mirror of https://github.com/openclaw/openclaw.git
215 lines
6.7 KiB
TypeScript
215 lines
6.7 KiB
TypeScript
import crypto from "node:crypto";
|
|
import { afterEach, describe, expect, it, vi } from "vitest";
|
|
import { createFeishuRuntimeMockModule } from "./monitor.test-mocks.js";
|
|
import { withRunningWebhookMonitor } from "./monitor.webhook.test-helpers.js";
|
|
|
|
const probeFeishuMock = vi.hoisted(() => vi.fn());
|
|
|
|
vi.mock("./probe.js", () => ({
|
|
probeFeishu: probeFeishuMock,
|
|
}));
|
|
|
|
vi.mock("./client.js", async () => {
|
|
const actual = await vi.importActual<typeof import("./client.js")>("./client.js");
|
|
return {
|
|
...actual,
|
|
createFeishuWSClient: vi.fn(() => ({ start: vi.fn() })),
|
|
};
|
|
});
|
|
|
|
vi.mock("./runtime.js", () => createFeishuRuntimeMockModule());
|
|
|
|
import { monitorFeishuProvider, stopFeishuMonitor } from "./monitor.js";
|
|
|
|
function signFeishuPayload(params: {
|
|
encryptKey: string;
|
|
payload: Record<string, unknown>;
|
|
timestamp?: string;
|
|
nonce?: string;
|
|
}): Record<string, string> {
|
|
const timestamp = params.timestamp ?? "1711111111";
|
|
const nonce = params.nonce ?? "nonce-test";
|
|
const signature = crypto
|
|
.createHash("sha256")
|
|
.update(timestamp + nonce + params.encryptKey + JSON.stringify(params.payload))
|
|
.digest("hex");
|
|
return {
|
|
"content-type": "application/json",
|
|
"x-lark-request-timestamp": timestamp,
|
|
"x-lark-request-nonce": nonce,
|
|
"x-lark-signature": signature,
|
|
};
|
|
}
|
|
|
|
function encryptFeishuPayload(encryptKey: string, payload: Record<string, unknown>): string {
|
|
const iv = crypto.randomBytes(16);
|
|
const key = crypto.createHash("sha256").update(encryptKey).digest();
|
|
const cipher = crypto.createCipheriv("aes-256-cbc", key, iv);
|
|
const plaintext = Buffer.from(JSON.stringify(payload), "utf8");
|
|
const encrypted = Buffer.concat([cipher.update(plaintext), cipher.final()]);
|
|
return Buffer.concat([iv, encrypted]).toString("base64");
|
|
}
|
|
|
|
async function postSignedPayload(url: string, payload: Record<string, unknown>) {
|
|
return await fetch(url, {
|
|
method: "POST",
|
|
headers: signFeishuPayload({ encryptKey: "encrypt_key", payload }),
|
|
body: JSON.stringify(payload),
|
|
});
|
|
}
|
|
|
|
afterEach(() => {
|
|
stopFeishuMonitor();
|
|
});
|
|
|
|
describe("Feishu webhook signed-request e2e", () => {
|
|
it("rejects invalid signatures with 401 instead of empty 200", async () => {
|
|
probeFeishuMock.mockResolvedValue({ ok: true, botOpenId: "bot_open_id" });
|
|
|
|
await withRunningWebhookMonitor(
|
|
{
|
|
accountId: "invalid-signature",
|
|
path: "/hook-e2e-invalid-signature",
|
|
verificationToken: "verify_token",
|
|
encryptKey: "encrypt_key",
|
|
},
|
|
monitorFeishuProvider,
|
|
async (url) => {
|
|
const payload = { type: "url_verification", challenge: "challenge-token" };
|
|
const response = await fetch(url, {
|
|
method: "POST",
|
|
headers: {
|
|
...signFeishuPayload({ encryptKey: "wrong_key", payload }),
|
|
},
|
|
body: JSON.stringify(payload),
|
|
});
|
|
|
|
expect(response.status).toBe(401);
|
|
expect(await response.text()).toBe("Invalid signature");
|
|
},
|
|
);
|
|
});
|
|
|
|
it("rejects missing signature headers with 401", async () => {
|
|
probeFeishuMock.mockResolvedValue({ ok: true, botOpenId: "bot_open_id" });
|
|
|
|
await withRunningWebhookMonitor(
|
|
{
|
|
accountId: "missing-signature",
