@openclaw/feishu 2026.5.2 → 2026.5.3-beta.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (224) hide show
  1. package/dist/accounts-Ba3-WP1z.js +423 -0
  2. package/dist/api.js +2280 -0
  3. package/dist/app-registration-B8qc1MCM.js +184 -0
  4. package/dist/audio-preflight.runtime-BPlzkO3l.js +7 -0
  5. package/dist/card-interaction-BfRLgvw_.js +96 -0
  6. package/dist/channel-CSD_Jt8I.js +1668 -0
  7. package/dist/channel-entry.js +22 -0
  8. package/dist/channel-plugin-api.js +2 -0
  9. package/dist/channel.runtime-DYsXcD36.js +700 -0
  10. package/dist/client-DBVoQL5w.js +157 -0
  11. package/dist/contract-api.js +9 -0
  12. package/dist/conversation-id-DWS3Ep2A.js +139 -0
  13. package/dist/directory.static-f3EeoRJd.js +44 -0
  14. package/dist/drive-C5eJLJr7.js +883 -0
  15. package/dist/index.js +68 -0
  16. package/dist/monitor-CT189QfR.js +60 -0
  17. package/dist/monitor.account-dJV2jO8C.js +4990 -0
  18. package/dist/monitor.state-DYM02ipp.js +100 -0
  19. package/dist/policy-D6c-wMPl.js +118 -0
  20. package/dist/probe-BNzzU_uR.js +149 -0
  21. package/dist/rolldown-runtime-DUslC3ob.js +14 -0
  22. package/dist/runtime-CG0DuRCy.js +8 -0
  23. package/dist/runtime-api.js +14 -0
  24. package/dist/secret-contract-Dm4Z_zQN.js +119 -0
  25. package/dist/secret-contract-api.js +2 -0
  26. package/dist/security-audit-DqJdocrN.js +11 -0
  27. package/dist/security-audit-shared-ByuMx9cJ.js +38 -0
  28. package/dist/security-contract-api.js +2 -0
  29. package/dist/send-DowxxbpH.js +1218 -0
  30. package/dist/session-conversation-B4nrW-vo.js +27 -0
  31. package/dist/session-key-api.js +2 -0
  32. package/dist/setup-api.js +2 -0
  33. package/dist/setup-entry.js +15 -0
  34. package/dist/subagent-hooks-C3UhPVLV.js +227 -0
  35. package/dist/subagent-hooks-api.js +23 -0
  36. package/dist/targets-JMFJRKSe.js +48 -0
  37. package/dist/thread-bindings-BmS6TLes.js +222 -0
  38. package/package.json +15 -6
  39. package/api.ts +0 -31
  40. package/channel-entry.ts +0 -20
  41. package/channel-plugin-api.ts +0 -1
  42. package/contract-api.ts +0 -16
  43. package/index.ts +0 -82
  44. package/runtime-api.ts +0 -55
  45. package/secret-contract-api.ts +0 -5
  46. package/security-contract-api.ts +0 -1
  47. package/session-key-api.ts +0 -1
  48. package/setup-api.ts +0 -3
  49. package/setup-entry.test.ts +0 -14
  50. package/setup-entry.ts +0 -13
  51. package/src/accounts.test.ts +0 -459
  52. package/src/accounts.ts +0 -326
  53. package/src/app-registration.ts +0 -331
  54. package/src/approval-auth.test.ts +0 -24
  55. package/src/approval-auth.ts +0 -25
  56. package/src/async.test.ts +0 -35
  57. package/src/async.ts +0 -104
  58. package/src/audio-preflight.runtime.ts +0 -9
  59. package/src/bitable.test.ts +0 -131
  60. package/src/bitable.ts +0 -762
  61. package/src/bot-content.ts +0 -474
  62. package/src/bot-group-name.test.ts +0 -108
  63. package/src/bot-runtime-api.ts +0 -12
  64. package/src/bot-sender-name.ts +0 -125
  65. package/src/bot.broadcast.test.ts +0 -463
  66. package/src/bot.card-action.test.ts +0 -577
  67. package/src/bot.checkBotMentioned.test.ts +0 -265
  68. package/src/bot.helpers.test.ts +0 -118
  69. package/src/bot.stripBotMention.test.ts +0 -126
  70. package/src/bot.test.ts +0 -3040
  71. package/src/bot.ts +0 -1559
  72. package/src/card-action.ts +0 -447
  73. package/src/card-interaction.test.ts +0 -129
  74. package/src/card-interaction.ts +0 -159
  75. package/src/card-test-helpers.ts +0 -47
  76. package/src/card-ux-approval.ts +0 -65
  77. package/src/card-ux-launcher.test.ts +0 -99
  78. package/src/card-ux-launcher.ts +0 -121
  79. package/src/card-ux-shared.ts +0 -33
  80. package/src/channel-runtime-api.ts +0 -16
  81. package/src/channel.runtime.ts +0 -47
  82. package/src/channel.test.ts +0 -959
  83. package/src/channel.ts +0 -1313
  84. package/src/chat-schema.ts +0 -25
  85. package/src/chat.test.ts +0 -196
  86. package/src/chat.ts +0 -188
