@cored-im/openclaw-plugin 0.1.16 → 0.1.17

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1 +1 @@
1
- {"version":3,"sources":["../src/setup-entry.ts","../src/channel.ts","../src/config.ts","../src/core/cored-client.ts","../src/messaging/outbound.ts","../src/targets.ts"],"sourcesContent":["// Copyright (c) 2026 Cored Limited\n// SPDX-License-Identifier: Apache-2.0\n\nimport { defineSetupPluginEntry } from \"openclaw/plugin-sdk/core\";\nimport { base } from \"./channel.js\";\n\nexport default defineSetupPluginEntry(base);\n","// Copyright (c) 2026 Cored Limited\n// SPDX-License-Identifier: Apache-2.0\n\nimport {\n createChatChannelPlugin,\n createChannelPluginBase,\n} from \"openclaw/plugin-sdk/core\";\nimport { createHybridChannelConfigBase } from \"openclaw/plugin-sdk/channel-config-helpers\";\nimport type { OpenClawConfig } from \"openclaw/plugin-sdk/core\";\nimport { listAccountIds, resolveAccountConfig } from \"./config.js\";\nimport { sendText } from \"./messaging/outbound.js\";\nimport { parseTarget } from \"./targets.js\";\nimport type { CoredAccountConfig } from \"./types.js\";\n\nconst BASE_FIELDS = [\"appId\", \"appSecret\", \"backendUrl\", \"enabled\", \"enableEncryption\", \"requestTimeout\"];\n\nexport const base = createChannelPluginBase<CoredAccountConfig>({\n id: \"cored\",\n\n meta: {\n id: \"cored\",\n label: \"Cored\",\n selectionLabel: \"Cored\",\n docsPath: \"/channels/cored\",\n blurb: \"Connect OpenClaw to Cored\",\n aliases: [\"co\"],\n },\n\n capabilities: {\n chatTypes: [\"direct\", \"group\"],\n },\n\n config: {\n ...createHybridChannelConfigBase<CoredAccountConfig>({\n sectionKey: \"cored\",\n listAccountIds: (cfg) => listAccountIds(cfg),\n resolveAccount: (cfg, accountId) =>\n resolveAccountConfig(cfg, accountId ?? undefined),\n defaultAccountId: () => \"default\",\n inspectAccount(cfg, accountId) {\n const resolved = resolveAccountConfig(cfg, accountId ?? undefined);\n const hasConfig = Boolean(\n resolved.appId && resolved.appSecret && resolved.backendUrl,\n );\n return {\n enabled: resolved.enabled,\n configured: hasConfig,\n tokenStatus: hasConfig ? \"available\" : \"missing\",\n };\n },\n clearBaseFields: BASE_FIELDS,\n }),\n },\n\n setup: {\n validateInput: ({ input }) => {\n const missing: string[] = [];\n if (!input.appToken) missing.push(\"--app-token (App ID from Admin Console)\");\n if (!input.token) missing.push(\"--token (App Secret from Admin Console)\");\n if (!input.url) missing.push(\"--url (your Cored server address)\");\n if (missing.length > 0) {\n return [\n `Missing required flags: ${missing.join(\", \")}`,\n \"\",\n \"Usage:\",\n ` openclaw channels add --channel cored --app-token <APP_ID> --token <APP_SECRET> --url <BACKEND_URL>`,\n \"\",\n \"You can find App ID and App Secret in:\",\n \" Cored Admin Console → Workplace → App Management → App Details\",\n ].join(\"\\n\");\n }\n return null;\n },\n applyAccountConfig: ({ cfg, accountId, input }) => {\n const updated = structuredClone(cfg) as Record<string, unknown>;\n if (!updated.channels) updated.channels = {};\n const ch = updated.channels as Record<string, Record<string, unknown>>;\n if (!ch[\"cored\"]) ch[\"cored\"] = {};\n const section = ch[\"cored\"];\n\n // Map ChannelSetupInput keys to our config shape:\n // appToken → appId, token → appSecret, url → backendUrl\n const appId = input.appToken;\n const appSecret = input.token;\n const backendUrl = input.url;\n\n if (accountId && accountId !== \"default\") {\n // Multi-account: write under accounts.<accountId>\n if (!section.accounts) section.accounts = {};\n const accounts = section.accounts as Record<string, Record<string, unknown>>;\n if (!accounts[accountId]) accounts[accountId] = {};\n const account = accounts[accountId];\n if (appId) account.appId = appId;\n if (appSecret) account.appSecret = appSecret;\n if (backendUrl) account.backendUrl = backendUrl;\n } else {\n // Single-account: write at top level\n if (appId) section.appId = appId;\n if (appSecret) section.appSecret = appSecret;\n if (backendUrl) section.backendUrl = backendUrl;\n }\n\n return updated as OpenClawConfig;\n },\n },\n\n setupWizard: {\n channel: \"cored\",\n status: {\n configuredLabel: \"Connected\",\n unconfiguredLabel: \"Not configured\",\n resolveConfigured: ({ cfg }) => {\n const ids = listAccountIds(cfg);\n return ids.some((id) => {\n const resolved = resolveAccountConfig(cfg, id);\n return Boolean(resolved.appId && resolved.appSecret && resolved.backendUrl);\n });\n },\n },\n credentials: [\n {\n inputKey: \"appToken\",\n providerHint: \"cored\",\n credentialLabel: \"App ID\",\n preferredEnvVar: \"CORED_APP_ID\",\n envPrompt: \"Use CORED_APP_ID from environment?\",\n keepPrompt: \"Keep current App ID?\",\n inputPrompt:\n \"Enter App ID (from Cored Admin Console → Workplace → App Management → App Details):\",\n inspect: ({ cfg, accountId }) => {\n const resolved = resolveAccountConfig(cfg, accountId ?? undefined);\n return {\n accountConfigured: Boolean(resolved.appId),\n hasConfiguredValue: Boolean(resolved.appId),\n };\n },\n },\n {\n inputKey: \"token\",\n providerHint: \"cored\",\n credentialLabel: \"App Secret\",\n preferredEnvVar: \"CORED_APP_SECRET\",\n envPrompt: \"Use CORED_APP_SECRET from environment?\",\n keepPrompt: \"Keep current App Secret?\",\n inputPrompt:\n \"Enter App Secret (from the same App Details page, keep this value confidential):\",\n inspect: ({ cfg, accountId }) => {\n const resolved = resolveAccountConfig(cfg, accountId ?? undefined);\n return {\n accountConfigured: Boolean(resolved.appSecret),\n hasConfiguredValue: Boolean(resolved.appSecret),\n };\n },\n },\n {\n inputKey: \"url\",\n providerHint: \"cored\",\n credentialLabel: \"Cored Server URL\",\n preferredEnvVar: \"CORED_BACKEND_URL\",\n envPrompt: \"Use CORED_BACKEND_URL from environment?\",\n keepPrompt: \"Keep current Cored Server URL?\",\n inputPrompt:\n \"Enter your Cored server address (e.g. http://192.168.10.10:21000):\",\n inspect: ({ cfg, accountId }) => {\n const resolved = resolveAccountConfig(cfg, accountId ?? undefined);\n return {\n accountConfigured: Boolean(resolved.backendUrl),\n hasConfiguredValue: Boolean(resolved.backendUrl),\n };\n },\n },\n ],\n },\n});\n\n// Cast needed: createChannelPluginBase returns Partial<config> but\n// createChatChannelPlugin requires config to be defined. We always\n// provide config above so the cast is safe.\nexport const coredPlugin = createChatChannelPlugin<CoredAccountConfig>({\n base: base as Parameters<typeof createChatChannelPlugin<CoredAccountConfig>>[0][\"base\"],\n\n // DM security: who can message the bot\n security: {\n dm: {\n channelKey: \"cored\",\n resolvePolicy: () => undefined,\n resolveAllowFrom: () => [],\n defaultPolicy: \"allowlist\",\n },\n },\n\n // Threading: how replies are delivered\n threading: { topLevelReplyToMode: \"reply\" },\n\n // Outbound: send messages to the platform\n outbound: {\n attachedResults: {\n channel: \"cored\",\n sendText: async (ctx) => {\n const target = parseTarget(ctx.to);\n if (!target) {\n throw new Error(`[cored] invalid send target: ${ctx.to}`);\n }\n const result = await sendText(\n target.id,\n ctx.text,\n ctx.accountId ?? undefined,\n ctx.replyToId ?? undefined,\n );\n if (!result.ok) {\n throw result.error ?? new Error(\"[cored] send failed\");\n }\n return { messageId: result.messageId ?? \"\" };\n },\n },\n base: {\n deliveryMode: \"direct\",\n resolveTarget: ({ to }) => {\n if (!to) return { ok: false as const, error: new Error(\"[cored] --to is required\") };\n const target = parseTarget(to);\n if (!target) {\n return {\n ok: false as const,\n error: new Error(\n `Cored requires --to <user:ID|chat:ID>, got: ${JSON.stringify(to)}`,\n ),\n };\n }\n return { ok: true as const, to: `${target.kind}:${target.id}` };\n },\n },\n },\n});\n","// Copyright (c) 2026 Cored Limited\n// SPDX-License-Identifier: Apache-2.0\n\nimport type { CoredChannelConfig, CoredAccountConfig } from \"./types.js\";\n\nconst DEFAULTS = {\n enableEncryption: true,\n requestTimeout: 30_000,\n} as const;\n\nconst ENV_PREFIX = \"CORED_\";\n\nfunction getChannelConfig(cfg: unknown): CoredChannelConfig | undefined {\n const root = cfg as Record<string, unknown> | undefined;\n return root?.channels\n ? ((root.channels as Record<string, unknown>).cored as\n | CoredChannelConfig\n | undefined)\n : undefined;\n}\n\nfunction readEnvConfig(): Partial<CoredAccountConfig> {\n const env = process.env;\n const result: Partial<CoredAccountConfig> = {};\n\n if (env[`${ENV_PREFIX}APP_ID`]) result.appId = env[`${ENV_PREFIX}APP_ID`];\n if (env[`${ENV_PREFIX}APP_SECRET`])\n result.appSecret = env[`${ENV_PREFIX}APP_SECRET`];\n if (env[`${ENV_PREFIX}BACKEND_URL`])\n result.backendUrl = env[`${ENV_PREFIX}BACKEND_URL`];\n if (env[`${ENV_PREFIX}ENABLE_ENCRYPTION`] !== undefined)\n result.enableEncryption =\n env[`${ENV_PREFIX}ENABLE_ENCRYPTION`] !== \"false\";\n if (env[`${ENV_PREFIX}REQUEST_TIMEOUT`])\n result.requestTimeout = Number(env[`${ENV_PREFIX}REQUEST_TIMEOUT`]);\n\n return result;\n}\n\nexport function listAccountIds(cfg: unknown): string[] {\n const ch = getChannelConfig(cfg);\n if (!ch) {\n // Check env vars as fallback\n if (process.env[`${ENV_PREFIX}APP_ID`]) return [\"default\"];\n return [];\n }\n if (ch.accounts) return Object.keys(ch.accounts);\n if (ch.appId) return [\"default\"];\n // env var fallback\n if (process.env[`${ENV_PREFIX}APP_ID`]) return [\"default\"];\n return [];\n}\n\nexport function resolveAccountConfig(\n cfg: unknown,\n accountId?: string,\n): CoredAccountConfig {\n const ch = getChannelConfig(cfg);\n const id = accountId ?? \"default\";\n const envConfig = readEnvConfig();\n\n const raw = ch?.accounts?.