* refactor: introduce provider plugin registry * refactor: move provider CLI to plugins * docs: add provider plugin implementation notes * refactor: shift provider runtime logic into plugins * refactor: add plugin defaults and summaries * docs: update provider plugin notes * feat(commands): add /commands slash list * Auto-reply: tidy help message * Auto-reply: fix status command lint * Tests: align google shared expectations * Auto-reply: tidy help message * Auto-reply: fix status command lint * refactor: move provider routing into plugins * test: align agent routing expectations * docs: update provider plugin notes * refactor: route replies via provider plugins * docs: note route-reply plugin hooks * refactor: extend provider plugin contract * refactor: derive provider status from plugins * refactor: unify gateway provider control * refactor: use plugin metadata in auto-reply * fix: parenthesize cron target selection * refactor: derive gateway methods from plugins * refactor: generalize provider logout * refactor: route provider logout through plugins * refactor: move WhatsApp web login methods into plugin * refactor: generalize provider log prefixes * refactor: centralize default chat provider * refactor: derive provider lists from registry * refactor: move provider reload noops into plugins * refactor: resolve web login provider via alias * refactor: derive CLI provider options from plugins * refactor: derive prompt provider list from plugins * style: apply biome lint fixes * fix: resolve provider routing edge cases * docs: update provider plugin refactor notes * fix(gateway): harden agent provider routing * refactor: move provider routing into plugins * refactor: move provider CLI to plugins * refactor: derive provider lists from registry * fix: restore slash command parsing * refactor: align provider ids for schema * refactor: unify outbound target resolution * fix: keep outbound labels stable * feat: add msteams to cron surfaces * fix: clean up lint build issues * refactor: localize chat provider alias normalization * refactor: drive gateway provider lists from plugins * docs: update provider plugin notes * style: format message-provider * fix: avoid provider registry init cycles * style: sort message-provider imports * fix: relax provider alias map typing * refactor: move provider routing into plugins * refactor: add plugin pairing/config adapters * refactor: route pairing and provider removal via plugins * refactor: align auto-reply provider typing * test: stabilize telegram media mocks * docs: update provider plugin refactor notes * refactor: pluginize outbound targets * refactor: pluginize provider selection * refactor: generalize text chunk limits * docs: update provider plugin notes * refactor: generalize group session/config * fix: normalize provider id for room detection * fix: avoid provider init in system prompt * style: formatting cleanup * refactor: normalize agent delivery targets * test: update outbound delivery labels * chore: fix lint regressions * refactor: extend provider plugin adapters * refactor: move elevated/block streaming defaults to plugins * refactor: defer outbound send deps to plugins * docs: note plugin-driven streaming/elevated defaults * refactor: centralize webchat provider constant * refactor: add provider setup adapters * refactor: delegate provider add config to plugins * docs: document plugin-driven provider add * refactor: add plugin state/binding metadata * refactor: build agent provider status from plugins * docs: note plugin-driven agent bindings * refactor: centralize internal provider constant usage * fix: normalize WhatsApp targets for groups and E.164 (#631) (thanks @imfing) * refactor: centralize default chat provider * refactor: centralize WhatsApp target normalization * refactor: move provider routing into plugins * refactor: normalize agent delivery targets * chore: fix lint regressions * fix: normalize WhatsApp targets for groups and E.164 (#631) (thanks @imfing) * feat: expand provider plugin adapters * refactor: route auto-reply via provider plugins * fix: align WhatsApp target normalization * fix: normalize WhatsApp targets for groups and E.164 (#631) (thanks @imfing) * refactor: centralize WhatsApp target normalization * feat: add /config chat config updates * docs: add /config get alias * feat(commands): add /commands slash list * refactor: centralize default chat provider * style: apply biome lint fixes * chore: fix lint regressions * fix: clean up whatsapp allowlist typing * style: format config command helpers * refactor: pluginize tool threading context * refactor: normalize session announce targets * docs: note new plugin threading and announce hooks * refactor: pluginize message actions * docs: update provider plugin actions notes * fix: align provider action adapters * refactor: centralize webchat checks * style: format message provider helpers * refactor: move provider onboarding into adapters * docs: note onboarding provider adapters * feat: add msteams onboarding adapter * style: organize onboarding imports * fix: normalize msteams allowFrom types * feat: add plugin text chunk limits * refactor: use plugin chunk limit fallbacks * feat: add provider mention stripping hooks * style: organize provider plugin type imports * refactor: generalize health snapshots * refactor: update macOS health snapshot handling * docs: refresh health snapshot notes * style: format health snapshot updates * refactor: drive security warnings via plugins * docs: note provider security adapter * style: format provider security adapters * refactor: centralize provider account defaults * refactor: type gateway client identity constants * chore: regen gateway protocol swift * fix: degrade health on failed provider probe * refactor: centralize pairing approve hint * docs: add plugin CLI command references * refactor: route auth and tool sends through plugins * docs: expand provider plugin hooks * refactor: document provider docking touchpoints * refactor: normalize internal provider defaults * refactor: streamline outbound delivery wiring * refactor: make provider onboarding plugin-owned * refactor: support provider-owned agent tools * refactor: move telegram draft chunking into telegram module * refactor: infer provider tool sends via extractToolSend * fix: repair plugin onboarding imports * refactor: de-dup outbound target normalization * style: tidy plugin and agent imports * refactor: data-drive provider selection line * fix: satisfy lint after provider plugin rebase * test: deflake gateway-cli coverage * style: format gateway-cli coverage test * refactor(provider-plugins): simplify provider ids * test(pairing-cli): avoid provider-specific ternary * style(macos): swiftformat HealthStore * refactor(sandbox): derive provider tool denylist * fix(sandbox): avoid plugin init in defaults * refactor(provider-plugins): centralize provider aliases * style(test): satisfy biome * refactor(protocol): v3 providers.status maps * refactor(ui): adapt to protocol v3 * refactor(macos): adapt to protocol v3 * test: update providers.status v3 fixtures * refactor(gateway): map provider runtime snapshot * test(gateway): update reload runtime snapshot * refactor(whatsapp): normalize heartbeat provider id * docs(refactor): update provider plugin notes * style: satisfy biome after rebase * fix: describe sandboxed elevated in prompt * feat(gateway): add agent image attachments + live probe * refactor: derive CLI provider options from plugins * fix(gateway): harden agent provider routing * fix(gateway): harden agent provider routing * refactor: align provider ids for schema * fix(protocol): keep agent provider string * fix(gateway): harden agent provider routing * fix(protocol): keep agent provider string * refactor: normalize agent delivery targets * refactor: support provider-owned agent tools * refactor(config): provider-keyed elevated allowFrom * style: satisfy biome * fix(gateway): appease provider narrowing * style: satisfy biome * refactor(reply): move group intro hints into plugin * fix(reply): avoid plugin registry init cycle * refactor(providers): add lightweight provider dock * refactor(gateway): use typed client id in connect * refactor(providers): document docks and avoid init cycles * refactor(providers): make media limit helper generic * fix(providers): break plugin registry import cycles * style: satisfy biome * refactor(status-all): build providers table from plugins * refactor(gateway): delegate web login to provider plugin * refactor(provider): drop web alias * refactor(provider): lazy-load monitors * style: satisfy lint/format * style: format status-all providers table * style: swiftformat gateway discovery model * test: make reload plan