@openclaw/feishu 2026.5.2 → 2026.5.3-beta.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/accounts-Ba3-WP1z.js +423 -0
- package/dist/api.js +2280 -0
- package/dist/app-registration-B8qc1MCM.js +184 -0
- package/dist/audio-preflight.runtime-BPlzkO3l.js +7 -0
- package/dist/card-interaction-BfRLgvw_.js +96 -0
- package/dist/channel-CSD_Jt8I.js +1668 -0
- package/dist/channel-entry.js +22 -0
- package/dist/channel-plugin-api.js +2 -0
- package/dist/channel.runtime-DYsXcD36.js +700 -0
- package/dist/client-DBVoQL5w.js +157 -0
- package/dist/contract-api.js +9 -0
- package/dist/conversation-id-DWS3Ep2A.js +139 -0
- package/dist/directory.static-f3EeoRJd.js +44 -0
- package/dist/drive-C5eJLJr7.js +883 -0
- package/dist/index.js +68 -0
- package/dist/monitor-CT189QfR.js +60 -0
- package/dist/monitor.account-dJV2jO8C.js +4990 -0
- package/dist/monitor.state-DYM02ipp.js +100 -0
- package/dist/policy-D6c-wMPl.js +118 -0
- package/dist/probe-BNzzU_uR.js +149 -0
- package/dist/rolldown-runtime-DUslC3ob.js +14 -0
- package/dist/runtime-CG0DuRCy.js +8 -0
- package/dist/runtime-api.js +14 -0
- package/dist/secret-contract-Dm4Z_zQN.js +119 -0
- package/dist/secret-contract-api.js +2 -0
- package/dist/security-audit-DqJdocrN.js +11 -0
- package/dist/security-audit-shared-ByuMx9cJ.js +38 -0
- package/dist/security-contract-api.js +2 -0
- package/dist/send-DowxxbpH.js +1218 -0
- package/dist/session-conversation-B4nrW-vo.js +27 -0
- package/dist/session-key-api.js +2 -0
- package/dist/setup-api.js +2 -0
- package/dist/setup-entry.js +15 -0
- package/dist/subagent-hooks-C3UhPVLV.js +227 -0
- package/dist/subagent-hooks-api.js +23 -0
- package/dist/targets-JMFJRKSe.js +48 -0
- package/dist/thread-bindings-BmS6TLes.js +222 -0
- package/package.json +15 -6
- package/api.ts +0 -31
- package/channel-entry.ts +0 -20
- package/channel-plugin-api.ts +0 -1
- package/contract-api.ts +0 -16
- package/index.ts +0 -82
- package/runtime-api.ts +0 -55
- package/secret-contract-api.ts +0 -5
- package/security-contract-api.ts +0 -1
- package/session-key-api.ts +0 -1
- package/setup-api.ts +0 -3
- package/setup-entry.test.ts +0 -14
- package/setup-entry.ts +0 -13
- package/src/accounts.test.ts +0 -459
- package/src/accounts.ts +0 -326
- package/src/app-registration.ts +0 -331
- package/src/approval-auth.test.ts +0 -24
- package/src/approval-auth.ts +0 -25
- package/src/async.test.ts +0 -35
- package/src/async.ts +0 -104
- package/src/audio-preflight.runtime.ts +0 -9
- package/src/bitable.test.ts +0 -131
- package/src/bitable.ts +0 -762
- package/src/bot-content.ts +0 -474
- package/src/bot-group-name.test.ts +0 -108
- package/src/bot-runtime-api.ts +0 -12
- package/src/bot-sender-name.ts +0 -125
- package/src/bot.broadcast.test.ts +0 -463
- package/src/bot.card-action.test.ts +0 -577
- package/src/bot.checkBotMentioned.test.ts +0 -265
- package/src/bot.helpers.test.ts +0 -118
- package/src/bot.stripBotMention.test.ts +0 -126
- package/src/bot.test.ts +0 -3040
- package/src/bot.ts +0 -1559
- package/src/card-action.ts +0 -447
- package/src/card-interaction.test.ts +0 -129
- package/src/card-interaction.ts +0 -159
- package/src/card-test-helpers.ts +0 -47
- package/src/card-ux-approval.ts +0 -65
- package/src/card-ux-launcher.test.ts +0 -99
- package/src/card-ux-launcher.ts +0 -121
- package/src/card-ux-shared.ts +0 -33
- package/src/channel-runtime-api.ts +0 -16
- package/src/channel.runtime.ts +0 -47
- package/src/channel.test.ts +0 -959
- package/src/channel.ts +0 -1313
- package/src/chat-schema.ts +0 -25
- package/src/chat.test.ts +0 -196
- package/src/chat.ts +0 -188
- package/src/client.test.ts +0 -433
- package/src/client.ts +0 -290
- package/src/comment-dispatcher-runtime-api.ts +0 -6
- package/src/comment-dispatcher.test.ts +0 -169
- package/src/comment-dispatcher.ts +0 -107
- package/src/comment-handler-runtime-api.ts +0 -3
- package/src/comment-handler.test.ts +0 -486
- package/src/comment-handler.ts +0 -309
- package/src/comment-reaction.test.ts +0 -166
- package/src/comment-reaction.ts +0 -259
- package/src/comment-shared.test.ts +0 -182
- package/src/comment-shared.ts +0 -406
- package/src/comment-target.ts +0 -44
- package/src/config-schema.test.ts +0 -309
- package/src/config-schema.ts +0 -333
- package/src/conversation-id.test.ts +0 -18
