Topolo Chat
Public overview of the collaboration surface for channels, direct messages, meetings, guests, and remote-assist workflows.
What It Is
Topolo Chat is the collaboration application for channels, direct messages, meetings, guest access, transcripts, and future remote-assist workflows.
Architecture
Chat combines a Cloudflare-native backend, a web client, realtime and meeting bindings, and optional desktop and mobile shells.
Runtime Surfaces
The primary public surfaces are https://chat.topolo.app and the direct worker host documented in /systems/topolo-chat.
API Reference
The current contract is curated in the docs platform and centers on channels, DMs, uploads, meetings, guests, notifications, notes, audit events, and remote-assist transport.
Auth and Permissions
Topolo Chat uses Topolo Auth for workspace access. Protected workspace bearer-token requests validate through Auth and do not accept locally decoded JWT claims from a Worker secret. Browser login handoff, SSO callback-code redemption, and returning-user cookie hydration delegate to the shared Topolo Auth client, while guest meeting entry remains intentionally separate from normal workspace membership. Workspace-admin paths such as API key management now require explicit Chat service permissions instead of relying on local role-name heuristics.
For first-party Topolo users, /login renders Chat’s branded shared LoginPage directly in the Chat shell. Hosted Auth login pages are reserved for third-party/provider handoff, not the default credential form.
Data Ownership
Chat owns workspace, membership, channel, DM, message, upload, meeting, guest, transcript, audit, and remote-assist session state.
Deployments
Chat deploys as a Cloudflare-backed collaboration app with optional desktop and mobile client shells.
Failure Modes
- meeting join token flow drifts from guest or mobile launch flows
- realtime or Durable Object bindings are unavailable
- guest entry is mistakenly treated as normal workspace auth
Debugging
Start with /systems/topolo-chat, then separate workspace-auth issues from guest and meeting-launch issues before debugging deeper.
Change Log / Verification
- Removed Chat’s hosted Auth redirect from
/loginon 2026-04-20 so first-party users sign in through the branded embedded shared LoginPage. - Removed the Chat worker’s residual local
TOPOLO_JWT_SECREThandoff on 2026-04-18 so protected workspace bearer-token requests validate through Auth. - Delegated Chat web login handoff and callback-code redemption to the shared Topolo Auth client on 2026-04-18.
- Added service-scoped Auth cookie hydration to Chat startup on 2026-04-18 so returning users can enter without a full hosted login redirect.
- Standardized Chat admin permission checks on 2026-04-10 so API key management now follows the shared Auth permission model instead of local role checks
- Standardized the public product label to
Chatacross the web shell, workspace bootstrap text, and meeting handoff flows on 2026-04-04 - Added canonical Topolo Chat coverage and retired repo-local collaboration docs on 2026-03-30