[id] ?? ch;\n\n return {\n accountId: id,\n appId: raw?.appId ?? envConfig.appId ?? \"\",\n appSecret: raw?.appSecret ?? envConfig.appSecret ?? \"\",\n backendUrl: raw?.backendUrl ?? envConfig.backendUrl ?? \"\",\n enabled: raw?.enabled ?? true,\n enableEncryption:\n raw?.enableEncryption ?? envConfig.enableEncryption ?? DEFAULTS.enableEncryption,\n requestTimeout:\n raw?.requestTimeout ?? envConfig.requestTimeout ?? DEFAULTS.requestTimeout,\n };\n}\n\nexport interface ConfigValidationError {\n field: string;\n message: string;\n}\n\nexport function validateAccountConfig(\n config: CoredAccountConfig,\n): ConfigValidationError[] {\n const errors: ConfigValidationError[] = [];\n\n if (!config.appId) {\n errors.push({\n field: \"appId\",\n message: `Account \"${config.accountId}\": appId is required. Set it in channels.cored.appId or CORED_APP_ID env var.`,\n });\n }\n\n if (!config.appSecret) {\n errors.push({\n field: \"appSecret\",\n message: `Account \"${config.accountId}\": appSecret is required. Set it in channels.cored.appSecret or CORED_APP_SECRET env var.`,\n });\n }\n\n if (!config.backendUrl) {\n errors.push({\n field: \"backendUrl\",\n message: `Account \"${config.accountId}\": backendUrl is required. Set it in channels.cored.backendUrl or CORED_BACKEND_URL env var.`,\n });\n } else if (\n !config.backendUrl.startsWith(\"http://\") &&\n !config.backendUrl.startsWith(\"https://\")\n ) {\n errors.push({\n field: \"backendUrl\",\n message: `Account \"${config.accountId}\": backendUrl must start with http:// or https:// (got \"${config.backendUrl}\").`,\n });\n }\n\n if (\n typeof config.requestTimeout !== \"number\" ||\n !Number.isFinite(config.requestTimeout) ||\n config.requestTimeout <= 0\n ) {\n errors.push({\n field: \"requestTimeout\",\n message: `Account \"${config.accountId}\": requestTimeout must be a positive number in milliseconds (got ${config.requestTimeout}).`,\n });\n }\n\n return errors;\n}\n\nexport function resolveAndValidateAccountConfig(\n cfg: unknown,\n accountId?: string,\n): CoredAccountConfig {\n const config = resolveAccountConfig(cfg, accountId);\n const errors = validateAccountConfig(config);\n\n if (errors.length > 0) {\n const messages = errors.map((e) => ` - ${e.message}`).join(\"\\n\");\n throw new Error(\n `[cored] Invalid config for account \"${config.accountId}\":\\n${messages}`,\n );\n }\n\n return config;\n}\n\nexport function listEnabledAccountConfigs(cfg: unknown): CoredAccountConfig[] {\n const ids = listAccountIds(cfg);\n return ids\n .map((id) => resolveAccountConfig(cfg, id))\n .filter((account) => account.enabled);\n}\n","// Copyright (c) 2026 Cored Limited\n// SPDX-License-Identifier: Apache-2.0\n\n/**\n * Cored client manager — wraps the @cored-im/sdk\n * and provides per-account lifecycle management.\n *\n * This module bridges the SDK's snake_case API with the plugin's camelCase\n * conventions and manages client instances by account ID.\n */\n\nimport { CoredClient, LoggerLevel, ApiError } from \"@cored-im/sdk\";\nimport type { Logger } from \"@cored-im/sdk\";\nimport type { CoredAccountConfig, ConnectionState, CoredMessageEvent } from \"../types.js\";\n\n// ---------------------------------------------------------------------------\n// Auth error detection\n// ---------------------------------------------------------------------------\n\n/** Cored auth failure error code (鉴权失败). */\nconst AUTH_ERROR_CODE = 40000006;\n\n/**\n * Check whether an error is a Cored auth/token failure.\n * Returns true for ApiError with code 40000006, which indicates\n * the token has expired or is otherwise invalid.\n */\nexport function isAuthError(err: unknown): boolean {\n return err instanceof ApiError && err.code === AUTH_ERROR_CODE;\n}\n\n// ---------------------------------------------------------------------------\n// Constants — the new SDK doesn't re-export message type enums from its\n// top-level barrel, so we define the constant locally. The value matches\n// the SDK's MessageType_TEXT = 'text' in message_enum.ts.\n// ---------------------------------------------------------------------------\n\nexport const MessageType_TEXT = \"text\";\n\n// ---------------------------------------------------------------------------\n// Types\n// ---------------------------------------------------------------------------\n\n/**\n * The SDK client instance returned by CoredClient.create().\n *\n * The new @cored-im/sdk uses:\n * - client.Im.v1.Message.sendMessage(req) — snake_case request fields\n * - client.Im.v1.Message.Event.onMessageReceive(handler) — sync, void return\n * - client.Im.v1.Chat.createTyping(req) — snake_case request fields\n * - client.preheat() / client.close() — camelCase lifecycle methods\n */\nexport type SdkClient = CoredClient;\n\n/**\n * Local send-message request shape matching the SDK's SendMessageReq.\n * Only text is used for now; add specific fields (image, card, etc.)\n * as outbound capabilities grow.\n */\nexport interface SendMessageReq {\n chat_id?: string;\n message_type?: string;\n message_content?: {\n text?: { content?: string };\n };\n reply_message_id?: string;\n}\n\n/**\n * Raw event shape from the SDK's onMessageReceive handler.\n *\n * The new SDK delivers typed events with shape:\n * { header: EventHeader, body: { message?: Message } }\n *\n * Message fields are snake_case. sender_id is a UserId object:\n * { user_id?, union_user_id?, open_user_id? }\n */\nexport interface SdkMessageEvent {\n header?: {\n event_id?: string;\n event_type?: string;\n event_created_at?: string;\n };\n body?: {\n message?: {\n message_id?: string;\n message_type?: string;\n message_status?: string;\n message_content?: unknown;\n message_created_at?: string | number;\n chat_id?: string;\n chat_seq_id?: string | number;\n sender_id?: {\n user_id?: string;\n union_user_id?: string;\n open_user_id?: string;\n } | string;\n // These may appear in group chats\n chat_type?: string;\n mention_user_list?: Array<{\n user_id?: {\n user_id?: string;\n union_user_id?: string;\n open_user_id?: string;\n };\n user_name?: string;\n }>;\n };\n };\n}\n\n// ---------------------------------------------------------------------------\n// Client state\n// ---------------------------------------------------------------------------\n\nexport interface ManagedClient {\n client: SdkClient;\n config: CoredAccountConfig;\n /** The raw handler reference, needed for offMessageReceive. */\n eventHandler?: (event: SdkMessageEvent) => void;\n /** Diagnostic connection state. Updated on create/destroy. */\n connectionState: ConnectionState;\n}\n\nconst clients = new Map<string, ManagedClient>();\n\n// ---------------------------------------------------------------------------\n// Logger adapter — bridge plugin's simple log callback to SDK's Logger interface\n// ---------------------------------------------------------------------------\n\nfunction makeLoggerAdapter(\n log?: (msg: string, ctx?: Record<string, unknown>) => void,\n): Logger {\n const emit = (level: string) => (msg: string, ...args: unknown[]) => {\n log?.(`[${level}] ${msg}${args.length ? \" \" + JSON.stringify(args) : \"\"}`);\n };\n return {\n debug: emit(\"debug\"),\n info: emit(\"info\"),\n warn: emit(\"warn\"),\n error: emit(\"error\"),\n };\n}\n\n// ---------------------------------------------------------------------------\n// Lifecycle\n// ---------------------------------------------------------------------------\n\nexport interface CreateClientOptions {\n config: CoredAccountConfig;\n onMessage?: (event: CoredMessageEvent, accountConfig: CoredAccountConfig) => void;\n log?: (msg: string, ctx?: Record<string, unknown>) => void;\n}\n\n/**\n * Create and connect a Cored SDK client for the given account.\n * Stores it in the client map for later retrieval.\n */\nexport async function createClient(opts: CreateClientOptions): Promise<ManagedClient> {\n const { config, onMessage, log } = opts;\n const accountId = config.accountId;\n\n // Tear down existing client for this account if any\n if (clients.has(accountId)) {\n await destroyClient(accountId);\n }\n\n const sdkClient = await CoredClient.create(\n config.backendUrl,\n config.appId,\n config.appSecret,\n {\n enableEncryption: config.enableEncryption,\n requestTimeout: config.requestTimeout,\n logger: log ? makeLoggerAdapter(log) : undefined,\n logLevel: log ? LoggerLevel.Debug : LoggerLevel.Info,\n },\n );\n\n // Preheat warms the token and verifies connectivity\n await sdkClient.preheat();\n\n const managed: ManagedClient = { client: sdkClient, config, connectionState: \"connected\" };\n\n // Subscribe to incoming messages if handler provided\n if (onMessage) {\n const handler = (sdkEvent: SdkMessageEvent) => {\n const normalized = normalizeSdkEvent(sdkEvent);\n if (normalized) {\n onMessage(normalized, config);\n }\n };\n\n // New SDK: onMessageReceive is synchronous, returns void.\n // Store handler reference for offMessageReceive on teardown.\n sdkClient.Im.v1.Message.Event.onMessageReceive(\n handler as Parameters<typeof sdkClient.Im.v1.Message.Event.onMessageReceive>[0],\n );\n managed.eventHandler = handler;\n }\n\n clients.set(accountId, managed);\n return managed;\n}\n\n/**\n * Destroy and disconnect a client by account ID.