@openclaw/zalo 2026.3.13 → 2026.5.1-beta.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (67) hide show
  1. package/README.md +1 -1
  2. package/api.ts +9 -0
  3. package/channel-plugin-api.ts +1 -0
  4. package/contract-api.ts +5 -0
  5. package/index.test.ts +15 -0
  6. package/index.ts +16 -13
  7. package/openclaw.plugin.json +514 -1
  8. package/package.json +31 -5
  9. package/runtime-api.test.ts +17 -0
  10. package/runtime-api.ts +75 -0
  11. package/secret-contract-api.ts +5 -0
  12. package/setup-api.ts +34 -0
  13. package/setup-entry.ts +13 -0
  14. package/src/accounts.test.ts +70 -0
  15. package/src/accounts.ts +19 -19
  16. package/src/actions.runtime.ts +5 -0
  17. package/src/actions.test.ts +32 -0
  18. package/src/actions.ts +20 -14
  19. package/src/api.test.ts +93 -2
  20. package/src/api.ts +29 -2
  21. package/src/approval-auth.test.ts +17 -0
  22. package/src/approval-auth.ts +25 -0
  23. package/src/channel.directory.test.ts +19 -6
  24. package/src/channel.runtime.ts +93 -0
  25. package/src/channel.startup.test.ts +26 -19
  26. package/src/channel.ts +228 -336
  27. package/src/config-schema.ts +3 -3
  28. package/src/group-access.ts +4 -3
  29. package/src/monitor.group-policy.test.ts +0 -12
  30. package/src/monitor.image.polling.test.ts +110 -0
  31. package/src/monitor.lifecycle.test.ts +41 -22
  32. package/src/monitor.pairing.lifecycle.test.ts +141 -0
  33. package/src/monitor.polling.media-reply.test.ts +425 -0
  34. package/src/monitor.reply-once.lifecycle.test.ts +171 -0
  35. package/src/monitor.ts +460 -206
  36. package/src/monitor.types.ts +4 -0
  37. package/src/monitor.webhook.test.ts +392 -62
  38. package/src/monitor.webhook.ts +73 -36
  39. package/src/outbound-media.test.ts +182 -0
  40. package/src/outbound-media.ts +241 -0
  41. package/src/outbound-payload.contract.test.ts +45 -0
  42. package/src/probe.ts +1 -1
  43. package/src/proxy.ts +1 -1
  44. package/src/runtime-api.ts +75 -0
  45. package/src/runtime-support.ts +91 -0
  46. package/src/runtime.ts +6 -3
  47. package/src/secret-contract.ts +109 -0
  48. package/src/secret-input.ts +1 -9
  49. package/src/send.test.ts +120 -0
  50. package/src/send.ts +15 -13
  51. package/src/session-route.ts +32 -0
  52. package/src/setup-allow-from.ts +94 -0
  53. package/src/setup-core.ts +149 -0
  54. package/src/{onboarding.status.test.ts → setup-status.test.ts} +13 -4
  55. package/src/setup-surface.test.ts +175 -0
  56. package/src/{onboarding.ts → setup-surface.ts} +59 -177
  57. package/src/status-issues.test.ts +2 -14
  58. package/src/status-issues.ts +8 -2
  59. package/src/test-support/lifecycle-test-support.ts +413 -0
  60. package/src/test-support/monitor-mocks-test-support.ts +209 -0
  61. package/src/token.test.ts +15 -0
  62. package/src/token.ts +8 -17
  63. package/src/types.ts +2 -2
  64. package/test-api.ts +1 -0
  65. package/tsconfig.json +16 -0
  66. package/CHANGELOG.md +0 -101
  67. package/src/channel.sendpayload.test.ts +0 -44
@@ -0,0 +1,182 @@
1
+ import { stat } from "node:fs/promises";
2
+ import { join } from "node:path";
3
+ import { resolvePreferredOpenClawTmpDir } from "openclaw/plugin-sdk/temp-path";
4
+ import { beforeEach, describe, expect, it, vi } from "vitest";
5
+
6
