mirror of
https://github.com/openclaw/openclaw.git
synced 2026-03-12 07:20:45 +00:00
Verified: - pnpm build - pnpm check - pnpm test:macmini Co-authored-by: Takhoffman <781889+Takhoffman@users.noreply.github.com> Co-authored-by: Tak Hoffman <781889+Takhoffman@users.noreply.github.com>
417 lines
13 KiB
TypeScript
417 lines
13 KiB
TypeScript
import type {
|
|
WebhookEvent,
|
|
MessageEvent,
|
|
FollowEvent,
|
|
UnfollowEvent,
|
|
JoinEvent,
|
|
LeaveEvent,
|
|
PostbackEvent,
|
|
} from "@line/bot-sdk";
|
|
import { hasControlCommand } from "../auto-reply/command-detection.js";
|
|
import { resolveControlCommandGate } from "../channels/command-gating.js";
|
|
import type { OpenClawConfig } from "../config/config.js";
|
|
import {
|
|
resolveAllowlistProviderRuntimeGroupPolicy,
|
|
resolveDefaultGroupPolicy,
|
|
warnMissingProviderGroupPolicyFallbackOnce,
|
|
} from "../config/runtime-group-policy.js";
|
|
import { danger, logVerbose } from "../globals.js";
|
|
import { resolvePairingIdLabel } from "../pairing/pairing-labels.js";
|
|
import { buildPairingReply } from "../pairing/pairing-messages.js";
|
|
import {
|
|
readChannelAllowFromStore,
|
|
upsertChannelPairingRequest,
|
|
} from "../pairing/pairing-store.js";
|
|
import type { RuntimeEnv } from "../runtime.js";
|
|
import {
|
|
firstDefined,
|
|
isSenderAllowed,
|
|
normalizeAllowFrom,
|
|
normalizeDmAllowFromWithStore,
|
|
} from "./bot-access.js";
|
|
import {
|
|
getLineSourceInfo,
|
|
buildLineMessageContext,
|
|
buildLinePostbackContext,
|
|
type LineInboundContext,
|
|
} from "./bot-message-context.js";
|
|
import { downloadLineMedia } from "./download.js";
|
|
import { pushMessageLine, replyMessageLine } from "./send.js";
|
|
import type { LineGroupConfig, ResolvedLineAccount } from "./types.js";
|
|
|
|
interface MediaRef {
|
|
path: string;
|
|
contentType?: string;
|
|
}
|
|
|
|
const LINE_DOWNLOADABLE_MESSAGE_TYPES: ReadonlySet<string> = new Set([
|
|
"image",
|
|
"video",
|
|
"audio",
|
|
"file",
|
|
]);
|
|
|
|
function isDownloadableLineMessageType(
|
|
messageType: MessageEvent["message"]["type"],
|
|
): messageType is "image" | "video" | "audio" | "file" {
|
|
return LINE_DOWNLOADABLE_MESSAGE_TYPES.has(messageType);
|
|
}
|
|
|
|
export interface LineHandlerContext {
|
|
cfg: OpenClawConfig;
|
|
account: ResolvedLineAccount;
|
|
runtime: RuntimeEnv;
|
|
mediaMaxBytes: number;
|
|
processMessage: (ctx: LineInboundContext) => Promise<void>;
|
|
}
|
|
|
|
function resolveLineGroupConfig(params: {
|
|
config: ResolvedLineAccount["config"];
|
|
groupId?: string;
|
|
roomId?: string;
|
|
}): LineGroupConfig | undefined {
|
|
const groups = params.config.groups ?? {};
|
|
if (params.groupId) {
|
|
return groups[params.groupId] ?? groups[`group:${params.groupId}`] ?? groups["*"];
|
|
}
|
|
if (params.roomId) {
|
|
return groups[params.roomId] ?? groups[`room:${params.roomId}`] ?? groups["*"];
|
|
}
|
|
return groups["*"];
|
|
}
|
|
|
|
async function sendLinePairingReply(params: {
|
|
senderId: string;
|
|
replyToken?: string;
|
|
context: LineHandlerContext;
|
|
}): Promise<void> {
|
|
const { senderId, replyToken, context } = params;
|
|
const { code, created } = await upsertChannelPairingRequest({
|
|
channel: "line",
|
|
id: senderId,
|
|
accountId: context.account.accountId,
|
|
});
|
|
if (!created) {
|
|
return;
|
|
}
|
|
logVerbose(`line pairing request sender=${senderId}`);
|
|
const idLabel = (() => {
|
|
try {
|
|
return resolvePairingIdLabel("line");
|
|
} catch {
|
|
return "lineUserId";
|
|
}
|
|
})();
|
|
const text = buildPairingReply({
|
|
channel: "line",
|
|
idLine: `Your ${idLabel}: ${senderId}`,
|
|
code,
|
|
});
|
|
try {
|
|
if (replyToken) {
|
|
await replyMessageLine(replyToken, [{ type: "text", text }], {
