feat: Complete zCode CLI X with Telegram bot integration

- Add full Telegram bot functionality with Z.AI API integration
- Implement 4 tools: Bash, FileEdit, WebSearch, Git
- Add 3 agents: Code Reviewer, Architect, DevOps Engineer
- Add 6 skills for common coding tasks
- Add systemd service file for 24/7 operation
- Add nginx configuration for HTTPS webhook
- Add comprehensive documentation
- Implement WebSocket server for real-time updates
- Add logging system with Winston
- Add environment validation

🤖 zCode CLI X - Agentic coder with Z.AI + Telegram integration
This commit is contained in:
admin
2026-05-05 09:01:26 +00:00
Unverified
parent 4a7035dd92
commit 875c7f9b91
24688 changed files with 3224957 additions and 221 deletions

View File

@@ -0,0 +1,40 @@
import { ProviderError } from "@smithy/property-provider";
export const createCredentialChain = (...credentialProviders) => {
let expireAfter = -1;
const baseFunction = async (awsIdentityProperties) => {
const credentials = await propertyProviderChain(...credentialProviders)(awsIdentityProperties);
if (!credentials.expiration && expireAfter !== -1) {
credentials.expiration = new Date(Date.now() + expireAfter);
}
return credentials;
};
const withOptions = Object.assign(baseFunction, {
expireAfter(milliseconds) {
if (milliseconds < 5 * 60_000) {
throw new Error("@aws-sdk/credential-providers - createCredentialChain(...).expireAfter(ms) may not be called with a duration lower than five minutes.");
}
expireAfter = milliseconds;
return withOptions;
},
});
return withOptions;
};
export const propertyProviderChain = (...providers) => async (awsIdentityProperties) => {
if (providers.length === 0) {
throw new ProviderError("No providers in chain", { tryNextLink: false });
}
let lastProviderError;
for (const provider of providers) {
try {
return await provider(awsIdentityProperties);
}
catch (err) {
lastProviderError = err;
if (err?.tryNextLink) {
continue;
}
throw err;
}
}
throw lastProviderError;
};

View File

@@ -0,0 +1,4 @@
import { fromCognitoIdentity as _fromCognitoIdentity } from "@aws-sdk/credential-provider-cognito-identity";
export const fromCognitoIdentity = (options) => _fromCognitoIdentity({
...options,
});

View File

@@ -0,0 +1,4 @@
import { fromCognitoIdentityPool as _fromCognitoIdentityPool } from "@aws-sdk/credential-provider-cognito-identity";
export const fromCognitoIdentityPool = (options) => _fromCognitoIdentityPool({
...options,
});

View File

@@ -0,0 +1,5 @@
import { fromContainerMetadata as _fromContainerMetadata } from "@smithy/credential-provider-imds";
export const fromContainerMetadata = (init) => {
init?.logger?.debug("@smithy/credential-provider-imds", "fromContainerMetadata");
return _fromContainerMetadata(init);
};

View File

@@ -0,0 +1,2 @@
import { fromEnv as _fromEnv } from "@aws-sdk/credential-provider-env";
export const fromEnv = (init) => _fromEnv(init);

View File

@@ -0,0 +1,4 @@
import { fromIni as _fromIni } from "@aws-sdk/credential-provider-ini";
export const fromIni = (init = {}) => _fromIni({
...init,
});

View File

@@ -0,0 +1,6 @@
import { setCredentialFeature } from "@aws-sdk/core/client";
import { fromInstanceMetadata as _fromInstanceMetadata } from "@smithy/credential-provider-imds";
export const fromInstanceMetadata = (init) => {
init?.logger?.debug("@smithy/credential-provider-imds", "fromInstanceMetadata");
return async () => _fromInstanceMetadata(init)().then((creds) => setCredentialFeature(creds, "CREDENTIALS_IMDS", "0"));
};