+ const loadOutboundMediaFromUrlMock = vi.fn();
7
+
8
+ vi.mock("openclaw/plugin-sdk/outbound-media", () => ({
9
+ loadOutboundMediaFromUrl: (...args: unknown[]) => loadOutboundMediaFromUrlMock(...args),
10
+ }));
11
+
12
+ import {
13
+ clearHostedZaloMediaForTest,
14
+ prepareHostedZaloMediaUrl,
15
+ resolveHostedZaloMediaRoutePrefix,
16
+ tryHandleHostedZaloMediaRequest,
17
+ } from "./outbound-media.js";
18
+
19
+ function createMockResponse() {
20
+ const headers = new Map<string, string>();
21
+ return {
22
+ headers,
23
+ res: {
24
+ statusCode: 200,
25
+ setHeader(name: string, value: string) {
26
+ headers.set(name, value);
27
+ },
28
+ end: vi.fn(),
29
+ },
30
+ };
31
+ }
32
+
33
+ describe("zalo outbound hosted media", () => {
34
+ beforeEach(() => {
35
+ clearHostedZaloMediaForTest();
36
+ loadOutboundMediaFromUrlMock.mockReset();
37
+ loadOutboundMediaFromUrlMock.mockResolvedValue({
38
+ buffer: Buffer.from("image-bytes"),
39
+ contentType: "image/png",
40
+ fileName: "photo.png",
41
+ });
42
+ });
43
+
44
+ it("loads outbound media under OpenClaw control and returns a hosted URL", async () => {
45
+ const hostedUrl = await prepareHostedZaloMediaUrl({
46
+ mediaUrl: "https://example.com/photo.png",
47
+ webhookUrl: "https://gateway.example.com/zalo-webhook",
48
+ maxBytes: 1024,
49
+ });
50
+
51
+ expect(loadOutboundMediaFromUrlMock).toHaveBeenCalledWith("https://example.com/photo.png", {
52
+ maxBytes: 1024,
53
+ });
54
+ expect(hostedUrl).toMatch(
55
+ /^https:\/\/gateway\.example\.com\/zalo-webhook\/media\/[a-f0-9]+\?token=[a-f0-9]+$/,
56
+ );
57
+ });
58
+
59
+ it("passes proxy-aware fetch options into hosted media downloads", async () => {
60
+ await prepareHostedZaloMediaUrl({
61
+ mediaUrl: "https://example.com/photo.png",
62
+ webhookUrl: "https://gateway.example.com/zalo-webhook",
63
+ maxBytes: 1024,
64
+ proxyUrl: "http://proxy.example:8080",
65
+ });
66
+
67
+ expect(loadOutboundMediaFromUrlMock).toHaveBeenCalledWith("https://example.com/photo.png", {
68
+ maxBytes: 1024,
69
+ proxyUrl: "http://proxy.example:8080",
70
+ });
71
+ });
72
+
73
+ it("creates hosted media storage with private filesystem permissions", async () => {
74
+ const hostedUrl = await prepareHostedZaloMediaUrl({
75
+ mediaUrl: "https://example.com/photo.png",
76
+ webhookUrl: "https://gateway.example.com/zalo-webhook",
77
+ maxBytes: 1024,
78
+ });
79
+
80
+ if (process.platform === "win32") {
81
+ expect(hostedUrl).toContain("/zalo-webhook/media/");
82
+ return;
83
+ }
84
+
85
+ const { pathname } = new URL(hostedUrl);
86
+ const id = pathname.split("/").pop();
87
+ expect(id).toBeTruthy();
88
+
89
+ const storageDir = join(resolvePreferredOpenClawTmpDir(), "openclaw-zalo-outbound-media");
90
+ const [dirStats, metadataStats, bufferStats] = await Promise.all([
91
+ stat(storageDir),
92
+ stat(join(storageDir, `${id}.json`)),
93
+ stat(join(storageDir, `${id}.bin`)),
94
+ ]);
95
+
96
+ expect(dirStats.mode & 0o777).toBe(0o700);
97
+ expect(metadataStats.mode & 0o777).toBe(0o600);
98
+ expect(bufferStats.mode & 0o777).toBe(0o600);
99
+ });
100
+
101
+ it("preserves the root webhook path when deriving the hosted media route", () => {
102
+ expect(
103
+ resolveHostedZaloMediaRoutePrefix({
104