  87. package/src/client.test.ts +0 -433
  88. package/src/client.ts +0 -290
  89. package/src/comment-dispatcher-runtime-api.ts +0 -6
  90. package/src/comment-dispatcher.test.ts +0 -169
  91. package/src/comment-dispatcher.ts +0 -107
  92. package/src/comment-handler-runtime-api.ts +0 -3
  93. package/src/comment-handler.test.ts +0 -486
  94. package/src/comment-handler.ts +0 -309
  95. package/src/comment-reaction.test.ts +0 -166
  96. package/src/comment-reaction.ts +0 -259
  97. package/src/comment-shared.test.ts +0 -182
  98. package/src/comment-shared.ts +0 -406
  99. package/src/comment-target.ts +0 -44
  100. package/src/config-schema.test.ts +0 -309
  101. package/src/config-schema.ts +0 -333
  102. package/src/conversation-id.test.ts +0 -18
  103. package/src/conversation-id.ts +0 -199
  104. package/src/dedup-runtime-api.ts +0 -1
  105. package/src/dedup.ts +0 -141
  106. package/src/directory.static.ts +0 -61
  107. package/src/directory.test.ts +0 -136
  108. package/src/directory.ts +0 -124
  109. package/src/doc-schema.ts +0 -182
  110. package/src/docx-batch-insert.test.ts +0 -91
  111. package/src/docx-batch-insert.ts +0 -223
  112. package/src/docx-color-text.ts +0 -154
  113. package/src/docx-table-ops.test.ts +0 -53
  114. package/src/docx-table-ops.ts +0 -316
  115. package/src/docx-types.ts +0 -38
  116. package/src/docx.account-selection.test.ts +0 -79
  117. package/src/docx.test.ts +0 -685
  118. package/src/docx.ts +0 -1616
  119. package/src/drive-schema.ts +0 -92
  120. package/src/drive.test.ts +0 -1219
  121. package/src/drive.ts +0 -829
  122. package/src/dynamic-agent.ts +0 -137
  123. package/src/event-types.ts +0 -45
  124. package/src/external-keys.test.ts +0 -20
  125. package/src/external-keys.ts +0 -19
  126. package/src/lifecycle.test-support.ts +0 -220
  127. package/src/media.test.ts +0 -900
  128. package/src/media.ts +0 -861
  129. package/src/mention-target.types.ts +0 -5
  130. package/src/mention.ts +0 -114
  131. package/src/message-action-contract.ts +0 -13
  132. package/src/monitor-state-runtime-api.ts +0 -7
  133. package/src/monitor-transport-runtime-api.ts +0 -7
  134. package/src/monitor.account.ts +0 -468
  135. package/src/monitor.acp-init-failure.lifecycle.test-support.ts +0 -219
  136. package/src/monitor.bot-identity.ts +0 -86
  137. package/src/monitor.bot-menu-handler.ts +0 -165
  138. package/src/monitor.bot-menu.lifecycle.test-support.ts +0 -224
  139. package/src/monitor.bot-menu.test.ts +0 -178
  140. package/src/monitor.broadcast.reply-once.lifecycle.test-support.ts +0 -264
  141. package/src/monitor.card-action.lifecycle.test-support.ts +0 -373
  142. package/src/monitor.cleanup.test.ts +0 -376
  143. package/src/monitor.comment-notice-handler.ts +0 -105
  144. package/src/monitor.comment.test.ts +0 -937
  145. package/src/monitor.comment.ts +0 -1386
  146. package/src/monitor.lifecycle.test.ts +0 -4
  147. package/src/monitor.message-handler.ts +0 -339
  148. package/src/monitor.reaction.lifecycle.test-support.ts +0 -68
  149. package/src/monitor.reaction.test.ts +0 -713
  150. package/src/monitor.startup.test.ts +0 -192
  151. package/src/monitor.startup.ts +0 -74
  152. package/src/monitor.state.defaults.test.ts +0 -46
  153. package/src/monitor.state.ts +0 -170
  154. package/src/monitor.synthetic-error.ts +0 -18
  155. package/src/monitor.test-mocks.ts +0 -45
  156. package/src/monitor.transport.ts +0 -424
  157. package/src/monitor.ts +0 -100
  158. package/src/monitor.webhook-e2e.test.ts +0 -272
  159. package/src/monitor.webhook-security.test.ts +0 -264
  160. package/src/monitor.webhook.test-helpers.ts +0 -116
  161. package/src/outbound-runtime-api.ts +0 -1
  162. package/src/outbound.test.ts +0 -935
  163. package/src/outbound.ts +0 -718
  164. package/src/perm-schema.ts +0 -52
  165. package/src/perm.ts +0 -170
  166. package/src/pins.ts +0 -108
  167. package/src/policy.test.ts +0 -334