plugin-driven * fix: avoid token stringification in status-all * refactor: make provider IDs explicit in status * feat: warn on signal/imessage provider runtime errors * test: cover gateway provider runtime warnings in status * fix: add runtime kind to provider status issues * test: cover health degradation on probe failure * fix: keep routeReply lightweight * style: organize routeReply imports * refactor(web): extract auth-store helpers * refactor(whatsapp): lazy login imports * refactor(outbound): route replies via plugin outbound * docs: update provider plugin notes * style: format provider status issues * fix: make sandbox scope warning wrap-safe * refactor: load outbound adapters from provider plugins * docs: update provider plugin outbound notes * style(macos): fix swiftformat lint * docs: changelog for provider plugins * fix(macos): satisfy swiftformat * fix(macos): open settings via menu action * style: format after rebase * fix(macos): open Settings via menu action --------- Co-authored-by: LK <luke@kyohere.com> Co-authored-by: Luke K (pr-0f3t) <2609441+lc0rp@users.noreply.github.com> Co-authored-by: Xin <xin@imfing.com>
614 lines
21 KiB
Swift
614 lines
21 KiB
Swift
import ClawdbotChatUI
|
|
import ClawdbotProtocol
|
|
import Foundation
|
|
import OSLog
|
|
|
|
private let gatewayConnectionLogger = Logger(subsystem: "com.clawdbot", category: "gateway.connection")
|
|
|
|
enum GatewayAgentProvider: String, Codable, CaseIterable, Sendable {
|
|
case last
|
|
case whatsapp
|
|
case telegram
|
|
case discord
|
|
case slack
|
|
case signal
|
|
case imessage
|
|
case msteams
|
|
case webchat
|
|
|
|
init(raw: String?) {
|
|
let normalized = (raw ?? "").trimmingCharacters(in: .whitespacesAndNewlines).lowercased()
|
|
self = GatewayAgentProvider(rawValue: normalized) ?? .last
|
|
}
|
|
|
|
var isDeliverable: Bool { self != .webchat }
|
|
|
|
func shouldDeliver(_ deliver: Bool) -> Bool { deliver && self.isDeliverable }
|
|
}
|
|
|
|
struct GatewayAgentInvocation: Sendable {
|
|
var message: String
|
|
var sessionKey: String = "main"
|
|
var thinking: String?
|
|
var deliver: Bool = false
|
|
var to: String?
|
|
var provider: GatewayAgentProvider = .last
|
|
var timeoutSeconds: Int?
|
|
var idempotencyKey: String = UUID().uuidString
|
|
}
|
|
|
|
/// Single, shared Gateway websocket connection for the whole app.
|
|
///
|
|
/// This owns exactly one `GatewayChannelActor` and reuses it across all callers
|
|
/// (ControlChannel, debug actions, SwiftUI WebChat, etc.).
|
|
actor GatewayConnection {
|
|
static let shared = GatewayConnection()
|
|
|
|
typealias Config = (url: URL, token: String?, password: String?)
|
|
|
|
enum Method: String, Sendable {
|
|
case agent
|
|
case status
|
|
case setHeartbeats = "set-heartbeats"
|
|
case systemEvent = "system-event"
|
|
case health
|
|
case providersStatus = "providers.status"
|
|
case configGet = "config.get"
|
|
case configSet = "config.set"
|
|
case wizardStart = "wizard.start"
|
|
case wizardNext = "wizard.next"
|
|
case wizardCancel = "wizard.cancel"
|
|
case wizardStatus = "wizard.status"
|
|
case talkMode = "talk.mode"
|
|
case webLoginStart = "web.login.start"
|
|
case webLoginWait = "web.login.wait"
|
|
case providersLogout = "providers.logout"
|
|
case modelsList = "models.list"
|
|
case chatHistory = "chat.history"
|
|
case chatSend = "chat.send"
|
|
case chatAbort = "chat.abort"
|
|
case skillsStatus = "skills.status"
|
|
case skillsInstall = "skills.install"
|
|
case skillsUpdate = "skills.update"
|
|
case voicewakeGet = "voicewake.get"
|
|
case voicewakeSet = "voicewake.set"
|
|
case nodePairApprove = "node.pair.approve"
|
|
case nodePairReject = "node.pair.reject"
|
|
case cronList = "cron.list"
|
|
case cronRuns = "cron.runs"
|
|
case cronRun = "cron.run"
|
|
case cronRemove = "cron.remove"
|
|
case cronUpdate = "cron.update"
|
|
case cronAdd = "cron.add"
|
|
case cronStatus = "cron.status"
|
|
}
|
|
|
|
private let configProvider: @Sendable () async throws -> Config
|
|
private let sessionBox: WebSocketSessionBox?
|
|
private let decoder = JSONDecoder()
|
|
|
|
private var client: GatewayChannelActor?
|
|
private var configuredURL: URL?
|
|
private var configuredToken: String?
|
|
private var configuredPassword: String?
|
|
|
|
private var subscribers: [UUID: AsyncStream<GatewayPush>.Continuation] = [:]
|
|
private var lastSnapshot: HelloOk?
