7030 (localhost)
**Stack:** Matrix (Synapse) → bridge → Router `/v1/agents/{id}/infer` → Matrix reply
**Фаза:** M1 (1 room = Sofiia), H1/H2/H3 hardening активний
**Фаза:** M2.2 (N rooms + mixed room routing), H1/H2/H3 hardening активний
---
@@ -364,11 +364,167 @@ echo | openssl s_client -connect matrix.daarion.space:443 -servername matrix.daa
---
---
## 9. Mixed Room Debug Guide (M2.2)
### 9.1 Перевірка конфігурації mixed rooms
```bash
# Поточний mapping (regular + mixed)
curl -sS http://127.0.0.1:7030/bridge/mappings | python3 -m json.tool
# Guard rail параметри (з /health)
curl -sS http://127.0.0.1:7030/health | python3 -m json.tool | python3 -c "
import sys, json; h=json.load(sys.stdin)
print('mixed_rooms:', h.get('mixed_rooms_count',0))
print('total_agents:', h.get('total_agents_in_mixed_rooms',0))
print('guard_rails:', json.dumps(h.get('mixed_guard_rails',{}), indent=2))
"
```
### 9.2 Smoke test для mixed room (6 acceptance test cases)
Відправляємо з `test_user` у mixed room `!roomX:daarion.space`:
```bash
# Змінна для зручності
ROOM_ID="!roomX:daarion.space"
TOKEN="@test_user_token" # або через Element UI
# 1. Slash → Sofiia
curl -sX POST "https://matrix.daarion.space/_matrix/client/v3/rooms/${ROOM_ID}/send/m.room.message/txn1" \
-H "Authorization: Bearer $TOKEN" -H "Content-Type: application/json" \
-d '{"msgtype":"m.text","body":"/sofiia ping"}' | jq '.event_id'
# 2. Slash → Helion
curl -sX POST "...txn2" -d '{"msgtype":"m.text","body":"/helion ping"}' | jq '.event_id'
# 3. @mention → Sofiia
curl -sX POST "...txn3" -d '{"msgtype":"m.text","body":"@sofiia status"}' | jq '.event_id'
# 4. colon-mention → Sofiia
curl -sX POST "...txn4" -d '{"msgtype":"m.text","body":"sofiia: status"}' | jq '.event_id'
# 5. Plain text → default agent
curl -sX POST "...txn5" -d '{"msgtype":"m.text","body":"ping"}' | jq '.event_id'
# 6. Unknown slash → audit matrix.route.rejected
curl -sX POST "...txn6" -d '{"msgtype":"m.text","body":"/unknown test"}' | jq '.event_id'
```
**Очікувана поведінка у кімнаті:**
| Команда | Reply prefix | Router agent |
|---------|-------------|--------------|
| `/sofiia ping` | `Sofiia: ...` | sofiia |
| `/helion ping` | `Helion: ...` | helion |
| `@sofiia status` | `Sofiia: ...` | sofiia |
| `sofiia: status` | `Sofiia: ...` | sofiia |
| `ping` (plain) | `<DefaultAgent>: ...` | перший у списку |
| `/unknown test` | `⚠️ Unknown agent...` або тиша (залежно від `UNKNOWN_AGENT_BEHAVIOR`) | — |
### 9.3 Перевірка routing метрик
```bash
# Successful routing breakdown by reason
curl -sS http://127.0.0.1:7030/metrics | grep 'matrix_bridge_routed_total'
# Очікування:
# matrix_bridge_routed_total{agent_id="sofiia",reason="slash_command"} N
# matrix_bridge_routed_total{agent_id="helion",reason="slash_command"} N
# matrix_bridge_routed_total{agent_id="sofiia",reason="at_mention"} N
# matrix_bridge_routed_total{agent_id="sofiia",reason="default"} N
# Rejections
curl -sS http://127.0.0.1:7030/metrics | grep 'matrix_bridge_route_rejected_total'
# Очікується > 0 лише якщо були /unknown або занадто довгі токени
# Active concurrency locks
curl -sS http://127.0.0.1:7030/metrics | grep 'active_room_agent_locks'