\n */\nexport async function destroyClient(accountId: string): Promise<void> {\n const managed = clients.get(accountId);\n if (!managed) return;\n\n managed.connectionState = \"disconnecting\";\n\n // Unsubscribe from events using offMessageReceive\n if (managed.eventHandler) {\n managed.client.Im.v1.Message.Event.offMessageReceive(\n managed.eventHandler as Parameters<typeof managed.client.Im.v1.Message.Event.offMessageReceive>[0],\n );\n }\n try {\n await managed.client.close();\n } catch {\n // Best-effort close\n }\n clients.delete(accountId);\n}\n\n/**\n * Destroy all managed clients.\n */\nexport async function destroyAllClients(): Promise<void> {\n const ids = [...clients.keys()];\n await Promise.allSettled(ids.map((id) => destroyClient(id)));\n}\n\n/**\n * Get a managed client by account ID. Falls back to the first available client.\n */\nexport function getClient(accountId?: string): ManagedClient | undefined {\n if (accountId && clients.has(accountId)) return clients.get(accountId);\n if (clients.size > 0) return clients.values().next().value as ManagedClient;\n return undefined;\n}\n\n/**\n * Number of currently connected clients.\n */\nexport function clientCount(): number {\n return clients.size;\n}\n\n/**\n * Get diagnostic state for all managed clients.\n */\nexport function getClientStates(): Array<{ accountId: string; connectionState: ConnectionState }> {\n return [...clients.entries()].map(([id, m]) => ({\n accountId: id,\n connectionState: m.connectionState,\n }));\n}\n\n// ---------------------------------------------------------------------------\n// Event normalization — SDK snake_case event -> plugin camelCase\n// ---------------------------------------------------------------------------\n\n/**\n * Convert a snake_case SDK event to the plugin's CoredMessageEvent format.\n * Returns null if the event is malformed.\n *\n * The new SDK delivers events with lowercase field names:\n * { header, body: { message: { message_id, sender_id: UserId, ... } } }\n *\n * sender_id is now a UserId object { user_id, union_user_id, open_user_id }\n * in the new SDK, but we keep backward compat with string for safety.\n */\nexport function normalizeSdkEvent(sdk: SdkMessageEvent): CoredMessageEvent | null {\n const msg = sdk.body?.message;\n if (!msg) return null;\n\n // Extract user ID from sender_id — may be UserId object or legacy string\n const senderId = msg.sender_id;\n let userId = \"\";\n if (typeof senderId === \"string\") {\n userId = senderId;\n } else if (senderId && typeof senderId === \"object\") {\n userId =\n senderId.user_id ??\n senderId.open_user_id ??\n senderId.union_user_id ??\n \"\";\n }\n\n // Extract mention user IDs from the new SDK's text mention format\n const mentionUsers = (msg.mention_user_list ?? []).map((u) => ({\n userId: u.user_id?.user_id ?? u.user_id?.open_user_id ?? u.user_id?.union_user_id ?? \"\",\n }));\n\n // message_created_at may be Int64 (string) in the new SDK\n const createdAt =\n typeof msg.message_created_at === \"string\"\n ? parseInt(msg.message_created_at, 10) || Date.now()\n : msg.message_created_at ?? Date.now();\n\n return {\n message: {\n messageId: msg.message_id ?? \"\",\n messageType: msg.message_type ?? \"\",\n messageContent: msg.message_content,\n chatId: msg.chat_id ?? \"\",\n chatType: msg.chat_type ?? \"direct\",\n sender: {\n userId,\n },\n createdAt,\n mentionUserList: mentionUsers,\n },\n };\n}\n","// Copyright (c) 2026 Cored Limited\n// SPDX-License-Identifier: Apache-2.0\n\n/**\n * Outbound message delivery — send text/typing/read to Cored chats.\n *\n * Pipeline: normalize target -> validate account/client -> send -> map errors\n *\n * Text-only for now; media/card/file delivery is follow-up (task 08).\n */\n\nimport {\n getClient,\n isAuthError,\n MessageType_TEXT,\n type ManagedClient,\n type SendMessageReq,\n} from \"../core/cored-client.js\";\n\n// ---------------------------------------------------------------------------\n// Send text\n// ---------------------------------------------------------------------------\n\nexport interface SendTextResult {\n ok: boolean;\n messageId?: string;\n error?: Error;\n provider?: string;\n}\n\n/**\n * Send a text message to a Cored chat.\n *\n * On auth error (code 40000006), forces a token refresh via preheat() and\n * retries once. This handles the SDK's token-refresh edge case without\n * requiring a gateway restart.\n */\nexport async function sendText(\n chatId: string,\n text: string,\n accountId?: string,\n replyMessageId?: string,\n logWarn?: (msg: string) => void,\n): Promise<SendTextResult> {\n const managed = getClient(accountId);\n if (!managed) {\n return {\n ok: false,\n error: new Error(\n `[cored] no connected client for account=${accountId ?? \"default\"}`,\n ),\n };\n }\n\n const req: SendMessageReq = {\n chat_id: chatId,\n message_type: MessageType_TEXT,\n message_content: {\n text: { content: text },\n },\n reply_message_id: replyMessageId,\n };\n\n try {\n const resp = await managed.client.Im.v1.Message.sendMessage(req);\n return { ok: true, messageId: resp.message_id, provider: \"cored\" };\n } catch (err) {\n if (!isAuthError(err)) {\n return {\n ok: false,\n error: new Error(\n `[cored] send failed for chat=${chatId}: ${err instanceof Error ? err.message : String(err)}`,\n ),\n };\n }\n\n // Auth token expired despite SDK auto-refresh — force refresh and retry once.\n // This avoids requiring a gateway restart when the SDK's background token\n // refresh hits an edge case (time sync drift, swallowed fetch failure, etc.).\n logWarn?.(\n `[cored] auth error on send (chat=${chatId}, account=${accountId ?? \"default\"}) — refreshing token and retrying`,\n );\n\n try {\n await managed.client.preheat();\n const resp = await managed.client.Im.v1.Message.sendMessage(req);\n logWarn?.(\n `[cored] auth retry succeeded (chat=${chatId}, account=${accountId ?? \"default\"})`,\n );\n return { ok: true, messageId: resp.message_id, provider: \"cored\" };\n } catch (retryErr) {\n return {\n ok: false,\n error: new Error(\n `[cored] send failed after auth retry for chat=${chatId}: ${retryErr instanceof Error ? retryErr.message : String(retryErr)}`,\n ),\n };\n }\n }\n}\n\n// ---------------------------------------------------------------------------\n// Typing indicator\n// ---------------------------------------------------------------------------\n\n/**\n * Set typing indicator in a chat. Cored typing lasts ~5s.\n */\nexport async function setTyping(\n chatId: string,\n accountId?: string,\n): Promise<void> {\n const managed = getClient(accountId);\n if (!managed) return;\n try {\n await managed.client.Im.v1.Chat.createTyping({ chat_id: chatId });\n } catch {\n // Typing is best-effort — don't fail the message flow\n }\n}\n\n/**\n * Clear typing indicator.\n */\nexport async function clearTyping(\n chatId: string,\n accountId?: string,\n): Promise<void> {\n const managed = getClient(accountId);\n if (!managed) return;\n try {\n await managed.client.Im.v1.Chat.deleteTyping({ chat_id: chatId });\n } catch {\n // Best-effort\n }\n}\n\n// ---------------------------------------------------------------------------\n// Read receipt\n// ---------------------------------------------------------------------------\n\n/**\n * Mark a message as read.\n */\nexport async function readMessage(\n messageId: string,\n accountId?: string,\n): Promise<void> {\n const managed = getClient(accountId);\n if (!managed) return;\n try {\n await managed.client.Im.v1.Message.readMessage({ message_id: messageId });\n } catch {\n // Best-effort\n }\n}\n\n// ---------------------------------------------------------------------------\n// Delivery callback for inbound dispatch\n// ---------------------------------------------------------------------------\n\n/**\n * Create a deliver function scoped to an account, suitable for passing\n * to processInboundMessage's InboundDispatchOptions.\n */\nexport function makeDeliver(\n accountId?: string,\n logWarn?: (msg: string) => void,\n): (chatId: string, text: string) => Promise<void> {\n return async (chatId: string, text: string) => {\n const result = await sendText(chatId, text, accountId, undefined, logWarn);\n if (!result.ok) {\n throw result.error ?? new Error(\"[cored] send failed\");\n }\n };\n}\n","// Copyright (c) 2026 Cored Limited\n// SPDX-License-Identifier: Apache-2.0\n\n/**\n * Target parsing & validation for the --to argument.\n *\n * Accepted formats:\n * \"chat:oc_abc123\" -> { kind: \"chat\", id: \"oc_abc123\" }\n * \"user:83870344313569283\" -> { kind: \"user\", id: \"83870344313569283\" }\n * \"cored:chat:oc_abc123\" -> { kind: \"chat\", id: \"oc_abc123\" } (prefix stripped)\n * \"oc_abc123\" -> { kind: \"chat\", id: \"oc_abc123\" } (bare ID defaults to chat)\n *\n * Returns null for empty, whitespace-only, or malformed targets (e.g. \"user:\" with no ID).\n */\n\nimport type { ParsedTarget } from \"./types.js\";\n\n/**\n * Parse a raw --to string into a structured target.\n * Returns null if the input is missing, empty, or has no usable ID.