|
|
|
|
init(
|
|
configProvider: @escaping @Sendable () async throws -> Config = GatewayConnection.defaultConfigProvider,
|
|
sessionBox: WebSocketSessionBox? = nil)
|
|
{
|
|
self.configProvider = configProvider
|
|
self.sessionBox = sessionBox
|
|
}
|
|
|
|
// MARK: - Low-level request
|
|
|
|
func request(
|
|
method: String,
|
|
params: [String: AnyCodable]?,
|
|
timeoutMs: Double? = nil) async throws -> Data
|
|
{
|
|
let cfg = try await self.configProvider()
|
|
await self.configure(url: cfg.url, token: cfg.token, password: cfg.password)
|
|
guard let client else {
|
|
throw NSError(domain: "Gateway", code: 0, userInfo: [NSLocalizedDescriptionKey: "gateway not configured"])
|
|
}
|
|
|
|
do {
|
|
return try await client.request(method: method, params: params, timeoutMs: timeoutMs)
|
|
} catch {
|
|
if error is GatewayResponseError || error is GatewayDecodingError {
|
|
throw error
|
|
}
|
|
|
|
// Auto-recover in local mode by spawning/attaching a gateway and retrying a few times.
|
|
// Canvas interactions should "just work" even if the local gateway isn't running yet.
|
|
let mode = await MainActor.run { AppStateStore.shared.connectionMode }
|
|
switch mode {
|
|
case .local:
|
|
await MainActor.run { GatewayProcessManager.shared.setActive(true) }
|
|
|
|
var lastError: Error = error
|
|
for delayMs in [150, 400, 900] {
|
|
try await Task.sleep(nanoseconds: UInt64(delayMs) * 1_000_000)
|
|
do {
|
|
return try await client.request(method: method, params: params, timeoutMs: timeoutMs)
|
|
} catch {
|
|
lastError = error
|
|
}
|
|
}
|
|
|
|
throw lastError
|
|
case .remote:
|
|
let nsError = error as NSError
|
|
guard nsError.domain == URLError.errorDomain else { throw error }
|
|
|
|
var lastError: Error = error
|
|
await RemoteTunnelManager.shared.stopAll()
|
|
do {
|
|
_ = try await GatewayEndpointStore.shared.ensureRemoteControlTunnel()
|
|
} catch {
|
|
lastError = error
|
|
}
|
|
|
|
for delayMs in [150, 400, 900] {
|
|
try await Task.sleep(nanoseconds: UInt64(delayMs) * 1_000_000)
|
|
do {
|
|
let cfg = try await self.configProvider()
|
|
await self.configure(url: cfg.url, token: cfg.token, password: cfg.password)
|
|
guard let client = self.client else {
|
|
throw NSError(
|
|
domain: "Gateway",
|
|
code: 0,
|
|
userInfo: [NSLocalizedDescriptionKey: "gateway not configured"])
|
|
}
|
|
return try await client.request(method: method, params: params, timeoutMs: timeoutMs)
|
|
} catch {
|
|
lastError = error
|
|
}
|
|
}
|
|
|
|
throw lastError
|
|
case .unconfigured:
|
|
throw error
|
|
}
|
|
}
|
|
}
|
|
|
|
func requestRaw(
|
|
method: Method,
|
|
params: [String: AnyCodable]? = nil,
|
|
timeoutMs: Double? = nil) async throws -> Data
|
|
{
|
|
try await self.request(method: method.rawValue, params: params, timeoutMs: timeoutMs)
|
|
}
|
|
|
|
func requestRaw(
|
|
method: String,
|
|
params: [String: AnyCodable]? = nil,
|
|
timeoutMs: Double? = nil) async throws -> Data
|
|
{
|
|
try await self.request(method: method, params: params, timeoutMs: timeoutMs)
|
|
}
|
|
|
|
func requestDecoded<T: Decodable>(
|
|
method: Method,
|
|
params: [String: AnyCodable]? = nil,
|
|
timeoutMs: Double? = nil) async throws -> T
|
|
{
|
|
let data = try await self.requestRaw(method: method, params: params, timeoutMs: timeoutMs)
|
|
do {
|
|
return try self.decoder.decode(T.self, from: data)
|
|
} catch {
|
|
throw GatewayDecodingError(method: method.rawValue, message: error.localizedDescription)
|
|
}
|
|
}
|
|
|
|
func requestVoid(
|
|
method: Method,
|
|
params: [String: AnyCodable]? = nil,
|
|
timeoutMs: Double? = nil) async throws
|
|
{
|
|
_ = try await self.requestRaw(method: method, params: params, timeoutMs: timeoutMs)
|
|
}
|
|
|
|
/// Ensure the underlying socket is configured (and replaced if config changed).