- package/src/conversation-id.ts +0 -199
- package/src/dedup-runtime-api.ts +0 -1
- package/src/dedup.ts +0 -141
- package/src/directory.static.ts +0 -61
- package/src/directory.test.ts +0 -136
- package/src/directory.ts +0 -124
- package/src/doc-schema.ts +0 -182
- package/src/docx-batch-insert.test.ts +0 -91
- package/src/docx-batch-insert.ts +0 -223
- package/src/docx-color-text.ts +0 -154
- package/src/docx-table-ops.test.ts +0 -53
- package/src/docx-table-ops.ts +0 -316
- package/src/docx-types.ts +0 -38
- package/src/docx.account-selection.test.ts +0 -79
- package/src/docx.test.ts +0 -685
- package/src/docx.ts +0 -1616
- package/src/drive-schema.ts +0 -92
- package/src/drive.test.ts +0 -1219
- package/src/drive.ts +0 -829
- package/src/dynamic-agent.ts +0 -137
- package/src/event-types.ts +0 -45
- package/src/external-keys.test.ts +0 -20
- package/src/external-keys.ts +0 -19
- package/src/lifecycle.test-support.ts +0 -220
- package/src/media.test.ts +0 -900
- package/src/media.ts +0 -861
- package/src/mention-target.types.ts +0 -5
- package/src/mention.ts +0 -114
- package/src/message-action-contract.ts +0 -13
- package/src/monitor-state-runtime-api.ts +0 -7
- package/src/monitor-transport-runtime-api.ts +0 -7
- package/src/monitor.account.ts +0 -468
- package/src/monitor.acp-init-failure.lifecycle.test-support.ts +0 -219
- package/src/monitor.bot-identity.ts +0 -86
- package/src/monitor.bot-menu-handler.ts +0 -165
- package/src/monitor.bot-menu.lifecycle.test-support.ts +0 -224
- package/src/monitor.bot-menu.test.ts +0 -178
- package/src/monitor.broadcast.reply-once.lifecycle.test-support.ts +0 -264
- package/src/monitor.card-action.lifecycle.test-support.ts +0 -373
- package/src/monitor.cleanup.test.ts +0 -376
- package/src/monitor.comment-notice-handler.ts +0 -105
- package/src/monitor.comment.test.ts +0 -937
- package/src/monitor.comment.ts +0 -1386
- package/src/monitor.lifecycle.test.ts +0 -4
- package/src/monitor.message-handler.ts +0 -339
- package/src/monitor.reaction.lifecycle.test-support.ts +0 -68
- package/src/monitor.reaction.test.ts +0 -713
- package/src/monitor.startup.test.ts +0 -192
- package/src/monitor.startup.ts +0 -74
- package/src/monitor.state.defaults.test.ts +0 -46
- package/src/monitor.state.ts +0 -170
- package/src/monitor.synthetic-error.ts +0 -18
- package/src/monitor.test-mocks.ts +0 -45
- package/src/monitor.transport.ts +0 -424
- package/src/monitor.ts +0 -100
- package/src/monitor.webhook-e2e.test.ts +0 -272
- package/src/monitor.webhook-security.test.ts +0 -264
- package/src/monitor.webhook.test-helpers.ts +0 -116
- package/src/outbound-runtime-api.ts +0 -1
- package/src/outbound.test.ts +0 -935
- package/src/outbound.ts +0 -718
- package/src/perm-schema.ts +0 -52
- package/src/perm.ts +0 -170
- package/src/pins.ts +0 -108
- package/src/policy.test.ts +0 -334
- package/src/policy.ts +0 -236
- package/src/post.test.ts +0 -105
- package/src/post.ts +0 -275
- package/src/probe.test.ts +0 -275
- package/src/probe.ts +0 -166
- package/src/processing-claims.ts +0 -59
- package/src/qr-terminal.ts +0 -1
- package/src/reactions.ts +0 -123
- package/src/reasoning-preview.test.ts +0 -59
- package/src/reasoning-preview.ts +0 -20
- package/src/reply-dispatcher-runtime-api.ts +0 -7
- package/src/reply-dispatcher.test.ts +0 -1144
- package/src/reply-dispatcher.ts +0 -650
- package/src/runtime.ts +0 -9
- package/src/secret-contract.ts +0 -145
- package/src/secret-input.ts +0 -1
- package/src/security-audit-shared.ts +0 -69
- package/src/security-audit.test.ts +0 -61
- package/src/security-audit.ts +0 -1
- package/src/send-result.ts +0 -29
- package/src/send-target.test.ts +0 -80
- package/src/send-target.ts +0 -35
- package/src/send.reply-fallback.test.ts +0 -292
- package/src/send.test.ts +0 -550
- package/src/send.ts +0 -800
- package/src/sequential-key.test.ts +0 -72
- package/src/sequential-key.ts +0 -28
- package/src/sequential-queue.test.ts +0 -92
- package/src/sequential-queue.ts +0 -16
- package/src/session-conversation.ts +0 -42
- package/src/session-route.ts +0 -48
- package/src/setup-core.ts +0 -51
- package/src/setup-surface.test.ts +0 -174
- package/src/setup-surface.ts +0 -581
- package/src/streaming-card.test.ts +0 -190
- package/src/streaming-card.ts +0 -490
- package/src/subagent-hooks.test.ts +0 -603