\n */\nexport function parseTarget(to?: string): ParsedTarget | null {\n const raw = String(to ?? \"\").trim();\n if (!raw) return null;\n\n // Strip optional \"cored:\" channel prefix (case-insensitive)\n const stripped = raw.replace(/^cored:/i, \"\");\n\n if (stripped.startsWith(\"user:\")) {\n const id = stripped.slice(\"user:\".length).trim();\n return id ? { kind: \"user\", id } : null;\n }\n\n if (stripped.startsWith(\"chat:\")) {\n const id = stripped.slice(\"chat:\".length).trim();\n return id ? { kind: \"chat\", id } : null;\n }\n\n // Bare ID — default to chat (Cored SDK uses ChatId for sending)\n return stripped ? { kind: \"chat\", id: stripped } : null;\n}\n"],"mappings":";AAGA,SAAS,8BAA8B;;;ACAvC;AAAA,EACE;AAAA,EACA;AAAA,OACK;AACP,SAAS,qCAAqC;;;ACF9C,IAAM,WAAW;AAAA,EACf,kBAAkB;AAAA,EAClB,gBAAgB;AAClB;AAEA,IAAM,aAAa;AAEnB,SAAS,iBAAiB,KAA8C;AACtE,QAAM,OAAO;AACb,SAAO,MAAM,WACP,KAAK,SAAqC,QAG5C;AACN;AAEA,SAAS,gBAA6C;AACpD,QAAM,MAAM,QAAQ;AACpB,QAAM,SAAsC,CAAC;AAE7C,MAAI,IAAI,GAAG,UAAU,QAAQ,EAAG,QAAO,QAAQ,IAAI,GAAG,UAAU,QAAQ;AACxE,MAAI,IAAI,GAAG,UAAU,YAAY;AAC/B,WAAO,YAAY,IAAI,GAAG,UAAU,YAAY;AAClD,MAAI,IAAI,GAAG,UAAU,aAAa;AAChC,WAAO,aAAa,IAAI,GAAG,UAAU,aAAa;AACpD,MAAI,IAAI,GAAG,UAAU,mBAAmB,MAAM;AAC5C,WAAO,mBACL,IAAI,GAAG,UAAU,mBAAmB,MAAM;AAC9C,MAAI,IAAI,GAAG,UAAU,iBAAiB;AACpC,WAAO,iBAAiB,OAAO,IAAI,GAAG,UAAU,iBAAiB,CAAC;AAEpE,SAAO;AACT;AAEO,SAAS,eAAe,KAAwB;AACrD,QAAM,KAAK,iBAAiB,GAAG;AAC/B,MAAI,CAAC,IAAI;AAEP,QAAI,QAAQ,IAAI,GAAG,UAAU,QAAQ,EAAG,QAAO,CAAC,SAAS;AACzD,WAAO,CAAC;AAAA,EACV;AACA,MAAI,GAAG,SAAU,QAAO,OAAO,KAAK,GAAG,QAAQ;AAC/C,MAAI,GAAG,MAAO,QAAO,CAAC,SAAS;AAE/B,MAAI,QAAQ,IAAI,GAAG,UAAU,QAAQ,EAAG,QAAO,CAAC,SAAS;AACzD,SAAO,CAAC;AACV;AAEO,SAAS,qBACd,KACA,WACoB;AACpB,QAAM,KAAK,iBAAiB,GAAG;AAC/B,QAAM,KAAK,aAAa;AACxB,QAAM,YAAY,cAAc;AAEhC,QAAM,MAAM,IAAI,WAAW,EAAE,KAAK;AAElC,SAAO;AAAA,IACL,WAAW;AAAA,IACX,OAAO,KAAK,SAAS,UAAU,SAAS;AAAA,IACxC,WAAW,KAAK,aAAa,UAAU,aAAa;AAAA,IACpD,YAAY,KAAK,cAAc,UAAU,cAAc;AAAA,IACvD,SAAS,KAAK,WAAW;AAAA,IACzB,kBACE,KAAK,oBAAoB,UAAU,oBAAoB,SAAS;AAAA,IAClE,gBACE,KAAK,kBAAkB,UAAU,kBAAkB,SAAS;AAAA,EAChE;AACF;;;AC/DA,SAAS,aAAa,aAAa,gBAAgB;AASnD,IAAM,kBAAkB;AAOjB,SAAS,YAAY,KAAuB;AACjD,SAAO,eAAe,YAAY,IAAI,SAAS;AACjD;AAQO,IAAM,mBAAmB;AAuFhC,IAAM,UAAU,oBAAI,IAA2B;AAmHxC,SAAS,UAAU,WAA+C;AACvE,MAAI,aAAa,QAAQ,IAAI,SAAS,EAAG,QAAO,QAAQ,IAAI,SAAS;AACrE,MAAI,QAAQ,OAAO,EAAG,QAAO,QAAQ,OAAO,EAAE,KAAK,EAAE;AACrD,SAAO;AACT;;;AC9MA,eAAsB,SACpB,QACA,MACA,WACA,gBACA,SACyB;AACzB,QAAM,UAAU,UAAU,SAAS;AACnC,MAAI,CAAC,SAAS;AACZ,WAAO;AAAA,MACL,IAAI;AAAA,MACJ,OAAO,IAAI;AAAA,QACT,2CAA2C,aAAa,SAAS;AAAA,MACnE;AAAA,IACF;AAAA,EACF;AAEA,QAAM,MAAsB;AAAA,IAC1B,SAAS;AAAA,IACT,cAAc;AAAA,IACd,iBAAiB;AAAA,MACf,MAAM,EAAE,SAAS,KAAK;AAAA,IACxB;AAAA,IACA,kBAAkB;AAAA,EACpB;AAEA,MAAI;AACF,UAAM,OAAO,MAAM,QAAQ,OAAO,GAAG,GAAG,QAAQ,YAAY,GAAG;AAC/D,WAAO,EAAE,IAAI,MAAM,WAAW,KAAK,YAAY,UAAU,QAAQ;AAAA,EACnE,SAAS,KAAK;AACZ,QAAI,CAAC,YAAY,GAAG,GAAG;AACrB,aAAO;AAAA,QACL,IAAI;AAAA,QACJ,OAAO,IAAI;AAAA,UACT,gCAAgC,MAAM,KAAK,eAAe,QAAQ,IAAI,UAAU,OAAO,GAAG,CAAC;AAAA,QAC7F;AAAA,MACF;AAAA,IACF;AAKA;AAAA,MACE,oCAAoC,MAAM,aAAa,aAAa,SAAS;AAAA,IAC/E;AAEA,QAAI;AACF,YAAM,QAAQ,OAAO,QAAQ;AAC7B,YAAM,OAAO,MAAM,QAAQ,OAAO,GAAG,GAAG,QAAQ,YAAY,GAAG;AAC/D;AAAA,QACE,sCAAsC,MAAM,aAAa,aAAa,SAAS;AAAA,MACjF;AACA,aAAO,EAAE,IAAI,MAAM,WAAW,KAAK,YAAY,UAAU,QAAQ;AAAA,IACnE,SAAS,UAAU;AACjB,aAAO;AAAA,QACL,IAAI;AAAA,QACJ,OAAO,IAAI;AAAA,UACT,iDAAiD,MAAM,KAAK,oBAAoB,QAAQ,SAAS,UAAU,OAAO,QAAQ,CAAC;AAAA,QAC7H;AAAA,MACF;AAAA,IACF;AAAA,EACF;AACF;;;AC9EO,SAAS,YAAY,IAAkC;AAC5D,QAAM,MAAM,OAAO,MAAM,EAAE,EAAE,KAAK;AAClC,MAAI,CAAC,IAAK,QAAO;AAGjB,QAAM,WAAW,IAAI,QAAQ,YAAY,EAAE;AAE3C,MAAI,SAAS,WAAW,OAAO,GAAG;AAChC,UAAM,KAAK,SAAS,MAAM,QAAQ,MAAM,EAAE,KAAK;AAC/C,WAAO,KAAK,EAAE,MAAM,QAAQ,GAAG,IAAI;AAAA,EACrC;AAEA,MAAI,SAAS,WAAW,OAAO,GAAG;AAChC,UAAM,KAAK,SAAS,MAAM,QAAQ,MAAM,EAAE,KAAK;AAC/C,WAAO,KAAK,EAAE,MAAM,QAAQ,GAAG,IAAI;AAAA,EACrC;AAGA,SAAO,WAAW,EAAE,MAAM,QAAQ,IAAI,SAAS,IAAI;AACrD;;;AJ1BA,IAAM,cAAc,CAAC,SAAS,aAAa,cAAc,WAAW,oBAAoB,gBAAgB;AAEjG,IAAM,OAAO,wBAA4C;AAAA,EAC9D,IAAI;AAAA,EAEJ,MAAM;AAAA,IACJ,IAAI;AAAA,IACJ,OAAO;AAAA,IACP,gBAAgB;AAAA,IAChB,UAAU;AAAA,IACV,OAAO;AAAA,IACP,SAAS,CAAC,IAAI;AAAA,EAChB;AAAA,EAEA,cAAc;AAAA,IACZ,WAAW,CAAC,UAAU,OAAO;AAAA,EAC/B;AAAA,EAEA,QAAQ;AAAA,IACN,GAAG,8BAAkD;AAAA,MACnD,YAAY;AAAA,MACZ,gBAAgB,CAAC,QAAQ,eAAe,GAAG;AAAA,MAC3C,gBAAgB,CAAC,KAAK,cACpB,qBAAqB,KAAK,aAAa,MAAS;AAAA,MAClD,kBAAkB,MAAM;AAAA,MACxB,eAAe,KAAK,WAAW;AAC7B,cAAM,WAAW,qBAAqB,KAAK,aAAa,MAAS;AACjE,cAAM,YAAY;AAAA,UAChB,SAAS,SAAS,SAAS,aAAa,SAAS;AAAA,QACnD;AACA,eAAO;AAAA,UACL,SAAS,SAAS;AAAA,UAClB,YAAY;AAAA,UACZ,aAAa,YAAY,cAAc;AAAA,QACzC;AAAA,MACF;AAAA,MACA,iBAAiB;AAAA,IACnB,CAAC;AAAA,EACH;AAAA,EAEA,OAAO;AAAA,IACL,eAAe,CAAC,EAAE,MAAM,MAAM;AAC5B,YAAM,UAAoB,CAAC;AAC3B,UAAI,CAAC,MAAM,SAAU,SAAQ,KAAK,yCAAyC;AAC3E,UAAI,CAAC,MAAM,MAAO,SAAQ,KAAK,yCAAyC;AACxE,UAAI,CAAC,MAAM,IAAK,SAAQ,KAAK,mCAAmC;AAChE,UAAI,QAAQ,SAAS,GAAG;AACtB,eAAO;AAAA,UACL,2BAA2B,QAAQ,KAAK,IAAI,CAAC;AAAA,UAC7C;AAAA,UACA;AAAA,UACA;AAAA,UACA;AAAA,UACA;AAAA,UACA;AAAA,QACF,EAAE,KAAK,IAAI;AAAA,MACb;AACA,aAAO;AAAA,IACT;AAAA,IACA,oBAAoB,CAAC,EAAE,KAAK,WAAW,MAAM,MAAM;AACjD,YAAM,UAAU,gBAAgB,GAAG;AACnC,UAAI,CAAC,QAAQ,SAAU,SAAQ,WAAW,CAAC;AAC3C,YAAM,KAAK,QAAQ;AACnB,UAAI,CAAC,GAAG,OAAO,EAAG,IAAG,OAAO,IAAI,CAAC;AACjC,YAAM,UAAU,GAAG,OAAO;AAI1B,YAAM,QAAQ,MAAM;AACpB,YAAM,YAAY,MAAM;AACxB,YAAM,aAAa,MAAM;AAEzB,UAAI,aAAa,cAAc,WAAW;AAExC,YAAI,CAAC,QAAQ,SAAU,SAAQ,WAAW,CAAC;AAC3C,cAAM,WAAW,QAAQ;AACzB,YAAI,CAAC,SAAS,SAAS,EAAG,UAAS,SAAS,IAAI,CAAC;AACjD,cAAM,UAAU,SAAS,SAAS;AAClC,YAAI,MAAO,SAAQ,QAAQ;AAC3B,YAAI,UAAW,SAAQ,YAAY;AACnC,YAAI,WAAY,SAAQ,aAAa;AAAA,MACvC,OAAO;AAEL,YAAI,MAAO,SAAQ,QAAQ;AAC3B,YAAI,UAAW,SAAQ,YAAY;AACnC,YAAI,WAAY,SAAQ,aAAa;AAAA,MACvC;AAEA,aAAO;AAAA,IACT;AAAA,EACF;AAAA,EAEA,aAAa;AAAA,IACX,SAAS;AAAA,IACT,QAAQ;AAAA,MACN,iBAAiB;AAAA,MACjB,mBAAmB;AAAA,MACnB,mBAAmB,CAAC,EAAE,IAAI,MAAM;AAC9B,cAAM,MAAM,eAAe,GAAG;AAC9B,eAAO,IAAI,KAAK,CAAC,OAAO;AACtB,gBAAM,WAAW,qBAAqB,KAAK,EAAE;AAC7C,iBAAO,QAAQ,SAAS,SAAS,SAAS,aAAa,SAAS,UAAU;AAAA,QAC5E,CAAC;AAAA,MACH;AAAA,IACF;AAAA,IACA,aAAa;AAAA,MACX;AAAA,QACE,UAAU;AAAA,QACV,cAAc;AAAA,QACd,iBAAiB;AAAA,QACjB,iBAAiB;AAAA,QACjB,WAAW;AAAA,QACX,YAAY;AAAA,QACZ,aACE;AAAA,QACF,SAAS,CAAC,EAAE,KAAK,UAAU,MAAM;AAC/B,gBAAM,WAAW,qBAAqB,KAAK,aAAa,MAAS;AACjE,iBAAO;AAAA,YACL,mBAAmB,QAAQ,SAAS,KAAK;AAAA,YACzC,oBAAoB,QAAQ,SAAS,KAAK;AAAA,UAC5C;AAAA,QACF;AAAA,MACF;AAAA,MACA;AAAA,QACE,UAAU;AAAA,QACV,cAAc;AAAA,QACd,iBAAiB;AAAA,QACjB,iBAAiB;AAAA,QACjB,WAAW;AAAA,QACX,YAAY;AAAA,QACZ,aACE;AAAA,QACF,SAAS,CAAC,EAAE,KAAK,UAAU,MAAM;AAC/B,gBAAM,WAAW,qBAAqB,KAAK,aAAa,MAAS;AACjE,iBAAO;AAAA,YACL,mBAAmB,QAAQ,SAAS,SAAS;AAAA,YAC7C,oBAAoB,QAAQ,SAAS,SAAS;AAAA,UAChD;AAAA,QACF;AAAA,MACF;AAAA,MACA;AAAA,QACE,UAAU;AAAA,QACV,cAAc;AAAA,QACd,iBAAiB;AAAA,QACjB,iBAAiB;AAAA,QACjB,WAAW;AAAA,QACX,YAAY;AAAA,QACZ,aACE;AAAA,QACF,SAAS,CAAC,EAAE,KAAK,UAAU,MAAM;AAC/B,gBAAM,WAAW,qBAAqB,KAAK,aAAa,MAAS;AACjE,iBAAO;AAAA,YACL,mBAAmB,QAAQ,SAAS,UAAU;AAAA,YAC9C,oBAAoB,QAAQ,SAAS,UAAU;AAAA,UACjD;AAAA,QACF;AAAA,MACF;AAAA,IACF;AAAA,EACF;AACF,CAAC;AAKM,IAAM,cAAc,wBAA4C;AAAA,EACrE;AAAA;AAAA,EAGA,UAAU;AAAA,IACR,IAAI;AAAA,MACF,YAAY;AAAA,MACZ,eAAe,MAAM;AAAA,MACrB,kBAAkB,MAAM,CAAC;AAAA,MACzB,eAAe;AAAA,IACjB;AAAA,EACF;AAAA;AAAA,EAGA,WAAW,EAAE,qBAAqB,QAAQ;AAAA;AAAA,EAG1C,UAAU;AAAA,IACR,iBAAiB;AAAA,MACf,SAAS;AAAA,MACT,UAAU,OAAO,QAAQ;AACvB,cAAM,SAAS,YAAY,IAAI,EAAE;AACjC,YAAI,CAAC,QAAQ;AACX,gBAAM,IAAI,MAAM,gCAAgC,IAAI,EAAE,EAAE;AAAA,QAC1D;AACA,cAAM,SAAS,MAAM;AAAA,UACnB,OAAO;AAAA,UACP,IAAI;AAAA,UACJ,IAAI,aAAa;AAAA,UACjB,IAAI,aAAa;AAAA,QACnB;AACA,YAAI,CAAC,OAAO,IAAI;AACd,gBAAM,OAAO,SAAS,IAAI,MAAM,qBAAqB;AAAA,QACvD;AACA,eAAO,EAAE,WAAW,OAAO,aAAa,GAAG;AAAA,MAC7C;AAAA,IACF;AAAA,IACA,MAAM;AAAA,MACJ,cAAc;AAAA,MACd,eAAe,CAAC,EAAE,GAAG,MAAM;AACzB,YAAI,CAAC,GAAI,QAAO,EAAE,IAAI,OAAgB,OAAO,IAAI,MAAM,0BAA0B,EAAE;AACnF,cAAM,SAAS,YAAY,EAAE;AAC7B,YAAI,CAAC,QAAQ;AACX,iBAAO;AAAA,YACL,IAAI;AAAA,YACJ,OAAO,IAAI;AAAA,cACT,+CAA+C,KAAK,UAAU,EAAE,CAAC;AAAA,YACnE;AAAA,UACF;AAAA,QACF;AACA,eAAO,EAAE,IAAI,MAAe,IAAI,GAAG,OAAO,IAAI,IAAI,OAAO,EAAE,GAAG;AAAA,MAChE;AAAA,IACF;AAAA,EACF;AACF,CAAC;;;ADlOD,IAAO,sBAAQ,uBAAuB,IAAI;","names":[]}
1
+ {"version":3,"sources":["../src/setup-entry.ts","../src/channel.ts","../src/config.ts","../src/core/cored-client.ts","../src/messaging/outbound.ts","../src/targets.ts"],"sourcesContent":["// Copyright (c) 2026 Cored Limited\n// SPDX-License-Identifier: Apache-2.0\n\nimport { defineSetupPluginEntry } from \"openclaw/plugin-sdk/core\";\nimport { base } from \"./channel.js\";\n\nexport default defineSetupPluginEntry(base);\n","// Copyright (c) 2026 Cored Limited\n// SPDX-License-Identifier: Apache-2.0\n\nimport {\n createChatChannelPlugin,\n createChannelPluginBase,\n} from \"openclaw/plugin-sdk/core\";\nimport { createHybridChannelConfigBase } from \"openclaw/plugin-sdk/channel-config-helpers\";\nimport type { OpenClawConfig } from \"openclaw/plugin-sdk/core\";\nimport { listAccountIds, resolveAccountConfig } from \"./config.js\";\nimport { sendText } from \"./messaging/outbound.js\";\nimport { parseTarget } from \"./targets.js\";\nimport type { CoredAccountConfig } from \"./types.js\";\n\nconst BASE_FIELDS = [\"appId\", \"appSecret\", \"backendUrl\", \"enabled\", \"enableEncryption\", \"requestTimeout\"];\n\nexport const base = createChannelPluginBase<CoredAccountConfig>({\n id: \"cored\",\n\n meta: {\n id: \"cored\",\n label: \"Cored\",\n selectionLabel: \"Cored\",\n docsPath: \"/channels/cored\",\n blurb: \"Connect OpenClaw to Cored\",\n aliases: [\"co\"],\n },\n\n capabilities: {\n chatTypes: [\"direct\", \"group\"],\n },\n\n config: {\n ...createHybridChannelConfigBase<CoredAccountConfig>({\n sectionKey: \"cored\",\n listAccountIds: (cfg) => listAccountIds(cfg),\n resolveAccount: (cfg, accountId) =>\n resolveAccountConfig(cfg, accountId ?? undefined),\n defaultAccountId: () => \"default\",\n inspectAccount(cfg, accountId) {\n const resolved = resolveAccountConfig(cfg, accountId ?? undefined);\n const hasConfig = Boolean(\n resolved.appId && resolved.appSecret && resolved.backendUrl,\n );\n return {\n enabled: resolved.enabled,\n configured: hasConfig,\n tokenStatus: hasConfig ? \"available\" : \"missing\",\n };\n },\n clearBaseFields: BASE_FIELDS,\n }),\n },\n\n setup: {\n validateInput: ({ input }) => {\n const missing: string[] = [];\n if (!input.appToken) missing.push(\"--app-token (App ID from Admin Console)\");\n if (!input.token) missing.push(\"--token (App Secret from Admin Console)\");\n if (!input.url) missing.push(\"--url (your Cored server