|
|
func refresh() async throws {
|
|
let cfg = try await self.configProvider()
|
|
await self.configure(url: cfg.url, token: cfg.token, password: cfg.password)
|
|
}
|
|
|
|
func shutdown() async {
|
|
if let client {
|
|
await client.shutdown()
|
|
}
|
|
self.client = nil
|
|
self.configuredURL = nil
|
|
self.configuredToken = nil
|
|
self.lastSnapshot = nil
|
|
}
|
|
|
|
func canvasHostUrl() async -> String? {
|
|
guard let snapshot = self.lastSnapshot else { return nil }
|
|
let trimmed = snapshot.canvashosturl?.trimmingCharacters(in: .whitespacesAndNewlines) ?? ""
|
|
return trimmed.isEmpty ? nil : trimmed
|
|
}
|
|
|
|
func snapshotPaths() -> (configPath: String?, stateDir: String?) {
|
|
guard let snapshot = self.lastSnapshot else { return (nil, nil) }
|
|
let configPath = snapshot.snapshot.configpath?.trimmingCharacters(in: .whitespacesAndNewlines)
|
|
let stateDir = snapshot.snapshot.statedir?.trimmingCharacters(in: .whitespacesAndNewlines)
|
|
return (
|
|
configPath?.isEmpty == false ? configPath : nil,
|
|
stateDir?.isEmpty == false ? stateDir : nil)
|
|
}
|
|
|
|
func subscribe(bufferingNewest: Int = 100) -> AsyncStream<GatewayPush> {
|
|
let id = UUID()
|
|
let snapshot = self.lastSnapshot
|
|
let connection = self
|
|
return AsyncStream(bufferingPolicy: .bufferingNewest(bufferingNewest)) { continuation in
|
|
if let snapshot {
|
|
continuation.yield(.snapshot(snapshot))
|
|
}
|
|
self.subscribers[id] = continuation
|
|
continuation.onTermination = { @Sendable _ in
|
|
Task { await connection.removeSubscriber(id) }
|
|
}
|
|
}
|
|
}
|
|
|
|
private func removeSubscriber(_ id: UUID) {
|
|
self.subscribers[id] = nil
|
|
}
|
|
|
|
private func broadcast(_ push: GatewayPush) {
|
|
if case let .snapshot(snapshot) = push {
|
|
self.lastSnapshot = snapshot
|
|
}
|
|
for (_, continuation) in self.subscribers {
|
|
continuation.yield(push)
|
|
}
|
|
}
|
|
|
|
private func configure(url: URL, token: String?, password: String?) async {
|
|
if self.client != nil, self.configuredURL == url, self.configuredToken == token,
|
|
self.configuredPassword == password
|
|
{
|
|
return
|
|
}
|
|
if let client {
|
|
await client.shutdown()
|
|
}
|
|
self.lastSnapshot = nil
|
|
self.client = GatewayChannelActor(
|
|
url: url,
|
|
token: token,
|
|
password: password,
|
|
session: self.sessionBox,
|
|
pushHandler: { [weak self] push in
|
|
await self?.handle(push: push)
|
|
})
|
|
self.configuredURL = url
|
|
self.configuredToken = token
|
|
self.configuredPassword = password
|
|
}
|
|
|
|
private func handle(push: GatewayPush) {
|
|
self.broadcast(push)
|
|
}
|
|
|
|
private static func defaultConfigProvider() async throws -> Config {
|
|
try await GatewayEndpointStore.shared.requireConfig()
|
|
}
|
|
}
|
|
|
|
// MARK: - Typed gateway API
|
|
|
|
extension GatewayConnection {
|
|
struct ConfigGetSnapshot: Decodable, Sendable {
|
|
struct SnapshotConfig: Decodable, Sendable {
|
|
struct Session: Decodable, Sendable {
|
|
let mainKey: String?