+ webhookUrl: "https://gateway.example.com/",
105
+ }),
106
+ ).toBe("/media");
107
+ });
108
+
109
+ it("serves hosted media once when the route token matches", async () => {
110
+ const hostedUrl = await prepareHostedZaloMediaUrl({
111
+ mediaUrl: "https://example.com/photo.png",
112
+ webhookUrl: "https://gateway.example.com/zalo-webhook",
113
+ maxBytes: 1024,
114
+ });
115
+ const { pathname, search } = new URL(hostedUrl);
116
+ const response = createMockResponse();
117
+
118
+ const handled = await tryHandleHostedZaloMediaRequest(
119
+ {
120
+ method: "GET",
121
+ url: `${pathname}${search}`,
122
+ } as never,
123
+ response.res as never,
124
+ );
125
+
126
+ expect(handled).toBe(true);
127
+ expect(response.res.statusCode).toBe(200);
128
+ expect(response.headers.get("Content-Type")).toBe("image/png");
129
+ expect(response.res.end).toHaveBeenCalledWith(Buffer.from("image-bytes"));
130
+
131
+ const secondResponse = createMockResponse();
132
+ const handledAgain = await tryHandleHostedZaloMediaRequest(
133
+ {
134
+ method: "GET",
135
+ url: `${pathname}${search}`,
136
+ } as never,
137
+ secondResponse.res as never,
138
+ );
139
+
140
+ expect(handledAgain).toBe(true);
141
+ expect(secondResponse.res.statusCode).toBe(404);
142
+ });
143
+
144
+ it("rejects hosted media requests with the wrong token", async () => {
145
+ const hostedUrl = await prepareHostedZaloMediaUrl({
146
+ mediaUrl: "https://example.com/photo.png",
147
+ webhookUrl: "https://gateway.example.com/custom/zalo",
148
+ webhookPath: "/custom/zalo-hook",
149
+ maxBytes: 1024,
150
+ });
151
+ const pathname = new URL(hostedUrl).pathname;
152
+ const response = createMockResponse();
153
+
154
+ const handled = await tryHandleHostedZaloMediaRequest(
155
+ {
156
+ method: "GET",
157
+ url: `${pathname}?token=wrong`,
158
+ } as never,
159
+ response.res as never,
160
+ );
161
+
162
+ expect(handled).toBe(true);
163
+ expect(response.res.statusCode).toBe(401);
164
+ expect(response.res.end).toHaveBeenCalledWith("Unauthorized");
165
+ });
166
+
167
+ it("rejects malformed hosted media ids before touching disk", async () => {
168
+ const response = createMockResponse();
169
+
170
+ const handled = await tryHandleHostedZaloMediaRequest(
171
+ {
172
+ method: "GET",
173
+ url: "/zalo-webhook/media/not-a-valid-hex-id?token=wrong",
174
+ } as never,
175
+ response.res as never,
176
+ );
177
+
178
+ expect(handled).toBe(true);
179
+ expect(response.res.statusCode).toBe(404);
180
+ expect(response.res.end).toHaveBeenCalledWith("Not Found");
181
+ });
182
+ });
@@ -0,0 +1,241 @@
1
+ import { randomBytes } from "node:crypto";
2
+ import { rmSync } from "node:fs";
3
+ import { chmod, mkdir, readdir, readFile, stat, unlink, writeFile } from "node:fs/promises";
4
+ import type { IncomingMessage, ServerResponse } from "node:http";
5
+ import { join } from "node:path";
6
+ import { loadOutboundMediaFromUrl } from "openclaw/plugin-sdk/outbound-media";
7
+ import { resolvePreferredOpenClawTmpDir } from "openclaw/plugin-sdk/temp-path";
8
+ import { resolveWebhookPath } from "openclaw/plugin-sdk/webhook-ingress";
9
+
10
+ const ZALO_OUTBOUND_MEDIA_TTL_MS = 2 * 60_000;
11
+ const ZALO_OUTBOUND_MEDIA_SEGMENT = "media";
12
+ const ZALO_OUTBOUND_MEDIA_PREFIX = `/${ZALO_OUTBOUND_MEDIA_SEGMENT}/`;