  168. package/src/policy.ts +0 -236
  169. package/src/post.test.ts +0 -105
  170. package/src/post.ts +0 -275
  171. package/src/probe.test.ts +0 -275
  172. package/src/probe.ts +0 -166
  173. package/src/processing-claims.ts +0 -59
  174. package/src/qr-terminal.ts +0 -1
  175. package/src/reactions.ts +0 -123
  176. package/src/reasoning-preview.test.ts +0 -59
  177. package/src/reasoning-preview.ts +0 -20
  178. package/src/reply-dispatcher-runtime-api.ts +0 -7
  179. package/src/reply-dispatcher.test.ts +0 -1144
  180. package/src/reply-dispatcher.ts +0 -650
  181. package/src/runtime.ts +0 -9
  182. package/src/secret-contract.ts +0 -145
  183. package/src/secret-input.ts +0 -1
  184. package/src/security-audit-shared.ts +0 -69
  185. package/src/security-audit.test.ts +0 -61
  186. package/src/security-audit.ts +0 -1
  187. package/src/send-result.ts +0 -29
  188. package/src/send-target.test.ts +0 -80
  189. package/src/send-target.ts +0 -35
  190. package/src/send.reply-fallback.test.ts +0 -292
  191. package/src/send.test.ts +0 -550
  192. package/src/send.ts +0 -800
  193. package/src/sequential-key.test.ts +0 -72
  194. package/src/sequential-key.ts +0 -28
  195. package/src/sequential-queue.test.ts +0 -92
  196. package/src/sequential-queue.ts +0 -16
  197. package/src/session-conversation.ts +0 -42
  198. package/src/session-route.ts +0 -48
  199. package/src/setup-core.ts +0 -51
  200. package/src/setup-surface.test.ts +0 -174
  201. package/src/setup-surface.ts +0 -581
  202. package/src/streaming-card.test.ts +0 -190
  203. package/src/streaming-card.ts +0 -490
  204. package/src/subagent-hooks.test.ts +0 -603
  205. package/src/subagent-hooks.ts +0 -397
  206. package/src/targets.ts +0 -97
  207. package/src/test-support/lifecycle-test-support.ts +0 -453
  208. package/src/thread-bindings.test.ts +0 -143
  209. package/src/thread-bindings.ts +0 -330
  210. package/src/tool-account-routing.test.ts +0 -187
  211. package/src/tool-account.test.ts +0 -44
  212. package/src/tool-account.ts +0 -93
  213. package/src/tool-factory-test-harness.ts +0 -79
  214. package/src/tool-result.test.ts +0 -32
  215. package/src/tool-result.ts +0 -16
  216. package/src/tools-config.test.ts +0 -21
  217. package/src/tools-config.ts +0 -22
  218. package/src/types.ts +0 -104
  219. package/src/typing.test.ts +0 -144
  220. package/src/typing.ts +0 -214
  221. package/src/wiki-schema.ts +0 -55
  222. package/src/wiki.ts +0 -227
  223. package/subagent-hooks-api.ts +0 -31
  224. package/tsconfig.json +0 -16
@@ -1,272 +0,0 @@
1
- import crypto from "node:crypto";
2
- import { afterEach, describe, expect, it, vi } from "vitest";
3
- import { createFeishuRuntimeMockModule } from "./monitor.test-mocks.js";
4
- import { withRunningWebhookMonitor } from "./monitor.webhook.test-helpers.js";
5
-
6
- const probeFeishuMock = vi.hoisted(() => vi.fn());
7
-
8
- vi.mock("./probe.js", () => ({
9
- probeFeishu: probeFeishuMock,
10
- }));
11
-
12
- vi.mock("./client.js", async () => {
13
- const actual = await vi.importActual<typeof import("./client.js")>("./client.js");
14
- return {
15
- ...actual,
16
- createFeishuWSClient: vi.fn(() => ({ start: vi.fn() })),
17
- };
18
- });
19
-
20
- vi.mock("./runtime.js", () => createFeishuRuntimeMockModule());
21
-
22
- import { monitorFeishuProvider, stopFeishuMonitor } from "./monitor.js";
23
-
24
- function signFeishuPayload(params: {
25
- encryptKey: string;
26
- rawBody: string;
27
- timestamp?: string;
28
- nonce?: string;
29
- }): Record<string, string> {
30
- const timestamp = params.timestamp ?? "1711111111";
31
- const nonce = params.nonce ?? "nonce-test";
32
- const signature = crypto
33
- .createHash("sha256")
34
- .update(timestamp + nonce + params.encryptKey + params.rawBody)
35
- .digest("hex");
36
- return {
37
- "content-type": "application/json",
38
- "x-lark-request-timestamp": timestamp,
39
- "x-lark-request-nonce": nonce,
40
- "x-lark-signature": signature,