- package/src/subagent-hooks.ts +0 -397
- package/src/targets.ts +0 -97
- package/src/test-support/lifecycle-test-support.ts +0 -453
- package/src/thread-bindings.test.ts +0 -143
- package/src/thread-bindings.ts +0 -330
- package/src/tool-account-routing.test.ts +0 -187
- package/src/tool-account.test.ts +0 -44
- package/src/tool-account.ts +0 -93
- package/src/tool-factory-test-harness.ts +0 -79
- package/src/tool-result.test.ts +0 -32
- package/src/tool-result.ts +0 -16
- package/src/tools-config.test.ts +0 -21
- package/src/tools-config.ts +0 -22
- package/src/types.ts +0 -104
- package/src/typing.test.ts +0 -144
- package/src/typing.ts +0 -214
- package/src/wiki-schema.ts +0 -55
- package/src/wiki.ts +0 -227
- package/subagent-hooks-api.ts +0 -31
- package/tsconfig.json +0 -16
|
@@ -1,272 +0,0 @@
|
|
|
1
|
-
import crypto from "node:crypto";
|
|
2
|
-
import { afterEach, describe, expect, it, vi } from "vitest";
|
|
3
|
-
import { createFeishuRuntimeMockModule } from "./monitor.test-mocks.js";
|
|
4
|
-
import { withRunningWebhookMonitor } from "./monitor.webhook.test-helpers.js";
|
|
5
|
-
|
|
6
|
-
const probeFeishuMock = vi.hoisted(() => vi.fn());
|
|
7
|
-
|
|
8
|
-
vi.mock("./probe.js", () => ({
|
|
9
|
-
probeFeishu: probeFeishuMock,
|
|
10
|
-
}));
|
|
11
|
-
|
|
12
|
-
vi.mock("./client.js", async () => {
|
|
13
|
-
const actual = await vi.importActual<typeof import("./client.js")>("./client.js");
|
|
14
|
-
return {
|
|
15
|
-
...actual,
|
|
16
|
-
createFeishuWSClient: vi.fn(() => ({ start: vi.fn() })),
|
|
17
|
-
};
|
|
18
|
-
});
|
|
19
|
-
|
|
20
|
-
vi.mock("./runtime.js", () => createFeishuRuntimeMockModule());
|
|
21
|
-
|
|
22
|
-
import { monitorFeishuProvider, stopFeishuMonitor } from "./monitor.js";
|
|
23
|
-
|
|
24
|
-
function signFeishuPayload(params: {
|
|
25
|
-
encryptKey: string;
|
|
26
|
-
rawBody: string;
|
|
27
|
-
timestamp?: string;
|
|
28
|
-
nonce?: string;
|
|
29
|
-
}): Record<string, string> {
|
|
30
|
-
const timestamp = params.timestamp ?? "1711111111";
|
|
31
|
-
const nonce = params.nonce ?? "nonce-test";
|
|
32
|
-
const signature = crypto
|
|
33
|
-
.createHash("sha256")
|
|
34
|
-
.update(timestamp + nonce + params.encryptKey + params.rawBody)
|
|
35
|
-
.digest("hex");
|
|
36
|
-
return {
|
|
37
|
-
"content-type": "application/json",
|
|
38
|
-
"x-lark-request-timestamp": timestamp,
|
|
39
|
-
"x-lark-request-nonce": nonce,
|
|
40
|
-
"x-lark-signature": signature,
|
|
41
|
-
};
|
|
42
|
-
}
|
|
43
|
-
|
|
44
|
-
function encryptFeishuPayload(encryptKey: string, payload: Record<string, unknown>): string {
|
|
45
|
-
const iv = crypto.randomBytes(16);
|
|
46
|
-
const key = crypto.createHash("sha256").update(encryptKey).digest();
|
|
47
|
-
const cipher = crypto.createCipheriv("aes-256-cbc", key, iv);
|
|
48
|
-
const plaintext = Buffer.from(JSON.stringify(payload), "utf8");
|
|
49
|
-
const encrypted = Buffer.concat([cipher.update(plaintext), cipher.final()]);
|
|
50
|
-
return Buffer.concat([iv, encrypted]).toString("base64");
|
|
51
|
-
}
|
|
52
|
-
|
|
53
|
-
async function postSignedPayload(url: string, payload: Record<string, unknown>) {
|
|
54
|
-
const rawBody = JSON.stringify(payload);
|
|
55
|
-
return await fetch(url, {
|
|
56
|
-
method: "POST",
|
|
57
|
-
headers: signFeishuPayload({ encryptKey: "encrypt_key", rawBody }),
|
|
58
|
-
body: rawBody,
|
|
59
|
-
});
|
|
60
|
-
}
|
|
61
|
-
|
|
62
|
-
afterEach(() => {
|
|
63
|
-
stopFeishuMonitor();
|
|
64
|
-
});
|
|
65
|
-
|
|
66
|
-
describe("Feishu webhook signed-request e2e", () => {
|
|
67
|
-
it("rejects invalid signatures with 401 instead of empty 200", async () => {
|
|
68
|
-
probeFeishuMock.mockResolvedValue({ ok: true, botOpenId: "bot_open_id" });
|
|
69
|
-
|
|
70
|
-
await withRunningWebhookMonitor(
|
|
71
|
-
{
|
|
72
|
-
accountId: "invalid-signature",
|
|
73
|
-
path: "/hook-e2e-invalid-signature",
|
|
74
|
-
verificationToken: "verify_token",
|
|
75
|
-
encryptKey: "encrypt_key",
|
|
76
|
-
},
|
|
77
|
-
monitorFeishuProvider,
|
|
78
|
-
async (url) => {
|
|
79
|
-
const payload = { type: "url_verification", challenge: "challenge-token" };
|
|
80
|
-
const rawBody = JSON.stringify(payload);
|
|
81
|
-
const response = await fetch(url, {
|
|
82
|
-
method: "POST",
|
|
83
|
-
headers: {
|
|
84
|
-
...signFeishuPayload({ encryptKey: "wrong_key", rawBody }),