# Зазвичай 0 (між повідомленнями)
```
### 9.4 Debug: "Wrong agent responds"
**Симптом:** У mixed room `/helion ...` → відповідає sofiia, або відповідає не той агент.
**Діагностика:**
```bash
# 1. Перевірити audit events в sofiia-console
# (через psql або API)
curl -sS http://127.0.0.1:8002/api/audit \
| python3 -m json.tool | grep -A5 '"event":"matrix.message.received"' \
| grep '"routing_reason"'
# routing_reason має бути "slash_command", "at_mention", "colon_mention" або "default"
# 2. Перевірити логи bridge
docker logs matrix-bridge-dagi-node1 --tail 100 2>&1 | grep -E 'route|Route|routing'
# Очікування: "Slash route: /helion → helion" або "Default route: → sofiia"
# 3. Перевірити BRIDGE_MIXED_ROOM_MAP в .env
grep BRIDGE_MIXED_ROOM_MAP /opt/microdao-daarion/.env
# Формат: "!roomX:server=sofiia,helion"
# Перший у списку = default agent
```
**Виправлення:**
- Якщо порядок агентів неправильний — змінити `BRIDGE_MIXED_ROOM_MAP` або встановити `BRIDGE_MIXED_DEFAULTS`
- Перезапустити bridge: `docker restart matrix-bridge-dagi-node1`
### 9.5 Debug: "Session context змішується між агентами"
**Симптом:** Helion "пам'ятає" контекст розмови sofiia.
**Перевірка:** Session key у логах (`session_id` у invoke payload)
```bash
docker logs matrix-bridge-dagi-node1 --tail 50 2>&1 | grep session_id
# Очікування для mixed room:
# session_id = "matrix:roomX_daarion_space:sofiia" ← ізольований per-agent
# session_id = "matrix:roomX_daarion_space:helion" ← окремий контекст
```
Якщо обидва агенти мають однаковий `session_id` — це баг рефакторингу, відкати на M2.0.
### 9.6 Debug: Concurrency lock "застрявання"
**Симптом:** Запит зависає, не відповідає, active_lock_count > 0 протягом >60s.
```bash
# Перевірити active locks
curl -sS http://127.0.0.1:7030/health | python3 -m json.tool | python3 -c \
"import sys,json; h=json.load(sys.stdin); print(h.get('mixed_guard_rails',{}).get('active_room_agent_locks',0))"
# Якщо > 0 протягом довгого часу — Router застряг
curl -sS http://127.0.0.1:9102/health | jq '.status'
# Якщо Router недоступний — перезапуск bridge звільнить locks (graceful shutdown + cancel)
docker restart matrix-bridge-dagi-node1
```
### 9.7 Guard rail: перевірка MAX_AGENTS_PER_MIXED_ROOM
Якщо у `.env` є рядок з 6+ агентами і `MAX_AGENTS_PER_MIXED_ROOM=5`:
```bash
docker logs matrix-bridge-dagi-node1 --tail 20 2>&1 | grep 'Config error\|MAX_AGENTS'
# Очікується: "❌ Config error: BRIDGE_MIXED_ROOM_MAP parse errors: Room ... has 6 agents > MAX..."
# Bridge не стартує → /health поверне {"ok":false,"error":"..."}
```
**Виправлення:** Зменшити кількість агентів або збільшити `MAX_AGENTS_PER_MIXED_ROOM`.
---
## 8. Що прикріпити до інциденту
```bash
echo "=== /health ===" && curl -sS http://127.0.0.1:7030/health | python3 -m json.tool
echo "=== /metrics traffic ===" && curl -sS http://127.0.0.1:7030/metrics | grep -E 'matrix_bridge_(messages|rate_limited|queue_dropped|gateway_errors)'
echo "=== /metrics latency ===" && curl -sS http://127.0.0.1:7030/metrics | grep -E '(invoke|send|queue_wait)_duration_seconds_(count|sum)'
echo "=== logs ===" && docker logs matrix-bridge-dagi-node1 --tail 50 2>&1 | grep -E 'ERROR|WARN|rate_limited|queue_full|Reply sent|invoke ok'
echo "=== /bridge/mappings ===" && curl -sS http://127.0.0.1:7030/bridge/mappings | python3 -m json.tool
echo "=== /metrics traffic ===" && curl -sS http://127.0.0.1:7030/metrics \
| grep -E 'matrix_bridge_(messages|rate_limited|queue_dropped|gateway_errors|routed|route_rejected)'
echo "=== /metrics latency ===" && curl -sS http://127.0.0.1:7030/metrics \
| grep -E '(invoke|send|queue_wait)_duration_seconds_(count|sum)'
echo "=== logs ===" && docker logs matrix-bridge-dagi-node1 --tail 50 2>&1 \
| grep -E 'ERROR|WARN|rate_limited|queue_full|Reply sent|invoke ok|route|rejected'
```

View File

@@ -1,5 +1,5 @@
"""
matrix-bridge-dagi — configuration and validation (M2.1: mixed rooms)
matrix-bridge-dagi — configuration and validation (M2.1 + M2.2: mixed rooms + guard rails)
"""
import os
from dataclasses import dataclass, field
@@ -40,6 +40,12 @@ class BridgeConfig:
# "!roomX:server=helion" — explicit default per mixed room (optional)
bridge_mixed_defaults: str
# M2.2: Mixed room guard rails
max_agents_per_mixed_room: int # fail-fast if room defines more agents than this
max_slash_len: int # reject slash token longer than this (anti-garbage)
unknown_agent_behavior: str # "ignore" | "reply_error"
mixed_concurrency_cap: int # max parallel invokes per (room, agent); 0 = unlimited
# Service identity
node_id: str
build_sha: str
@@ -78,6 +84,10 @@ def load_config() -> BridgeConfig:
queue_drain_timeout_s=max(1.0, float(_optional("QUEUE_DRAIN_TIMEOUT_S", "5"))),
bridge_mixed_room_map=_optional("BRIDGE_MIXED_ROOM_MAP", ""),
bridge_mixed_defaults=_optional("BRIDGE_MIXED_DEFAULTS", ""),
max_agents_per_mixed_room=max(1, int(_optional("MAX_AGENTS_PER_MIXED_ROOM", "5"))),
max_slash_len=max(4, int(_optional("MAX_SLASH_LEN", "32"))),
unknown_agent_behavior=_optional("UNKNOWN_AGENT_BEHAVIOR", "ignore"),
mixed_concurrency_cap=max(0, int(_optional("MIXED_CONCURRENCY_CAP", "1"))),
node_id=_optional("NODE_ID", "NODA1"),
build_sha=_optional("BUILD_SHA", "dev"),
build_time=_optional("BUILD_TIME", "local"),

View File

@@ -1,5 +1,5 @@
"""
Matrix Ingress + Egress Loop — Phase M1.4 + H1 + H2 + H3 + M2.1 (mixed rooms)
Matrix Ingress + Egress Loop — Phase M1.4 + H1 + H2 + H3 + M2.1 + M2.2 (mixed rooms hardening)
Architecture (H2):
Reader task → asyncio.Queue(maxsize) → N Worker tasks
@@ -34,7 +34,10 @@ from typing import Any, Callable, Dict, List, Optional
import httpx
from .matrix_client import MatrixClient
from .mixed_routing import MixedRoomConfig, route_message, reply_prefix
from .mixed_routing import (
MixedRoomConfig, route_message, reply_prefix,
REASON_REJECTED_UNKNOWN_AGENT, REASON_REJECTED_SLASH_TOO_LONG, REASON_REJECTED_NO_MAPPING,
)
from .rate_limit import InMemoryRateLimiter
from .room_mapping import RoomMappingConfig, RoomMapping
@@ -152,6 +155,8 @@ class MatrixIngressLoop:
on_invoke_latency(agent_id, duration_seconds)
on_send_latency(agent_id, duration_seconds)
on_queue_wait(agent_id, wait_seconds)
on_routed(agent_id, reason) M2.2: successful routing
on_route_rejected(room_id, reason) M2.2: routing rejection
"""
def __init__(
@@ -169,6 +174,10 @@ class MatrixIngressLoop:
worker_concurrency: int = 2,
queue_drain_timeout_s: float = 5.0,
mixed_room_config: Optional[MixedRoomConfig] = None,
# M2.2: guard rails
unknown_agent_behavior: str = "ignore", # "ignore" | "reply_error"
max_slash_len: int = 32,
mixed_concurrency_cap: int = 1, # 0 = unlimited
# Callbacks
on_message_received: Optional[Callable[[str, str], None]] = None,
on_message_replied: Optional[Callable[[str, str, str], None]] = None,
@@ -179,6 +188,8 @@ class MatrixIngressLoop:
on_invoke_latency: Optional[Callable[[str, float], None]] = None,
on_send_latency: Optional[Callable[[str, float], None]] = None,
on_queue_wait: Optional[Callable[[str, float], None]] = None,
on_routed: Optional[Callable[[str, str], None]] = None,
on_route_rejected: Optional[Callable[[str, str], None]] = None,
) -> None:
self._hs_url = matrix_homeserver_url
self._token = matrix_access_token
@@ -203,6 +214,13 @@ class MatrixIngressLoop:
self._on_send_latency = on_send_latency
self._on_queue_wait = on_queue_wait
self._mixed_room_config = mixed_room_config
self._unknown_agent_behavior = unknown_agent_behavior
self._max_slash_len = max_slash_len
self._mixed_concurrency_cap = mixed_concurrency_cap
self._on_routed = on_routed
self._on_route_rejected = on_route_rejected
# Lazily populated semaphores keyed by "{room_id}:{agent_id}"
self._concurrency_locks: Dict[str, asyncio.Semaphore] = {}
self._next_batch: Optional[str] = None
self._queue: Optional[asyncio.Queue] = None # exposed for /health
@@ -218,6 +236,19 @@ class MatrixIngressLoop:
def worker_count(self) -> int:
return self._worker_count
@property
def active_lock_count(self) -> int:
"""Number of room-agent pairs currently holding a concurrency lock."""
return sum(1 for lock in self._concurrency_locks.values() if lock.locked())
def _get_concurrency_lock(self, room_id: str, agent_id: str) -> asyncio.Semaphore:
"""Lazily create and return the semaphore for a (room, agent) pair."""