41
- };
42
- }
43
-
44
- function encryptFeishuPayload(encryptKey: string, payload: Record<string, unknown>): string {
45
- const iv = crypto.randomBytes(16);
46
- const key = crypto.createHash("sha256").update(encryptKey).digest();
47
- const cipher = crypto.createCipheriv("aes-256-cbc", key, iv);
48
- const plaintext = Buffer.from(JSON.stringify(payload), "utf8");
49
- const encrypted = Buffer.concat([cipher.update(plaintext), cipher.final()]);
50
- return Buffer.concat([iv, encrypted]).toString("base64");
51
- }
52
-
53
- async function postSignedPayload(url: string, payload: Record<string, unknown>) {
54
- const rawBody = JSON.stringify(payload);
55
- return await fetch(url, {
56
- method: "POST",
57
- headers: signFeishuPayload({ encryptKey: "encrypt_key", rawBody }),
58
- body: rawBody,
59
- });
60
- }
61
-
62
- afterEach(() => {
63
- stopFeishuMonitor();
64
- });
65
-
66
- describe("Feishu webhook signed-request e2e", () => {
67
- it("rejects invalid signatures with 401 instead of empty 200", async () => {
68
- probeFeishuMock.mockResolvedValue({ ok: true, botOpenId: "bot_open_id" });
69
-
70
- await withRunningWebhookMonitor(
71
- {
72
- accountId: "invalid-signature",
73
- path: "/hook-e2e-invalid-signature",
74
- verificationToken: "verify_token",
75
- encryptKey: "encrypt_key",
76
- },
77
- monitorFeishuProvider,
78
- async (url) => {
79
- const payload = { type: "url_verification", challenge: "challenge-token" };
80
- const rawBody = JSON.stringify(payload);
81
- const response = await fetch(url, {
82
- method: "POST",
83
- headers: {
84
- ...signFeishuPayload({ encryptKey: "wrong_key", rawBody }),
85
- },
86
- body: rawBody,
87
- });
88
-
89
- expect(response.status).toBe(401);
90
- expect(await response.text()).toBe("Invalid signature");
91
- },
92
- );
93
- });
94
-
95
- it("rejects missing signature headers with 401", async () => {
96
- probeFeishuMock.mockResolvedValue({ ok: true, botOpenId: "bot_open_id" });
97
-
98
- await withRunningWebhookMonitor(
99
- {
100
- accountId: "missing-signature",
101
- path: "/hook-e2e-missing-signature",
102
- verificationToken: "verify_token",
103
- encryptKey: "encrypt_key",
104
- },
105
- monitorFeishuProvider,
106
- async (url) => {
107
- const response = await fetch(url, {
108
- method: "POST",
109
- headers: { "content-type": "application/json" },
110
- body: JSON.stringify({ type: "url_verification", challenge: "challenge-token" }),
111
- });
112
-
113
- expect(response.status).toBe(401);
114
- expect(await response.text()).toBe("Invalid signature");
115
- },
116
- );
117
- });
118
-
119
- it("rejects malformed short signatures with 401", async () => {
120
- probeFeishuMock.mockResolvedValue({ ok: true, botOpenId: "bot_open_id" });
121
-
122
- await withRunningWebhookMonitor(
123
- {
124
- accountId: "short-signature",
125
- path: "/hook-e2e-short-signature",
126
- verificationToken: "verify_token",
127
- encryptKey: "encrypt_key",
128
- },
129
- monitorFeishuProvider,
130
- async (url) => {
131
- const payload = { type: "url_verification", challenge: "challenge-token" };
132
- const headers = signFeishuPayload({
133
- encryptKey: "encrypt_key",
134
- rawBody: JSON.stringify(payload),
135
- });
136
- headers["x-lark-signature"] = headers["x-lark-signature"].slice(0, 12);
137
-
138
- const response = await fetch(url, {
139
- method: "POST",
140
- headers,
141
- body: JSON.stringify(payload),
142
- });
143
-
144
- expect(response.status).toBe(401);
145
- expect(await response.text()).toBe("Invalid signature");
146
- },
147
- );
148
- });
149
-
150
- it("returns 401 for unsigned invalid json before parsing", async () => {
151
- probeFeishuMock.mockResolvedValue({ ok: true, botOpenId: "bot_open_id" });
152
-
153
- await withRunningWebhookMonitor(
154
- {
155
- accountId: "invalid-json",
156
- path: "/hook-e2e-invalid-json",
157
- verificationToken: "verify_token",
158
- encryptKey: "encrypt_key",
159
- },
160