|
|
85
|
-
},
|
|
86
|
-
body: rawBody,
|
|
87
|
-
});
|
|
88
|
-
|
|
89
|
-
expect(response.status).toBe(401);
|
|
90
|
-
expect(await response.text()).toBe("Invalid signature");
|
|
91
|
-
},
|
|
92
|
-
);
|
|
93
|
-
});
|
|
94
|
-
|
|
95
|
-
it("rejects missing signature headers with 401", async () => {
|
|
96
|
-
probeFeishuMock.mockResolvedValue({ ok: true, botOpenId: "bot_open_id" });
|
|
97
|
-
|
|
98
|
-
await withRunningWebhookMonitor(
|
|
99
|
-
{
|
|
100
|
-
accountId: "missing-signature",
|
|
101
|
-
path: "/hook-e2e-missing-signature",
|
|
102
|
-
verificationToken: "verify_token",
|
|
103
|
-
encryptKey: "encrypt_key",
|
|
104
|
-
},
|
|
105
|
-
monitorFeishuProvider,
|
|
106
|
-
async (url) => {
|
|
107
|
-
const response = await fetch(url, {
|
|
108
|
-
method: "POST",
|
|
109
|
-
headers: { "content-type": "application/json" },
|
|
110
|
-
body: JSON.stringify({ type: "url_verification", challenge: "challenge-token" }),
|
|
111
|
-
});
|
|
112
|
-
|
|
113
|
-
expect(response.status).toBe(401);
|
|
114
|
-
expect(await response.text()).toBe("Invalid signature");
|
|
115
|
-
},
|
|
116
|
-
);
|
|
117
|
-
});
|
|
118
|
-
|
|
119
|
-
it("rejects malformed short signatures with 401", async () => {
|
|
120
|
-
probeFeishuMock.mockResolvedValue({ ok: true, botOpenId: "bot_open_id" });
|
|
121
|
-
|
|
122
|
-
await withRunningWebhookMonitor(
|
|
123
|
-
{
|
|
124
|
-
accountId: "short-signature",
|
|
125
|
-
path: "/hook-e2e-short-signature",
|
|
126
|
-
verificationToken: "verify_token",
|
|
127
|
-
encryptKey: "encrypt_key",
|
|
128
|
-
},
|
|
129
|
-
monitorFeishuProvider,
|
|
130
|
-
async (url) => {
|
|
131
|
-
const payload = { type: "url_verification", challenge: "challenge-token" };
|
|
132
|
-
const headers = signFeishuPayload({
|
|
133
|
-
encryptKey: "encrypt_key",
|
|
134
|
-
rawBody: JSON.stringify(payload),
|
|
135
|
-
});
|
|
136
|
-
headers["x-lark-signature"] = headers["x-lark-signature"].slice(0, 12);
|
|
137
|
-
|
|
138
|
-
const response = await fetch(url, {
|
|
139
|
-
method: "POST",
|
|
140
|
-
headers,
|
|
141
|
-
body: JSON.stringify(payload),
|
|
142
|
-
});
|
|
143
|
-
|
|
144
|
-
expect(response.status).toBe(401);
|
|
145
|
-
expect(await response.text()).toBe("Invalid signature");
|
|
146
|
-
},
|
|
147
|
-
);
|
|
148
|
-
});
|
|
149
|
-
|
|
150
|
-
it("returns 401 for unsigned invalid json before parsing", async () => {
|
|
151
|
-
probeFeishuMock.mockResolvedValue({ ok: true, botOpenId: "bot_open_id" });
|
|
152
|
-
|
|
153
|
-
await withRunningWebhookMonitor(
|
|
154
|
-
{
|
|
155
|
-
accountId: "invalid-json",
|
|
156
|
-
path: "/hook-e2e-invalid-json",
|
|
157
|
-
verificationToken: "verify_token",
|
|
158
|
-
encryptKey: "encrypt_key",
|
|
159
|
-
},
|
|
160
|
-
monitorFeishuProvider,
|
|
161
|
-
async (url) => {
|
|
162
|
-
const response = await fetch(url, {
|
|
163
|
-
method: "POST",
|
|
164
|
-
headers: { "content-type": "application/json" },
|
|
165
|
-
body: "{not-json",
|
|
166
|
-
});
|
|
167
|
-
|
|
168
|
-
expect(response.status).toBe(401);
|
|
169
|
-
expect(await response.text()).toBe("Invalid signature");
|
|
170
|
-
},
|
|
171
|
-
);
|
|
172
|
-
});
|
|
173
|
-
|
|
174
|
-
it("returns 400 for signed invalid json after signature validation", async () => {
|
|
175
|
-
probeFeishuMock.mockResolvedValue({ ok: true, botOpenId: "bot_open_id" });
|
|
176
|
-
|
|
177
|
-
await withRunningWebhookMonitor(
|
|
178
|
-
{
|
|
179
|
-
accountId: "signed-invalid-json",
|
|
180
|
-
path: "/hook-e2e-signed-invalid-json",
|
|
181
|
-
verificationToken: "verify_token",
|
|
182
|
-
encryptKey: "encrypt_key",
|
|
183
|
-
},
|
|
184
|
-
monitorFeishuProvider,
|
|
185
|
-
async (url) => {
|
|
186
|
-
const rawBody = "{not-json";
|
|
187
|
-
const response = await fetch(url, {
|
|
188
|
-
method: "POST",
|
|
189
|
-
headers: signFeishuPayload({ encryptKey: "encrypt_key", rawBody }),
|
|
190
|
-
body: rawBody,
|
|
191
|
-
});
|
|
192
|
-
|
|
193
|
-
expect(response.status).toBe(400);
|
|
194
|
-
expect(await response.text()).toBe("Invalid JSON");
|
|
195
|
-
},
|
|
196
|
-
);
|
|
197
|
-
});
|
|
198
|
-
|
|
199
|
-
it("accepts signed plaintext url_verification challenges end-to-end", async () => {
|
|
200
|
-
probeFeishuMock.mockResolvedValue({ ok: true, botOpenId: "bot_open_id" });
|