key = f"{room_id}:{agent_id}"
if key not in self._concurrency_locks:
cap = self._mixed_concurrency_cap if self._mixed_concurrency_cap > 0 else 2 ** 31
self._concurrency_locks[key] = asyncio.Semaphore(cap)
return self._concurrency_locks[key]
# ── Public run ─────────────────────────────────────────────────────────────
async def run(self, stop_event: asyncio.Event) -> None:
@@ -428,23 +459,46 @@ class MatrixIngressLoop:
# Route message to determine target agent
agent_id, routing_reason, effective_text = route_message(
text, room_id, self._mixed_room_config, self._room_map.allowed_agents,
max_slash_len=self._max_slash_len,
)
if agent_id is None:
# M2.2: routing rejected — audit + metric + optional error reply
logger.warning(
"Mixed room %s: unresolvable routing reason=%s event=%s — skipping",
"Mixed room %s: routing rejected reason=%s event=%s",
room_id, routing_reason, event_id,
)
if self._on_route_rejected:
self._on_route_rejected(room_id, routing_reason)
await _write_audit(
http_client, self._console_url, self._internal_token,
event="matrix.error",
event="matrix.route.rejected",
agent_id="unknown", node_id=self._node_id,
room_id=room_id, event_id=event_id,
status="error", error_code="no_agent_for_message",
data={"routing_reason": routing_reason, "sender": sender},
status="error", error_code=routing_reason,
data={"routing_reason": routing_reason, "sender": sender, "text_len": len(text)},
)
# M2.2: optional user-facing error reply in room
if self._unknown_agent_behavior == "reply_error" and routing_reason == REASON_REJECTED_UNKNOWN_AGENT:
available = self._mixed_room_config.agents_for_room(room_id)
# Extract agent name from text (first slash token, if any)
slash_token = text.strip().split()[0].lstrip("/") if text.strip().startswith("/") else ""
label = f"`/{slash_token}`" if slash_token else "this command"
error_msg = (
f"⚠️ Unknown agent {label}. "
f"Available in this room: {', '.join(available)}"
)
txn_id = MatrixClient.make_txn_id(room_id, event_id + "_reject")
try:
await client.send_text(room_id, error_msg, txn_id)
except Exception as exc:
logger.warning("Could not send route-error reply: %s", exc)
return
# M2.2: successful route — fire metric callback
if self._on_routed:
self._on_routed(agent_id, routing_reason)
# H1: Rate limit (uses final agent_id for metric tagging)
if self._rate_limiter is not None:
allowed, limit_type = self._rate_limiter.check(room_id=room_id, sender=sender)
@@ -578,6 +632,35 @@ class MatrixIngressLoop:
else:
session_id = f"matrix:{room_key}"
# M2.2: per-room-agent concurrency cap (only for mixed rooms; single-agent rooms unaffected)
_lock = self._get_concurrency_lock(room_id, agent_id) if is_mixed and self._mixed_concurrency_cap > 0 else None
if _lock is not None:
await _lock.acquire()
try:
await self._invoke_and_send(
client, http_client, entry, session_id, wait_s, is_mixed, routing_reason,
)
finally:
if _lock is not None:
_lock.release()
async def _invoke_and_send(
self,
client: MatrixClient,
http_client: httpx.AsyncClient,
entry: _QueueEntry,
session_id: str,
wait_s: float,
is_mixed: bool,
routing_reason: str,
) -> None:
"""Inner: invoke Router + send reply (separated for concurrency lock wrapping)."""