|
|
accountId: context.account.accountId,
|
|
channelAccessToken: context.account.channelAccessToken,
|
|
});
|
|
return;
|
|
}
|
|
} catch (err) {
|
|
logVerbose(`line pairing reply failed for ${senderId}: ${String(err)}`);
|
|
}
|
|
try {
|
|
await pushMessageLine(`line:${senderId}`, text, {
|
|
accountId: context.account.accountId,
|
|
channelAccessToken: context.account.channelAccessToken,
|
|
});
|
|
} catch (err) {
|
|
logVerbose(`line pairing reply failed for ${senderId}: ${String(err)}`);
|
|
}
|
|
}
|
|
|
|
type LineAccessDecision = {
|
|
allowed: boolean;
|
|
commandAuthorized: boolean;
|
|
};
|
|
|
|
async function shouldProcessLineEvent(
|
|
event: MessageEvent | PostbackEvent,
|
|
context: LineHandlerContext,
|
|
): Promise<LineAccessDecision> {
|
|
const { cfg, account } = context;
|
|
const { userId, groupId, roomId, isGroup } = getLineSourceInfo(event.source);
|
|
const senderId = userId ?? "";
|
|
const dmPolicy = account.config.dmPolicy ?? "pairing";
|
|
|
|
const storeAllowFrom = await readChannelAllowFromStore(
|
|
"line",
|
|
process.env,
|
|
account.accountId,
|
|
).catch(() => []);
|
|
const effectiveDmAllow = normalizeDmAllowFromWithStore({
|
|
allowFrom: account.config.allowFrom,
|
|
storeAllowFrom,
|
|
dmPolicy,
|
|
});
|
|
const groupConfig = resolveLineGroupConfig({ config: account.config, groupId, roomId });
|
|
const groupAllowOverride = groupConfig?.allowFrom;
|
|
const fallbackGroupAllowFrom = account.config.allowFrom?.length
|
|
? account.config.allowFrom
|
|
: undefined;
|
|
const groupAllowFrom = firstDefined(
|
|
groupAllowOverride,
|
|
account.config.groupAllowFrom,
|
|
fallbackGroupAllowFrom,
|
|
);
|
|
// Group authorization stays explicit to group allowlists and must not
|
|
// inherit DM pairing-store identities.
|
|
const effectiveGroupAllow = normalizeAllowFrom(groupAllowFrom);
|
|
const defaultGroupPolicy = resolveDefaultGroupPolicy(cfg);
|
|
const { groupPolicy, providerMissingFallbackApplied } =
|
|
resolveAllowlistProviderRuntimeGroupPolicy({
|
|
providerConfigPresent: cfg.channels?.line !== undefined,
|
|
groupPolicy: account.config.groupPolicy,
|
|
defaultGroupPolicy,
|
|
});
|
|
warnMissingProviderGroupPolicyFallbackOnce({
|
|
providerMissingFallbackApplied,
|
|
providerKey: "line",
|
|
accountId: account.accountId,
|
|
log: (message) => logVerbose(message),
|
|
});
|
|
|
|
const denied = { allowed: false, commandAuthorized: false };
|
|
|
|
if (isGroup) {
|
|
if (groupConfig?.enabled === false) {
|
|
logVerbose(`Blocked line group ${groupId ?? roomId ?? "unknown"} (group disabled)`);
|
|
return denied;
|
|
}
|
|
if (typeof groupAllowOverride !== "undefined") {
|
|
if (!senderId) {
|
|
logVerbose("Blocked line group message (group allowFrom override, no sender ID)");
|
|
return denied;
|
|
}
|
|
if (!isSenderAllowed({ allow: effectiveGroupAllow, senderId })) {
|
|
logVerbose(`Blocked line group sender ${senderId} (group allowFrom override)`);
|
|
return denied;
|
|
}
|
|
}
|
|
if (groupPolicy === "disabled") {
|
|
logVerbose("Blocked line group message (groupPolicy: disabled)");
|
|
return denied;
|
|
}
|
|
if (groupPolicy === "allowlist") {
|
|
if (!senderId) {
|
|
logVerbose("Blocked line group message (no sender ID, groupPolicy: allowlist)");
|
|
return denied;
|
|
}
|
|
if (!effectiveGroupAllow.hasEntries) {
|
|
logVerbose("Blocked line group message (groupPolicy: allowlist, no groupAllowFrom)");
|
|
return denied;
|
|
}
|
|
if (!isSenderAllowed({ allow: effectiveGroupAllow, senderId })) {
|
|
logVerbose(`Blocked line group message from ${senderId} (groupPolicy: allowlist)`);
|
|
return denied;
|
|
}
|
|
}
|
|
|
|
// Resolve command authorization using the same pattern as Telegram/Discord/Slack.