- monitorFeishuProvider,
161
- async (url) => {
162
- const response = await fetch(url, {
163
- method: "POST",
164
- headers: { "content-type": "application/json" },
165
- body: "{not-json",
166
- });
167
-
168
- expect(response.status).toBe(401);
169
- expect(await response.text()).toBe("Invalid signature");
170
- },
171
- );
172
- });
173
-
174
- it("returns 400 for signed invalid json after signature validation", async () => {
175
- probeFeishuMock.mockResolvedValue({ ok: true, botOpenId: "bot_open_id" });
176
-
177
- await withRunningWebhookMonitor(
178
- {
179
- accountId: "signed-invalid-json",
180
- path: "/hook-e2e-signed-invalid-json",
181
- verificationToken: "verify_token",
182
- encryptKey: "encrypt_key",
183
- },
184
- monitorFeishuProvider,
185
- async (url) => {
186
- const rawBody = "{not-json";
187
- const response = await fetch(url, {
188
- method: "POST",
189
- headers: signFeishuPayload({ encryptKey: "encrypt_key", rawBody }),
190
- body: rawBody,
191
- });
192
-
193
- expect(response.status).toBe(400);
194
- expect(await response.text()).toBe("Invalid JSON");
195
- },
196
- );
197
- });
198
-
199
- it("accepts signed plaintext url_verification challenges end-to-end", async () => {
200
- probeFeishuMock.mockResolvedValue({ ok: true, botOpenId: "bot_open_id" });
201
-
202
- await withRunningWebhookMonitor(
203
- {
204
- accountId: "signed-challenge",
205
- path: "/hook-e2e-signed-challenge",
206
- verificationToken: "verify_token",
207
- encryptKey: "encrypt_key",
208
- },
209
- monitorFeishuProvider,
210
- async (url) => {
211
- const payload = { type: "url_verification", challenge: "challenge-token" };
212
- const response = await postSignedPayload(url, payload);
213
-
214
- expect(response.status).toBe(200);
215
- await expect(response.json()).resolves.toEqual({ challenge: "challenge-token" });
216
- },
217
- );
218
- });
219
-
220
- it("accepts signed non-challenge events and reaches the dispatcher", async () => {
221
- probeFeishuMock.mockResolvedValue({ ok: true, botOpenId: "bot_open_id" });
222
-
223
- await withRunningWebhookMonitor(
224
- {
225
- accountId: "signed-dispatch",
226
- path: "/hook-e2e-signed-dispatch",
227
- verificationToken: "verify_token",
228
- encryptKey: "encrypt_key",
229
- },
230
- monitorFeishuProvider,
231
- async (url) => {
232
- const payload = {
233
- schema: "2.0",
234
- header: { event_type: "unknown.event" },
235
- event: {},
236
- };
237
- const response = await postSignedPayload(url, payload);
238
-
239
- expect(response.status).toBe(200);
240
- expect(await response.text()).toContain("no unknown.event event handle");
241
- },
242
- );
243
- });
244
-
245
- it("accepts signed encrypted url_verification challenges end-to-end", async () => {
246
- probeFeishuMock.mockResolvedValue({ ok: true, botOpenId: "bot_open_id" });
247
-
248
- await withRunningWebhookMonitor(
249
- {
250
- accountId: "encrypted-challenge",
251
- path: "/hook-e2e-encrypted-challenge",
252
- verificationToken: "verify_token",
253
- encryptKey: "encrypt_key",
254
- },
255
- monitorFeishuProvider,
256
- async (url) => {
257
- const payload = {
258
- encrypt: encryptFeishuPayload("encrypt_key", {
259
- type: "url_verification",
260
- challenge: "encrypted-challenge-token",
261
- }),
262
- };
263
- const response = await postSignedPayload(url, payload);
264
-
265
- expect(response.status).toBe(200);
266
- await expect(response.json()).resolves.toEqual({
267
- challenge: "encrypted-challenge-token",
268
- });
269
- },
270
- );
271
- });
272
- });
@@ -1,264 +0,0 @@
1
- import { createConnection } from "node:net";
2
- import { afterEach, describe, expect, it, vi } from "vitest";
3
- import {
4
- createFeishuClientMockModule,
5
- createFeishuRuntimeMockModule,
6
- } from "./monitor.test-mocks.js";
7
- import {
8
- buildWebhookConfig,
9
- getFreePort,
10
- withRunningWebhookMonitor,
11
- } from "./monitor.webhook.test-helpers.js";
12
-
13
- const probeFeishuMock = vi.hoisted(() => vi.fn());