|
201
|
-
|
|
202
|
-
await withRunningWebhookMonitor(
|
|
203
|
-
{
|
|
204
|
-
accountId: "signed-challenge",
|
|
205
|
-
path: "/hook-e2e-signed-challenge",
|
|
206
|
-
verificationToken: "verify_token",
|
|
207
|
-
encryptKey: "encrypt_key",
|
|
208
|
-
},
|
|
209
|
-
monitorFeishuProvider,
|
|
210
|
-
async (url) => {
|
|
211
|
-
const payload = { type: "url_verification", challenge: "challenge-token" };
|
|
212
|
-
const response = await postSignedPayload(url, payload);
|
|
213
|
-
|
|
214
|
-
expect(response.status).toBe(200);
|
|
215
|
-
await expect(response.json()).resolves.toEqual({ challenge: "challenge-token" });
|
|
216
|
-
},
|
|
217
|
-
);
|
|
218
|
-
});
|
|
219
|
-
|
|
220
|
-
it("accepts signed non-challenge events and reaches the dispatcher", async () => {
|
|
221
|
-
probeFeishuMock.mockResolvedValue({ ok: true, botOpenId: "bot_open_id" });
|
|
222
|
-
|
|
223
|
-
await withRunningWebhookMonitor(
|
|
224
|
-
{
|
|
225
|
-
accountId: "signed-dispatch",
|
|
226
|
-
path: "/hook-e2e-signed-dispatch",
|
|
227
|
-
verificationToken: "verify_token",
|
|
228
|
-
encryptKey: "encrypt_key",
|
|
229
|
-
},
|
|
230
|
-
monitorFeishuProvider,
|
|
231
|
-
async (url) => {
|
|
232
|
-
const payload = {
|
|
233
|
-
schema: "2.0",
|
|
234
|
-
header: { event_type: "unknown.event" },
|
|
235
|
-
event: {},
|
|
236
|
-
};
|
|
237
|
-
const response = await postSignedPayload(url, payload);
|
|
238
|
-
|
|
239
|
-
expect(response.status).toBe(200);
|
|
240
|
-
expect(await response.text()).toContain("no unknown.event event handle");
|
|
241
|
-
},
|
|
242
|
-
);
|
|
243
|
-
});
|
|
244
|
-
|
|
245
|
-
it("accepts signed encrypted url_verification challenges end-to-end", async () => {
|
|
246
|
-
probeFeishuMock.mockResolvedValue({ ok: true, botOpenId: "bot_open_id" });
|
|
247
|
-
|
|
248
|
-
await withRunningWebhookMonitor(
|
|
249
|
-
{
|
|
250
|
-
accountId: "encrypted-challenge",
|
|
251
|
-
path: "/hook-e2e-encrypted-challenge",
|
|
252
|
-
verificationToken: "verify_token",
|
|
253
|
-
encryptKey: "encrypt_key",
|
|
254
|
-
},
|
|
255
|
-
monitorFeishuProvider,
|
|
256
|
-
async (url) => {
|
|
257
|
-
const payload = {
|
|
258
|
-
encrypt: encryptFeishuPayload("encrypt_key", {
|
|
259
|
-
type: "url_verification",
|
|
260
|
-
challenge: "encrypted-challenge-token",
|
|
261
|
-
}),
|
|
262
|
-
};
|
|
263
|
-
const response = await postSignedPayload(url, payload);
|
|
264
|
-
|
|
265
|
-
expect(response.status).toBe(200);
|
|
266
|
-
await expect(response.json()).resolves.toEqual({
|
|
267
|
-
challenge: "encrypted-challenge-token",
|
|
268
|
-
});
|
|
269
|
-
},
|
|
270
|
-
);
|
|
271
|
-
});
|
|
272
|
-
});
|
|
@@ -1,264 +0,0 @@
|
|
|
1
|
-
import { createConnection } from "node:net";
|
|
2
|
-
import { afterEach, describe, expect, it, vi } from "vitest";
|
|
3
|
-
import {
|
|
4
|
-
createFeishuClientMockModule,
|
|
5
|
-
createFeishuRuntimeMockModule,
|
|
6
|
-
} from "./monitor.test-mocks.js";
|
|
7
|
-
import {
|
|
8
|
-
buildWebhookConfig,
|
|
9
|
-
getFreePort,
|
|
10
|
-
withRunningWebhookMonitor,
|
|
11
|
-
} from "./monitor.webhook.test-helpers.js";
|
|
12
|
-
|
|
13
|
-
const probeFeishuMock = vi.hoisted(() => vi.fn());
|
|
14
|
-
|
|
15
|
-
vi.mock("./probe.js", () => ({
|
|
16
|
-
probeFeishu: probeFeishuMock,
|
|
17
|
-
}));
|
|
18
|
-
|
|
19
|
-
vi.mock("./client.js", () => createFeishuClientMockModule());
|
|
20
|
-
vi.mock("./runtime.js", () => createFeishuRuntimeMockModule());
|
|
21
|
-
|
|
22
|
-
vi.mock("@larksuiteoapi/node-sdk", () => ({
|
|
23
|
-
adaptDefault: vi.fn(
|
|
24
|
-
() => (_req: unknown, res: { statusCode?: number; end: (s: string) => void }) => {
|
|
25
|
-
res.statusCode = 200;
|
|
26
|
-
res.end("ok");
|
|
27
|
-
},
|
|
28
|
-
),
|
|
29
|
-
}));
|
|
30
|
-
|
|
31
|
-
vi.mock("./monitor.state.js", async (importOriginal) => {
|
|
32
|
-
const actual = await importOriginal<typeof import("./monitor.state.js")>();
|
|
33
|
-
return {
|
|
34
|
-
...actual,
|
|
35
|
-
FEISHU_WEBHOOK_BODY_TIMEOUT_MS: 50,
|
|
36
|
-
};
|
|
37
|
-
});
|
|
38
|
-
|
|
39
|
-
import type { RuntimeEnv } from "../runtime-api.js";
|
|
40
|
-
import {
|
|
41
|
-
clearFeishuWebhookRateLimitStateForTest,
|
|
42
|
-
getFeishuWebhookRateLimitStateSizeForTest,
|
|
43
|
-
isWebhookRateLimitedForTest,
|
|
44
|
-
monitorFeishuProvider,
|