|
|
path: "/hook-e2e-missing-signature",
|
|
verificationToken: "verify_token",
|
|
encryptKey: "encrypt_key",
|
|
},
|
|
monitorFeishuProvider,
|
|
async (url) => {
|
|
const response = await fetch(url, {
|
|
method: "POST",
|
|
headers: { "content-type": "application/json" },
|
|
body: JSON.stringify({ type: "url_verification", challenge: "challenge-token" }),
|
|
});
|
|
|
|
expect(response.status).toBe(401);
|
|
expect(await response.text()).toBe("Invalid signature");
|
|
},
|
|
);
|
|
});
|
|
|
|
it("returns 400 for invalid json before invoking the sdk", async () => {
|
|
probeFeishuMock.mockResolvedValue({ ok: true, botOpenId: "bot_open_id" });
|
|
|
|
await withRunningWebhookMonitor(
|
|
{
|
|
accountId: "invalid-json",
|
|
path: "/hook-e2e-invalid-json",
|
|
verificationToken: "verify_token",
|
|
encryptKey: "encrypt_key",
|
|
},
|
|
monitorFeishuProvider,
|
|
async (url) => {
|
|
const response = await fetch(url, {
|
|
method: "POST",
|
|
headers: { "content-type": "application/json" },
|
|
body: "{not-json",
|
|
});
|
|
|
|
expect(response.status).toBe(400);
|
|
expect(await response.text()).toBe("Invalid JSON");
|
|
},
|
|
);
|
|
});
|
|
|
|
it("accepts signed plaintext url_verification challenges end-to-end", async () => {
|
|
probeFeishuMock.mockResolvedValue({ ok: true, botOpenId: "bot_open_id" });
|
|
|
|
await withRunningWebhookMonitor(
|
|
{
|
|
accountId: "signed-challenge",
|
|
path: "/hook-e2e-signed-challenge",
|
|
verificationToken: "verify_token",
|
|
encryptKey: "encrypt_key",
|
|
},
|
|
monitorFeishuProvider,
|
|
async (url) => {
|
|
const payload = { type: "url_verification", challenge: "challenge-token" };
|
|
const response = await postSignedPayload(url, payload);
|
|
|
|
expect(response.status).toBe(200);
|
|
await expect(response.json()).resolves.toEqual({ challenge: "challenge-token" });
|
|
},
|
|
);
|
|
});
|
|
|
|
it("accepts signed non-challenge events and reaches the dispatcher", async () => {
|
|
probeFeishuMock.mockResolvedValue({ ok: true, botOpenId: "bot_open_id" });
|
|
|
|
await withRunningWebhookMonitor(
|
|
{
|
|
accountId: "signed-dispatch",
|
|
path: "/hook-e2e-signed-dispatch",
|
|
verificationToken: "verify_token",
|
|
encryptKey: "encrypt_key",
|
|
},
|
|
monitorFeishuProvider,
|
|
async (url) => {
|
|
const payload = {
|
|
schema: "2.0",
|
|
header: { event_type: "unknown.event" },
|
|
event: {},
|
|
};
|
|
const response = await postSignedPayload(url, payload);
|
|
|
|
expect(response.status).toBe(200);
|
|
expect(await response.text()).toContain("no unknown.event event handle");
|
|
},
|
|
);
|
|
});
|
|
|
|
it("accepts signed encrypted url_verification challenges end-to-end", async () => {
|
|
probeFeishuMock.mockResolvedValue({ ok: true, botOpenId: "bot_open_id" });
|
|
|
|
await withRunningWebhookMonitor(
|
|
{
|
|
accountId: "encrypted-challenge",
|
|
path: "/hook-e2e-encrypted-challenge",
|
|
verificationToken: "verify_token",
|
|
encryptKey: "encrypt_key",
|
|
},
|
|
monitorFeishuProvider,
|
|
async (url) => {
|
|
const payload = {
|
|
encrypt: encryptFeishuPayload("encrypt_key", {
|
|
type: "url_verification",
|
|
challenge: "encrypted-challenge-token",
|
|
}),
|
|
};
|
|
const response = await postSignedPayload(url, payload);
|
|
|
|
expect(response.status).toBe(200);
|
|
await expect(response.json()).resolves.toEqual({
|
|
challenge: "encrypted-challenge-token",
|
|
});
|
|
},
|
|
);
|
|
});
|
|
});
|