View File

@@ -0,0 +1,4 @@
import { fromLoginCredentials as _fromLoginCredentials, } from "@aws-sdk/credential-provider-login";
export const fromLoginCredentials = (init) => _fromLoginCredentials({
...init,
});

View File

@@ -0,0 +1,4 @@
import { defaultProvider } from "@aws-sdk/credential-provider-node";
export const fromNodeProviderChain = (init = {}) => defaultProvider({
...init,
});

View File

@@ -0,0 +1,2 @@
import { fromProcess as _fromProcess } from "@aws-sdk/credential-provider-process";
export const fromProcess = (init) => _fromProcess(init);

View File

@@ -0,0 +1,4 @@
import { fromSSO as _fromSSO } from "@aws-sdk/credential-provider-sso";
export const fromSSO = (init = {}) => {
return _fromSSO({ ...init });
};

View File

@@ -0,0 +1,118 @@
import { normalizeProvider } from "@smithy/core";
import { CredentialsProviderError } from "@smithy/property-provider";
const ASSUME_ROLE_DEFAULT_REGION = "us-east-1";
export const fromTemporaryCredentials = (options, credentialDefaultProvider, regionProvider) => {
let stsClient;
return async (awsIdentityProperties = {}) => {
const { callerClientConfig } = awsIdentityProperties;
const profile = options.clientConfig?.profile ?? callerClientConfig?.profile;
const logger = options.logger ?? callerClientConfig?.logger;
logger?.debug("@aws-sdk/credential-providers - fromTemporaryCredentials (STS)");
const params = { ...options.params, RoleSessionName: options.params.RoleSessionName ?? "aws-sdk-js-" + Date.now() };
if (params?.SerialNumber) {
if (!options.mfaCodeProvider) {
throw new CredentialsProviderError(`Temporary credential requires multi-factor authentication, but no MFA code callback was provided.`, {
tryNextLink: false,
logger,
});
}
params.TokenCode = await options.mfaCodeProvider(params?.SerialNumber);
}
const { AssumeRoleCommand, STSClient } = await import("./loadSts");
if (!stsClient) {
const defaultCredentialsOrError = typeof credentialDefaultProvider === "function" ? credentialDefaultProvider() : undefined;
const credentialSources = [
options.masterCredentials,
options.clientConfig?.credentials,
void callerClientConfig?.credentials,
callerClientConfig?.credentialDefaultProvider?.(),
defaultCredentialsOrError,
];
let credentialSource = "STS client default credentials";
if (credentialSources[0]) {
credentialSource = "options.masterCredentials";
}
else if (credentialSources[1]) {
credentialSource = "options.clientConfig.credentials";
}
else if (credentialSources[2]) {
credentialSource = "caller client's credentials";
throw new Error("fromTemporaryCredentials recursion in callerClientConfig.credentials");
}
else if (credentialSources[3]) {
credentialSource = "caller client's credentialDefaultProvider";
}
else if (credentialSources[4]) {
credentialSource = "AWS SDK default credentials";
}
const regionSources = [
options.clientConfig?.region,
callerClientConfig?.region,
await regionProvider?.({
profile,
}),
ASSUME_ROLE_DEFAULT_REGION,
];
let regionSource = "default partition's default region";
if (regionSources[0]) {
regionSource = "options.clientConfig.region";
}
else if (regionSources[1]) {
regionSource = "caller client's region";
}
else if (regionSources[2]) {
regionSource = "file or env region";
}
const requestHandlerSources = [
filterRequestHandler(options.clientConfig?.requestHandler),
filterRequestHandler(callerClientConfig?.requestHandler),
];
let requestHandlerSource = "STS default requestHandler";
if (requestHandlerSources[0]) {
requestHandlerSource = "options.clientConfig.requestHandler";
}
else if (requestHandlerSources[1]) {
requestHandlerSource = "caller client's requestHandler";
}
logger?.debug?.(`@aws-sdk/credential-providers - fromTemporaryCredentials STS client init with ` +
`${regionSource}=${await normalizeProvider(coalesce(regionSources))()}, ${credentialSource}, ${requestHandlerSource}.`);
stsClient = new STSClient({
userAgentAppId: callerClientConfig?.userAgentAppId,
...options.clientConfig,
credentials: coalesce(credentialSources),
logger,
profile,
region: coalesce(regionSources),
requestHandler: coalesce(requestHandlerSources),
});
}
if (options.clientPlugins) {
for (const plugin of options.clientPlugins) {
stsClient.middlewareStack.use(plugin);
}
}
const { Credentials } = await stsClient.send(new AssumeRoleCommand(params));
if (!Credentials || !Credentials.AccessKeyId || !Credentials.SecretAccessKey) {
throw new CredentialsProviderError(`Invalid response from STS.assumeRole call with role ${params.RoleArn}`, {
logger,
});
}
return {
accessKeyId: Credentials.AccessKeyId,
secretAccessKey: Credentials.SecretAccessKey,
sessionToken: Credentials.SessionToken,
expiration: Credentials.Expiration,
credentialScope: Credentials.CredentialScope,
};
};
};
const filterRequestHandler = (requestHandler) => {
return requestHandler?.metadata?.handlerProtocol === "h2" ? undefined : requestHandler;
};
const coalesce = (args) => {
for (const item of args) {
if (item !== undefined) {
return item;
}
}
};

