* Telegram: stabilize Area 2 DM and model callbacks * Telegram: fix dispatch test deps wiring * Telegram: stabilize area2 test harness and gate flaky sticker e2e * Telegram: address review feedback on config reload and tests * Telegram tests: use plugin-sdk reply dispatcher import * Telegram tests: add routing reload regression and track sticker skips * Telegram: add polling-session backoff regression test * Telegram tests: mock loadWebMedia through plugin-sdk path * Telegram: refresh native and callback routing config * Telegram tests: fix compact callback config typing
197 lines
5.4 KiB
TypeScript
197 lines
5.4 KiB
TypeScript
import { describe, expect, it } from "vitest";
|
|
import type { OpenClawConfig } from "../../../src/config/config.js";
|
|
import type { ChannelGroupPolicy } from "../../../src/config/group-policy.js";
|
|
import type { TelegramAccountConfig } from "../../../src/config/types.js";
|
|
import {
|
|
createNativeCommandsHarness,
|
|
createTelegramGroupCommandContext,
|
|
findNotAuthorizedCalls,
|
|
} from "./bot-native-commands.test-helpers.js";
|
|
|
|
describe("native command auth in groups", () => {
|
|
function setup(params: {
|
|
cfg?: OpenClawConfig;
|
|
telegramCfg?: TelegramAccountConfig;
|
|
allowFrom?: string[];
|
|
groupAllowFrom?: string[];
|
|
useAccessGroups?: boolean;
|
|
groupConfig?: Record<string, unknown>;
|
|
resolveGroupPolicy?: () => ChannelGroupPolicy;
|
|
}) {
|
|
return createNativeCommandsHarness({
|
|
cfg: params.cfg ?? ({} as OpenClawConfig),
|
|
telegramCfg: params.telegramCfg ?? ({} as TelegramAccountConfig),
|
|
allowFrom: params.allowFrom ?? [],
|
|
groupAllowFrom: params.groupAllowFrom ?? [],
|
|
useAccessGroups: params.useAccessGroups ?? false,
|
|
resolveGroupPolicy:
|
|
params.resolveGroupPolicy ??
|
|
(() =>
|
|
({
|
|
allowlistEnabled: false,
|
|
allowed: true,
|
|
}) as ChannelGroupPolicy),
|
|
groupConfig: params.groupConfig,
|
|
});
|
|
}
|
|
|
|
it("authorizes native commands in groups when sender is in groupAllowFrom", async () => {
|
|
const { handlers, sendMessage } = setup({
|
|
groupAllowFrom: ["12345"],
|
|
useAccessGroups: true,
|
|
// no allowFrom — sender is NOT in DM allowlist
|
|
});
|
|
|
|
const ctx = createTelegramGroupCommandContext();
|
|
|
|
await handlers.status?.(ctx);
|
|
|
|
const notAuthCalls = findNotAuthorizedCalls(sendMessage);
|
|
expect(notAuthCalls).toHaveLength(0);
|
|
});
|
|
|
|
it("authorizes native commands in groups from commands.allowFrom.telegram", async () => {
|
|
const { handlers, sendMessage } = setup({
|
|
cfg: {
|
|
commands: {
|
|
allowFrom: {
|
|
telegram: ["12345"],
|
|
},
|
|
},
|
|
} as OpenClawConfig,
|
|
allowFrom: ["99999"],
|
|
groupAllowFrom: ["99999"],
|
|
useAccessGroups: true,
|
|
});
|
|
|
|
const ctx = createTelegramGroupCommandContext();
|
|
|
|
await handlers.status?.(ctx);
|
|
|
|
const notAuthCalls = findNotAuthorizedCalls(sendMessage);
|
|
expect(notAuthCalls).toHaveLength(0);
|
|
});
|
|
|
|