address)\");\n if (missing.length > 0) {\n return [\n `Missing required flags: ${missing.join(\", \")}`,\n \"\",\n \"Usage:\",\n ` openclaw channels add --channel cored --app-token <APP_ID> --token <APP_SECRET> --url <BACKEND_URL>`,\n \"\",\n \"You can find App ID and App Secret in:\",\n \" Cored Admin Console → Workplace → App Management → App Details\",\n ].join(\"\\n\");\n }\n return null;\n },\n applyAccountConfig: ({ cfg, accountId, input }) => {\n const updated = structuredClone(cfg) as Record<string, unknown>;\n if (!updated.channels) updated.channels = {};\n const ch = updated.channels as Record<string, Record<string, unknown>>;\n if (!ch[\"cored\"]) ch[\"cored\"] = {};\n const section = ch[\"cored\"];\n\n // Map ChannelSetupInput keys to our config shape:\n // appToken → appId, token → appSecret, url → backendUrl\n const appId = input.appToken;\n const appSecret = input.token;\n const backendUrl = input.url;\n\n const id = accountId || \"default\";\n\n if (!section.accounts) section.accounts = {};\n const accounts = section.accounts as Record<string, Record<string, unknown>>;\n if (!accounts[id]) accounts[id] = {};\n const account = accounts[id];\n if (appId) account.appId = appId;\n if (appSecret) account.appSecret = appSecret;\n if (backendUrl) account.backendUrl = backendUrl;\n\n return updated as OpenClawConfig;\n },\n },\n\n setupWizard: {\n channel: \"cored\",\n status: {\n configuredLabel: \"Connected\",\n unconfiguredLabel: \"Not configured\",\n resolveConfigured: ({ cfg }) => {\n const ids = listAccountIds(cfg);\n return ids.some((id) => {\n const resolved = resolveAccountConfig(cfg, id);\n return Boolean(resolved.appId && resolved.appSecret && resolved.backendUrl);\n });\n },\n },\n credentials: [\n {\n inputKey: \"appToken\",\n providerHint: \"cored\",\n credentialLabel: \"App ID\",\n preferredEnvVar: \"CORED_APP_ID\",\n envPrompt: \"Use CORED_APP_ID from environment?\",\n keepPrompt: \"Keep current App ID?\",\n inputPrompt:\n \"Enter App ID (from Cored Admin Console → Workplace → App Management → App Details):\",\n inspect: ({ cfg, accountId }) => {\n const resolved = resolveAccountConfig(cfg, accountId ?? undefined);\n return {\n accountConfigured: Boolean(resolved.appId),\n hasConfiguredValue: Boolean(resolved.appId),\n };\n },\n },\n {\n inputKey: \"token\",\n providerHint: \"cored\",\n credentialLabel: \"App Secret\",\n preferredEnvVar: \"CORED_APP_SECRET\",\n envPrompt: \"Use CORED_APP_SECRET from environment?\",\n keepPrompt: \"Keep current App Secret?\",\n inputPrompt:\n \"Enter App Secret (from the same App Details page, keep this value confidential):\",\n inspect: ({ cfg, accountId }) => {\n const resolved = resolveAccountConfig(cfg, accountId ?? undefined);\n return {\n accountConfigured: Boolean(resolved.appSecret),\n hasConfiguredValue: Boolean(resolved.appSecret),\n };\n },\n },\n {\n inputKey: \"url\",\n providerHint: \"cored\",\n credentialLabel: \"Cored Server URL\",\n preferredEnvVar: \"CORED_BACKEND_URL\",\n envPrompt: \"Use CORED_BACKEND_URL from environment?\",\n keepPrompt: \"Keep current Cored Server URL?\",\n inputPrompt:\n \"Enter your Cored server address (e.g. http://192.168.10.10:21000):\",\n inspect: ({ cfg, accountId }) => {\n const resolved = resolveAccountConfig(cfg, accountId ?? undefined);\n return {\n accountConfigured: Boolean(resolved.backendUrl),\n hasConfiguredValue: Boolean(resolved.backendUrl),\n };\n },\n },\n ],\n },\n});\n\n// Cast needed: createChannelPluginBase returns Partial<config> but\n// createChatChannelPlugin requires config to be defined. We always\n// provide config above so the cast is safe.\nexport const coredPlugin = createChatChannelPlugin<CoredAccountConfig>({\n base: base as Parameters<typeof createChatChannelPlugin<CoredAccountConfig>>[0][\"base\"],\n\n // DM security: who can message the bot\n security: {\n dm: {\n channelKey: \"cored\",\n resolvePolicy: () => undefined,\n resolveAllowFrom: () => [],\n defaultPolicy: \"allowlist\",\n },\n },\n\n // Threading: how replies are delivered\n threading: { topLevelReplyToMode: \"reply\" },\n\n // Outbound: send messages to the platform\n outbound: {\n attachedResults: {\n channel: \"cored\",\n sendText: async (ctx) => {\n const target = parseTarget(ctx.to);\n if (!target) {\n throw new Error(`[cored] invalid send target: ${ctx.to}`);\n }\n const result = await sendText(\n target.id,\n ctx.text,\n ctx.accountId ?? undefined,\n ctx.replyToId ?? undefined,\n );\n if (!result.ok) {\n throw result.error ?? new Error(\"[cored] send failed\");\n }\n return { messageId: result.messageId ?? \"\" };\n },\n },\n base: {\n deliveryMode: \"direct\",\n resolveTarget: ({ to }) => {\n if (!to) return { ok: false as const, error: new Error(\"[cored] --to is required\") };\n const target = parseTarget(to);\n if (!target) {\n return {\n ok: false as const,\n error: new Error(\n `Cored requires --to <user:ID|chat:ID>, got: ${JSON.stringify(to)}`,\n ),\n };\n }\n return { ok: true as const, to: `${target.kind}:${target.id}` };\n },\n },\n },\n});\n","// Copyright (c) 2026 Cored Limited\n// SPDX-License-Identifier: Apache-2.0\n\nimport type { CoredChannelConfig, CoredAccountConfig } from \"./types.js\";\n\nconst DEFAULTS = {\n enableEncryption: true,\n requestTimeout: 30_000,\n} as const;\n\nconst ENV_PREFIX = \"CORED_\";\n\nfunction getChannelConfig(cfg: unknown): CoredChannelConfig | undefined {\n const root = cfg as Record<string, unknown> | undefined;\n return root?.channels\n ? ((root.channels as Record<string, unknown>).cored as\n | CoredChannelConfig\n | undefined)\n : undefined;\n}\n\nfunction readEnvConfig(): Partial<CoredAccountConfig> {\n const env = process.env;\n const result: Partial<CoredAccountConfig> = {};\n\n if (env[`${ENV_PREFIX}APP_ID`]) result.appId = env[`${ENV_PREFIX}APP_ID`];\n if (env[`${ENV_PREFIX}APP_SECRET`])\n result.appSecret = env[`${ENV_PREFIX}APP_SECRET`];\n if (env[`${ENV_PREFIX}BACKEND_URL`])\n result.backendUrl = env[`${ENV_PREFIX}BACKEND_URL`];\n if (env[`${ENV_PREFIX}ENABLE_ENCRYPTION`] !== undefined)\n result.enableEncryption =\n env[`${ENV_PREFIX}ENABLE_ENCRYPTION`] !== \"false\";\n if (env[`${ENV_PREFIX}REQUEST_TIMEOUT`])\n result.requestTimeout = Number(env[`${ENV_PREFIX}REQUEST_TIMEOUT`]);\n\n return result;\n}\n\nexport function listAccountIds(cfg: unknown): string[] {\n const ch = getChannelConfig(cfg);\n if (!ch) {\n // Check env vars as fallback\n if (process.env[`${ENV_PREFIX}APP_ID`]) return [\"default\"];\n return [];\n }\n if (ch.accounts) return Object.keys(ch.accounts);\n // env var fallback\n if (process.env[`${ENV_PREFIX}APP_ID`]) return [\"default\"];\n return [];\n}\n\nexport function resolveAccountConfig(\n cfg: unknown,\n accountId?: string,\n): CoredAccountConfig {\n const ch = getChannelConfig(cfg);\n const id = accountId ?? \"default\";\n const envConfig = readEnvConfig();\n\n const raw = ch?.accounts?.[id];\n\n return {\n accountId: id,\n appId: raw?.appId ?? envConfig.appId ?? \"\",\n appSecret: raw?.appSecret ?? envConfig.appSecret ?? \"\",\n backendUrl: raw?.backendUrl ?? envConfig.backendUrl ?? \"\",\n enabled: raw?.enabled ?? true,\n enableEncryption:\n raw?.enableEncryption ?? envConfig.enableEncryption ?? DEFAULTS.enableEncryption,\n requestTimeout:\n raw?.requestTimeout ?? envConfig.requestTimeout ?? DEFAULTS.requestTimeout,\n };\n}\n\nexport interface ConfigValidationError {\n field: string;\n message: string;\n}\n\nexport function validateAccountConfig(\n config: CoredAccountConfig,\n): ConfigValidationError[] {\n const errors: ConfigValidationError[] = [];\n\n if (!config.appId) {\n errors.push({\n field: \"appId\",\n message: `Account \"${config.accountId}\": appId is required. Set it in channels.cored.appId or CORED_APP_ID env var.`,\n });\n }\n\n if (!config.appSecret) {\n errors.push({\n field: \"appSecret\",\n message: `Account \"${config.accountId}\": appSecret is required. Set it in channels.cored.appSecret or CORED_APP_SECRET env var.`,\n });\n }\n\n if (!config.backendUrl) {\n errors.push({\n field: \"backendUrl\",\n message: `Account \"${config.accountId}\": backendUrl is required. Set it in channels.cored.backendUrl or CORED_BACKEND_URL env var.`,\n });\n } else if (\n !config.backendUrl.startsWith(\"http://\") &&\n !config.backendUrl.startsWith(\"https://\")\n ) {\n errors.push({\n field: \"backendUrl\",\n message: `Account \"${config.accountId}\": backendUrl must start with http:// or https:// (got \"${config.backendUrl}\").`,\n });\n }\n\n if (\n typeof config.requestTimeout !== \"number\" ||\n !Number.isFinite(config.requestTimeout) ||\n config.requestTimeout <= 0\n ) {\n errors.push({\n field: \"requestTimeout\",\n message: `Account \"${config.accountId}\": requestTimeout must be a positive number in milliseconds (got ${config.requestTimeout}).`,\n });\n }\n\n return errors;\n}\n\nexport function resolveAndValidateAccountConfig(\n cfg: unknown,\n accountId?: string,\n): CoredAccountConfig {\n const config = resolveAccountConfig(cfg, accountId);\n const errors = validateAccountConfig(config);\n\n if (errors.length > 0) {\n const messages = errors.map((e) => ` - ${e.message}`).join(\"\\n\");\n throw new Error(\n `[cored] Invalid config for account \"${config.accountId}\":\\n${messages}`,\n );\n }\n\n return config;\n}\n\nexport function listEnabledAccountConfigs(cfg: unknown): CoredAccountConfig[] {\n const ids = listAccountIds(cfg);\n return ids\n .map((id) => resolveAccountConfig(cfg, id))\n .filter((account) => account.enabled);\n}\n","// Copyright (c) 2026 Cored Limited\n// SPDX-License-Identifier: Apache-2.0\n\n/**\n * Cored client manager — wraps the @cored-im/sdk\n * and provides per-account lifecycle management.