View File

@@ -0,0 +1 @@
export { fromTemporaryCredentials } from "./fromTemporaryCredentials.base";

View File

@@ -0,0 +1,13 @@
import { NODE_REGION_CONFIG_FILE_OPTIONS } from "@smithy/config-resolver";
import { loadConfig } from "@smithy/node-config-provider";
import { fromNodeProviderChain } from "./fromNodeProviderChain";
import { fromTemporaryCredentials as fromTemporaryCredentialsBase } from "./fromTemporaryCredentials.base";
export const fromTemporaryCredentials = (options) => {
return fromTemporaryCredentialsBase(options, fromNodeProviderChain, async ({ profile = process.env.AWS_PROFILE }) => loadConfig({
environmentVariableSelector: (env) => env.AWS_REGION,
configFileSelector: (profileData) => {
return profileData.region;
},
default: () => undefined,
}, { ...NODE_REGION_CONFIG_FILE_OPTIONS, profile })());
};

View File

@@ -0,0 +1,4 @@
import { fromTokenFile as _fromTokenFile } from "@aws-sdk/credential-provider-web-identity";
export const fromTokenFile = (init = {}) => _fromTokenFile({
...init,
});

View File

@@ -0,0 +1,4 @@
import { fromWebToken as _fromWebToken } from "@aws-sdk/credential-provider-web-identity";
export const fromWebToken = (init) => _fromWebToken({
...init,
});

View File

@@ -0,0 +1,5 @@
export * from "./fromCognitoIdentity";
export * from "./fromCognitoIdentityPool";
export { fromHttp } from "@aws-sdk/credential-provider-http";
export * from "./fromTemporaryCredentials.browser";
export * from "./fromWebToken";

View File

@@ -0,0 +1,15 @@
export * from "./createCredentialChain";
export * from "./fromCognitoIdentity";
export * from "./fromCognitoIdentityPool";
export * from "./fromContainerMetadata";
export * from "./fromEnv";
export { fromHttp } from "@aws-sdk/credential-provider-http";
export * from "./fromIni";
export * from "./fromInstanceMetadata";
export * from "./fromLoginCredentials";
export * from "./fromNodeProviderChain";
export * from "./fromProcess";
export * from "./fromSSO";
export * from "./fromTemporaryCredentials";
export * from "./fromTokenFile";
export * from "./fromWebToken";

View File

@@ -0,0 +1,2 @@
import { AssumeRoleCommand, STSClient } from "@aws-sdk/nested-clients/sts";
export { AssumeRoleCommand, STSClient };