13
+ const ZALO_OUTBOUND_MEDIA_DIR = join(
14
+ resolvePreferredOpenClawTmpDir(),
15
+ "openclaw-zalo-outbound-media",
16
+ );
17
+ const ZALO_OUTBOUND_MEDIA_ID_RE = /^[a-f0-9]{24}$/;
18
+
19
+ type HostedZaloMediaMetadata = {
20
+ routePath: string;
21
+ token: string;
22
+ contentType?: string;
23
+ expiresAt: number;
24
+ };
25
+
26
+ function resolveHostedZaloMediaMetadataPath(id: string): string {
27
+ return join(ZALO_OUTBOUND_MEDIA_DIR, `${id}.json`);
28
+ }
29
+
30
+ function resolveHostedZaloMediaBufferPath(id: string): string {
31
+ return join(ZALO_OUTBOUND_MEDIA_DIR, `${id}.bin`);
32
+ }
33
+
34
+ function createHostedZaloMediaId(): string {
35
+ return randomBytes(12).toString("hex");
36
+ }
37
+
38
+ function createHostedZaloMediaToken(): string {
39
+ return randomBytes(24).toString("hex");
40
+ }
41
+
42
+ async function ensureHostedZaloMediaDir(): Promise<void> {
43
+ await mkdir(ZALO_OUTBOUND_MEDIA_DIR, { recursive: true, mode: 0o700 });
44
+ await chmod(ZALO_OUTBOUND_MEDIA_DIR, 0o700).catch(() => undefined);
45
+ }
46
+
47
+ async function deleteHostedZaloMediaEntry(id: string): Promise<void> {
48
+ await Promise.all([
49
+ unlink(resolveHostedZaloMediaMetadataPath(id)).catch(() => undefined),
50
+ unlink(resolveHostedZaloMediaBufferPath(id)).catch(() => undefined),
51
+ ]);
52
+ }
53
+
54
+ async function cleanupExpiredHostedZaloMedia(nowMs = Date.now()): Promise<void> {
55
+ let fileNames: string[];
56
+ try {
57
+ fileNames = await readdir(ZALO_OUTBOUND_MEDIA_DIR);
58
+ } catch {
59
+ return;
60
+ }
61
+
62
+ await Promise.all(
63
+ fileNames
64
+ .filter((fileName) => fileName.endsWith(".json"))
65
+ .map(async (fileName) => {
66
+ const id = fileName.slice(0, -5);
67
+ try {
68
+ const metadataRaw = await readFile(resolveHostedZaloMediaMetadataPath(id), "utf8");
69
+ const metadata = JSON.parse(metadataRaw) as HostedZaloMediaMetadata;
70
+ if (metadata.expiresAt <= nowMs) {
71
+ await deleteHostedZaloMediaEntry(id);
72
+ }
73
+ } catch {
74
+ await deleteHostedZaloMediaEntry(id);
75
+ }
76
+ }),
77
+ );
78
+ }
79
+
80
+ async function readHostedZaloMediaEntry(id: string): Promise<{
81
+ metadata: HostedZaloMediaMetadata;
82
+ buffer: Buffer;
83
+ } | null> {
84
+ try {
85
+ const [metadataRaw, buffer] = await Promise.all([
86
+ readFile(resolveHostedZaloMediaMetadataPath(id), "utf8"),
87
+ readFile(resolveHostedZaloMediaBufferPath(id)),
88
+ ]);
89
+ return {
90
+ metadata: JSON.parse(metadataRaw) as HostedZaloMediaMetadata,
91
+ buffer,
92
+ };
93
+ } catch {
94
+ return null;
95
+ }
96
+ }
97
+
98
+ export function resolveHostedZaloMediaRoutePrefix(params: {
99
+ webhookUrl: string;
100
+ webhookPath?: string;
101
+ }): string {
102
+ const webhookRoutePath = resolveWebhookPath({
103
+ webhookPath: params.webhookPath,
104
+ webhookUrl: params.webhookUrl,
105
+ defaultPath: null,
106
+ });
107
+ if (!webhookRoutePath) {
108
+ throw new Error("Zalo webhookPath could not be derived for outbound media hosting");
109
+ }
110
+ return webhookRoutePath === "/"
111
+ ? `/${ZALO_OUTBOUND_MEDIA_SEGMENT}`
112
+ : `${webhookRoutePath}/${ZALO_OUTBOUND_MEDIA_SEGMENT}`;
113
+ }
114
+
115
+ function resolveHostedZaloMediaRoutePath(params: {
116
+ webhookUrl: string;
117
