- Add full Telegram bot functionality with Z.AI API integration
- Implement 4 tools: Bash, FileEdit, WebSearch, Git
- Add 3 agents: Code Reviewer, Architect, DevOps Engineer
- Add 6 skills for common coding tasks
- Add systemd service file for 24/7 operation
- Add nginx configuration for HTTPS webhook
- Add comprehensive documentation
- Implement WebSocket server for real-time updates
- Add logging system with Winston
- Add environment validation
🤖 zCode CLI X - Agentic coder with Z.AI + Telegram integration
65 lines
2.5 KiB
JavaScript
65 lines
2.5 KiB
JavaScript
import { Sha256 } from '@aws-crypto/sha256-js';
|
|
import { FetchHttpHandler } from '@smithy/fetch-http-handler';
|
|
import { HttpRequest } from '@smithy/protocol-http';
|
|
import { SignatureV4 } from '@smithy/signature-v4';
|
|
import assert from 'assert';
|
|
const DEFAULT_PROVIDER_CHAIN_RESOLVER = () => import('@aws-sdk/credential-providers').then(({ fromNodeProviderChain }) => fromNodeProviderChain({
|
|
clientConfig: {
|
|
requestHandler: new FetchHttpHandler({
|
|
requestInit: (httpRequest) => {
|
|
return {
|
|
...httpRequest,
|
|
};
|
|
},
|
|
}),
|
|
},
|
|
}))
|
|
.catch((error) => {
|
|
throw new Error(`Failed to import '@aws-sdk/credential-providers'.` +
|
|
`You can provide a custom \`providerChainResolver\` in the client options if your runtime does not have access to '@aws-sdk/credential-providers': ` +
|
|
`\`new AnthropicBedrock({ providerChainResolver })\` ` +
|
|
`Original error: ${error.message}`);
|
|
});
|
|
export const getAuthHeaders = async (req, props) => {
|
|
assert(req.method, 'Expected request method property to be set');
|
|
let credentials;
|
|
if (props.awsAccessKey && props.awsSecretKey) {
|
|
credentials = {
|
|
accessKeyId: props.awsAccessKey,
|
|
secretAccessKey: props.awsSecretKey,
|
|
...(props.awsSessionToken != null && { sessionToken: props.awsSessionToken }),
|
|
};
|
|
}
|
|
else {
|
|
const provider = await (props.providerChainResolver ?
|
|
props.providerChainResolver()
|
|
: DEFAULT_PROVIDER_CHAIN_RESOLVER());
|
|
credentials = await provider();
|
|
}
|
|
const signer = new SignatureV4({
|
|
service: 'bedrock',
|
|
region: props.regionName,
|
|
credentials,
|
|
sha256: Sha256,
|
|
});
|
|
const url = new URL(props.url);
|
|
const headers = !req.headers ? {}
|
|
: Symbol.iterator in req.headers ?
|
|
Object.fromEntries(Array.from(req.headers).map((header) => [...header]))
|
|
: { ...req.headers };
|
|
// The connection header may be stripped by a proxy somewhere, so the receiver
|
|
// of this message may not see this header, so we remove it from the set of headers
|
|
// that are signed.
|
|
delete headers['connection'];
|
|
headers['host'] = url.hostname;
|
|
const request = new HttpRequest({
|
|
method: req.method.toUpperCase(),
|
|
protocol: url.protocol,
|
|
path: url.pathname,
|
|
headers,
|
|
body: req.body,
|
|
});
|
|
const signed = await signer.sign(request);
|
|
return signed.headers;
|
|
};
|
|
//# sourceMappingURL=auth.mjs.map
|