|
45
|
-
stopFeishuMonitor,
|
|
46
|
-
} from "./monitor.js";
|
|
47
|
-
import { monitorWebhook } from "./monitor.transport.js";
|
|
48
|
-
import type { ResolvedFeishuAccount } from "./types.js";
|
|
49
|
-
|
|
50
|
-
async function waitForSlowBodyTimeoutResponse(
|
|
51
|
-
url: string,
|
|
52
|
-
timeoutMs: number,
|
|
53
|
-
): Promise<{ body: string; elapsedMs: number }> {
|
|
54
|
-
return await new Promise<{ body: string; elapsedMs: number }>((resolve, reject) => {
|
|
55
|
-
const target = new URL(url);
|
|
56
|
-
const startedAt = Date.now();
|
|
57
|
-
let response = "";
|
|
58
|
-
const socket = createConnection(
|
|
59
|
-
{
|
|
60
|
-
host: target.hostname,
|
|
61
|
-
port: Number(target.port),
|
|
62
|
-
},
|
|
63
|
-
() => {
|
|
64
|
-
socket.write(`POST ${target.pathname} HTTP/1.1\r\n`);
|
|
65
|
-
socket.write(`Host: ${target.hostname}\r\n`);
|
|
66
|
-
socket.write("Content-Type: application/json\r\n");
|
|
67
|
-
socket.write("Content-Length: 65536\r\n");
|
|
68
|
-
socket.write("\r\n");
|
|
69
|
-
socket.write('{"type":"url_verification"');
|
|
70
|
-
},
|
|
71
|
-
);
|
|
72
|
-
|
|
73
|
-
socket.setEncoding("utf8");
|
|
74
|
-
socket.on("error", () => {});
|
|
75
|
-
socket.on("data", (chunk) => {
|
|
76
|
-
response += chunk;
|
|
77
|
-
if (response.includes("Request body timeout")) {
|
|
78
|
-
clearTimeout(failTimer);
|
|
79
|
-
socket.destroy();
|
|
80
|
-
resolve({ body: response, elapsedMs: Date.now() - startedAt });
|
|
81
|
-
}
|
|
82
|
-
});
|
|
83
|
-
|
|
84
|
-
const failTimer = setTimeout(() => {
|
|
85
|
-
socket.destroy();
|
|
86
|
-
reject(new Error(`timeout response did not arrive within ${timeoutMs}ms`));
|
|
87
|
-
}, timeoutMs);
|
|
88
|
-
});
|
|
89
|
-
}
|
|
90
|
-
|
|
91
|
-
afterEach(() => {
|
|
92
|
-
clearFeishuWebhookRateLimitStateForTest();
|
|
93
|
-
stopFeishuMonitor();
|
|
94
|
-
});
|
|
95
|
-
|
|
96
|
-
describe("Feishu webhook security hardening", () => {
|
|
97
|
-
it("rejects webhook mode without verificationToken", async () => {
|
|
98
|
-
probeFeishuMock.mockResolvedValue({ ok: true, botOpenId: "bot_open_id" });
|
|
99
|
-
|
|
100
|
-
const cfg = buildWebhookConfig({
|
|
101
|
-
accountId: "missing-token",
|
|
102
|
-
path: "/hook-missing-token",
|
|
103
|
-
port: await getFreePort(),
|
|
104
|
-
});
|
|
105
|
-
|
|
106
|
-
await expect(monitorFeishuProvider({ config: cfg })).rejects.toThrow(
|
|
107
|
-
/requires verificationToken/i,
|
|
108
|
-
);
|
|
109
|
-
});
|
|
110
|
-
|
|
111
|
-
it("rejects webhook mode without encryptKey", async () => {
|
|
112
|
-
probeFeishuMock.mockResolvedValue({ ok: true, botOpenId: "bot_open_id" });
|
|
113
|
-
|
|
114
|
-
const cfg = buildWebhookConfig({
|
|
115
|
-
accountId: "missing-encrypt-key",
|
|
116
|
-
path: "/hook-missing-encrypt",
|
|
117
|
-
port: await getFreePort(),
|
|
118
|
-
verificationToken: "verify_token",
|
|
119
|
-
});
|
|
120
|
-
|
|
121
|
-
await expect(monitorFeishuProvider({ config: cfg })).rejects.toThrow(/requires encryptKey/i);
|
|
122
|
-
});
|
|
123
|
-
|
|
124
|
-
it("refuses to start the webhook transport without encryptKey", async () => {
|
|
125
|
-
const account = {
|
|
126
|
-
accountId: "transport-missing-encrypt-key",
|
|
127
|
-
config: {
|
|
128
|
-
enabled: true,
|
|
129
|
-
connectionMode: "webhook",
|
|
130
|
-
webhookHost: "127.0.0.1",
|
|
131
|
-
webhookPort: await getFreePort(),
|
|
132
|
-
webhookPath: "/hook-transport-missing-encrypt",
|
|
133
|
-
},
|
|
134
|
-
} as ResolvedFeishuAccount;
|
|
135
|
-
|
|
136
|
-
await expect(
|
|
137
|
-
monitorWebhook({
|
|
138
|
-
account,
|
|
139
|
-
accountId: account.accountId,
|
|
140
|
-
runtime: {
|
|
141
|
-
log: vi.fn(),
|
|
142
|
-
error: vi.fn(),
|
|
143
|
-
exit: vi.fn(),
|
|
144
|
-
} as RuntimeEnv,
|
|
145
|
-
abortSignal: new AbortController().signal,
|
|
146
|
-
eventDispatcher: {} as never,
|
|
147
|
-
}),
|
|
148
|
-
).rejects.toThrow(/requires encryptKey/i);
|
|
149
|
-
});
|
|
150
|
-
|
|
151
|
-
it("returns 415 for POST requests without json content type", async () => {
|
|
152
|
-
probeFeishuMock.mockResolvedValue({ ok: true, botOpenId: "bot_open_id" });
|
|
153
|
-
await withRunningWebhookMonitor(
|
|
154
|
-
{
|
|
155
|
-
accountId: "content-type",
|
|
156
|
-
path: "/hook-content-type",
|
|
157
|
-
verificationToken: "verify_token",
|
|
158