event = entry.event
event_id = event.get("event_id", "")
text = event.get("content", {}).get("body", "").strip()
room_id = entry.room_id
agent_id = entry.agent_id
# H3: Invoke with latency
t0 = time.monotonic()
reply_text: Optional[str] = None

View File

@@ -105,6 +105,21 @@ if _PROM_OK:
["agent_id"],
buckets=[0.01, 0.05, 0.1, 0.5, 1.0, 5.0, 30.0],
)
# M2.2: Mixed room routing metrics
_routed_total = Counter(
"matrix_bridge_routed_total",
"Successful message routing by reason",
["agent_id", "reason"],
)
_route_rejected_total = Counter(
"matrix_bridge_route_rejected_total",
"Messages rejected during routing (unknown agent, bad slash, etc.)",
["room_id", "reason"],
)
_active_room_agent_locks = Gauge(
"matrix_bridge_active_room_agent_locks",
"Number of room-agent pairs currently holding a concurrency lock",
)
# ── Startup state ─────────────────────────────────────────────────────────────
_START_TIME = time.monotonic()
@@ -151,6 +166,7 @@ async def lifespan(app_: Any):
_cfg.bridge_mixed_room_map,
_cfg.bridge_mixed_defaults,
_cfg.bridge_allowed_agents,
max_agents_per_room=_cfg.max_agents_per_mixed_room,
)
logger.info(
"✅ Mixed room config: %d rooms, agents=%s",
@@ -249,6 +265,15 @@ async def lifespan(app_: Any):
if _PROM_OK:
_queue_wait.labels(agent_id=agent_id).observe(wait_s)
# M2.2 callbacks
def _on_routed(agent_id: str, reason: str) -> None:
if _PROM_OK:
_routed_total.labels(agent_id=agent_id, reason=reason).inc()
def _on_route_rejected(room_id: str, reason: str) -> None:
if _PROM_OK:
_route_rejected_total.labels(room_id=room_id, reason=reason).inc()
ingress = MatrixIngressLoop(
matrix_homeserver_url=_cfg.matrix_homeserver_url,
matrix_access_token=_cfg.matrix_access_token,
@@ -263,6 +288,9 @@ async def lifespan(app_: Any):
worker_concurrency=_cfg.worker_concurrency,
queue_drain_timeout_s=_cfg.queue_drain_timeout_s,
mixed_room_config=_mixed_room_config,
unknown_agent_behavior=_cfg.unknown_agent_behavior,
max_slash_len=_cfg.max_slash_len,
mixed_concurrency_cap=_cfg.mixed_concurrency_cap,
on_message_received=_on_msg,
on_message_replied=_on_replied,
on_gateway_error=_on_gw_error,
@@ -272,6 +300,8 @@ async def lifespan(app_: Any):
on_invoke_latency=_on_invoke_latency,
on_send_latency=_on_send_latency,
on_queue_wait=_on_queue_wait,
on_routed=_on_routed,
on_route_rejected=_on_route_rejected,
)
logger.info(
"✅ Backpressure queue: max=%d workers=%d drain_timeout=%.1fs",
@@ -321,6 +351,8 @@ app.add_middleware(
@app.get("/health")
async def health() -> Dict[str, Any]:
uptime = int(time.monotonic() - _START_TIME)
if _PROM_OK and _ingress_loop is not None:
_active_room_agent_locks.set(_ingress_loop.active_lock_count)
if _config_error or _cfg is None:
return {
"ok": False,
@@ -351,6 +383,9 @@ async def health() -> Dict[str, Any]:
"gateway_reachable": _gateway_reachable,
"mappings_count": _room_map.total_mappings if _room_map else 0,
"mixed_rooms_count": _mixed_room_config.total_rooms if _mixed_room_config else 0,
"total_agents_in_mixed_rooms": sum(
len(r.agents) for r in _mixed_room_config.rooms.values()
) if _mixed_room_config else 0,
"config_ok": True,
"rate_limiter": _rate_limiter.stats() if _rate_limiter else None,
"queue": {
@@ -358,6 +393,13 @@ async def health() -> Dict[str, Any]:
"max": _cfg.queue_max_events,
"workers": _cfg.worker_concurrency,
},
"mixed_guard_rails": {
"max_agents_per_room": _cfg.max_agents_per_mixed_room,
"max_slash_len": _cfg.max_slash_len,
"unknown_agent_behavior": _cfg.unknown_agent_behavior,
"concurrency_cap": _cfg.mixed_concurrency_cap,
"active_room_agent_locks": _ingress_loop.active_lock_count if _ingress_loop else 0,
},
}

View File

@@ -1,5 +1,5 @@
"""
Mixed-Room Routing — Phase M2.1
Mixed-Room Routing — Phase M2.1 + M2.2 (guard rails + rejection audit)
Supports 1 room → N agents with deterministic message routing.
@@ -33,12 +33,21 @@ _SLASH_RE = re.compile(r"^/([A-Za-z0-9_\-]+)\s*(.*)", re.DOTALL)
_MENTION_AT_RE = re.compile(r"^@([A-Za-z0-9_\-]+)\s*(.*)", re.DOTALL)
_MENTION_COLON_RE = re.compile(r"^([A-Za-z0-9_\-]+):\s+(.*)", re.DOTALL)
# Routing reason labels
# Routing reason labels (successful routes)
REASON_SLASH = "slash_command"
REASON_AT_MENTION = "at_mention"
REASON_COLON_MENTION = "colon_mention"
REASON_DEFAULT = "default"
# Rejection reason labels (route_message returns agent_id=None + one of these)
REASON_REJECTED_UNKNOWN_AGENT = "unknown_agent"
REASON_REJECTED_SLASH_TOO_LONG = "slash_too_long"
REASON_REJECTED_NO_MAPPING = "no_mapping"
# Hard guards
_DEFAULT_MAX_AGENTS_PER_ROOM = 5
_DEFAULT_MAX_SLASH_LEN = 32
# ── Data structures ────────────────────────────────────────────────────────────
@@ -94,6 +103,7 @@ def parse_mixed_room_map(
raw_map: str,
raw_defaults: str,
allowed_agents: FrozenSet[str],
max_agents_per_room: int = _DEFAULT_MAX_AGENTS_PER_ROOM,
) -> MixedRoomConfig:
"""
Parse BRIDGE_MIXED_ROOM_MAP and BRIDGE_MIXED_DEFAULTS into MixedRoomConfig.