14
-
15
- vi.mock("./probe.js", () => ({
16
- probeFeishu: probeFeishuMock,
17
- }));
18
-
19
- vi.mock("./client.js", () => createFeishuClientMockModule());
20
- vi.mock("./runtime.js", () => createFeishuRuntimeMockModule());
21
-
22
- vi.mock("@larksuiteoapi/node-sdk", () => ({
23
- adaptDefault: vi.fn(
24
- () => (_req: unknown, res: { statusCode?: number; end: (s: string) => void }) => {
25
- res.statusCode = 200;
26
- res.end("ok");
27
- },
28
- ),
29
- }));
30
-
31
- vi.mock("./monitor.state.js", async (importOriginal) => {
32
- const actual = await importOriginal<typeof import("./monitor.state.js")>();
33
- return {
34
- ...actual,
35
- FEISHU_WEBHOOK_BODY_TIMEOUT_MS: 50,
36
- };
37
- });
38
-
39
- import type { RuntimeEnv } from "../runtime-api.js";
40
- import {
41
- clearFeishuWebhookRateLimitStateForTest,
42
- getFeishuWebhookRateLimitStateSizeForTest,
43
- isWebhookRateLimitedForTest,
44
- monitorFeishuProvider,
45
- stopFeishuMonitor,
46
- } from "./monitor.js";
47
- import { monitorWebhook } from "./monitor.transport.js";
48
- import type { ResolvedFeishuAccount } from "./types.js";
49
-
50
- async function waitForSlowBodyTimeoutResponse(
51
- url: string,
52
- timeoutMs: number,
53
- ): Promise<{ body: string; elapsedMs: number }> {
54
- return await new Promise<{ body: string; elapsedMs: number }>((resolve, reject) => {
55
- const target = new URL(url);
56
- const startedAt = Date.now();
57
- let response = "";
58
- const socket = createConnection(
59
- {
60
- host: target.hostname,
61
- port: Number(target.port),
62
- },
63
- () => {
64
- socket.write(`POST ${target.pathname} HTTP/1.1\r\n`);
65
- socket.write(`Host: ${target.hostname}\r\n`);
66
- socket.write("Content-Type: application/json\r\n");
67
- socket.write("Content-Length: 65536\r\n");
68
- socket.write("\r\n");
69
- socket.write('{"type":"url_verification"');
70
- },
71
- );
72
-
73
- socket.setEncoding("utf8");
74
- socket.on("error", () => {});
75
- socket.on("data", (chunk) => {
76
- response += chunk;
77
- if (response.includes("Request body timeout")) {
78
- clearTimeout(failTimer);
79
- socket.destroy();
80
- resolve({ body: response, elapsedMs: Date.now() - startedAt });
81
- }
82
- });
83
-
84
- const failTimer = setTimeout(() => {
85
- socket.destroy();
86
- reject(new Error(`timeout response did not arrive within ${timeoutMs}ms`));
87
- }, timeoutMs);
88
- });
89
- }
90
-
91
- afterEach(() => {
92
- clearFeishuWebhookRateLimitStateForTest();
93
- stopFeishuMonitor();
94
- });
95
-
96
- describe("Feishu webhook security hardening", () => {
97
- it("rejects webhook mode without verificationToken", async () => {
98
- probeFeishuMock.mockResolvedValue({ ok: true, botOpenId: "bot_open_id" });
99
-
100
- const cfg = buildWebhookConfig({
101
- accountId: "missing-token",
102
- path: "/hook-missing-token",
103
- port: await getFreePort(),
104
- });
105
-
106
- await expect(monitorFeishuProvider({ config: cfg })).rejects.toThrow(
107
- /requires verificationToken/i,
108
- );
109
- });
110
-
111
- it("rejects webhook mode without encryptKey", async () => {
112
- probeFeishuMock.mockResolvedValue({ ok: true, botOpenId: "bot_open_id" });
113
-
114
- const cfg = buildWebhookConfig({
115
- accountId: "missing-encrypt-key",
116
- path: "/hook-missing-encrypt",
117
- port: await getFreePort(),
118
- verificationToken: "verify_token",
119
- });
120
-
121
- await expect(monitorFeishuProvider({ config: cfg })).rejects.toThrow(/requires encryptKey/i);
122
- });
123
-
124
- it("refuses to start the webhook transport without encryptKey", async () => {
125
- const account = {
126
- accountId: "transport-missing-encrypt-key",
127
- config: {
128
- enabled: true,
129
- connectionMode: "webhook",
130
- webhookHost: "127.0.0.1",
131
- webhookPort: await getFreePort(),
132
- webhookPath: "/hook-transport-missing-encrypt",
133
- },
134
- } as ResolvedFeishuAccount;
135
-
136
- await expect(
137