|
|
let scope: String?
|
|
}
|
|
|
|
let session: Session?
|
|
}
|
|
|
|
let config: SnapshotConfig?
|
|
}
|
|
|
|
static func mainSessionKey(fromConfigGetData data: Data) throws -> String {
|
|
let snapshot = try JSONDecoder().decode(ConfigGetSnapshot.self, from: data)
|
|
let scope = snapshot.config?.session?.scope?.trimmingCharacters(in: .whitespacesAndNewlines)
|
|
if scope == "global" {
|
|
return "global"
|
|
}
|
|
return "main"
|
|
}
|
|
|
|
func mainSessionKey(timeoutMs: Double = 15000) async -> String {
|
|
do {
|
|
let data = try await self.requestRaw(method: "config.get", params: nil, timeoutMs: timeoutMs)
|
|
return try Self.mainSessionKey(fromConfigGetData: data)
|
|
} catch {
|
|
return "main"
|
|
}
|
|
}
|
|
|
|
func status() async -> (ok: Bool, error: String?) {
|
|
do {
|
|
_ = try await self.requestRaw(method: .status)
|
|
return (true, nil)
|
|
} catch {
|
|
return (false, error.localizedDescription)
|
|
}
|
|
}
|
|
|
|
func setHeartbeatsEnabled(_ enabled: Bool) async -> Bool {
|
|
do {
|
|
try await self.requestVoid(method: .setHeartbeats, params: ["enabled": AnyCodable(enabled)])
|
|
return true
|
|
} catch {
|
|
gatewayConnectionLogger.error("setHeartbeatsEnabled failed \(error.localizedDescription, privacy: .public)")
|
|
return false
|
|
}
|
|
}
|
|
|
|
func sendAgent(_ invocation: GatewayAgentInvocation) async -> (ok: Bool, error: String?) {
|
|
let trimmed = invocation.message.trimmingCharacters(in: .whitespacesAndNewlines)
|
|
guard !trimmed.isEmpty else { return (false, "message empty") }
|
|
|
|
var params: [String: AnyCodable] = [
|
|
"message": AnyCodable(trimmed),
|
|
"sessionKey": AnyCodable(invocation.sessionKey),
|
|
"thinking": AnyCodable(invocation.thinking ?? "default"),
|
|
"deliver": AnyCodable(invocation.deliver),
|
|
"to": AnyCodable(invocation.to ?? ""),
|
|
"provider": AnyCodable(invocation.provider.rawValue),
|
|
"idempotencyKey": AnyCodable(invocation.idempotencyKey),
|
|
]
|
|
if let timeout = invocation.timeoutSeconds {
|
|
params["timeout"] = AnyCodable(timeout)
|
|
}
|
|
|
|
do {
|
|
try await self.requestVoid(method: .agent, params: params)
|
|
return (true, nil)
|
|
} catch {
|
|
return (false, error.localizedDescription)
|
|
}
|
|
}
|
|
|
|
func sendAgent(
|
|
message: String,
|
|
thinking: String?,
|
|
sessionKey: String,
|
|
deliver: Bool,
|
|
to: String?,
|
|
provider: GatewayAgentProvider = .last,
|
|
timeoutSeconds: Int? = nil,
|
|
idempotencyKey: String = UUID().uuidString) async -> (ok: Bool, error: String?)
|
|
{
|
|
await self.sendAgent(GatewayAgentInvocation(
|
|
message: message,
|
|
sessionKey: sessionKey,
|
|
thinking: thinking,
|
|
deliver: deliver,
|
|
to: to,
|
|
provider: provider,
|
|
timeoutSeconds: timeoutSeconds,
|
|
idempotencyKey: idempotencyKey))
|
|
}
|
|
|
|
func sendSystemEvent(_ params: [String: AnyCodable]) async {
|
|
do {
|
|
try await self.requestVoid(method: .systemEvent, params: params)
|
|
} catch {
|
|
// Best-effort only.
