qa/convex-credential-broker/README.md
Standalone Convex project for shared qa-lab live credentials with lease locking.
This broker exposes:
POST /qa-credentials/v1/acquirePOST /qa-credentials/v1/heartbeatPOST /qa-credentials/v1/releasePOST /qa-credentials/v1/admin/addPOST /qa-credentials/v1/admin/removePOST /qa-credentials/v1/admin/listThe implementation matches the contract documented in
docs/help/testing.md for --credential-source convex.
kind onlycd qa/convex-credential-broker
npm install
npx convex dev
npx convex deploy
OPENCLAW_QA_CONVEX_SECRET_MAINTAINEROPENCLAW_QA_CONVEX_SECRET_CIClient URL policy:
OPENCLAW_QA_CONVEX_SITE_URL must use https:// in normal use.http:// only when OPENCLAW_QA_ALLOW_INSECURE_HTTP=1.Maintainers can manage rows without using the Convex dashboard:
pnpm openclaw qa credentials add \
--kind telegram \
--payload-file qa/telegram-credential.json
pnpm openclaw qa credentials add \
--kind discord \
--payload-file qa/discord-credential.json
pnpm openclaw qa credentials list --kind telegram
pnpm openclaw qa credentials remove --credential-id <credential-id>
Admin endpoints require OPENCLAW_QA_CONVEX_SECRET_MAINTAINER.
Replace <site-url> with your Convex site URL and <token> with a configured secret.
Acquire:
curl -sS -X POST "<site-url>/qa-credentials/v1/acquire" \
-H "authorization: Bearer <token>" \
-H "content-type: application/json" \
-d '{
"kind":"telegram",
"ownerId":"local-dev",
"actorRole":"maintainer",
"leaseTtlMs":1200000,
"heartbeatIntervalMs":30000
}'
Heartbeat:
curl -sS -X POST "<site-url>/qa-credentials/v1/heartbeat" \
-H "authorization: Bearer <token>" \
-H "content-type: application/json" \
-d '{
"kind":"telegram",
"ownerId":"local-dev",
"actorRole":"maintainer",
"credentialId":"<credential-id>",
"leaseToken":"<lease-token>",
"leaseTtlMs":1200000
}'
Release:
curl -sS -X POST "<site-url>/qa-credentials/v1/release" \
-H "authorization: Bearer <token>" \
-H "content-type: application/json" \
-d '{
"kind":"telegram",
"ownerId":"local-dev",
"actorRole":"maintainer",
"credentialId":"<credential-id>",
"leaseToken":"<lease-token>"
}'
Admin add (maintainer token only):
curl -sS -X POST "<site-url>/qa-credentials/v1/admin/add" \
-H "authorization: Bearer <maintainer-token>" \
-H "content-type: application/json" \
-d '{
"kind":"telegram",
"actorId":"local-maintainer",
"payload":{
"groupId":"-100123",
"driverToken":"driver-token",
"sutToken":"sut-token"
}
}'
For kind: "telegram", broker admin/add validates that payload includes:
groupId as a numeric chat id stringdriverTokensutTokenFor kind: "discord", broker admin/add validates that payload includes:
guildId as a Discord snowflake stringchannelId as a Discord snowflake stringdriverBotTokensutBotTokensutApplicationId as a Discord snowflake stringAdmin list (default redacted):
curl -sS -X POST "<site-url>/qa-credentials/v1/admin/list" \
-H "authorization: Bearer <maintainer-token>" \
-H "content-type: application/json" \
-d '{
"kind":"telegram",
"status":"all"
}'
Admin remove (soft disable, fails when lease is active):
curl -sS -X POST "<site-url>/qa-credentials/v1/admin/remove" \
-H "authorization: Bearer <maintainer-token>" \
-H "content-type: application/json" \
-d '{
"credentialId":"<credential-id>",
"actorId":"local-maintainer"
}'