+ webhookPath?: string;
118
+ }): string {
119
+ return `${resolveHostedZaloMediaRoutePrefix(params)}/`;
120
+ }
121
+
122
+ export async function prepareHostedZaloMediaUrl(params: {
123
+ mediaUrl: string;
124
+ webhookUrl: string;
125
+ webhookPath?: string;
126
+ maxBytes: number;
127
+ proxyUrl?: string;
128
+ }): Promise<string> {
129
+ await ensureHostedZaloMediaDir();
130
+ await cleanupExpiredHostedZaloMedia();
131
+
132
+ const media = await loadOutboundMediaFromUrl(params.mediaUrl, {
133
+ maxBytes: params.maxBytes,
134
+ ...(params.proxyUrl ? { proxyUrl: params.proxyUrl } : {}),
135
+ });
136
+
137
+ const routePath = resolveHostedZaloMediaRoutePath({
138
+ webhookUrl: params.webhookUrl,
139
+ webhookPath: params.webhookPath,
140
+ });
141
+ const id = createHostedZaloMediaId();
142
+ const token = createHostedZaloMediaToken();
143
+ const publicBaseUrl = new URL(params.webhookUrl).origin;
144
+
145
+ await writeFile(resolveHostedZaloMediaBufferPath(id), media.buffer, { mode: 0o600 });
146
+ try {
147
+ await writeFile(
148
+ resolveHostedZaloMediaMetadataPath(id),
149
+ JSON.stringify({
150
+ routePath,
151
+ token,
152
+ contentType: media.contentType,
153
+ expiresAt: Date.now() + ZALO_OUTBOUND_MEDIA_TTL_MS,
154
+ } satisfies HostedZaloMediaMetadata),
155
+ { encoding: "utf8", mode: 0o600 },
156
+ );
157
+ } catch (error) {
158
+ await deleteHostedZaloMediaEntry(id);
159
+ throw error;
160
+ }
161
+
162
+ return `${publicBaseUrl}${routePath}${id}?token=${token}`;
163
+ }
164
+
165
+ export async function tryHandleHostedZaloMediaRequest(
166
+ req: IncomingMessage,
167
+ res: ServerResponse,
168
+ ): Promise<boolean> {
169
+ await cleanupExpiredHostedZaloMedia();
170
+
171
+ const method = req.method ?? "GET";
172
+ if (method !== "GET" && method !== "HEAD") {
173
+ return false;
174
+ }
175
+
176
+ let url: URL;
177
+ try {
178
+ url = new URL(req.url ?? "/", "http://localhost");
179
+ } catch {
180
+ return false;
181
+ }
182
+
183
+ const mediaPath = url.pathname;
184
+ const prefixIndex = mediaPath.lastIndexOf(ZALO_OUTBOUND_MEDIA_PREFIX);
185
+ if (prefixIndex < 0) {
186
+ return false;
187
+ }
188
+
189
+ const routePath = mediaPath.slice(0, prefixIndex + ZALO_OUTBOUND_MEDIA_PREFIX.length);
190
+ const id = mediaPath.slice(prefixIndex + ZALO_OUTBOUND_MEDIA_PREFIX.length);
191
+ if (!id || !ZALO_OUTBOUND_MEDIA_ID_RE.test(id)) {
192
+ res.statusCode = 404;
193
+ res.end("Not Found");
194
+ return true;
195
+ }
196
+
197
+ const entry = await readHostedZaloMediaEntry(id);
198
+ if (!entry || entry.metadata.routePath !== routePath) {
199
+ res.statusCode = 404;
200
+ res.end("Not Found");
201
+ return true;
202
+ }
203
+
204
+ if (entry.metadata.expiresAt <= Date.now()) {
205
+ await deleteHostedZaloMediaEntry(id);
206
+ res.statusCode = 410;
207
+ res.end("Expired");
208
+ return true;
209
+ }
210
+
211
+ if (url.searchParams.get("token") !== entry.metadata.token) {
212
+ res.statusCode = 401;
213
+ res.end("Unauthorized");
214
+ return true;
215
+ }
216
+
217
+ if (entry.metadata.contentType) {
218
+ res.setHeader("Content-Type", entry.metadata.contentType);
219
+ }
220
+ res.setHeader("Cache-Control", "no-store");
221
+ res.setHeader("X-Content-Type-Options", "nosniff");
222