it("uses commands.allowFrom.telegram as the sole auth source when configured", async () => {
|
|
const { handlers, sendMessage } = setup({
|
|
cfg: {
|
|
commands: {
|
|
allowFrom: {
|
|
telegram: ["99999"],
|
|
},
|
|
},
|
|
} as OpenClawConfig,
|
|
groupAllowFrom: ["12345"],
|
|
useAccessGroups: true,
|
|
});
|
|
|
|
const ctx = createTelegramGroupCommandContext();
|
|
|
|
await handlers.status?.(ctx);
|
|
|
|
expect(sendMessage).toHaveBeenCalledWith(
|
|
-100999,
|
|
"You are not authorized to use this command.",
|
|
expect.objectContaining({ message_thread_id: 42 }),
|
|
);
|
|
});
|
|
|
|
it("keeps groupPolicy disabled enforced when commands.allowFrom is configured", async () => {
|
|
const { handlers, sendMessage } = setup({
|
|
cfg: {
|
|
channels: {
|
|
telegram: {
|
|
groupPolicy: "disabled",
|
|
},
|
|
},
|
|
commands: {
|
|
allowFrom: {
|
|
telegram: ["12345"],
|
|
},
|
|
},
|
|
} as OpenClawConfig,
|
|
useAccessGroups: true,
|
|
resolveGroupPolicy: () =>
|
|
({
|
|
allowlistEnabled: false,
|
|
allowed: false,
|
|
}) as ChannelGroupPolicy,
|
|
});
|
|
|
|
const ctx = createTelegramGroupCommandContext();
|
|
|
|
await handlers.status?.(ctx);
|
|
|
|
expect(sendMessage).toHaveBeenCalledWith(
|
|
-100999,
|
|
"Telegram group commands are disabled.",
|
|
expect.objectContaining({ message_thread_id: 42 }),
|
|
);
|
|
});
|
|
|
|
it("keeps group chat allowlists enforced when commands.allowFrom is configured", async () => {
|
|
const { handlers, sendMessage } = setup({
|
|
cfg: {
|
|
commands: {
|
|
allowFrom: {
|
|
telegram: ["12345"],
|
|
},
|
|
},
|
|
} as OpenClawConfig,
|
|
useAccessGroups: true,
|
|
resolveGroupPolicy: () =>
|
|
({
|
|
allowlistEnabled: true,
|
|
allowed: false,
|
|
}) as ChannelGroupPolicy,
|
|
});
|
|
|
|
const ctx = createTelegramGroupCommandContext();
|
|
|
|
await handlers.status?.(ctx);
|
|
|
|
expect(sendMessage).toHaveBeenCalledWith(
|
|
-100999,
|
|
"This group is not allowed.",
|
|
expect.objectContaining({ message_thread_id: 42 }),
|
|
);
|
|
});
|
|
|
|
it("rejects native commands in groups when sender is in neither allowlist", async () => {
|
|
const { handlers, sendMessage } = setup({
|
|
allowFrom: ["99999"],
|
|
groupAllowFrom: ["99999"],
|
|
useAccessGroups: true,
|
|
});
|
|
|
|
const ctx = createTelegramGroupCommandContext({
|
|
username: "intruder",
|
|
});
|
|
|
|
await handlers.status?.(ctx);
|
|
|
|
const notAuthCalls = findNotAuthorizedCalls(sendMessage);
|
|
expect(notAuthCalls.length).toBeGreaterThan(0);
|
|
});
|
|
|
|
it("replies in the originating forum topic when auth is rejected", async () => {
|
|
const { handlers, sendMessage } = setup({
|
|
allowFrom: ["99999"],
|
|
groupAllowFrom: ["99999"],
|
|
useAccessGroups: true,
|
|
});
|
|
|
|
const ctx = createTelegramGroupCommandContext({
|
|
username: "intruder",
|
|
});
|
|
|
|
await handlers.status?.(ctx);
|
|
|
|
expect(sendMessage).toHaveBeenCalledWith(
|
|
-100999,
|
|
"You are not authorized to use this command.",
|
|
expect.objectContaining({ message_thread_id: 42 }),
|
|
);
|
|
});
|
|
});
|