|
|
const allowForCommands = effectiveGroupAllow;
|
|
const senderAllowedForCommands = isSenderAllowed({ allow: allowForCommands, senderId });
|
|
const useAccessGroups = cfg.commands?.useAccessGroups !== false;
|
|
const rawText = resolveEventRawText(event);
|
|
const commandGate = resolveControlCommandGate({
|
|
useAccessGroups,
|
|
authorizers: [{ configured: allowForCommands.hasEntries, allowed: senderAllowedForCommands }],
|
|
allowTextCommands: true,
|
|
hasControlCommand: hasControlCommand(rawText, cfg),
|
|
});
|
|
return { allowed: true, commandAuthorized: commandGate.commandAuthorized };
|
|
}
|
|
|
|
if (dmPolicy === "disabled") {
|
|
logVerbose("Blocked line sender (dmPolicy: disabled)");
|
|
return denied;
|
|
}
|
|
|
|
const dmAllowed = dmPolicy === "open" || isSenderAllowed({ allow: effectiveDmAllow, senderId });
|
|
if (!dmAllowed) {
|
|
if (dmPolicy === "pairing") {
|
|
if (!senderId) {
|
|
logVerbose("Blocked line sender (dmPolicy: pairing, no sender ID)");
|
|
return denied;
|
|
}
|
|
await sendLinePairingReply({
|
|
senderId,
|
|
replyToken: "replyToken" in event ? event.replyToken : undefined,
|
|
context,
|
|
});
|
|
} else {
|
|
logVerbose(`Blocked line sender ${senderId || "unknown"} (dmPolicy: ${dmPolicy})`);
|
|
}
|
|
return denied;
|
|
}
|
|
|
|
// Resolve command authorization for DMs.
|
|
const allowForCommands = effectiveDmAllow;
|
|
const senderAllowedForCommands = isSenderAllowed({ allow: allowForCommands, senderId });
|
|
const useAccessGroups = cfg.commands?.useAccessGroups !== false;
|
|
const rawText = resolveEventRawText(event);
|
|
const commandGate = resolveControlCommandGate({
|
|
useAccessGroups,
|
|
authorizers: [{ configured: allowForCommands.hasEntries, allowed: senderAllowedForCommands }],
|
|
allowTextCommands: true,
|
|
hasControlCommand: hasControlCommand(rawText, cfg),
|
|
});
|
|
return { allowed: true, commandAuthorized: commandGate.commandAuthorized };
|
|
}
|
|
|
|
/** Extract raw text from a LINE message or postback event for command detection. */
|
|
function resolveEventRawText(event: MessageEvent | PostbackEvent): string {
|
|
if (event.type === "message") {
|
|
const msg = event.message;
|
|
if (msg.type === "text") {
|
|
return msg.text;
|
|
}
|
|
return "";
|
|
}
|
|
if (event.type === "postback") {
|
|
return event.postback?.data?.trim() ?? "";
|
|
}
|
|
return "";
|
|
}
|
|
|
|
async function handleMessageEvent(event: MessageEvent, context: LineHandlerContext): Promise<void> {
|
|
const { cfg, account, runtime, mediaMaxBytes, processMessage } = context;
|
|
const message = event.message;
|
|
|
|
const decision = await shouldProcessLineEvent(event, context);
|
|
if (!decision.allowed) {
|
|
return;
|
|
}
|
|
|
|
// Download media if applicable
|
|
const allMedia: MediaRef[] = [];
|
|
|
|
if (isDownloadableLineMessageType(message.type)) {
|
|
try {
|
|
const media = await downloadLineMedia(message.id, account.channelAccessToken, mediaMaxBytes);
|
|
allMedia.push({
|
|
path: media.path,
|
|
contentType: media.contentType,
|
|
});
|
|
} catch (err) {
|
|
const errMsg = String(err);
|
|
if (errMsg.includes("exceeds") && errMsg.includes("limit")) {
|
|
logVerbose(`line: media exceeds size limit for message ${message.id}`);
|
|
// Continue without media
|
|
} else {
|
|
runtime.error?.(danger(`line: failed to download media: ${errMsg}`));
