qa/convex-credential-broker/README.md
Standalone Convex project for shared qa-lab live credentials with lease locking.
Keep private operator notes in ~/Projects/manager/docs/, not in public docs.
This broker exposes:
POST /qa-credentials/v1/acquirePOST /qa-credentials/v1/payload-chunkPOST /qa-credentials/v1/heartbeatPOST /qa-credentials/v1/releasePOST /qa-credentials/v1/admin/addPOST /qa-credentials/v1/admin/removePOST /qa-credentials/v1/admin/listThe implementation matches the contract documented in
docs/help/testing.md for --credential-source convex.
kind onlycd qa/convex-credential-broker
npm install
npx convex dev
npx convex deploy
OPENCLAW_QA_CONVEX_SECRET_MAINTAINEROPENCLAW_QA_CONVEX_SECRET_CIClient URL policy:
OPENCLAW_QA_CONVEX_SITE_URL must use https:// in normal use.http:// only when OPENCLAW_QA_ALLOW_INSECURE_HTTP=1.Maintainers can manage rows without using the Convex dashboard:
pnpm openclaw qa credentials add \
--kind telegram \
--payload-file qa/telegram-credential.json
pnpm openclaw qa credentials add \
--kind discord \
--payload-file qa/discord-credential.json
pnpm openclaw qa credentials list --kind telegram
pnpm openclaw qa credentials remove --credential-id <credential-id>
Admin endpoints require OPENCLAW_QA_CONVEX_SECRET_MAINTAINER.
Replace <site-url> with your Convex site URL and <token> with a configured secret.
Acquire:
curl -sS -X POST "<site-url>/qa-credentials/v1/acquire" \
-H "authorization: Bearer <token>" \
-H "content-type: application/json" \
-d '{
"kind":"telegram",
"ownerId":"local-dev",
"actorRole":"maintainer",
"leaseTtlMs":1200000,
"heartbeatIntervalMs":30000
}'
Heartbeat:
curl -sS -X POST "<site-url>/qa-credentials/v1/heartbeat" \
-H "authorization: Bearer <token>" \
-H "content-type: application/json" \
-d '{
"kind":"telegram",
"ownerId":"local-dev",
"actorRole":"maintainer",
"credentialId":"<credential-id>",
"leaseToken":"<lease-token>",
"leaseTtlMs":1200000
}'
Release:
curl -sS -X POST "<site-url>/qa-credentials/v1/release" \
-H "authorization: Bearer <token>" \
-H "content-type: application/json" \
-d '{
"kind":"telegram",
"ownerId":"local-dev",
"actorRole":"maintainer",
"credentialId":"<credential-id>",
"leaseToken":"<lease-token>"
}'
Admin add (maintainer token only):
curl -sS -X POST "<site-url>/qa-credentials/v1/admin/add" \
-H "authorization: Bearer <maintainer-token>" \
-H "content-type: application/json" \
-d '{
"kind":"telegram",
"actorId":"local-maintainer",
"payload":{
"groupId":"-100123",
"driverToken":"driver-token",
"sutToken":"sut-token"
}
}'
For kind: "telegram", broker admin/add validates that payload includes:
groupId as a numeric chat id stringdriverTokensutTokenFor kind: "telegram-user", broker admin/add validates one exclusive real-user
credential for both the TDLib CLI driver and the Telegram Desktop visual witness:
groupId as a numeric chat id stringsutTokentesterUserId as a numeric Telegram user id stringtesterUsernametelegramApiId as a numeric stringtelegramApiHashtdlibDatabaseEncryptionKeytdlibArchiveBase64tdlibArchiveSha256 as a SHA-256 hex stringdesktopTdataArchiveBase64desktopTdataArchiveSha256 as a SHA-256 hex stringLong-running agent sessions should acquire this lease once, keep it for the
whole Crabbox review/repro session, then release it from the same session file.
Do not run parallel telegram-user jobs against the burner account.
For kind: "discord", broker admin/add validates that payload includes:
guildId as a Discord snowflake stringchannelId as a Discord snowflake stringdriverBotTokensutBotTokensutApplicationId as a Discord snowflake stringFor kind: "whatsapp", broker admin/add validates that payload includes:
driverPhoneE164 as an E.164 phone number stringsutPhoneE164 as a distinct E.164 phone number stringdriverAuthArchiveBase64sutAuthArchiveBase64groupJidOther kinds are currently accepted as pass-through payloads. Add broker-side validation before treating a new kind as a hardened shared pool.
Admin list (default redacted):
curl -sS -X POST "<site-url>/qa-credentials/v1/admin/list" \
-H "authorization: Bearer <maintainer-token>" \
-H "content-type: application/json" \
-d '{
"kind":"telegram",
"status":"all"
}'
Admin remove (soft disable, fails when lease is active):
curl -sS -X POST "<site-url>/qa-credentials/v1/admin/remove" \
-H "authorization: Bearer <maintainer-token>" \
-H "content-type: application/json" \
-d '{
"credentialId":"<credential-id>",
"actorId":"local-maintainer"
}'