\n *\n * This module bridges the SDK's snake_case API with the plugin's camelCase\n * conventions and manages client instances by account ID.\n */\n\nimport { CoredClient, LoggerLevel, ApiError } from \"@cored-im/sdk\";\nimport type { Logger } from \"@cored-im/sdk\";\nimport type { CoredAccountConfig, ConnectionState, CoredMessageEvent } from \"../types.js\";\n\n// ---------------------------------------------------------------------------\n// Auth error detection\n// ---------------------------------------------------------------------------\n\n/** Cored auth failure error code (鉴权失败). */\nconst AUTH_ERROR_CODE = 40000006;\n\n/**\n * Check whether an error is a Cored auth/token failure.\n * Returns true for ApiError with code 40000006, which indicates\n * the token has expired or is otherwise invalid.\n */\nexport function isAuthError(err: unknown): boolean {\n return err instanceof ApiError && err.code === AUTH_ERROR_CODE;\n}\n\n// ---------------------------------------------------------------------------\n// Constants — the new SDK doesn't re-export message type enums from its\n// top-level barrel, so we define the constant locally. The value matches\n// the SDK's MessageType_TEXT = 'text' in message_enum.ts.\n// ---------------------------------------------------------------------------\n\nexport const MessageType_TEXT = \"text\";\n\n// ---------------------------------------------------------------------------\n// Types\n// ---------------------------------------------------------------------------\n\n/**\n * The SDK client instance returned by CoredClient.create().\n *\n * The new @cored-im/sdk uses:\n * - client.Im.v1.Message.sendMessage(req) — snake_case request fields\n * - client.Im.v1.Message.Event.onMessageReceive(handler) — sync, void return\n * - client.Im.v1.Chat.createTyping(req) — snake_case request fields\n * - client.preheat() / client.close() — camelCase lifecycle methods\n */\nexport type SdkClient = CoredClient;\n\n/**\n * Local send-message request shape matching the SDK's SendMessageReq.\n * Only text is used for now; add specific fields (image, card, etc.)\n * as outbound capabilities grow.\n */\nexport interface SendMessageReq {\n chat_id?: string;\n message_type?: string;\n message_content?: {\n text?: { content?: string };\n };\n reply_message_id?: string;\n}\n\n/**\n * Raw event shape from the SDK's onMessageReceive handler.\n *\n * The new SDK delivers typed events with shape:\n * { header: EventHeader, body: { message?: Message } }\n *\n * Message fields are snake_case. sender_id is a UserId object:\n * { user_id?, union_user_id?, open_user_id? }\n */\nexport interface SdkMessageEvent {\n header?: {\n event_id?: string;\n event_type?: string;\n event_created_at?: string;\n };\n body?: {\n message?: {\n message_id?: string;\n message_type?: string;\n message_status?: string;\n message_content?: unknown;\n message_created_at?: string | number;\n chat_id?: string;\n chat_seq_id?: string | number;\n sender_id?: {\n user_id?: string;\n union_user_id?: string;\n open_user_id?: string;\n } | string;\n // These may appear in group chats\n chat_type?: string;\n mention_user_list?: Array<{\n user_id?: {\n user_id?: string;\n union_user_id?: string;\n open_user_id?: string;\n };\n user_name?: string;\n }>;\n };\n };\n}\n\n// ---------------------------------------------------------------------------\n// Client state\n// ---------------------------------------------------------------------------\n\nexport interface ManagedClient {\n client: SdkClient;\n config: CoredAccountConfig;\n /** The raw handler reference, needed for offMessageReceive. */\n eventHandler?: (event: SdkMessageEvent) => void;\n /** Diagnostic connection state. Updated on create/destroy. */\n connectionState: ConnectionState;\n}\n\nconst clients = new Map<string, ManagedClient>();\n\n// ---------------------------------------------------------------------------\n// Logger adapter — bridge plugin's simple log callback to SDK's Logger interface\n// ---------------------------------------------------------------------------\n\nfunction makeLoggerAdapter(\n log?: (msg: string, ctx?: Record<string, unknown>) => void,\n): Logger {\n const emit = (level: string) => (msg: string, ...args: unknown[]) => {\n log?.(`[${level}] ${msg}${args.length ? \" \" + JSON.stringify(args) : \"\"}`);\n };\n return {\n debug: emit(\"debug\"),\n info: emit(\"info\"),\n warn: emit(\"warn\"),\n error: emit(\"error\"),\n };\n}\n\n// ---------------------------------------------------------------------------\n// Lifecycle\n// ---------------------------------------------------------------------------\n\nexport interface CreateClientOptions {\n config: CoredAccountConfig;\n onMessage?: (event: CoredMessageEvent, accountConfig: CoredAccountConfig) => void;\n log?: (msg: string, ctx?: Record<string, unknown>) => void;\n}\n\n/**\n * Create and connect a Cored SDK client for the given account.\n * Stores it in the client map for later retrieval.\n */\nexport async function createClient(opts: CreateClientOptions): Promise<ManagedClient> {\n const { config, onMessage, log } = opts;\n const accountId = config.accountId;\n\n // Tear down existing client for this account if any\n if (clients.has(accountId)) {\n await destroyClient(accountId);\n }\n\n const sdkClient = await CoredClient.create(\n config.backendUrl,\n config.appId,\n config.appSecret,\n {\n enableEncryption: config.enableEncryption,\n requestTimeout: config.requestTimeout,\n logger: log ? makeLoggerAdapter(log) : undefined,\n logLevel: log ? LoggerLevel.Debug : LoggerLevel.Info,\n },\n );\n\n // Preheat warms the token and verifies connectivity\n await sdkClient.preheat();\n\n const managed: ManagedClient = { client: sdkClient, config, connectionState: \"connected\" };\n\n // Subscribe to incoming messages if handler provided\n if (onMessage) {\n const handler = (sdkEvent: SdkMessageEvent) => {\n const normalized = normalizeSdkEvent(sdkEvent);\n if (normalized) {\n onMessage(normalized, config);\n }\n };\n\n // New SDK: onMessageReceive is synchronous, returns void.\n // Store handler reference for offMessageReceive on teardown.\n sdkClient.Im.v1.Message.Event.onMessageReceive(\n handler as Parameters<typeof sdkClient.Im.v1.Message.Event.onMessageReceive>[0],\n );\n managed.eventHandler = handler;\n }\n\n clients.set(accountId, managed);\n return managed;\n}\n\n/**\n * Destroy and disconnect a client by account ID.\n */\nexport async function destroyClient(accountId: string): Promise<void> {\n const managed = clients.get(accountId);\n if (!managed) return;\n\n managed.connectionState = \"disconnecting\";\n\n // Unsubscribe from events using offMessageReceive\n if (managed.eventHandler) {\n managed.client.Im.v1.Message.Event.offMessageReceive(\n managed.eventHandler as Parameters<typeof managed.client.Im.v1.Message.Event.offMessageReceive>[0],\n );\n }\n try {\n await managed.client.close();\n } catch {\n // Best-effort close\n }\n clients.delete(accountId);\n}\n\n/**\n * Destroy all managed clients.\n */\nexport async function destroyAllClients(): Promise<void> {\n const ids = [...clients.keys()];\n await Promise.allSettled(ids.map((id) => destroyClient(id)));\n}\n\n/**\n * Get a managed client by account ID. Falls back to the first available client.\n */\nexport function getClient(accountId?: string): ManagedClient | undefined {\n if (accountId && clients.has(accountId)) return clients.get(accountId);\n if (clients.size > 0) return clients.values().next().value as ManagedClient;\n return undefined;\n}\n\n/**\n * Number of currently connected clients.\n */\nexport function clientCount(): number {\n return clients.size;\n}\n\n/**\n * Get diagnostic state for all managed clients.\n */\nexport function getClientStates(): Array<{ accountId: string; connectionState: ConnectionState }> {\n return [...clients.entries()].map(([id, m]) => ({\n accountId: id,\n connectionState: m.connectionState,\n }));\n}\n\n// ---------------------------------------------------------------------------\n// Event normalization — SDK snake_case event -> plugin camelCase\n// ---------------------------------------------------------------------------\n\n/**\n * Convert a snake_case SDK event to the plugin's CoredMessageEvent format.\n * Returns null if the event is malformed.\n *\n * The new SDK delivers events with lowercase field names:\n * { header, body: { message: { message_id, sender_id: UserId, ... } } }\n *\n * sender_id is now a UserId object { user_id, union_user_id, open_user_id }\n * in the new SDK, but we keep backward compat with string for safety.\n */\nexport function normalizeSdkEvent(sdk: SdkMessageEvent): CoredMessageEvent | null {\n const msg = sdk.body?.message;\n if (!msg) return null;\n\n // Extract user ID from sender_id — may be UserId object or legacy string\n const senderId = msg.sender_id;\n let userId = \"\";\n if (typeof senderId === \"string\") {\n userId = senderId;\n } else if (senderId && typeof senderId === \"object\") {\n userId =\n senderId.user_id ??\n senderId.open_user_id ??\n senderId.union_user_id ??