+ const bufferStats = await stat(resolveHostedZaloMediaBufferPath(id)).catch(() => null);
223
+ if (bufferStats) {
224
+ res.setHeader("Content-Length", String(bufferStats.size));
225
+ }
226
+
227
+ if (method === "HEAD") {
228
+ res.statusCode = 200;
229
+ res.end();
230
+ return true;
231
+ }
232
+
233
+ res.statusCode = 200;
234
+ res.end(entry.buffer);
235
+ await deleteHostedZaloMediaEntry(id);
236
+ return true;
237
+ }
238
+
239
+ export function clearHostedZaloMediaForTest(): void {
240
+ rmSync(ZALO_OUTBOUND_MEDIA_DIR, { recursive: true, force: true });
241
+ }
@@ -0,0 +1,45 @@
1
+ import {
2
+ installChannelOutboundPayloadContractSuite,
3
+ primeChannelOutboundSendMock,
4
+ type OutboundPayloadHarnessParams,
5
+ } from "openclaw/plugin-sdk/channel-contract-testing";
6
+ import { describe, vi } from "vitest";
7
+ import { zaloPlugin } from "./channel.js";
8
+
9
+ const { sendZaloTextMock } = vi.hoisted(() => ({
10
+ sendZaloTextMock: vi.fn(),
11
+ }));
12
+
13
+ vi.mock("./channel.runtime.js", () => ({
14
+ sendZaloText: sendZaloTextMock,
15
+ }));
16
+
17
+ function createZaloHarness(params: OutboundPayloadHarnessParams) {
18
+ const sendZalo = vi.fn();
19
+ primeChannelOutboundSendMock(sendZalo, { ok: true, messageId: "zl-1" }, params.sendResults);
20
+ sendZaloTextMock.mockReset().mockImplementation(
21
+ async (nextCtx: { to: string; text: string; mediaUrl?: string }) =>
22
+ await sendZalo(nextCtx.to, nextCtx.text, {
23
+ mediaUrl: nextCtx.mediaUrl,
24
+ }),
25
+ );
26
+ const ctx = {
27
+ cfg: {},
28
+ to: "123456789",
29
+ text: "",
30
+ payload: params.payload,
31
+ };
32
+ return {
33
+ run: async () => await zaloPlugin.outbound!.sendPayload!(ctx),
34
+ sendMock: sendZalo,
35
+ to: ctx.to,
36
+ };
37
+ }
38
+
39
+ describe("Zalo outbound payload contract", () => {
40
+ installChannelOutboundPayloadContractSuite({
41
+ channel: "zalo",
42
+ chunking: { mode: "split", longTextLength: 3000, maxChunkLength: 2000 },
43
+ createHarness: createZaloHarness,
44
+ });
45
+ });
package/src/probe.ts CHANGED
@@ -1,4 +1,4 @@
1
- import type { BaseProbeResult } from "openclaw/plugin-sdk/zalo";
1
+ import type { BaseProbeResult } from "openclaw/plugin-sdk/channel-contract";
2
2
  import { getMe, ZaloApiError, type ZaloBotInfo, type ZaloFetch } from "./api.js";
3
3
 
4
4
  export type ZaloProbeResult = BaseProbeResult<string> & {
package/src/proxy.ts CHANGED
@@ -1,4 +1,4 @@
1
- import type { Dispatcher, RequestInit as UndiciRequestInit } from "undici";
1
+ import type { RequestInit as UndiciRequestInit } from "undici";
2
2
  import { ProxyAgent, fetch as undiciFetch } from "undici";
3
3
  import type { ZaloFetch } from "./api.js";
4
4
 
@@ -0,0 +1,75 @@
1
+ export {
2
+ addWildcardAllowFrom,
3
+ applyAccountNameToChannelSection,
4
+ applyBasicWebhookRequestGuards,
5
+ applySetupAccountConfigPatch,
6
+ type BaseProbeResult,
7
+ type BaseTokenResolution,
8
+ buildBaseAccountStatusSnapshot,
9
+ buildChannelConfigSchema,
10
+ buildSecretInputSchema,
11
+ buildSingleChannelSecretPromptState,
12
+ buildTokenChannelStatusSummary,
13
+ type ChannelAccountSnapshot,
14
+ type ChannelMessageActionAdapter,
15
+ type ChannelMessageActionName,
16
+ type ChannelPlugin,
17
+ type ChannelStatusIssue,
18
+ chunkTextForOutbound,
19