@@ -104,6 +114,7 @@ def parse_mixed_room_map(
Raises ValueError on:
- Malformed room_id
- Empty agent list
- Too many agents per room (> max_agents_per_room)
- Agent not in allowed_agents
- Duplicate room_id in map
"""
@@ -154,6 +165,13 @@ def parse_mixed_room_map(
errors.append(f"Empty agent list for room {room_id!r}")
continue
# M2.2 guard: fail-fast if too many agents per room
if len(agents) > max_agents_per_room:
errors.append(
f"Room {room_id!r} has {len(agents)} agents > MAX_AGENTS_PER_MIXED_ROOM={max_agents_per_room}"
)
continue
invalid = [a for a in agents if a not in allowed_agents]
if invalid:
errors.append(
@@ -189,6 +207,7 @@ def route_message(
room_id: str,
config: MixedRoomConfig,
allowed_agents: FrozenSet[str],
max_slash_len: int = _DEFAULT_MAX_SLASH_LEN,
) -> Tuple[Optional[str], str, str]:
"""
Determine which agent should handle this message.
@@ -196,8 +215,8 @@ def route_message(
Returns:
(agent_id, routing_reason, effective_text)
agent_id: matched agent or None if unresolvable
routing_reason: one of REASON_* constants
agent_id: matched agent or None if unresolvable / rejected
routing_reason: one of REASON_* or REASON_REJECTED_* constants
effective_text: text with routing prefix stripped (for cleaner invoke)
Priority:
@@ -205,10 +224,14 @@ def route_message(
2. @agentname ... (at-mention)
3. agentname: ... (colon-mention)
4. default agent for room (fallback)
Guard rails (M2.2):
- Slash command token longer than max_slash_len → REASON_REJECTED_SLASH_TOO_LONG
- Unknown agent in slash → REASON_REJECTED_UNKNOWN_AGENT (no fallthrough)
"""
room = config.rooms.get(room_id)
if room is None:
return None, "no_mapping", text
return None, REASON_REJECTED_NO_MAPPING, text
stripped = text.strip()
@@ -217,16 +240,25 @@ def route_message(
if m:
candidate = m.group(1).lower()
body = m.group(2).strip() or stripped # keep original if body empty
# M2.2: reject suspiciously long slash tokens (garbage / injection attempts)
if len(candidate) > max_slash_len:
logger.warning(
"Slash token too long (%d > %d) in room %s — rejected",
len(candidate), max_slash_len, room_id,
)
return None, REASON_REJECTED_SLASH_TOO_LONG, text
agent = _resolve_agent(candidate, room, allowed_agents)
if agent:
logger.debug("Slash route: /%s%s", candidate, agent)
return agent, REASON_SLASH, body
# Unknown agent → return None + log; do not fall through to default
# Unknown agent → hard reject, do NOT fall through to default
logger.warning(
"Slash command /%s in room %s: agent not recognised or not allowed",
candidate, room_id,
"Slash command /%s in room %s: agent not recognised or not allowed (available: %s)",
candidate, room_id, room.agents,
)
return None, f"unknown_slash_{candidate}", text
return None, REASON_REJECTED_UNKNOWN_AGENT, text
# 2. @mention: @sofiia hello
m = _MENTION_AT_RE.match(stripped)

View File

@@ -308,6 +308,158 @@ def test_rate_limited_mixed_room_event_dropped():
assert len(dropped) == 2 # two dropped by rate limiter
def test_on_route_rejected_callback_fires():
"""on_route_rejected fires when /unknown slash is used in mixed room."""
ingress = _make_ingress(mixed_raw=f"{ROOM_MIXED}=sofiia,helion")
rejected_calls: List[tuple] = []
ingress._on_route_rejected = lambda room, reason: rejected_calls.append((room, reason))
client = _fake_client({ROOM_MIXED: [_make_event("/unknownbot hello", event_id="r1")]})
queue: asyncio.Queue = asyncio.Queue(maxsize=50)
ingress._queue = queue
async def _run():
with patch("app.ingress._write_audit", new=AsyncMock()):
await ingress._enqueue_from_sync(client, queue, AsyncMock(), {})
run(_run())
assert queue.qsize() == 0
assert len(rejected_calls) == 1
room, reason = rejected_calls[0]
assert room == ROOM_MIXED
assert "unknown" in reason
def test_on_routed_callback_fires_with_reason():
"""on_routed fires with correct agent_id and routing_reason on successful route."""