\n \"\";\n }\n\n // Extract mention user IDs from the new SDK's text mention format\n const mentionUsers = (msg.mention_user_list ?? []).map((u) => ({\n userId: u.user_id?.user_id ?? u.user_id?.open_user_id ?? u.user_id?.union_user_id ?? \"\",\n }));\n\n // message_created_at may be Int64 (string) in the new SDK\n const createdAt =\n typeof msg.message_created_at === \"string\"\n ? parseInt(msg.message_created_at, 10) || Date.now()\n : msg.message_created_at ?? Date.now();\n\n return {\n message: {\n messageId: msg.message_id ?? \"\",\n messageType: msg.message_type ?? \"\",\n messageContent: msg.message_content,\n chatId: msg.chat_id ?? \"\",\n chatType: msg.chat_type ?? \"direct\",\n sender: {\n userId,\n },\n createdAt,\n mentionUserList: mentionUsers,\n },\n };\n}\n","// Copyright (c) 2026 Cored Limited\n// SPDX-License-Identifier: Apache-2.0\n\n/**\n * Outbound message delivery — send text/typing/read to Cored chats.\n *\n * Pipeline: normalize target -> validate account/client -> send -> map errors\n *\n * Text-only for now; media/card/file delivery is follow-up (task 08).\n */\n\nimport {\n getClient,\n isAuthError,\n MessageType_TEXT,\n type ManagedClient,\n type SendMessageReq,\n} from \"../core/cored-client.js\";\n\n// ---------------------------------------------------------------------------\n// Send text\n// ---------------------------------------------------------------------------\n\nexport interface SendTextResult {\n ok: boolean;\n messageId?: string;\n error?: Error;\n provider?: string;\n}\n\n/**\n * Send a text message to a Cored chat.\n *\n * On auth error (code 40000006), forces a token refresh via preheat() and\n * retries once. This handles the SDK's token-refresh edge case without\n * requiring a gateway restart.\n */\nexport async function sendText(\n chatId: string,\n text: string,\n accountId?: string,\n replyMessageId?: string,\n logWarn?: (msg: string) => void,\n): Promise<SendTextResult> {\n const managed = getClient(accountId);\n if (!managed) {\n return {\n ok: false,\n error: new Error(\n `[cored] no connected client for account=${accountId ?? \"default\"}`,\n ),\n };\n }\n\n const req: SendMessageReq = {\n chat_id: chatId,\n message_type: MessageType_TEXT,\n message_content: {\n text: { content: text },\n },\n reply_message_id: replyMessageId,\n };\n\n try {\n const resp = await managed.client.Im.v1.Message.sendMessage(req);\n return { ok: true, messageId: resp.message_id, provider: \"cored\" };\n } catch (err) {\n if (!isAuthError(err)) {\n return {\n ok: false,\n error: new Error(\n `[cored] send failed for chat=${chatId}: ${err instanceof Error ? err.message : String(err)}`,\n ),\n };\n }\n\n // Auth token expired despite SDK auto-refresh — force refresh and retry once.\n // This avoids requiring a gateway restart when the SDK's background token\n // refresh hits an edge case (time sync drift, swallowed fetch failure, etc.).\n logWarn?.(\n `[cored] auth error on send (chat=${chatId}, account=${accountId ?? \"default\"}) — refreshing token and retrying`,\n );\n\n try {\n await managed.client.preheat();\n const resp = await managed.client.Im.v1.Message.sendMessage(req);\n logWarn?.(\n `[cored] auth retry succeeded (chat=${chatId}, account=${accountId ?? \"default\"})`,\n );\n return { ok: true, messageId: resp.message_id, provider: \"cored\" };\n } catch (retryErr) {\n return {\n ok: false,\n error: new Error(\n `[cored] send failed after auth retry for chat=${chatId}: ${retryErr instanceof Error ? retryErr.message : String(retryErr)}`,\n ),\n };\n }\n }\n}\n\n// ---------------------------------------------------------------------------\n// Typing indicator\n// ---------------------------------------------------------------------------\n\n/**\n * Set typing indicator in a chat. Cored typing lasts ~5s.\n */\nexport async function setTyping(\n chatId: string,\n accountId?: string,\n): Promise<void> {\n const managed = getClient(accountId);\n if (!managed) return;\n try {\n await managed.client.Im.v1.Chat.createTyping({ chat_id: chatId });\n } catch {\n // Typing is best-effort — don't fail the message flow\n }\n}\n\n/**\n * Clear typing indicator.\n */\nexport async function clearTyping(\n chatId: string,\n accountId?: string,\n): Promise<void> {\n const managed = getClient(accountId);\n if (!managed) return;\n try {\n await managed.client.Im.v1.Chat.deleteTyping({ chat_id: chatId });\n } catch {\n // Best-effort\n }\n}\n\n// ---------------------------------------------------------------------------\n// Read receipt\n// ---------------------------------------------------------------------------\n\n/**\n * Mark a message as read.\n */\nexport async function readMessage(\n messageId: string,\n accountId?: string,\n): Promise<void> {\n const managed = getClient(accountId);\n if (!managed) return;\n try {\n await managed.client.Im.v1.Message.readMessage({ message_id: messageId });\n } catch {\n // Best-effort\n }\n}\n\n// ---------------------------------------------------------------------------\n// Delivery callback for inbound dispatch\n// ---------------------------------------------------------------------------\n\n/**\n * Create a deliver function scoped to an account, suitable for passing\n * to processInboundMessage's InboundDispatchOptions.\n */\nexport function makeDeliver(\n accountId?: string,\n logWarn?: (msg: string) => void,\n): (chatId: string, text: string) => Promise<void> {\n return async (chatId: string, text: string) => {\n const result = await sendText(chatId, text, accountId, undefined, logWarn);\n if (!result.ok) {\n throw result.error ?? new Error(\"[cored] send failed\");\n }\n };\n}\n","// Copyright (c) 2026 Cored Limited\n// SPDX-License-Identifier: Apache-2.0\n\n/**\n * Target parsing & validation for the --to argument.\n *\n * Accepted formats:\n * \"chat:oc_abc123\" -> { kind: \"chat\", id: \"oc_abc123\" }\n * \"user:83870344313569283\" -> { kind: \"user\", id: \"83870344313569283\" }\n * \"cored:chat:oc_abc123\" -> { kind: \"chat\", id: \"oc_abc123\" } (prefix stripped)\n * \"oc_abc123\" -> { kind: \"chat\", id: \"oc_abc123\" } (bare ID defaults to chat)\n *\n * Returns null for empty, whitespace-only, or malformed targets (e.g. \"user:\" with no ID).\n */\n\nimport type { ParsedTarget } from \"./types.js\";\n\n/**\n * Parse a raw --to string into a structured target.\n * Returns null if the input is missing, empty, or has no usable ID.\n */\nexport function parseTarget(to?: string): ParsedTarget | null {\n const raw = String(to ?? \"\").trim();\n if (!raw) return null;\n\n // Strip optional \"cored:\" channel prefix (case-insensitive)\n const stripped = raw.replace(/^cored:/i, \"\");\n\n if (stripped.startsWith(\"user:\")) {\n const id = stripped.slice(\"user:\".length).trim();\n return id ? { kind: \"user\", id } : null;\n }\n\n if (stripped.startsWith(\"chat:\")) {\n const id = stripped.slice(\"chat:\".length).trim();\n return id ? { kind: \"chat\", id } : null;\n }\n\n // Bare ID — default to chat (Cored SDK uses ChatId for sending)\n return stripped ? { kind: \"chat\", id: stripped } : null;\n}\n"],"mappings":";AAGA,SAAS,8BAA8B;;;ACAvC;AAAA,EACE;AAAA,EACA;AAAA,OACK;AACP,SAAS,qCAAqC;;;ACF9C,IAAM,WAAW;AAAA,EACf,kBAAkB;AAAA,EAClB,gBAAgB;AAClB;AAEA,IAAM,aAAa;AAEnB,SAAS,iBAAiB,KAA8C;AACtE,QAAM,OAAO;AACb,SAAO,MAAM,WACP,KAAK,SAAqC,QAG5C;AACN;AAEA,SAAS,gBAA6C;AACpD,QAAM,MAAM,QAAQ;AACpB,QAAM,SAAsC,CAAC;AAE7C,MAAI,IAAI,GAAG,UAAU,QAAQ,EAAG,QAAO,QAAQ,IAAI,GAAG,UAAU,QAAQ;AACxE,MAAI,IAAI,GAAG,UAAU,YAAY;AAC/B,WAAO,YAAY,IAAI,GAAG,UAAU,YAAY;AAClD,MAAI,IAAI,GAAG,UAAU,aAAa;AAChC,WAAO,aAAa,IAAI,GAAG,UAAU,aAAa;AACpD,MAAI,IAAI,GAAG,UAAU,mBAAmB,MAAM;AAC5C,WAAO,mBACL,IAAI,GAAG,UAAU,mBAAmB,MAAM;AAC9C,MAAI,IAAI,GAAG,UAAU,iBAAiB;AACpC,WAAO,iBAAiB,OAAO,IAAI,GAAG,UAAU,iBAAiB,CAAC;AAEpE,SAAO;AACT;AAEO,SAAS,eAAe,KAAwB;AACrD,QAAM,KAAK,iBAAiB,GAAG;AAC/B,MAAI,CAAC,IAAI;AAEP,QAAI,QAAQ,IAAI,GAAG,UAAU,QAAQ,EAAG,QAAO,CAAC,SAAS;AACzD,WAAO,CAAC;AAAA,EACV;AACA,MAAI,GAAG,SAAU,QAAO,OAAO,KAAK,GAAG,QAAQ;AAE/C,MAAI,QAAQ,IAAI,GAAG,UAAU,QAAQ,EAAG,QAAO,CAAC,SAAS;AACzD,SAAO,CAAC;AACV;AAEO,SAAS,qBACd,KACA,WACoB;AACpB,QAAM,KAAK,iBAAiB,GAAG;AAC/B,QAAM,KAAK,aAAa;AACxB,QAAM,YAAY,cAAc;AAEhC,QAAM,MAAM,IAAI,WAAW,EAAE;AAE7B,SAAO;AAAA,IACL,WAAW;AAAA,IACX,OAAO,KAAK,SAAS,UAAU,SAAS;AAAA,IACxC,WAAW,KAAK,aAAa,UAAU,aAAa;AAAA,IACpD,YAAY,KAAK,cAAc,UAAU,cAAc;AAAA,IACvD,SAAS,KAAK,WAAW;AAAA,IACzB,kBACE,KAAK,oBAAoB,UAAU,oBAAoB,SAAS;AAAA,IAClE,gBACE,KAAK,kBAAkB,UAAU,kBAAkB,SAAS;AAAA,EAChE;AACF;;;AC9DA,SAAS,aAAa,aAAa,gBAAgB;AASnD,IAAM,kBAAkB;AAOjB,SAAS,YAAY,KAAuB;AACjD,SAAO,eAAe,YAAY,IAAI,SAAS;AACjD;AAQO,IAAM,mBAAmB;AAuFhC,IAAM,UAAU,oBAAI,IAA2B;AAmHxC,SAAS,UAAU,WAA+C;AACvE,MAAI,aAAa,QAAQ,IAAI,SAAS,EAAG,QAAO,QAAQ,IAAI,SAAS;AACrE,MAAI,QAAQ,OAAO,EAAG,QAAO,QAAQ,OAAO,EAAE,KAAK,EAAE;AACrD,SAAO;AACT;;;AC9MA,eAAsB,SACpB,QACA,MACA,WACA,gBACA,SACyB;AACzB,QAAM,UAAU,UAAU,SAAS;AACnC,MAAI,CAAC,SAAS;AACZ,WAAO;AAAA,MACL,IAAI;AAAA,MACJ,OAAO,IAAI;AAAA,QACT,2CAA2C,aAAa,SAAS;AAAA,MACnE;AAAA,IACF;AAAA,EACF;AAEA,QAAM,MAAsB;AAAA,IAC1B,SAAS;AAAA,IACT,cAAc;AAAA,IACd,iBAAiB;AAAA,MACf,MAAM,EAAE,SAAS,KAAK;AAAA,IACxB;AAAA,IACA,kBAAkB;AAAA,EACpB;AAEA,MAAI;AACF,UAAM,OAAO,MAAM,QAAQ,OAAO,GAAG,GAAG,QAAQ,YAAY,GAAG;AAC/D,WAAO,EAAE,IAAI,MAAM,WAAW,KAAK,YAAY,UAAU,QAAQ;AAAA,EACnE,SAAS,KAAK;AACZ,QAAI,CAAC,YAAY,GAAG,GAAG;AACrB,aAAO;AAAA,QACL,IAAI;AAAA,QACJ,OAAO,IAAI;AAAA,UACT,gCAAgC,MAAM,KAAK,eAAe,QAAQ,IAAI,UAAU,OAAO,GAAG,CAAC;AAAA,QAC7F;AAAA,MACF;AAAA,IACF;AAKA;AAAA,MACE,oCAAoC,MAAM,aAAa,aAAa,SAAS;AAAA,IAC/E;AAEA,QAAI;AACF,YAAM,QAAQ,OAAO,QAAQ;AAC7B,YAAM,OAAO,MAAM,QAAQ,OAAO,GAAG,GAAG,QAAQ,YAAY,GAAG;AAC/D;AAAA,QACE,sCAAsC,MAAM,aAAa,aAAa,SAAS;AAAA,MACjF;AACA,aAAO,EAAE,IAAI,MAAM,WAAW,KAAK,YAAY,UAAU,QAAQ;AAAA,IACnE,SAAS,UAAU;AACjB,aAAO;AAAA,QACL,IAAI;AAAA,QACJ,OAAO,IAAI;AAAA,UACT,iDAAiD,MAAM,KAAK,oBAAoB,QAAQ,SAAS,UAAU,OAAO,QAAQ,CAAC;AAAA,QAC7H;AAAA,MACF;AAAA,IACF;AAAA,EACF;AACF;;;AC9EO,SAAS,YAAY,IAAkC;AAC5D,QAAM,MAAM,OAAO,MAAM,EAAE,EAAE,KAAK;AAClC,MAAI,CAAC,IAAK,QAAO;AAGjB,QAAM,WAAW,IAAI,QAAQ,YAAY,EAAE;AAE3C,MAAI,SAAS,WAAW,OAAO,GAAG;AAChC,UAAM,KAAK,SAAS,MAAM,QAAQ,MAAM,EAAE,KAAK;AAC/C,WAAO,KAAK,EAAE,MAAM,QAAQ,GAAG,IAAI;AAAA,EACrC;AAEA,MAAI,SAAS,WAAW,OAAO,GAAG;AAChC,UAAM,KAAK,SAAS,MAAM,QAAQ,MAAM,EAAE,KAAK;AAC/C,WAAO,KAAK,EAAE,MAAM,QAAQ,GAAG,IAAI;AAAA,EACrC;AAGA,SAAO,WAAW,EAAE,MAAM,QAAQ,IAAI,SAAS,IAAI;AACrD;;;AJ1BA,IAAM,cAAc,CAAC,SAAS,aAAa,cAAc,WAAW,oBAAoB,gBAAgB;AAEjG,IAAM,OAAO,wBAA4C;AAAA,EAC9D,IAAI;AAAA,EAEJ,MAAM;AAAA,IACJ,IAAI;AAAA,IACJ,OAAO;AAAA,IACP,gBAAgB;AAAA,IAChB,UAAU;AAAA,IACV,OAAO;AAAA,IACP,SAAS,CAAC,IAAI;AAAA,EAChB;AAAA,EAEA,cAAc;AAAA,IACZ,WAAW,CAAC,UAAU,OAAO;AAAA,EAC/B;AAAA,EAEA,QAAQ;AAAA,IACN,GAAG,8BAAkD;AAAA,MACnD,YAAY;AAAA,MACZ,gBAAgB,CAAC,QAAQ,eAAe,GAAG;AAAA,MAC3C,gBAAgB,CAAC,KAAK,cACpB,qBAAqB,KAAK,aAAa,MAAS;AAAA,MAClD,kBAAkB,MAAM;AAAA,MACxB,eAAe,KAAK,WAAW;AAC7B,cAAM,WAAW,qBAAqB,KAAK,aAAa,MAAS;AACjE,cAAM,YAAY;AAAA,UAChB,SAAS,SAAS,SAAS,aAAa,SAAS;AAAA,QACnD;AACA,eAAO;AAAA,UACL,SAAS,SAAS;AAAA,UAClB,YAAY;AAAA,UACZ,aAAa,YAAY,cAAc;AAAA,QACzC;AAAA,MACF;AAAA,MACA,iBAAiB;AAAA,IACnB,CAAC;AAAA,EACH;AAAA,EAEA,OAAO;AAAA,IACL,eAAe,CAAC,EAAE,MAAM,MAAM;AAC5B,YAAM,UAAoB,CAAC;AAC3B,UAAI,CAAC,MAAM,SAAU,SAAQ,KAAK,yCAAyC;AAC3E,UAAI,CAAC,MAAM,MAAO,SAAQ,KAAK,yCAAyC;AACxE,UAAI,CAAC,MAAM,IAAK,SAAQ,KAAK,mCAAmC;AAChE,UAAI,QAAQ,SAAS,GAAG;AACtB,eAAO;AAAA,UACL,2BAA2B,QAAQ,KAAK,IAAI,CAAC;AAAA,UAC7C;AAAA,UACA;AAAA,UACA;AAAA,UACA;AAAA,UACA;AAAA,UACA;AAAA,QACF,EAAE,KAAK,IAAI;AAAA,MACb;AACA,aAAO;AAAA,IACT;AAAA,IACA,oBAAoB,CAAC,EAAE,KAAK,WAAW,MAAM,MAAM;AACjD,YAAM,UAAU,gBAAgB,GAAG;AACnC,UAAI,CAAC,QAAQ,SAAU,SAAQ,WAAW,CAAC;AAC3C,YAAM,KAAK,QAAQ;AACnB,UAAI,CAAC,GAAG,OAAO,EAAG,IAAG,OAAO,IAAI,CAAC;AACjC,YAAM,UAAU,GAAG,OAAO;AAI1B,YAAM,QAAQ,MAAM;AACpB,YAAM,YAAY,MAAM;AACxB,YAAM,aAAa,MAAM;AAEzB,YAAM,KAAK,aAAa;AAExB,UAAI,CAAC,QAAQ,SAAU,SAAQ,WAAW,CAAC;AAC3C,YAAM,WAAW,QAAQ;AACzB,UAAI,CAAC,SAAS,EAAE,EAAG,UAAS,EAAE,IAAI,CAAC;AACnC,YAAM,UAAU,SAAS,EAAE;AAC3B,UAAI,MAAO,SAAQ,QAAQ;AAC3B,UAAI,UAAW,SAAQ,YAAY;AACnC,UAAI,WAAY,SAAQ,aAAa;AAErC,aAAO;AAAA,IACT;AAAA,EACF;AAAA,EAEA,aAAa;AAAA,IACX,SAAS;AAAA,IACT,QAAQ;AAAA,MACN,iBAAiB;AAAA,MACjB,mBAAmB;AAAA,MACnB,mBAAmB,CAAC,EAAE,IAAI,MAAM;AAC9B,cAAM,MAAM,eAAe,GAAG;AAC9B,eAAO,IAAI,KAAK,CAAC,OAAO;AACtB,gBAAM,WAAW,qBAAqB,KAAK,EAAE;AAC7C,iBAAO,QAAQ,SAAS,SAAS,SAAS,aAAa,SAAS,UAAU;AAAA,QAC5E,CAAC;AAAA,MACH;AAAA,IACF;AAAA,IACA,aAAa;AAAA,MACX;AAAA,QACE,UAAU;AAAA,QACV,cAAc;AAAA,QACd,iBAAiB;AAAA,QACjB,iBAAiB;AAAA,QACjB,WAAW;AAAA,QACX,YAAY;AAAA,QACZ,aACE;AAAA,QACF,SAAS,CAAC,EAAE,KAAK,UAAU,MAAM;AAC/B,gBAAM,WAAW,qBAAqB,KAAK,aAAa,MAAS;AACjE,iBAAO;AAAA,YACL,mBAAmB,QAAQ,SAAS,KAAK;AAAA,YACzC,oBAAoB,QAAQ,SAAS,KAAK;AAAA,UAC5C;AAAA,QACF;AAAA,MACF;AAAA,MACA;AAAA,QACE,UAAU;AAAA,QACV,cAAc;AAAA,QACd,iBAAiB;AAAA,QACjB,iBAAiB;AAAA,QACjB,WAAW;AAAA,QACX,YAAY;AAAA,QACZ,aACE;AAAA,QACF,SAAS,CAAC,EAAE,KAAK,UAAU,MAAM;AAC/B,gBAAM,WAAW,qBAAqB,KAAK,aAAa,MAAS;AACjE,iBAAO;AAAA,YACL,mBAAmB,QAAQ,SAAS,SAAS;AAAA,YAC7C,oBAAoB,QAAQ,SAAS,SAAS;AAAA,UAChD;AAAA,QACF;AAAA,MACF;AAAA,MACA;AAAA,QACE,UAAU;AAAA,QACV,cAAc;AAAA,QACd,iBAAiB;AAAA,QACjB,iBAAiB;AAAA,QACjB,WAAW;AAAA,QACX,YAAY;AAAA,QACZ,aACE;AAAA,QACF,SAAS,CAAC,EAAE,KAAK,UAAU,MAAM;AAC/B,gBAAM,WAAW,qBAAqB,KAAK,aAAa,MAAS;AACjE,iBAAO;AAAA,YACL,mBAAmB,QAAQ,SAAS,UAAU;AAAA,YAC9C,oBAAoB,QAAQ,SAAS,UAAU;AAAA,UACjD;AAAA,QACF;AAAA,MACF;AAAA,IACF;AAAA,EACF;AACF,CAAC;AAKM,IAAM,cAAc,wBAA4C;AAAA,EACrE;AAAA;AAAA,EAGA,UAAU;AAAA,IACR,IAAI;AAAA,MACF,YAAY;AAAA,MACZ,eAAe,MAAM;AAAA,MACrB,kBAAkB,MAAM,CAAC;AAAA,MACzB,eAAe;AAAA,IACjB;AAAA,EACF;AAAA;AAAA,EAGA,WAAW,EAAE,qBAAqB,QAAQ;AAAA;AAAA,EAG1C,UAAU;AAAA,IACR,iBAAiB;AAAA,MACf,SAAS;AAAA,MACT,UAAU,OAAO,QAAQ;AACvB,cAAM,SAAS,YAAY,IAAI,EAAE;AACjC,YAAI,CAAC,QAAQ;AACX,gBAAM,IAAI,MAAM,gCAAgC,IAAI,EAAE,EAAE;AAAA,QAC1D;AACA,cAAM,SAAS,MAAM;AAAA,UACnB,OAAO;AAAA,UACP,IAAI;AAAA,UACJ,IAAI,aAAa;AAAA,UACjB,IAAI,aAAa;AAAA,QACnB;AACA,YAAI,CAAC,OAAO,IAAI;AACd,gBAAM,OAAO,SAAS,IAAI,MAAM,qBAAqB;AAAA,QACvD;AACA,eAAO,EAAE,WAAW,OAAO,aAAa,GAAG;AAAA,MAC7C;AAAA,IACF;AAAA,IACA,MAAM;AAAA,MACJ,cAAc;AAAA,MACd,eAAe,CAAC,EAAE,GAAG,MAAM;AACzB,YAAI,CAAC,GAAI,QAAO,EAAE,IAAI,OAAgB,OAAO,IAAI,MAAM,0BAA0B,EAAE;AACnF,cAAM,SAAS,YAAY,EAAE;AAC7B,YAAI,CAAC,QAAQ;AACX,iBAAO;AAAA,YACL,IAAI;AAAA,YACJ,OAAO,IAAI;AAAA,cACT,+CAA+C,KAAK,UAAU,EAAE,CAAC;AAAA,YACnE;AAAA,UACF;AAAA,QACF;AACA,eAAO,EAAE,IAAI,MAAe,IAAI,GAAG,OAAO,IAAI,IAAI,OAAO,EAAE,GAAG;AAAA,MAChE;AAAA,IACF;AAAA,EACF;AACF,CAAC;;;AD5ND,IAAO,sBAAQ,uBAAuB,IAAI;","names":[]}
@@ -28,7 +28,7 @@
28
28
  "enableEncryption": {
29
29
  "type": "boolean",
30
30
  "description": "Use encrypted communication between OpenClaw and Cored server",
31
- "default": false
31
+ "default": true
32
32
  },
33
33
  "requestTimeout": {
34
34
  "type": "number",
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@cored-im/openclaw-plugin",
3
- "version": "0.1.16",
3
+ "version": "0.1.17",
4
4
  "description": "Cored IM channel plugin for OpenClaw",
5
5
  "author": "Cored Limited",
6
6
  "type": "module",
package/src/channel.ts CHANGED
@@ -84,21 +84,15 @@ export const base = createChannelPluginBase<CoredAccountConfig>({
84
84
  const appSecret = input.token;
85
85
  const backendUrl = input.url;
86
86
 
87
- if (accountId && accountId !== "default") {
88
- // Multi-account: write under accounts.<accountId>
89
- if (!section.accounts) section.accounts = {};
90
- const accounts = section.accounts as Record<string, Record<string, unknown>>;
91
- if (!accounts[accountId]) accounts[accountId] = {};
92
- const account = accounts[accountId];
93
- if (appId) account.appId = appId;
94
- if (appSecret) account.appSecret = appSecret;
95
- if (backendUrl) account.backendUrl = backendUrl;
96
- } else {
97
- // Single-account: write at top level
98
- if (appId) section.appId = appId;
99
- if (appSecret) section.appSecret = appSecret;
100
- if (backendUrl) section.backendUrl = backendUrl;
101
- }
87
+ const id = accountId || "default";
88
+
89
+ if (!section.accounts) section.accounts = {};
90
+ const accounts = section.accounts as Record<string, Record<string, unknown>>;
91
+ if (!accounts[id]) accounts[id] = {};
92
+ const account = accounts[id];
93
+ if (appId) account.appId = appId;
94
+ if (appSecret) account.appSecret = appSecret;
95
+ if (backendUrl) account.backendUrl = backendUrl;
102
96
 
103
97
  return updated as OpenClawConfig;
104
98
  },
@@ -16,8 +16,8 @@ describe("listAccountIds", () => {
16
16
  expect(listAccountIds(undefined)).toEqual([]);
17
17
  });
18
18
 
19
- it("returns ['default'] for flat single-account config", () => {
20
- const cfg = { channels: { cored: { appId: "app_1" } } };
19
+ it("returns ['default'] for single-account config", () => {
20
+ const cfg = { channels: { cored: { accounts: { default: { appId: "app_1" } } } } };
21
21
  expect(listAccountIds(cfg)).toEqual(["default"]);
22
22
  });
23
23
 
@@ -48,13 +48,17 @@ describe("listAccountIds", () => {
48
48
  });
49
49
 
50
50
  describe("resolveAccountConfig", () => {
51
- it("resolves flat config with defaults applied", () => {
51
+ it("resolves default account with defaults applied", () => {
52
52
  const cfg = {
53
53
  channels: {
54
54
  cored: {
55
- appId: "app_1",
56
- appSecret: "secret_1",
57
- backendUrl: "https://your-backend-url.com",
55
+ accounts: {
56
+ default: {
57
+ appId: "app_1",
58
+ appSecret: "secret_1",
59
+ backendUrl: "https://your-backend-url.com",
60
+ },
61
+ },
58
62
  },
59
63
  },
60
64
  };
@@ -118,7 +122,7 @@ describe("resolveAccountConfig", () => {
118
122
  it("config values take precedence over env vars", () => {
119
123
  process.env.CORED_APP_ID = "env_app";
120
124
  const cfg = {
121
- channels: { cored: { appId: "config_app", appSecret: "s", backendUrl: "http://x" } },
125
+ channels: { cored: { accounts: { default: { appId: "config_app", appSecret: "s", backendUrl: "http://x" } } } },
122
126
  };
123
127
  try {
124
128
  const account = resolveAccountConfig(cfg);
@@ -205,9 +209,13 @@ describe("resolveAndValidateAccountConfig", () => {
205
209
  const cfg = {
206
210
  channels: {
207
211
  cored: {
208
- appId: "app_1",
209
- appSecret: "secret_1",
210
- backendUrl: "https://your-backend-url.com",
212
+ accounts: {
213
+ default: {
214
+ appId: "app_1",
215
+ appSecret: "secret_1",
216
+ backendUrl: "https://your-backend-url.com",
217
+ },
218
+ },
211
219
  },
212
220
  },
213
221
  };
package/src/config.ts CHANGED
@@ -45,7 +45,6 @@ export function listAccountIds(cfg: unknown): string[] {
45
45
  return [];
46
46
  }
47
47
  if (ch.accounts) return Object.keys(ch.accounts);
48
- if (ch.appId) return ["default"];
49
48
  // env var fallback
50
49
  if (process.env[`${ENV_PREFIX}APP_ID`]) return ["default"];
51
50
  return [];
@@ -59,7 +58,7 @@ export function resolveAccountConfig(
59
58
  const id = accountId ?? "default";
60
59
  const envConfig = readEnvConfig();
61
60
 
62
- const raw = ch?.accounts?.[id] ?? ch;
61
+ const raw = ch?.accounts?.[id];
63
62
 
64
63
  return {
65
64
  accountId: id,
package/src/index.test.ts CHANGED
@@ -151,7 +151,7 @@ describe("service start — config validation", () => {
151
151
  it("connects valid accounts normally", async () => {
152
152
  const api = createMockApi({
153
153
  channels: {
154
- cored: { appId: "a", appSecret: "s", backendUrl: "https://ok.io" },
154
+ cored: { accounts: { default: { appId: "a", appSecret: "s", backendUrl: "https://ok.io" } } },
155
155
  },
156
156
  });
157
157
  entry.default.registerFull(api);
package/src/types.ts CHANGED
@@ -23,12 +23,6 @@ export interface CoredRawAccountConfig {
23
23
  }
24
24
 
25
25
  export interface CoredChannelConfig {
26
- appId?: string;
27
- appSecret?: string;
28
- backendUrl?: string;
29
- enabled?: boolean;
30
- enableEncryption?: boolean;
31
- requestTimeout?: number;
32
26
  accounts?: Record<string, CoredRawAccountConfig>;
33
27
  }
34
28