|
-
encryptKey: "encrypt_key",
|
|
159
|
-
},
|
|
160
|
-
monitorFeishuProvider,
|
|
161
|
-
async (url) => {
|
|
162
|
-
const response = await fetch(url, {
|
|
163
|
-
method: "POST",
|
|
164
|
-
headers: { "content-type": "text/plain" },
|
|
165
|
-
body: "{}",
|
|
166
|
-
});
|
|
167
|
-
|
|
168
|
-
expect(response.status).toBe(415);
|
|
169
|
-
expect(await response.text()).toBe("Unsupported Media Type");
|
|
170
|
-
},
|
|
171
|
-
);
|
|
172
|
-
});
|
|
173
|
-
|
|
174
|
-
it("rejects oversized unsigned webhook bodies with 413 before signature verification", async () => {
|
|
175
|
-
probeFeishuMock.mockResolvedValue({ ok: true, botOpenId: "bot_open_id" });
|
|
176
|
-
await withRunningWebhookMonitor(
|
|
177
|
-
{
|
|
178
|
-
accountId: "payload-too-large",
|
|
179
|
-
path: "/hook-payload-too-large",
|
|
180
|
-
verificationToken: "verify_token",
|
|
181
|
-
encryptKey: "encrypt_key",
|
|
182
|
-
},
|
|
183
|
-
monitorFeishuProvider,
|
|
184
|
-
async (url) => {
|
|
185
|
-
const response = await fetch(url, {
|
|
186
|
-
method: "POST",
|
|
187
|
-
headers: { "content-type": "application/json" },
|
|
188
|
-
body: JSON.stringify({ payload: "x".repeat(70 * 1024) }),
|
|
189
|
-
});
|
|
190
|
-
|
|
191
|
-
expect(response.status).toBe(413);
|
|
192
|
-
expect(await response.text()).toBe("Payload too large");
|
|
193
|
-
},
|
|
194
|
-
);
|
|
195
|
-
});
|
|
196
|
-
|
|
197
|
-
it("drops slow-body webhook requests within the tightened pre-auth timeout", async () => {
|
|
198
|
-
probeFeishuMock.mockResolvedValue({ ok: true, botOpenId: "bot_open_id" });
|
|
199
|
-
await withRunningWebhookMonitor(
|
|
200
|
-
{
|
|
201
|
-
accountId: "slow-body-timeout",
|
|
202
|
-
path: "/hook-slow-body-timeout",
|
|
203
|
-
verificationToken: "verify_token",
|
|
204
|
-
encryptKey: "encrypt_key",
|
|
205
|
-
},
|
|
206
|
-
monitorFeishuProvider,
|
|
207
|
-
async (url) => {
|
|
208
|
-
const result = await waitForSlowBodyTimeoutResponse(url, 1_000);
|
|
209
|
-
expect(result.body).toContain("408 Request Timeout");
|
|
210
|
-
expect(result.body).toContain("Request body timeout");
|
|
211
|
-
expect(result.elapsedMs).toBeLessThan(500);
|
|
212
|
-
},
|
|
213
|
-
);
|
|
214
|
-
});
|
|
215
|
-
|
|
216
|
-
it("rate limits webhook burst traffic with 429", async () => {
|
|
217
|
-
probeFeishuMock.mockResolvedValue({ ok: true, botOpenId: "bot_open_id" });
|
|
218
|
-
await withRunningWebhookMonitor(
|
|
219
|
-
{
|
|
220
|
-
accountId: "rate-limit",
|
|
221
|
-
path: "/hook-rate-limit",
|
|
222
|
-
verificationToken: "verify_token",
|
|
223
|
-
encryptKey: "encrypt_key",
|
|
224
|
-
},
|
|
225
|
-
monitorFeishuProvider,
|
|
226
|
-
async (url) => {
|
|
227
|
-
let saw429 = false;
|
|
228
|
-
for (let i = 0; i < 130; i += 1) {
|
|
229
|
-
const response = await fetch(url, {
|
|
230
|
-
method: "POST",
|
|
231
|
-
headers: { "content-type": "text/plain" },
|
|
232
|
-
body: "{}",
|
|
233
|
-
});
|
|
234
|
-
if (response.status === 429) {
|
|
235
|
-
saw429 = true;
|
|
236
|
-
expect(await response.text()).toBe("Too Many Requests");
|
|
237
|
-
break;
|
|
238
|
-
}
|
|
239
|
-
}
|
|
240
|
-
|
|
241
|
-
expect(saw429).toBe(true);
|
|
242
|
-
},
|
|
243
|
-
);
|
|
244
|
-
});
|
|
245
|
-
|
|
246
|
-
it("caps tracked webhook rate-limit keys to prevent unbounded growth", () => {
|
|
247
|
-
const now = 1_000_000;
|
|
248
|
-
for (let i = 0; i < 4_500; i += 1) {
|
|
249
|
-
isWebhookRateLimitedForTest(`/feishu-rate-limit:key-${i}`, now);
|
|
250
|
-
}
|
|
251
|
-
expect(getFeishuWebhookRateLimitStateSizeForTest()).toBeLessThanOrEqual(4_096);
|
|
252
|
-
});
|
|
253
|
-
|
|
254
|
-
it("prunes stale webhook rate-limit state after window elapses", () => {
|
|
255
|
-
const now = 2_000_000;
|
|
256
|
-
for (let i = 0; i < 100; i += 1) {
|
|
257
|
-
isWebhookRateLimitedForTest(`/feishu-rate-limit-stale:key-${i}`, now);
|
|
258
|
-
}
|
|
259
|
-
expect(getFeishuWebhookRateLimitStateSizeForTest()).toBe(100);
|
|
260
|
-
|
|
261
|
-
isWebhookRateLimitedForTest("/feishu-rate-limit-stale:fresh", now + 60_001);
|
|
262
|
-
expect(getFeishuWebhookRateLimitStateSizeForTest()).toBe(1);
|
|
263
|
-
});
|
|
264
|
-
});
|
|
@@ -1,116 +0,0 @@
|
|
|
1
|
-
import { createServer } from "node:http";
|
|
2
|
-
import type { AddressInfo } from "node:net";
|
|
3
|
-
import { vi } from "vitest";