- monitorWebhook({
138
- account,
139
- accountId: account.accountId,
140
- runtime: {
141
- log: vi.fn(),
142
- error: vi.fn(),
143
- exit: vi.fn(),
144
- } as RuntimeEnv,
145
- abortSignal: new AbortController().signal,
146
- eventDispatcher: {} as never,
147
- }),
148
- ).rejects.toThrow(/requires encryptKey/i);
149
- });
150
-
151
- it("returns 415 for POST requests without json content type", async () => {
152
- probeFeishuMock.mockResolvedValue({ ok: true, botOpenId: "bot_open_id" });
153
- await withRunningWebhookMonitor(
154
- {
155
- accountId: "content-type",
156
- path: "/hook-content-type",
157
- verificationToken: "verify_token",
158
- encryptKey: "encrypt_key",
159
- },
160
- monitorFeishuProvider,
161
- async (url) => {
162
- const response = await fetch(url, {
163
- method: "POST",
164
- headers: { "content-type": "text/plain" },
165
- body: "{}",
166
- });
167
-
168
- expect(response.status).toBe(415);
169
- expect(await response.text()).toBe("Unsupported Media Type");
170
- },
171
- );
172
- });
173
-
174
- it("rejects oversized unsigned webhook bodies with 413 before signature verification", async () => {
175
- probeFeishuMock.mockResolvedValue({ ok: true, botOpenId: "bot_open_id" });
176
- await withRunningWebhookMonitor(
177
- {
178
- accountId: "payload-too-large",
179
- path: "/hook-payload-too-large",
180
- verificationToken: "verify_token",
181
- encryptKey: "encrypt_key",
182
- },
183
- monitorFeishuProvider,
184
- async (url) => {
185
- const response = await fetch(url, {
186
- method: "POST",
187
- headers: { "content-type": "application/json" },
188
- body: JSON.stringify({ payload: "x".repeat(70 * 1024) }),
189
- });
190
-
191
- expect(response.status).toBe(413);
192
- expect(await response.text()).toBe("Payload too large");
193
- },
194
- );
195
- });
196
-
197
- it("drops slow-body webhook requests within the tightened pre-auth timeout", async () => {
198
- probeFeishuMock.mockResolvedValue({ ok: true, botOpenId: "bot_open_id" });
199
- await withRunningWebhookMonitor(
200
- {
201
- accountId: "slow-body-timeout",
202
- path: "/hook-slow-body-timeout",
203
- verificationToken: "verify_token",
204
- encryptKey: "encrypt_key",
205
- },
206
- monitorFeishuProvider,
207
- async (url) => {
208
- const result = await waitForSlowBodyTimeoutResponse(url, 1_000);
209
- expect(result.body).toContain("408 Request Timeout");
210
- expect(result.body).toContain("Request body timeout");
211
- expect(result.elapsedMs).toBeLessThan(500);
212
- },
213
- );
214
- });
215
-
216
- it("rate limits webhook burst traffic with 429", async () => {
217
- probeFeishuMock.mockResolvedValue({ ok: true, botOpenId: "bot_open_id" });
218
- await withRunningWebhookMonitor(
219
- {
220
- accountId: "rate-limit",
221
- path: "/hook-rate-limit",
222
- verificationToken: "verify_token",
223
- encryptKey: "encrypt_key",
224
- },
225
- monitorFeishuProvider,
226
- async (url) => {
227
- let saw429 = false;
228
- for (let i = 0; i < 130; i += 1) {
229
- const response = await fetch(url, {
230
- method: "POST",
231
- headers: { "content-type": "text/plain" },
232
- body: "{}",
233
- });
234
- if (response.status === 429) {
235
- saw429 = true;
236
- expect(await response.text()).toBe("Too Many Requests");
237
- break;
238
- }
239
- }
240
-
241
- expect(saw429).toBe(true);
242
- },
243
- );
244
- });
245
-
246
- it("caps tracked webhook rate-limit keys to prevent unbounded growth", () => {
247
- const now = 1_000_000;
248
- for (let i = 0; i < 4_500; i += 1) {
249
- isWebhookRateLimitedForTest(`/feishu-rate-limit:key-${i}`, now);
250
- }
251
- expect(getFeishuWebhookRateLimitStateSizeForTest()).toBeLessThanOrEqual(4_096);
252
- });
253
-
254
- it("prunes stale webhook rate-limit state after window elapses", () => {
255
- const now = 2_000_000;
256
- for (let i = 0; i < 100; i += 1) {
257
- isWebhookRateLimitedForTest(`/feishu-rate-limit-stale:key-${i}`, now);
258
- }
259