|
|
}
|
|
}
|
|
}
|
|
|
|
const messageContext = await buildLineMessageContext({
|
|
event,
|
|
allMedia,
|
|
cfg,
|
|
account,
|
|
commandAuthorized: decision.commandAuthorized,
|
|
});
|
|
|
|
if (!messageContext) {
|
|
logVerbose("line: skipping empty message");
|
|
return;
|
|
}
|
|
|
|
await processMessage(messageContext);
|
|
}
|
|
|
|
async function handleFollowEvent(event: FollowEvent, _context: LineHandlerContext): Promise<void> {
|
|
const userId = event.source.type === "user" ? event.source.userId : undefined;
|
|
logVerbose(`line: user ${userId ?? "unknown"} followed`);
|
|
// Could implement welcome message here
|
|
}
|
|
|
|
async function handleUnfollowEvent(
|
|
event: UnfollowEvent,
|
|
_context: LineHandlerContext,
|
|
): Promise<void> {
|
|
const userId = event.source.type === "user" ? event.source.userId : undefined;
|
|
logVerbose(`line: user ${userId ?? "unknown"} unfollowed`);
|
|
}
|
|
|
|
async function handleJoinEvent(event: JoinEvent, _context: LineHandlerContext): Promise<void> {
|
|
const groupId = event.source.type === "group" ? event.source.groupId : undefined;
|
|
const roomId = event.source.type === "room" ? event.source.roomId : undefined;
|
|
logVerbose(`line: bot joined ${groupId ? `group ${groupId}` : `room ${roomId}`}`);
|
|
}
|
|
|
|
async function handleLeaveEvent(event: LeaveEvent, _context: LineHandlerContext): Promise<void> {
|
|
const groupId = event.source.type === "group" ? event.source.groupId : undefined;
|
|
const roomId = event.source.type === "room" ? event.source.roomId : undefined;
|
|
logVerbose(`line: bot left ${groupId ? `group ${groupId}` : `room ${roomId}`}`);
|
|
}
|
|
|
|
async function handlePostbackEvent(
|
|
event: PostbackEvent,
|
|
context: LineHandlerContext,
|
|
): Promise<void> {
|
|
const data = event.postback.data;
|
|
logVerbose(`line: received postback: ${data}`);
|
|
|
|
const decision = await shouldProcessLineEvent(event, context);
|
|
if (!decision.allowed) {
|
|
return;
|
|
}
|
|
|
|
const postbackContext = await buildLinePostbackContext({
|
|
event,
|
|
cfg: context.cfg,
|
|
account: context.account,
|
|
commandAuthorized: decision.commandAuthorized,
|
|
});
|
|
if (!postbackContext) {
|
|
return;
|
|
}
|
|
|
|
await context.processMessage(postbackContext);
|
|
}
|
|
|
|
export async function handleLineWebhookEvents(
|
|
events: WebhookEvent[],
|
|
context: LineHandlerContext,
|
|
): Promise<void> {
|
|
for (const event of events) {
|
|
try {
|
|
switch (event.type) {
|
|
case "message":
|
|
await handleMessageEvent(event, context);
|
|
break;
|
|
case "follow":
|
|
await handleFollowEvent(event, context);
|
|
break;
|
|
case "unfollow":
|
|
await handleUnfollowEvent(event, context);
|
|
break;
|
|
case "join":
|
|
await handleJoinEvent(event, context);
|
|
break;
|
|
case "leave":
|
|
await handleLeaveEvent(event, context);
|
|
break;
|
|
case "postback":
|
|
await handlePostbackEvent(event, context);
|
|
break;
|
|
default:
|
|
logVerbose(`line: unhandled event type: ${(event as WebhookEvent).type}`);
|
|
}
|
|
} catch (err) {
|
|
context.runtime.error?.(danger(`line: event handler failed: ${String(err)}`));
|
|
// Continue processing remaining events in this batch. Webhook ACK is sent
|
|
// before processing, so dropping later events here would make them unrecoverable.
|
|
continue;
|
|
}
|
|
}
|
|
}
|