|
|
4
|
-
import type { ClawdbotConfig } from "../runtime-api.js";
|
|
5
|
-
import type { monitorFeishuProvider } from "./monitor.js";
|
|
6
|
-
|
|
7
|
-
const WEBHOOK_READY_MAX_ATTEMPTS = 200;
|
|
8
|
-
const WEBHOOK_READY_RETRY_DELAY_MS = 50;
|
|
9
|
-
const WEBHOOK_MONITOR_START_MAX_ATTEMPTS = 4;
|
|
10
|
-
|
|
11
|
-
export async function getFreePort(): Promise<number> {
|
|
12
|
-
const server = createServer();
|
|
13
|
-
await new Promise<void>((resolve) => server.listen(0, "127.0.0.1", () => resolve()));
|
|
14
|
-
const address = server.address() as AddressInfo | null;
|
|
15
|
-
if (!address) {
|
|
16
|
-
throw new Error("missing server address");
|
|
17
|
-
}
|
|
18
|
-
await new Promise<void>((resolve) => server.close(() => resolve()));
|
|
19
|
-
return address.port;
|
|
20
|
-
}
|
|
21
|
-
|
|
22
|
-
async function waitUntilServerReady(url: string): Promise<void> {
|
|
23
|
-
for (let i = 0; i < WEBHOOK_READY_MAX_ATTEMPTS; i += 1) {
|
|
24
|
-
try {
|
|
25
|
-
const response = await fetch(url, { method: "GET" });
|
|
26
|
-
if (response.status >= 200 && response.status < 500) {
|
|
27
|
-
return;
|
|
28
|
-
}
|
|
29
|
-
} catch {
|
|
30
|
-
// retry
|
|
31
|
-
}
|
|
32
|
-
await new Promise((resolve) => setTimeout(resolve, WEBHOOK_READY_RETRY_DELAY_MS));
|
|
33
|
-
}
|
|
34
|
-
throw new Error(`server did not start: ${url}`);
|
|
35
|
-
}
|
|
36
|
-
|
|
37
|
-
export function buildWebhookConfig(params: {
|
|
38
|
-
accountId: string;
|
|
39
|
-
path: string;
|
|
40
|
-
port: number;
|
|
41
|
-
verificationToken?: string;
|
|
42
|
-
encryptKey?: string;
|
|
43
|
-
}): ClawdbotConfig {
|
|
44
|
-
return {
|
|
45
|
-
channels: {
|
|
46
|
-
feishu: {
|
|
47
|
-
enabled: true,
|
|
48
|
-
accounts: {
|
|
49
|
-
[params.accountId]: {
|
|
50
|
-
enabled: true,
|
|
51
|
-
appId: "cli_test",
|
|
52
|
-
appSecret: "secret_test", // pragma: allowlist secret
|
|
53
|
-
connectionMode: "webhook",
|
|
54
|
-
webhookHost: "127.0.0.1",
|
|
55
|
-
webhookPort: params.port,
|
|
56
|
-
webhookPath: params.path,
|
|
57
|
-
encryptKey: params.encryptKey,
|
|
58
|
-
verificationToken: params.verificationToken,
|
|
59
|
-
},
|
|
60
|
-
},
|
|
61
|
-
},
|
|
62
|
-
},
|
|
63
|
-
} as ClawdbotConfig;
|
|
64
|
-
}
|
|
65
|
-
|
|
66
|
-
export async function withRunningWebhookMonitor(
|
|
67
|
-
params: {
|
|
68
|
-
accountId: string;
|
|
69
|
-
path: string;
|
|
70
|
-
verificationToken: string;
|
|
71
|
-
encryptKey: string;
|
|
72
|
-
},
|
|
73
|
-
monitor: typeof monitorFeishuProvider,
|
|
74
|
-
run: (url: string) => Promise<void>,
|
|
75
|
-
) {
|
|
76
|
-
let startupError: unknown;
|
|
77
|
-
for (let attempt = 1; attempt <= WEBHOOK_MONITOR_START_MAX_ATTEMPTS; attempt += 1) {
|
|
78
|
-
const port = await getFreePort();
|
|
79
|
-
const cfg = buildWebhookConfig({
|
|
80
|
-
accountId: params.accountId,
|
|
81
|
-
path: params.path,
|
|
82
|
-
port,
|
|
83
|
-
encryptKey: params.encryptKey,
|
|
84
|
-
verificationToken: params.verificationToken,
|
|
85
|
-
});
|
|
86
|
-
|
|
87
|
-
const abortController = new AbortController();
|
|
88
|
-
const runtime = { log: vi.fn(), error: vi.fn(), exit: vi.fn() };
|
|
89
|
-
const monitorPromise = monitor({
|
|
90
|
-
config: cfg,
|
|
91
|
-
runtime,
|
|
92
|
-
abortSignal: abortController.signal,
|
|
93
|
-
accountId: params.accountId,
|
|
94
|
-
});
|
|
95
|
-
|
|
96
|
-
const url = `http://127.0.0.1:${port}${params.path}`;
|
|
97
|
-
try {
|
|
98
|
-
await waitUntilServerReady(url);
|
|
99
|
-
try {
|
|
100
|
-
await run(url);
|
|
101
|
-
} finally {
|
|
102
|
-
abortController.abort();
|
|
103
|
-
await monitorPromise.catch(() => undefined);
|
|
104
|
-
}
|
|
105
|
-
return;
|
|
106
|
-
} catch (error) {
|
|
107
|
-
startupError = error;
|
|
108
|
-
abortController.abort();
|
|
109
|
-
await monitorPromise.catch(() => undefined);
|
|
110
|
-
if (attempt < WEBHOOK_MONITOR_START_MAX_ATTEMPTS) {
|
|
111
|
-
await new Promise((resolve) => setTimeout(resolve, attempt * WEBHOOK_READY_RETRY_DELAY_MS));
|
|
112
|
-
}
|
|
113
|
-
}
|
|
114
|
-
}
|
|
115
|
-
throw startupError instanceof Error ? startupError : new Error("failed to start webhook monitor");
|
|
116
|
-
}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
export { chunkTextForOutbound, type ChannelOutboundAdapter } from "../runtime-api.js";
|