- expect(getFeishuWebhookRateLimitStateSizeForTest()).toBe(100);
260
-
261
- isWebhookRateLimitedForTest("/feishu-rate-limit-stale:fresh", now + 60_001);
262
- expect(getFeishuWebhookRateLimitStateSizeForTest()).toBe(1);
263
- });
264
- });
@@ -1,116 +0,0 @@
1
- import { createServer } from "node:http";
2
- import type { AddressInfo } from "node:net";
3
- import { vi } from "vitest";
4
- import type { ClawdbotConfig } from "../runtime-api.js";
5
- import type { monitorFeishuProvider } from "./monitor.js";
6
-
7
- const WEBHOOK_READY_MAX_ATTEMPTS = 200;
8
- const WEBHOOK_READY_RETRY_DELAY_MS = 50;
9
- const WEBHOOK_MONITOR_START_MAX_ATTEMPTS = 4;
10
-
11
- export async function getFreePort(): Promise<number> {
12
- const server = createServer();
13
- await new Promise<void>((resolve) => server.listen(0, "127.0.0.1", () => resolve()));
14
- const address = server.address() as AddressInfo | null;
15
- if (!address) {
16
- throw new Error("missing server address");
17
- }
18
- await new Promise<void>((resolve) => server.close(() => resolve()));
19
- return address.port;
20
- }
21
-
22
- async function waitUntilServerReady(url: string): Promise<void> {
23
- for (let i = 0; i < WEBHOOK_READY_MAX_ATTEMPTS; i += 1) {
24
- try {
25
- const response = await fetch(url, { method: "GET" });
26
- if (response.status >= 200 && response.status < 500) {
27
- return;
28
- }
29
- } catch {
30
- // retry
31
- }
32
- await new Promise((resolve) => setTimeout(resolve, WEBHOOK_READY_RETRY_DELAY_MS));
33
- }
34
- throw new Error(`server did not start: ${url}`);
35
- }
36
-
37
- export function buildWebhookConfig(params: {
38
- accountId: string;
39
- path: string;
40
- port: number;
41
- verificationToken?: string;
42
- encryptKey?: string;
43
- }): ClawdbotConfig {
44
- return {
45
- channels: {
46
- feishu: {
47
- enabled: true,
48
- accounts: {
49
- [params.accountId]: {
50
- enabled: true,
51
- appId: "cli_test",
52
- appSecret: "secret_test", // pragma: allowlist secret
53
- connectionMode: "webhook",
54
- webhookHost: "127.0.0.1",
55
- webhookPort: params.port,
56
- webhookPath: params.path,
57
- encryptKey: params.encryptKey,
58
- verificationToken: params.verificationToken,
59
- },
60
- },
61
- },
62
- },
63
- } as ClawdbotConfig;
64
- }
65
-
66
- export async function withRunningWebhookMonitor(
67
- params: {
68
- accountId: string;
69
- path: string;
70
- verificationToken: string;
71
- encryptKey: string;
72
- },
73
- monitor: typeof monitorFeishuProvider,
74
- run: (url: string) => Promise<void>,
75
- ) {
76
- let startupError: unknown;
77
- for (let attempt = 1; attempt <= WEBHOOK_MONITOR_START_MAX_ATTEMPTS; attempt += 1) {
78
- const port = await getFreePort();
79
- const cfg = buildWebhookConfig({
80
- accountId: params.accountId,
81
- path: params.path,
82
- port,
83
- encryptKey: params.encryptKey,
84
- verificationToken: params.verificationToken,
85
- });
86
-
87
- const abortController = new AbortController();
88
- const runtime = { log: vi.fn(), error: vi.fn(), exit: vi.fn() };
89
- const monitorPromise = monitor({
90
- config: cfg,
91
- runtime,
92
- abortSignal: abortController.signal,
93
- accountId: params.accountId,
94
- });
95
-
96
- const url = `http://127.0.0.1:${port}${params.path}`;
97
- try {
98
- await waitUntilServerReady(url);
99
- try {
100
- await run(url);
101
- } finally {
102
- abortController.abort();
103
- await monitorPromise.catch(() => undefined);
104
- }
105
- return;
106
- } catch (error) {
107
- startupError = error;
108
- abortController.abort();
109
- await monitorPromise.catch(() => undefined);
110
- if (attempt < WEBHOOK_MONITOR_START_MAX_ATTEMPTS) {
111
- await new Promise((resolve) => setTimeout(resolve, attempt * WEBHOOK_READY_RETRY_DELAY_MS));
112
- }
113
- }
114
- }
115
- throw startupError instanceof Error ? startupError : new Error("failed to start webhook monitor");
116
- }
@@ -1 +0,0 @@
1
- export { chunkTextForOutbound, type ChannelOutboundAdapter } from "../runtime-api.js";