+ createChannelPairingController,
20
+ createChannelReplyPipeline,
21
+ createDedupeCache,
22
+ createFixedWindowRateLimiter,
23
+ createWebhookAnomalyTracker,
24
+ DEFAULT_ACCOUNT_ID,
25
+ deliverTextOrMediaReply,
26
+ evaluateSenderGroupAccess,
27
+ formatAllowFromLowercase,
28
+ formatPairingApproveHint,
29
+ type GroupPolicy,
30
+ hasConfiguredSecretInput,
31
+ isNormalizedSenderAllowed,
32
+ isNumericTargetId,
33
+ jsonResult,
34
+ logTypingFailure,
35
+ type MarkdownTableMode,
36
+ mergeAllowFromEntries,
37
+ migrateBaseNameToDefaultAccount,
38
+ normalizeAccountId,
39
+ normalizeResolvedSecretInputString,
40
+ normalizeSecretInputString,
41
+ type OpenClawConfig,
42
+ type OutboundReplyPayload,
43
+ PAIRING_APPROVED_MESSAGE,
44
+ type PluginRuntime,
45
+ promptSingleChannelSecretInput,
46
+ readJsonWebhookBodyOrReject,
47
+ readStringParam,
48
+ registerPluginHttpRoute,
49
+ type RegisterWebhookPluginRouteOptions,
50
+ registerWebhookTarget,
51
+ type RegisterWebhookTargetOptions,
52
+ registerWebhookTargetWithPluginRoute,
53
+ type ReplyPayload,
54
+ resolveClientIp,
55
+ resolveDefaultGroupPolicy,
56
+ resolveDirectDmAuthorizationOutcome,
57
+ resolveInboundRouteEnvelopeBuilderWithRuntime,
58
+ resolveOpenProviderRuntimeGroupPolicy,
59
+ resolveSenderCommandAuthorizationWithRuntime,
60
+ resolveWebhookPath,
61
+ resolveWebhookTargetWithAuthOrRejectSync,
62
+ runSingleChannelSecretStep,
63
+ type RuntimeEnv,
64
+ type SecretInput,
65
+ type SenderGroupAccessDecision,
66
+ sendPayloadWithChunkedTextAndMedia,
67
+ setTopLevelChannelDmPolicyWithAllowFrom,
68
+ waitForAbortSignal,
69
+ warnMissingProviderGroupPolicyFallbackOnce,
70
+ WEBHOOK_ANOMALY_COUNTER_DEFAULTS,
71
+ WEBHOOK_RATE_LIMIT_DEFAULTS,
72
+ withResolvedWebhookRequestPipeline,
73
+ type WizardPrompter,
74
+ } from "./runtime-support.js";
75
+ export { setZaloRuntime } from "./runtime.js";
@@ -0,0 +1,91 @@
1
+ export type { ReplyPayload } from "openclaw/plugin-sdk/reply-runtime";
2
+ export type { OpenClawConfig, GroupPolicy } from "openclaw/plugin-sdk/config-types";
3
+ export type { MarkdownTableMode } from "openclaw/plugin-sdk/config-types";
4
+ export type { BaseTokenResolution } from "openclaw/plugin-sdk/channel-contract";
5
+ export type {
6
+ BaseProbeResult,
7
+ ChannelAccountSnapshot,
8
+ ChannelMessageActionAdapter,
9
+ ChannelMessageActionName,
10
+ ChannelStatusIssue,
11
+ } from "openclaw/plugin-sdk/channel-contract";
12
+ export type { SecretInput } from "openclaw/plugin-sdk/secret-input";
13
+ export type { SenderGroupAccessDecision } from "openclaw/plugin-sdk/group-access";
14
+ export type { ChannelPlugin, PluginRuntime, WizardPrompter } from "openclaw/plugin-sdk/core";
15
+ export type { RuntimeEnv } from "openclaw/plugin-sdk/runtime";
16
+ export type { OutboundReplyPayload } from "openclaw/plugin-sdk/reply-payload";
17
+ export {
18
+ DEFAULT_ACCOUNT_ID,
19
+ buildChannelConfigSchema,
20
+ createDedupeCache,
21
+ formatPairingApproveHint,
22
+ jsonResult,
23
+ normalizeAccountId,
24
+ readStringParam,
25
+ resolveClientIp,
26
+ } from "openclaw/plugin-sdk/core";
27
+ export {
28
+ applyAccountNameToChannelSection,
29
+ applySetupAccountConfigPatch,
30
+ buildSingleChannelSecretPromptState,
31
+ mergeAllowFromEntries,
32