ingress = _make_ingress(mixed_raw=f"{ROOM_MIXED}=sofiia,helion")
routed_calls: List[tuple] = []
ingress._on_routed = lambda agent, reason: routed_calls.append((agent, reason))
client = _fake_client({ROOM_MIXED: [_make_event("/helion hello", event_id="rt1")]})
queue: asyncio.Queue = asyncio.Queue(maxsize=50)
ingress._queue = queue
async def _run():
with patch("app.ingress._write_audit", new=AsyncMock()):
await ingress._enqueue_from_sync(client, queue, AsyncMock(), {})
run(_run())
assert len(routed_calls) == 1
agent, reason = routed_calls[0]
assert agent == "helion"
assert reason == "slash_command"
def test_unknown_agent_reply_error_sends_message():
"""UNKNOWN_AGENT_BEHAVIOR=reply_error → error message sent to room."""
ingress = _make_ingress(mixed_raw=f"{ROOM_MIXED}=sofiia,helion")
ingress._unknown_agent_behavior = "reply_error"
sent_texts: List[str] = []
mock_client = _fake_client({ROOM_MIXED: [_make_event("/druid hello", event_id="ue1")]})
mock_client.send_text = AsyncMock(side_effect=lambda room, text, txn_id=None: sent_texts.append(text))
queue: asyncio.Queue = asyncio.Queue(maxsize=50)
ingress._queue = queue
async def _run():
with patch("app.ingress._write_audit", new=AsyncMock()):
await ingress._enqueue_from_sync(mock_client, queue, AsyncMock(), {})
run(_run())
assert queue.qsize() == 0 # not enqueued
assert len(sent_texts) == 1
assert "Unknown agent" in sent_texts[0]
assert "sofiia" in sent_texts[0] or "helion" in sent_texts[0]
def test_unknown_agent_ignore_sends_nothing():
"""UNKNOWN_AGENT_BEHAVIOR=ignore (default) → no reply sent."""
ingress = _make_ingress(mixed_raw=f"{ROOM_MIXED}=sofiia,helion")
ingress._unknown_agent_behavior = "ignore"
sent_texts: List[str] = []
mock_client = _fake_client({ROOM_MIXED: [_make_event("/druid hello", event_id="ui1")]})
mock_client.send_text = AsyncMock(side_effect=lambda room, text, txn_id=None: sent_texts.append(text))
queue: asyncio.Queue = asyncio.Queue(maxsize=50)
ingress._queue = queue
async def _run():
with patch("app.ingress._write_audit", new=AsyncMock()):
await ingress._enqueue_from_sync(mock_client, queue, AsyncMock(), {})
run(_run())
assert queue.qsize() == 0
assert len(sent_texts) == 0 # silent
def test_concurrency_cap_active_lock_count():
"""active_lock_count returns 1 while semaphore is held."""
ingress = _make_ingress(mixed_raw=f"{ROOM_MIXED}=sofiia,helion")
ingress._mixed_concurrency_cap = 1
async def _run():
lock = ingress._get_concurrency_lock(ROOM_MIXED, "sofiia")
assert ingress.active_lock_count == 0
await lock.acquire()
assert ingress.active_lock_count == 1
lock.release()
assert ingress.active_lock_count == 0
run(_run())
def test_slash_too_long_rejected_and_not_enqueued():
"""Slash token longer than max_slash_len → rejected, not enqueued."""
ingress = _make_ingress(mixed_raw=f"{ROOM_MIXED}=sofiia,helion")
ingress._max_slash_len = 4 # very short for test
client = _fake_client({ROOM_MIXED: [_make_event("/toolongtoken hello", event_id="tl1")]})
queue: asyncio.Queue = asyncio.Queue(maxsize=50)
ingress._queue = queue
rejected_calls: List[str] = []
ingress._on_route_rejected = lambda room, reason: rejected_calls.append(reason)
async def _run():
with patch("app.ingress._write_audit", new=AsyncMock()):
await ingress._enqueue_from_sync(client, queue, AsyncMock(), {})
run(_run())
assert queue.qsize() == 0
assert len(rejected_calls) == 1
assert rejected_calls[0] == "slash_too_long"
def test_route_rejected_audit_event_written():
"""On routing rejection, matrix.route.rejected audit event must be written."""
ingress = _make_ingress(mixed_raw=f"{ROOM_MIXED}=sofiia,helion")
audit_events: List[str] = []
async def fake_audit(*args, **kwargs):
audit_events.append(kwargs.get("event", ""))
client = _fake_client({ROOM_MIXED: [_make_event("/unknownbot test", event_id="ra1")]})
queue: asyncio.Queue = asyncio.Queue(maxsize=50)
ingress._queue = queue
async def _run():
with patch("app.ingress._write_audit", side_effect=fake_audit):
await ingress._enqueue_from_sync(client, queue, AsyncMock(), {})
run(_run())
assert "matrix.route.rejected" in audit_events
def test_direct_room_reply_has_no_prefix():
"""Reply in single-agent (direct) room must NOT have a prefix."""