|
|
}
|
|
}
|
|
|
|
// MARK: - Health
|
|
|
|
func healthSnapshot(timeoutMs: Double? = nil) async throws -> HealthSnapshot {
|
|
let data = try await self.requestRaw(method: .health, timeoutMs: timeoutMs)
|
|
if let snap = decodeHealthSnapshot(from: data) { return snap }
|
|
throw GatewayDecodingError(method: Method.health.rawValue, message: "failed to decode health snapshot")
|
|
}
|
|
|
|
func healthOK(timeoutMs: Int = 8000) async throws -> Bool {
|
|
let data = try await self.requestRaw(method: .health, timeoutMs: Double(timeoutMs))
|
|
return (try? self.decoder.decode(ClawdbotGatewayHealthOK.self, from: data))?.ok ?? true
|
|
}
|
|
|
|
// MARK: - Skills
|
|
|
|
func skillsStatus() async throws -> SkillsStatusReport {
|
|
try await self.requestDecoded(method: .skillsStatus)
|
|
}
|
|
|
|
func skillsInstall(
|
|
name: String,
|
|
installId: String,
|
|
timeoutMs: Int? = nil) async throws -> SkillInstallResult
|
|
{
|
|
var params: [String: AnyCodable] = [
|
|
"name": AnyCodable(name),
|
|
"installId": AnyCodable(installId),
|
|
]
|
|
if let timeoutMs {
|
|
params["timeoutMs"] = AnyCodable(timeoutMs)
|
|
}
|
|
return try await self.requestDecoded(method: .skillsInstall, params: params)
|
|
}
|
|
|
|
func skillsUpdate(
|
|
skillKey: String,
|
|
enabled: Bool? = nil,
|
|
apiKey: String? = nil,
|
|
env: [String: String]? = nil) async throws -> SkillUpdateResult
|
|
{
|
|
var params: [String: AnyCodable] = [
|
|
"skillKey": AnyCodable(skillKey),
|
|
]
|
|
if let enabled { params["enabled"] = AnyCodable(enabled) }
|
|
if let apiKey { params["apiKey"] = AnyCodable(apiKey) }
|
|
if let env, !env.isEmpty { params["env"] = AnyCodable(env) }
|
|
return try await self.requestDecoded(method: .skillsUpdate, params: params)
|
|
}
|
|
|
|
// MARK: - Chat
|
|
|
|
func chatHistory(
|
|
sessionKey: String,
|
|
limit: Int? = nil,
|
|
timeoutMs: Int? = nil) async throws -> ClawdbotChatHistoryPayload
|
|
{
|
|
var params: [String: AnyCodable] = ["sessionKey": AnyCodable(sessionKey)]
|
|
if let limit { params["limit"] = AnyCodable(limit) }
|
|
let timeout = timeoutMs.map { Double($0) }
|
|
return try await self.requestDecoded(
|
|
method: .chatHistory,
|
|
params: params,
|
|
timeoutMs: timeout)
|
|
}
|
|
|
|
func chatSend(
|
|
sessionKey: String,
|
|
message: String,
|
|
thinking: String,
|
|
idempotencyKey: String,
|
|
attachments: [ClawdbotChatAttachmentPayload],
|
|
timeoutMs: Int = 30000) async throws -> ClawdbotChatSendResponse
|
|
{
|
|
var params: [String: AnyCodable] = [
|
|
"sessionKey": AnyCodable(sessionKey),
|
|
"message": AnyCodable(message),
|
|
"thinking": AnyCodable(thinking),
|
|
"idempotencyKey": AnyCodable(idempotencyKey),
|
|
"timeoutMs": AnyCodable(timeoutMs),
|
|
]
|
|
|
|
if !attachments.isEmpty {
|
|
let encoded = attachments.map { att in
|
|
[
|
|
"type": att.type,
|
|
"mimeType": att.mimeType,
|
|
"fileName": att.fileName,
|
|
"content": att.content,
|
|
]
|
|
}
|
|
params["attachments"] = AnyCodable(encoded)
|
|
}
|
|
|
|
return try await self.requestDecoded(
|
|
method: .chatSend,
|
|
params: params,
|
|
timeoutMs: Double(timeoutMs))
|
|
}
|
|
|
|