+ migrateBaseNameToDefaultAccount,
33
+ promptSingleChannelSecretInput,
34
+ runSingleChannelSecretStep,
35
+ setTopLevelChannelDmPolicyWithAllowFrom,
36
+ } from "openclaw/plugin-sdk/setup";
37
+ export {
38
+ buildSecretInputSchema,
39
+ hasConfiguredSecretInput,
40
+ normalizeResolvedSecretInputString,
41
+ normalizeSecretInputString,
42
+ } from "openclaw/plugin-sdk/secret-input";
43
+ export {
44
+ buildTokenChannelStatusSummary,
45
+ PAIRING_APPROVED_MESSAGE,
46
+ } from "openclaw/plugin-sdk/channel-status";
47
+ export { buildBaseAccountStatusSnapshot } from "openclaw/plugin-sdk/status-helpers";
48
+ export { chunkTextForOutbound } from "openclaw/plugin-sdk/text-chunking";
49
+ export {
50
+ formatAllowFromLowercase,
51
+ isNormalizedSenderAllowed,
52
+ } from "openclaw/plugin-sdk/allow-from";
53
+ export { addWildcardAllowFrom } from "openclaw/plugin-sdk/setup";
54
+ export { evaluateSenderGroupAccess } from "openclaw/plugin-sdk/group-access";
55
+ export { resolveOpenProviderRuntimeGroupPolicy } from "openclaw/plugin-sdk/runtime-group-policy";
56
+ export {
57
+ warnMissingProviderGroupPolicyFallbackOnce,
58
+ resolveDefaultGroupPolicy,
59
+ } from "openclaw/plugin-sdk/runtime-group-policy";
60
+ export { createChannelPairingController } from "openclaw/plugin-sdk/channel-pairing";
61
+ export { createChannelReplyPipeline } from "openclaw/plugin-sdk/channel-reply-pipeline";
62
+ export { logTypingFailure } from "openclaw/plugin-sdk/channel-feedback";
63
+ export {
64
+ deliverTextOrMediaReply,
65
+ isNumericTargetId,
66
+ sendPayloadWithChunkedTextAndMedia,
67
+ } from "openclaw/plugin-sdk/reply-payload";
68
+ export {
69
+ resolveDirectDmAuthorizationOutcome,
70
+ resolveSenderCommandAuthorizationWithRuntime,
71
+ } from "openclaw/plugin-sdk/command-auth";
72
+ export { resolveInboundRouteEnvelopeBuilderWithRuntime } from "openclaw/plugin-sdk/inbound-envelope";
73
+ export { waitForAbortSignal } from "openclaw/plugin-sdk/runtime";
74
+ export {
75
+ applyBasicWebhookRequestGuards,
76
+ createFixedWindowRateLimiter,
77
+ createWebhookAnomalyTracker,
78
+ readJsonWebhookBodyOrReject,
79
+ registerPluginHttpRoute,
80
+ registerWebhookTarget,
81
+ registerWebhookTargetWithPluginRoute,
82
+ resolveWebhookPath,
83
+ resolveWebhookTargetWithAuthOrRejectSync,
84
+ WEBHOOK_ANOMALY_COUNTER_DEFAULTS,
85
+ WEBHOOK_RATE_LIMIT_DEFAULTS,
86
+ withResolvedWebhookRequestPipeline,
87
+ } from "openclaw/plugin-sdk/webhook-ingress";
88
+ export type {
89
+ RegisterWebhookPluginRouteOptions,
90
+ RegisterWebhookTargetOptions,
91
+ } from "openclaw/plugin-sdk/webhook-ingress";
package/src/runtime.ts CHANGED
@@ -1,6 +1,9 @@
1
- import { createPluginRuntimeStore } from "openclaw/plugin-sdk/compat";
2
- import type { PluginRuntime } from "openclaw/plugin-sdk/zalo";
1
+ import { createPluginRuntimeStore } from "openclaw/plugin-sdk/runtime-store";
2
+ import type { PluginRuntime } from "./runtime-support.js";
3
3
 
4
4
  const { setRuntime: setZaloRuntime, getRuntime: getZaloRuntime } =
5
- createPluginRuntimeStore<PluginRuntime>("Zalo runtime not initialized");
5
+ createPluginRuntimeStore<PluginRuntime>({
6
+ pluginId: "zalo",
7
+ errorMessage: "Zalo runtime not initialized",
8
+ });
6
9
  export { getZaloRuntime, setZaloRuntime };