mirror of
https://github.com/openclaw/openclaw.git
synced 2026-05-20 15:44:46 +00:00
93 lines
2.9 KiB
TypeScript
93 lines
2.9 KiB
TypeScript
import {
|
|
firstDefined,
|
|
isSenderIdAllowed,
|
|
mergeDmAllowFromSources,
|
|
} from "openclaw/plugin-sdk/allow-from";
|
|
import type {
|
|
DmPolicy,
|
|
TelegramDirectConfig,
|
|
TelegramGroupConfig,
|
|
} from "openclaw/plugin-sdk/config-contracts";
|
|
import { createSubsystemLogger } from "openclaw/plugin-sdk/runtime-env";
|
|
import { normalizeOptionalString } from "openclaw/plugin-sdk/string-coerce-runtime";
|
|
|
|
export type NormalizedAllowFrom = {
|
|
entries: string[];
|
|
hasWildcard: boolean;
|
|
hasEntries: boolean;
|
|
invalidEntries: string[];
|
|
};
|
|
|
|
const warnedInvalidEntries = new Set<string>();
|
|
const log = createSubsystemLogger("telegram/bot-access");
|
|
|
|
function warnInvalidAllowFromEntries(entries: string[]) {
|
|
if (process.env.VITEST || process.env.NODE_ENV === "test") {
|
|
return;
|
|
}
|
|
for (const entry of entries) {
|
|
if (warnedInvalidEntries.has(entry)) {
|
|
continue;
|
|
}
|
|
warnedInvalidEntries.add(entry);
|
|
log.warn(
|
|
[
|
|
"Invalid allowFrom entry:",
|
|
JSON.stringify(entry),
|
|
"- allowFrom/groupAllowFrom authorization expects numeric Telegram sender user IDs only.",
|
|
'To allow a Telegram group or supergroup, add its negative chat ID under "channels.telegram.groups" instead.',
|
|
'If you had "@username" entries, re-run setup (it resolves @username to IDs) or replace them manually.',
|
|
].join(" "),
|
|
);
|
|
}
|
|
}
|
|
|
|
export const normalizeAllowFrom = (list?: Array<string | number>): NormalizedAllowFrom => {
|
|
const entries = (list ?? [])
|
|
.map((value) => normalizeOptionalString(String(value)) ?? "")
|
|
.filter(Boolean);
|
|
const hasWildcard = entries.includes("*");
|
|
const normalized = entries
|
|
.filter((value) => value !== "*")
|
|
.map((value) => value.replace(/^(telegram|tg):/i, ""));
|
|
const invalidEntries = normalized.filter((value) => !/^\d+$/.test(value));
|
|
if (invalidEntries.length > 0) {
|
|
warnInvalidAllowFromEntries([...new Set(invalidEntries)]);
|
|
}
|
|
const ids = normalized.filter((value) => /^\d+$/.test(value));
|
|
return {
|
|
entries: ids,
|
|
hasWildcard,
|
|
hasEntries: entries.length > 0,
|
|
invalidEntries,
|
|
};
|
|
};
|
|
|
|
export const normalizeDmAllowFromWithStore = (params: {
|
|
allowFrom?: Array<string | number>;
|
|
storeAllowFrom?: string[];
|
|
dmPolicy?: string;
|
|
}): NormalizedAllowFrom => normalizeAllowFrom(mergeDmAllowFromSources(params));
|
|
|
|
export function resolveTelegramEffectiveDmPolicy(params: {
|
|
isGroup: boolean;
|
|
groupConfig?: TelegramDirectConfig | TelegramGroupConfig;
|
|
dmPolicy?: DmPolicy;
|
|
}): DmPolicy {
|
|
if (!params.isGroup && params.groupConfig && "dmPolicy" in params.groupConfig) {
|
|
return params.groupConfig.dmPolicy ?? params.dmPolicy ?? "pairing";
|
|
}
|
|
return params.dmPolicy ?? "pairing";
|
|
}
|
|
|
|
export const isSenderAllowed = (params: {
|
|
allow: NormalizedAllowFrom;
|
|
senderId?: string;
|
|
senderUsername?: string;
|
|
}) => {
|
|
const { allow, senderId } = params;
|
|
return isSenderIdAllowed(allow, senderId, true);
|
|
};
|
|
|
|
export { firstDefined };
|