ingress = _make_ingress(direct_raw=f"druid:{ROOM_DIRECT}", allowed=frozenset({"druid"}))

View File

@@ -26,6 +26,9 @@ from app.mixed_routing import ( # noqa: E402
REASON_AT_MENTION,
REASON_COLON_MENTION,
REASON_DEFAULT,
REASON_REJECTED_UNKNOWN_AGENT,
REASON_REJECTED_SLASH_TOO_LONG,
REASON_REJECTED_NO_MAPPING,
)
ROOM_X = "!roomX:daarion.space"
@@ -146,7 +149,7 @@ def test_slash_unknown_agent_returns_none():
cfg = _make_cfg()
agent, reason, _ = route_message("/druid hello", ROOM_X, cfg, frozenset({"sofiia", "helion"}))
assert agent is None
assert "unknown_slash_druid" in reason
assert reason == REASON_REJECTED_UNKNOWN_AGENT
# ── Routing — @mention ────────────────────────────────────────────────────────
@@ -225,3 +228,70 @@ def test_reply_prefix_single_room_empty():
def test_reply_prefix_capitalises_first_letter():
assert reply_prefix("druid", is_mixed=True) == "Druid: "
assert reply_prefix("NUTRA", is_mixed=True) == "Nutra: " # capitalize() normalises case
# ── M2.2: Guard rails ─────────────────────────────────────────────────────────
def test_max_agents_per_room_raises():
"""More agents than max → ValueError at parse time."""
raw = f"{ROOM_X}=sofiia,helion,druid,nutra,alateya,yaromir" # 6 agents
allowed_6 = frozenset({"sofiia", "helion", "druid", "nutra", "alateya", "yaromir"})
with pytest.raises(ValueError, match="MAX_AGENTS_PER_MIXED_ROOM"):
parse_mixed_room_map(raw, "", allowed_6, max_agents_per_room=5)
def test_max_agents_per_room_exactly_at_limit_ok():
"""Exactly at limit should succeed."""
raw = f"{ROOM_X}=sofiia,helion,druid,nutra,alateya" # 5 = default limit
allowed_5 = frozenset({"sofiia", "helion", "druid", "nutra", "alateya"})
cfg = parse_mixed_room_map(raw, "", allowed_5, max_agents_per_room=5)
assert len(cfg.agents_for_room(ROOM_X)) == 5
def test_slash_too_long_returns_rejected_reason():
"""Slash command token longer than max_slash_len → rejection, no fallthrough."""
cfg = _make_cfg()
long_token = "a" * 33 # > default 32
agent, reason, _ = route_message(
f"/{long_token} hello", ROOM_X, cfg, frozenset({"sofiia", "helion"}),
max_slash_len=32,
)
assert agent is None
assert reason == REASON_REJECTED_SLASH_TOO_LONG
def test_slash_exactly_at_max_len_ok():
"""Slash token exactly at max_slash_len should NOT be rejected."""
allowed = frozenset({"sofiia", "helion"})
raw = f"{ROOM_X}=sofiia,helion"
# Create a 10-char agent name (within limit) — use a mock allowed set
cfg = parse_mixed_room_map(raw, "", allowed, max_agents_per_room=5)
agent, reason, _ = route_message("/sofiia hi", ROOM_X, cfg, allowed, max_slash_len=32)
assert agent == "sofiia"
assert reason == REASON_SLASH
def test_unknown_slash_returns_rejected_unknown_agent():
"""Slash with valid-length token but unknown agent → REASON_REJECTED_UNKNOWN_AGENT."""
cfg = _make_cfg()
agent, reason, _ = route_message(
"/druid hello", ROOM_X, cfg, frozenset({"sofiia", "helion"}),
max_slash_len=32,
)
assert agent is None
assert reason == REASON_REJECTED_UNKNOWN_AGENT
def test_no_mapping_returns_rejected_no_mapping():
"""Room not in config → REASON_REJECTED_NO_MAPPING."""
cfg = _make_cfg(room_id=ROOM_X)
agent, reason, _ = route_message("hello", ROOM_Y, cfg, ALLOWED, max_slash_len=32)
assert agent is None
assert reason == REASON_REJECTED_NO_MAPPING
def test_rejection_reasons_are_distinct_constants():
"""All rejection reason strings must differ from success reasons."""
success = {REASON_SLASH, REASON_AT_MENTION, REASON_COLON_MENTION, REASON_DEFAULT}
rejected = {REASON_REJECTED_UNKNOWN_AGENT, REASON_REJECTED_SLASH_TOO_LONG, REASON_REJECTED_NO_MAPPING}
assert not success.intersection(rejected), "Rejection reasons must not overlap with success reasons"