func chatAbort(sessionKey: String, runId: String) async throws -> Bool {
|
|
struct AbortResponse: Decodable { let ok: Bool?; let aborted: Bool? }
|
|
let res: AbortResponse = try await self.requestDecoded(
|
|
method: .chatAbort,
|
|
params: ["sessionKey": AnyCodable(sessionKey), "runId": AnyCodable(runId)])
|
|
return res.aborted ?? false
|
|
}
|
|
|
|
func talkMode(enabled: Bool, phase: String? = nil) async {
|
|
var params: [String: AnyCodable] = ["enabled": AnyCodable(enabled)]
|
|
if let phase { params["phase"] = AnyCodable(phase) }
|
|
try? await self.requestVoid(method: .talkMode, params: params)
|
|
}
|
|
|
|
// MARK: - VoiceWake
|
|
|
|
func voiceWakeGetTriggers() async throws -> [String] {
|
|
struct VoiceWakePayload: Decodable { let triggers: [String] }
|
|
let payload: VoiceWakePayload = try await self.requestDecoded(method: .voicewakeGet)
|
|
return payload.triggers
|
|
}
|
|
|
|
func voiceWakeSetTriggers(_ triggers: [String]) async {
|
|
do {
|
|
try await self.requestVoid(
|
|
method: .voicewakeSet,
|
|
params: ["triggers": AnyCodable(triggers)],
|
|
timeoutMs: 10000)
|
|
} catch {
|
|
// Best-effort only.
|
|
}
|
|
}
|
|
|
|
// MARK: - Node pairing
|
|
|
|
func nodePairApprove(requestId: String) async throws {
|
|
try await self.requestVoid(
|
|
method: .nodePairApprove,
|
|
params: ["requestId": AnyCodable(requestId)],
|
|
timeoutMs: 10000)
|
|
}
|
|
|
|
func nodePairReject(requestId: String) async throws {
|
|
try await self.requestVoid(
|
|
method: .nodePairReject,
|
|
params: ["requestId": AnyCodable(requestId)],
|
|
timeoutMs: 10000)
|
|
}
|
|
|
|
// MARK: - Cron
|
|
|
|
struct CronSchedulerStatus: Decodable, Sendable {
|
|
let enabled: Bool
|
|
let storePath: String
|
|
let jobs: Int
|
|
let nextWakeAtMs: Int?
|
|
}
|
|
|
|
func cronStatus() async throws -> CronSchedulerStatus {
|
|
try await self.requestDecoded(method: .cronStatus)
|
|
}
|
|
|
|
func cronList(includeDisabled: Bool = true) async throws -> [CronJob] {
|
|
let res: CronListResponse = try await self.requestDecoded(
|
|
method: .cronList,
|
|
params: ["includeDisabled": AnyCodable(includeDisabled)])
|
|
return res.jobs
|
|
}
|
|
|
|
func cronRuns(jobId: String, limit: Int = 200) async throws -> [CronRunLogEntry] {
|
|
let res: CronRunsResponse = try await self.requestDecoded(
|
|
method: .cronRuns,
|
|
params: ["id": AnyCodable(jobId), "limit": AnyCodable(limit)])
|
|
return res.entries
|
|
}
|
|
|
|
func cronRun(jobId: String, force: Bool = true) async throws {
|
|
try await self.requestVoid(
|
|
method: .cronRun,
|
|
params: [
|
|
"id": AnyCodable(jobId),
|
|
"mode": AnyCodable(force ? "force" : "due"),
|
|
],
|
|
timeoutMs: 20000)
|
|
}
|
|
|
|
func cronRemove(jobId: String) async throws {
|
|
try await self.requestVoid(method: .cronRemove, params: ["id": AnyCodable(jobId)])
|
|
}
|
|
|
|
func cronUpdate(jobId: String, patch: [String: AnyCodable]) async throws {
|
|
try await self.requestVoid(
|
|
method: .cronUpdate,
|
|
params: ["id": AnyCodable(jobId), "patch": AnyCodable(patch)])
|
|
}
|
|
|
|
func cronAdd(payload: [String: AnyCodable]) async throws {
|
|
try await self.requestVoid(method: .cronAdd, params: payload)
|
|
}
|
|
}
|